Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Updater.exe

Overview

General Information

Sample name:Updater.exe
Analysis ID:1591997
MD5:8f3972f98564fc9d1e3e5a3840a0da85
SHA1:90e87af2bdfdf33e49eea353480cb8da362c450e
SHA256:cbdfe04b8f754e5e6150936ee604f0a478b79c6d0466ee155775ead575adea90
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Updater.exe (PID: 6456 cmdline: "C:\Users\user\Desktop\Updater.exe" MD5: 8F3972F98564FC9D1E3E5A3840A0DA85)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Updater.exeVirustotal: Detection: 15%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 89.6% probability
Source: Updater.exeStatic PE information: certificate valid
Source: unknownHTTPS traffic detected: 45.33.84.9:443 -> 192.168.2.7:49701 version: TLS 1.2
Source: Updater.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: r.PDB source: Updater.exe, 00000002.00000002.1424608962.000002D6C67E5000.00000004.00000020.00020000.00000000.sdmp
Source: global trafficHTTP traffic detected: POST /r HTTP/1.1Content-Type: text/plain; charset=utf-8Host: can.thisilient.comContent-Length: 1520Expect: 100-continueConnection: Keep-Alive
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: can.thisilient.com
Source: unknownHTTP traffic detected: POST /r HTTP/1.1Content-Type: text/plain; charset=utf-8Host: can.thisilient.comContent-Length: 1520Expect: 100-continueConnection: Keep-Alive
Source: Updater.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: Updater.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: Updater.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: Updater.exe, 00000002.00000002.1425269745.000002D6C8303000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://can.thisilient.com
Source: Updater.exeString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
Source: Updater.exeString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0$
Source: Updater.exeString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
Source: Updater.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: Updater.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: Updater.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: Updater.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: Updater.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: Updater.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: Updater.exeString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
Source: Updater.exeString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
Source: Updater.exeString found in binary or memory: http://ocsp.globalsign.com/rootr30;
Source: Updater.exe, 00000002.00000002.1425269745.000002D6C8231000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: Updater.exeString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
Source: Updater.exeString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
Source: Updater.exeString found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06
Source: Updater.exe, 00000002.00000002.1425269745.000002D6C82DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://can.thisilient.com
Source: Updater.exeString found in binary or memory: https://can.thisilient.com/r
Source: Updater.exeString found in binary or memory: https://www.globalsign.com/repository/0
Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
Source: unknownHTTPS traffic detected: 45.33.84.9:443 -> 192.168.2.7:49701 version: TLS 1.2
Source: C:\Users\user\Desktop\Updater.exeCode function: 2_2_00007FFAAC47B3352_2_00007FFAAC47B335
Source: Updater.exeStatic PE information: No import functions for PE file found
Source: classification engineClassification label: mal52.winEXE@1/1@1/1
Source: C:\Users\user\Desktop\Updater.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Updater.exe.logJump to behavior
Source: C:\Users\user\Desktop\Updater.exeMutant created: NULL
Source: Updater.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: Updater.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
Source: C:\Users\user\Desktop\Updater.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Updater.exeVirustotal: Detection: 15%
Source: C:\Users\user\Desktop\Updater.exeFile read: C:\Users\user\Desktop\Updater.exeJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
Source: Updater.exeStatic PE information: certificate valid
Source: Updater.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: Updater.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: Updater.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Updater.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: r.PDB source: Updater.exe, 00000002.00000002.1424608962.000002D6C67E5000.00000004.00000020.00020000.00000000.sdmp
Source: Updater.exeStatic PE information: 0x886E3A6B [Mon Jul 14 04:34:51 2042 UTC]
