Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Gxm6KI51wl.exe

Overview

General Information

Sample name:Gxm6KI51wl.exe
renamed because original name is a hash value
Original sample name:1a1debc631daab24c955c28aa18e909b.exe
Analysis ID:1501289
MD5:1a1debc631daab24c955c28aa18e909b
SHA1:55e9a22c7d5d1eceffdc9657e78da59ec471f90e
SHA256:e09370c9adc09c15eb8d05301bd3c74ef76e98b8a2fa2089df9c4ec5d7b4e047
Tags:exeRedLineStealer
Infos:

Detection

PureLog Stealer, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected PureLog Stealer
Yara detected zgRAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
AI detected suspicious sample
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Reads the System eventlog
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables security privileges
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • Gxm6KI51wl.exe (PID: 4908 cmdline: "C:\Users\user\Desktop\Gxm6KI51wl.exe" MD5: 1A1DEBC631DAAB24C955C28AA18E909B)
    • conhost.exe (PID: 2688 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • MSBuild.exe (PID: 2684 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
zgRATzgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.zgrat
No configs have been found
SourceRuleDescriptionAuthorStrings
00000003.00000002.1241589726.0000000000802000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
    00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmpJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
      00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmpMALWARE_Win_zgRATDetects zgRATditekSHen
        • 0x4ed39:$s1: file:///
        • 0x4ec95:$s2: {11111-22222-10009-11112}
        • 0x4ecc9:$s3: {11111-22222-50001-00000}
        • 0x4c36c:$s4: get_Module
        • 0x484b3:$s5: Reverse
        • 0x489bb:$s6: BlockCopy
        • 0x484bf:$s7: ReadByte
        • 0x4ed4b:$s8: 4C 00 6F 00 63 00 61 00 74 00 69 00 6F 00 6E 00 00 0B 46 00 69 00 6E 00 64 00 20 00 00 13 52 00 65 00 73 00 6F 00 75 00 72 00 63 00 65 00 41 00 00 11 56 00 69 00 72 00 74 00 75 00 61 00 6C 00 ...
        SourceRuleDescriptionAuthorStrings
        0.2.Gxm6KI51wl.exe.6d86b000.2.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
          0.2.Gxm6KI51wl.exe.6d86b000.2.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            0.2.Gxm6KI51wl.exe.6d86b000.2.unpackMALWARE_Win_zgRATDetects zgRATditekSHen
            • 0x4cf39:$s1: file:///
            • 0x4ce95:$s2: {11111-22222-10009-11112}
            • 0x4cec9:$s3: {11111-22222-50001-00000}
            • 0x4a56c:$s4: get_Module
            • 0x466b3:$s5: Reverse
            • 0x46bbb:$s6: BlockCopy
            • 0x466bf:$s7: ReadByte
            • 0x4cf4b:$s8: 4C 00 6F 00 63 00 61 00 74 00 69 00 6F 00 6E 00 00 0B 46 00 69 00 6E 00 64 00 20 00 00 13 52 00 65 00 73 00 6F 00 75 00 72 00 63 00 65 00 41 00 00 11 56 00 69 00 72 00 74 00 75 00 61 00 6C 00 ...
            3.2.MSBuild.exe.800000.0.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
              3.2.MSBuild.exe.800000.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                Click to see the 7 entries
                No Sigma rule has matched
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: C:\Users\user\AppData\Roaming\d3d9x.dllReversingLabs: Detection: 60%
                Source: Gxm6KI51wl.exeReversingLabs: Detection: 66%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Roaming\d3d9x.dllJoe Sandbox ML: detected
                Source: Gxm6KI51wl.exeJoe Sandbox ML: detected
                Source: Gxm6KI51wl.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: Gxm6KI51wl.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeCode function: 0_2_6D85C4A8 FindFirstFileExW,0_2_6D85C4A8
                Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficDNS traffic detected: DNS query: time.windows.com
                Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
                Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49677 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior

                System Summary

                barindex
                Source: 0.2.Gxm6KI51wl.exe.6d86b000.2.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 3.2.MSBuild.exe.800000.0.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.Gxm6KI51wl.exe.6d86b000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.Gxm6KI51wl.exe.6d840000.1.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.Gxm6KI51wl.exe.6d86b000.2.raw.unpack, Strings.csLarge array initialization: Strings: array initializer size 6160
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeCode function: 0_2_6D848DA0 GetModuleHandleW,NtQueryInformationProcess,0_2_6D848DA0
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeCode function: 0_2_6D848DA00_2_6D848DA0
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeCode function: 0_2_6D8411D00_2_6D8411D0
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeCode function: 0_2_6D8485C00_2_6D8485C0
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeCode function: 0_2_6D862A450_2_6D862A45
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00F85FB93_2_00F85FB9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00F8EB983_2_00F8EB98
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00F8EB883_2_00F8EB88
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00F8CC543_2_00F8CC54
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: SecurityJump to behavior
                Source: Gxm6KI51wl.exe, 00000000.00000000.1232983026.00000000002C2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameIrisKevin186Wendy.mscL vs Gxm6KI51wl.exe
                Source: Gxm6KI51wl.exe, 00000000.00000002.1247140436.0000000000A4E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Gxm6KI51wl.exe
                Source: Gxm6KI51wl.exe, 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmpBinary or memory string: OriginalFilenameCricketer.exe" vs Gxm6KI51wl.exe
                Source: Gxm6KI51wl.exeBinary or memory string: OriginalFilenameIrisKevin186Wendy.mscL vs Gxm6KI51wl.exe
                Source: Gxm6KI51wl.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.Gxm6KI51wl.exe.6d86b000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 3.2.MSBuild.exe.800000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.Gxm6KI51wl.exe.6d86b000.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.Gxm6KI51wl.exe.6d840000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: Gxm6KI51wl.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 0.2.Gxm6KI51wl.exe.6d86b000.2.raw.unpack, Strings.csCryptographic APIs: 'CreateDecryptor'
                Source: 0.2.Gxm6KI51wl.exe.6d86b000.2.raw.unpack, daD.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.Gxm6KI51wl.exe.6d86b000.2.raw.unpack, daD.csCryptographic APIs: 'CreateDecryptor'
                Source: 0.2.Gxm6KI51wl.exe.6d86b000.2.raw.unpack, y7p.csCryptographic APIs: 'CreateDecryptor'
                Source: 0.2.Gxm6KI51wl.exe.6d86b000.2.raw.unpack, Strings.csBase64 encoded string: 'GwIERx07GzAFKSEpHCoDKR03NR8GKgM2LF8hPh1cNgkcKAM5BSwHPgcoOgkaOCVHGiciBSldQh0dO0NO'
                Source: classification engineClassification label: mal100.troj.evad.winEXE@4/3@1/0
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeFile created: C:\Users\user\AppData\Roaming\d3d9x.dllJump to behavior
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2688:120:WilError_03
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: NULL
                Source: Gxm6KI51wl.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: Gxm6KI51wl.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: Gxm6KI51wl.exeReversingLabs: Detection: 66%
                Source: unknownProcess created: C:\Users\user\Desktop\Gxm6KI51wl.exe "C:\Users\user\Desktop\Gxm6KI51wl.exe"
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: textshaping.dllJump to behavior
                Source: Gxm6KI51wl.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: Gxm6KI51wl.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Data Obfuscation