Source: C:\Users\user\Desktop\Updater.exeCode function: 2_2_00007FFAAC47782E pushad ; iretd 2_2_00007FFAAC47785D
Source: C:\Users\user\Desktop\Updater.exeCode function: 2_2_00007FFAAC47785E push eax; iretd 2_2_00007FFAAC47786D
Source: C:\Users\user\Desktop\Updater.exeCode function: 2_2_00007FFAAC47021D push E95E0398h; ret 2_2_00007FFAAC470259
Source: C:\Users\user\Desktop\Updater.exeCode function: 2_2_00007FFAAC477C2E pushad ; retf 2_2_00007FFAAC477C5D
Source: C:\Users\user\Desktop\Updater.exeCode function: 2_2_00007FFAAC477C5E push eax; retf 2_2_00007FFAAC477C6D
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeMemory allocated: 2D6C80D0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Updater.exeMemory allocated: 2D6E0230000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Updater.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Updater.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Updater.exe TID: 2708Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Updater.exe TID: 4312Thread sleep count: 168 > 30Jump to behavior
Source: C:\Users\user\Desktop\Updater.exe TID: 4312Thread sleep count: 327 > 30Jump to behavior
Source: C:\Users\user\Desktop\Updater.exe TID: 6308Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Updater.exe TID: 6776Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Updater.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Updater.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: Updater.exe, 00000002.00000002.1425802604.000002D6E0958000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\Updater.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\Updater.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\Updater.exeQueries volume information: C:\Users\user\Desktop\Updater.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Updater.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Updater.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Disable or Modify Tools
LSASS Memory31
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
Virtualization/Sandbox Evasion
Security Account Manager12
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Timestomp
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Updater.exe11%ReversingLabs
Updater.exe15%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://can.thisilient.com0%Avira URL Cloudsafe
http://can.thisilient.com0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
can.thisilient.com
45.33.84.9
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    https://can.thisilient.com/rfalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://can.thisilient.comUpdater.exe, 00000002.00000002.1425269745.000002D6C8303000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameUpdater.exe, 00000002.00000002.1425269745.000002D6C8231000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        https://can.thisilient.comUpdater.exe, 00000002.00000002.1425269745.000002D6C82DC000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        45.33.84.9
        can.thisilient.comUnited States
        63949LINODE-APLinodeLLCUSfalse
        Joe Sandbox version:42.0.0 Malachite
        Analysis ID:1591997
        Start date and time:2025-01-15 16:28:34 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 5m 13s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Run name:Run with higher sleep bypass
        Number of analysed new started processes analysed:13
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:Updater.exe
        Detection:MAL
        Classification:mal52.winEXE@1/1@1/1
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 79%
        • Number of executed functions: 3
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
        • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 13.107.253.45, 52.149.20.212
        • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • Report size getting too big, too many NtReadVirtualMemory calls found.
        No simulations
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        45.33.84.9ZipThis.exeGet hashmaliciousUnknownBrowse
          ZipThis.exeGet hashmaliciousUnknownBrowse
            http://www.kalenderpedia.deGet hashmaliciousUnknownBrowse
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              can.thisilient.comZipThis.exeGet hashmaliciousUnknownBrowse
              • 45.33.84.9
              ZipThis.exeGet hashmaliciousUnknownBrowse
              • 45.33.84.9
              http://www.kalenderpedia.deGet hashmaliciousUnknownBrowse
              • 45.33.84.9
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              LINODE-APLinodeLLCUShttps://realazure.action.azurecomm.net/api/v2/a/c?url=https://evoicemanageroauth-receptionextension.ayesgroup.com.tr/api/&d=AIAACYB2LC5AFHPW2VWJHSV6UVQVRFTHKQBDW7UWQ3KNJXOX5BDUSXJ3ZQRQJPJ5OCLBPZWKD4BJYLQE5BL3GPZPYFC3R7C3HOFZMPETSYONQACZBWKXDVJSZWINJEC6Z4RKVWOIGO4NDLG6FQA6LFOFNHOYVHNU6O5BF2CIF5XY7JZBYIXDHOQTPGKEQXDCQ5S3LP7YSIX6WCUPVILRNCLWJT2MHVSBN2DFV42FB6TTKWPS3I3ZHCMOW63EIPBFPUC2TNHK25YXIBLVSK2QFSGRKUWIP7I&s=CJMEZBXJGCDDZHAVATKKCN5IOIKFCP44FAQWT2LF3YTNOXOSBYKAGet hashmaliciousHTMLPhisherBrowse
              • 66.228.45.195
              Subscription_Renewal_Receipt_2025.htmGet hashmaliciousHTMLPhisherBrowse
              • 50.116.26.15
              https://m365.eu.vadesecure.com/safeproxy/v4?f=P2kPCMrad6wbkDicjo9-gccMP9mht8icnqc8BSBVdA_Y7h7opqWdVmIuu6aydhxUqmDN6F6EdXlLyB2l0qIMlQ&i=5-xWt8no16hszAEjWVJq7eaI9aJqiiKo6Nhcmhm-VGlgucrJV_O22YeSLcAbYkmTq4CwxD0j9z8vSmI-321xIA&k=xkCw&r=pXE3RoNwGsBbFpqq5275TB1w64v1huZFRPWjs9IU8PkouXkx5H5uI3MDfotj5UVm&s=fdffd7ecf746462b0c7628930ed8d07f470444f4a342766d2b3d92d5b7331db4&u=https%3A%2F%2Ftiny.pl%2Fc1rp2m9fGet hashmaliciousHTMLPhisherBrowse
              • 45.33.29.14
              RFQ PC25-1301 Product Specifications_PDF.exeGet hashmaliciousFormBookBrowse
              • 172.104.236.215
              MACHINE SPECIFICATIONS.exeGet hashmaliciousFormBookBrowse
              • 45.56.79.23
              http://premiumsub.hosted.phplist.com/Get hashmaliciousUnknownBrowse
              • 45.33.29.14
              1N6ZpdYnU3.exeGet hashmaliciousFormBookBrowse
              • 178.79.184.196
              http://www.jadavisinjurylawyers.com/Get hashmaliciousUnknownBrowse
              • 173.255.204.62
              boatnet.arm7.elfGet hashmaliciousUnknownBrowse
              • 104.237.135.249
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              3b5074b1b5d032e5620f69f9f700ff0ePersonliche Nachricht fur e4060738.pdfGet hashmaliciousUnknownBrowse
              • 45.33.84.9
              https://pub-2d00d32ff6d84ef6999828eaf509b772.r2.dev/index.html#watson.becky@aidb.orgGet hashmaliciousHTMLPhisherBrowse
              • 45.33.84.9
              Invoice No 1122207 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
              • 45.33.84.9
              http://www.flamingoblv.comGet hashmaliciousUnknownBrowse
              • 45.33.84.9
              NZZ71x6Cyz.dllGet hashmaliciousWannacryBrowse
              • 45.33.84.9
              qqnal04.exeGet hashmaliciousPhemedrone StealerBrowse
              • 45.33.84.9
              RFQ_43200046412000086500125.vbsGet hashmaliciousDiscord Token StealerBrowse
              • 45.33.84.9
              0969686.vbeGet hashmaliciousAgentTeslaBrowse
              • 45.33.84.9
              No context
              Process:C:\Users\user\Desktop\Updater.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1143
              Entropy (8bit):5.363323400812904
              Encrypted:false
              SSDEEP:24:ML9E4KQwKDE4KGKZI6KhwE4kLE4qXKIE4TKBGKoZAE4KKUNb:MxHKQwYHKGSI6owHoHitHTHhAHKKkb
              MD5:A975604E9D55484A4B077C59874EEE81
              SHA1:C9C7EB649A74DAF98D0EE85FB068683B354B01AA
              SHA-256:48F4690F7DA0CD34B59E447E73B182F81A444E19F618EF6CB378D7A5FC00825A
              SHA-512:46B22945CDEAD7AED49FB3FF079EE8E6D51571BB8C5DFDCC2AC00EEE858FC6E55C8BEF846080ACC31D7C57ABD2EFE1D410B2177D98D540148397B9C8DFB4DFE3
              Malicious:true
              Reputation:low
              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Net.Http, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Net.Http\f4b68470ad08185826d827aa6e7875b6\System.Net.Http.ni.dll",0..2,"System.Web, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Configuration\915c1ee906bd8dfc15398a4bab4acb48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, Publ
              File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
              Entropy (8bit):6.880048281652988
              TrID:
              • Win64 Executable GUI Net Framework (217006/5) 49.88%
              • Win64 Executable GUI (202006/5) 46.43%
              • Win64 Executable (generic) (12005/4) 2.76%
              • Generic Win/DOS Executable (2004/3) 0.46%
              • DOS Executable Generic (2002/1) 0.46%
              File name:Updater.exe
              File size:20'776 bytes
              MD5:8f3972f98564fc9d1e3e5a3840a0da85
              SHA1:90e87af2bdfdf33e49eea353480cb8da362c450e
              SHA256:cbdfe04b8f754e5e6150936ee604f0a478b79c6d0466ee155775ead575adea90
              SHA512:f0909e35e839bc8735d1f3b8c1ae37dc9b78ba9d8278a17f2dd660c1cfc18fa42a95d7a8cb9cbe44e73778440e3bb117c97377933860e68c07723c09b91f6f84
              SSDEEP:384:U+uUE99n53Fc4LVlDsQw/uo6ki2rcNi1HUfIXSJIVE8E9VF0Ny+P/s:UH9nysnDs8r2AkNTW2EIXs
              TLSH:E1927C46AB608C03DF578E7AF0E6852159B1B38B9CB9D9DB910EC1790E443802FD5A7C
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...k:n..........."...0.................. .....@..... .......................`.......x....`...@......@............... .....
              Icon Hash:00928e8e8686b000
              Entrypoint:0x140000000
              Entrypoint Section:
              Digitally signed:true
              Imagebase:0x140000000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Time Stamp:0x886E3A6B [Mon Jul 14 04:34:51 2042 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:
              Signature Valid:true
              Signature Issuer:CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE
              Signature Validation Error:The operation completed successfully
              Error Number:0
              Not Before, Not After
              • 21/02/2024 13:51:07 21/02/2025 13:51:07
              Subject Chain
              • E=contactus@lightnertok.com, CN=LIGHTNER TOK LTD, O=LIGHTNER TOK LTD, L=Tel Aviv-Jaffa, S=Tel Aviv, C=IL, OID.1.3.6.1.4.1.311.60.2.1.3=IL, SERIALNUMBER=516201944, OID.2.5.4.15=Private Organization
              Version:3
              Thumbprint MD5:CEC13869EA7B5624B992C775556F2F58
              Thumbprint SHA-1:B0F054A3A02999D47B5FADE5C33FA9C9FE1B951F
              Thumbprint SHA-256:661CCA115D81F163E9E7C33A3D60D2BFC02F95829864B132267E130EDA8DAE07
              Serial:4469809AA0E206829C99CD18
              Instruction
              dec ebp
              pop edx
              nop
              add byte ptr [ebx], al
              add byte ptr [eax], al
              add byte ptr [eax+eax], al
              add byte ptr [eax], al
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x610.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x22000x2f28
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
              IMAGE_DIRECTORY_ENTRY_DEBUG0x375c0x1c.text
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x20000x17780x18004827aa12af5b139f82d6a5776d2c9760False0.544921875data5.494857000998824IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rsrc0x40000x6100x80022cfa201420d24581bc417b9031ae853False0.3251953125data3.6438015075611085IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_VERSION0x40900x324data0.42786069651741293
              RT_MANIFEST0x43c40x246XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.4965635738831615
              TimestampSource PortDest PortSource IPDest IP
              Jan 15, 2025 16:29:31.568203926 CET49701443192.168.2.745.33.84.9
              Jan 15, 2025 16:29:31.568240881 CET4434970145.33.84.9192.168.2.7
              Jan 15, 2025 16:29:31.568303108 CET49701443192.168.2.745.33.84.9
              Jan 15, 2025 16:29:31.656088114 CET49701443192.168.2.745.33.84.9
              Jan 15, 2025 16:29:31.656111956 CET4434970145.33.84.9192.168.2.7
              Jan 15, 2025 16:29:32.171756029 CET4434970145.33.84.9192.168.2.7
              Jan 15, 2025 16:29:32.171838999 CET49701443192.168.2.745.33.84.9
              Jan 15, 2025 16:29:32.181622982 CET49701443192.168.2.745.33.84.9
              Jan 15, 2025 16:29:32.181634903 CET4434970145.33.84.9192.168.2.7
              Jan 15, 2025 16:29:32.182051897 CET4434970145.33.84.9192.168.2.7
              Jan 15, 2025 16:29:32.224253893 CET49701443192.168.2.745.33.84.9
              Jan 15, 2025 16:29:32.265774965 CET49701443192.168.2.745.33.84.9
              Jan 15, 2025 16:29:32.307328939 CET4434970145.33.84.9192.168.2.7
              Jan 15, 2025 16:29:32.368717909 CET4434970145.33.84.9192.168.2.7
              Jan 15, 2025 16:29:32.411473989 CET49701443192.168.2.745.33.84.9
              Jan 15, 2025 16:29:32.414896011 CET49701443192.168.2.745.33.84.9
              Jan 15, 2025 16:29:32.414907932 CET4434970145.33.84.9192.168.2.7
              Jan 15, 2025 16:29:32.812792063 CET4434970145.33.84.9192.168.2.7
              Jan 15, 2025 16:29:32.812943935 CET4434970145.33.84.9192.168.2.7
              Jan 15, 2025 16:29:32.812998056 CET49701443192.168.2.745.33.84.9
              Jan 15, 2025 16:29:32.821461916 CET49701443192.168.2.745.33.84.9
              TimestampSource PortDest PortSource IPDest IP
              Jan 15, 2025 16:29:31.530513048 CET5459453192.168.2.71.1.1.1
              Jan 15, 2025 16:29:31.558111906 CET53545941.1.1.1192.168.2.7
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Jan 15, 2025 16:29:31.530513048 CET192.168.2.71.1.1.10x9e53Standard query (0)can.thisilient.comA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Jan 15, 2025 16:29:31.558111906 CET1.1.1.1192.168.2.70x9e53No error (0)can.thisilient.com45.33.84.9A (IP address)IN (0x0001)false
              • can.thisilient.com
              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.74970145.33.84.94436456C:\Users\user\Desktop\Updater.exe
              TimestampBytes transferredDirectionData
              2025-01-15 15:29:32 UTC155OUTPOST /r HTTP/1.1
              Content-Type: text/plain; charset=utf-8
              Host: can.thisilient.com
              Content-Length: 1520
              Expect: 100-continue
              Connection: Keep-Alive
              2025-01-15 15:29:32 UTC25INHTTP/1.1 100 Continue
              2025-01-15 15:29:32 UTC1520OUTData Raw: 56 30 46 63 58 55 42 6d 57 41 55 50 41 41 31 51 55 55 5a 52 44 67 52 43 62 46 73 4c 56 6b 41 58 45 67 42 42 5a 77 78 53 58 68 78 4b 45 55 78 44 55 46 68 43 41 52 41 36 56 55 52 47 58 55 42 62 49 6c 39 47 57 77 41 61 43 41 30 56 54 6c 56 52 43 31 4a 49 42 52 6c 48 57 45 46 41 45 6c 6b 43 53 52 46 59 55 78 39 43 55 78 49 4a 47 78 59 46 55 33 4a 44 55 51 42 41 42 6c 73 77 52 51 59 57 51 52 49 4d 55 46 4a 4c 57 51 6f 57 41 56 56 46 58 78 63 48 42 53 42 41 51 33 4d 46 52 51 64 48 56 41 5a 2f 56 77 5a 58 44 30 45 48 56 47 4e 61 52 47 31 65 44 52 46 41 42 56 56 4f 57 30 49 53 43 56 6c 41 59 68 64 55 46 43 73 46 53 30 64 41 45 52 4e 52 55 78 77 63 48 41 42 56 45 68 31 50 53 51 52 45 48 57 64 4c 51 52 49 45 58 52 31 2b 4b 78 38 35 50 53 51 58 51 56 63 58 47 44 51
              Data Ascii: V0FcXUBmWAUPAA1QUUZRDgRCbFsLVkAXEgBBZwxSXhxKEUxDUFhCARA6VURGXUBbIl9GWwAaCA0VTlVRC1JIBRlHWEFAElkCSRFYUx9CUxIJGxYFU3JDUQBABlswRQYWQRIMUFJLWQoWAVVFXxcHBSBAQ3MFRQdHVAZ/VwZXD0EHVGNaRG1eDRFABVVOW0ISCVlAYhdUFCsFS0dAERNRUxwcHABVEh1PSQREHWdLQRIEXR1+Kx85PSQXQVcXGDQ
              2025-01-15 15:29:32 UTC190INHTTP/1.1 200 OK
              Content-Type: application/json
              Date: Wed, 15 Jan 2025 15:29:32 GMT
              Server: Nginx
              Vary: Accept-Encoding
              Via: 1.1 google
              Connection: close
              Transfer-Encoding: chunked
              2025-01-15 15:29:32 UTC65INData Raw: 33 62 0d 0a 7b 22 6d 65 73 73 61 67 65 22 3a 22 4f 6b 20 66 72 6f 6d 20 72 65 70 6f 72 74 20 70 6f 73 74 20 73 65 72 76 69 63 65 20 50 4f 53 54 22 2c 22 73 74 61 74 75 73 22 3a 32 30 30 7d 0d 0a
              Data Ascii: 3b{"message":"Ok from report post service POST","status":200}
              2025-01-15 15:29:32 UTC5INData Raw: 30 0d 0a 0d 0a
              Data Ascii: 0


              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Target ID:2
              Start time:10:29:29
              Start date:15/01/2025
              Path:C:\Users\user\Desktop\Updater.exe
              Wow64 process (32bit):false
              Commandline:"C:\Users\user\Desktop\Updater.exe"
              Imagebase:0x2d6c65e0000
              File size:20'776 bytes
              MD5 hash:8F3972F98564FC9D1E3E5A3840A0DA85
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low
              Has exited:true

              Reset < >

                Execution Graph

                Execution Coverage:11.7%
                Dynamic/Decrypted Code Coverage:100%
                Signature Coverage:0%
                Total number of Nodes:3
                Total number of Limit Nodes:0
                execution_graph 5678 7ffaac478644 5679 7ffaac47864d LoadLibraryExW 5678->5679 5681 7ffaac4786fd 5679->5681
                Memory Dump Source
                • Source File: 00000002.00000002.1426712326.00007FFAAC470000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC470000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffaac470000_Updater.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: eeb590769eac243c20f472a6de309dada23223d84d62a76060fc43694c7bc77f
                • Instruction ID: 409bba56e7f1fb50f5daf1bd233653daa7ac00760885327a5fbbb95e73ead354
                • Opcode Fuzzy Hash: eeb590769eac243c20f472a6de309dada23223d84d62a76060fc43694c7bc77f
                • Instruction Fuzzy Hash: ED722B3091DA898FEB65DB28C8597A47BE0FF56314F0481BED44EC7192DE38E90AC785

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 98 7ffaac478644-7ffaac47864b 99 7ffaac47864d-7ffaac478655 98->99 100 7ffaac478656-7ffaac4786bf 98->100 99->100 103 7ffaac4786c1-7ffaac4786c6 100->103 104 7ffaac4786c9-7ffaac4786fb LoadLibraryExW 100->104 103->104 105 7ffaac4786fd 104->105 106 7ffaac478703-7ffaac47872a 104->106 105->106
                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.1426712326.00007FFAAC470000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC470000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffaac470000_Updater.jbxd
                Similarity
                • API ID: LibraryLoad
                • String ID:
                • API String ID: 1029625771-0
                • Opcode ID: aa980a13cb12a38b992eac92b14708729621d59a7d5e72c8909485439ac7962f
                • Instruction ID: fd0a7d4899824ec6dccc140923acd9a700d213dfab8cef570032733d2d6bd29e
                • Opcode Fuzzy Hash: aa980a13cb12a38b992eac92b14708729621d59a7d5e72c8909485439ac7962f
                • Instruction Fuzzy Hash: AB31E43190CA5C9FDB59DBACC849AE9BBE0EB66320F00822BD00DD3251DB74A449CB91

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 170 7ffaac478072-7ffaac4786bf 173 7ffaac4786c1-7ffaac4786c6 170->173 174 7ffaac4786c9-7ffaac4786fb LoadLibraryExW 170->174 173->174 175 7ffaac4786fd 174->175 176 7ffaac478703-7ffaac47872a 174->176 175->176
                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.1426712326.00007FFAAC470000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC470000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffaac470000_Updater.jbxd
                Similarity
                • API ID: LibraryLoad
                • String ID:
                • API String ID: 1029625771-0
                • Opcode ID: 31da95ed59facccc6f6ed377dfc3e2b9315606ed354c0ecc1cb19dfdc18d8433
                • Instruction ID: f64fe0fa234003b8c2321ca4f24f0f50b38d08072e586f1ba2a0323d180ffc08
                • Opcode Fuzzy Hash: 31da95ed59facccc6f6ed377dfc3e2b9315606ed354c0ecc1cb19dfdc18d8433
                • Instruction Fuzzy Hash: 7E216D71908A1C9FDB58DF9CD849BE9BBE1FB69321F10822FD00ED3651DB70A8458B91