                barindex
                Source: 0.2.Gxm6KI51wl.exe.6d86b000.2.raw.unpack, y7p.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 0.2.Gxm6KI51wl.exe.6d86b000.2.raw.unpack, FPZ.cs.Net Code: NTS
                Source: d3d9x.dll.0.drStatic PE information: section name: .Jpc
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeCode function: 0_2_6D863174 push ecx; ret 0_2_6D863187
                Source: Gxm6KI51wl.exeStatic PE information: section name: .text entropy: 7.165136221561172
                Source: d3d9x.dll.0.drStatic PE information: section name: .text entropy: 6.871072071474358
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeFile created: C:\Users\user\AppData\Roaming\d3d9x.dllJump to dropped file
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeMemory allocated: E80000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeMemory allocated: 26B0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeMemory allocated: 25E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeMemory allocated: 4D60000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeMemory allocated: 5D60000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeMemory allocated: 5E90000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeMemory allocated: 6E90000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: F80000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2800000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 25C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\d3d9x.dllJump to dropped file
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeAPI coverage: 9.1 %
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exe TID: 6532Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5376Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeCode function: 0_2_6D85C4A8 FindFirstFileExW,0_2_6D85C4A8
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeCode function: 0_2_6D85BDF7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6D85BDF7
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeCode function: 0_2_6D857981 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_6D857981
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeCode function: 0_2_6D85BDF7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6D85BDF7
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeCode function: 0_2_6D857E5A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6D857E5A
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 800000 protect: page execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 800000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 800000Jump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 802000Jump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 85E000Jump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 87E000Jump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 6AF008Jump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeCode function: 0_2_6D858018 cpuid 0_2_6D858018
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeQueries volume information: C:\Users\user\Desktop\Gxm6KI51wl.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Gxm6KI51wl.exeCode function: 0_2_6D857AA3 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_6D857AA3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.Gxm6KI51wl.exe.6d86b000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.MSBuild.exe.800000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Gxm6KI51wl.exe.6d86b000.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Gxm6KI51wl.exe.6d840000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.1241589726.0000000000802000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmp, type: MEMORY
                Source: Yara matchFile source: 0.2.Gxm6KI51wl.exe.6d86b000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.MSBuild.exe.800000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Gxm6KI51wl.exe.6d86b000.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Gxm6KI51wl.exe.6d840000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmp, type: MEMORY

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.Gxm6KI51wl.exe.6d86b000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.MSBuild.exe.800000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Gxm6KI51wl.exe.6d86b000.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Gxm6KI51wl.exe.6d840000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.1241589726.0000000000802000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmp, type: MEMORY
                Source: Yara matchFile source: 0.2.Gxm6KI51wl.exe.6d86b000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.MSBuild.exe.800000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Gxm6KI51wl.exe.6d86b000.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Gxm6KI51wl.exe.6d840000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmp, type: MEMORY
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                DLL Side-Loading
                311
                Process Injection
                1
                Masquerading
                OS Credential Dumping1
                System Time Discovery
                Remote Services11
                Archive Collected Data
                12
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                1
                Disable or Modify Tools
                LSASS Memory11
                Security Software Discovery
                Remote Desktop ProtocolData from Removable Media1
                Non-Application Layer Protocol
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
                Virtualization/Sandbox Evasion
                Security Account Manager31
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared Drive2
                Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
                Process Injection
                NTDS1
                File and Directory Discovery
                Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets23
                System Information Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
                Obfuscated Files or Information
                Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
                Software Packing
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                DLL Side-Loading
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Gxm6KI51wl.exe67%ReversingLabsByteCode-MSIL.Trojan.LummaStealer
                Gxm6KI51wl.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\d3d9x.dll100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\d3d9x.dll61%ReversingLabsWin32.Trojan.Midie
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                bg.microsoft.map.fastly.net
                199.232.214.172
                truefalse
                  unknown
                  time.windows.com
                  unknown
                  unknownfalse
                    unknown
                    No contacted IP infos
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1501289
                    Start date and time:2024-08-29 17:06:07 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 5m 26s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:22
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:Gxm6KI51wl.exe
                    renamed because original name is a hash value
                    Original Sample Name:1a1debc631daab24c955c28aa18e909b.exe
                    Detection:MAL
                    Classification:mal100.troj.evad.winEXE@4/3@1/0
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 89%
                    • Number of executed functions: 21
                    • Number of non-executed functions: 20
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe, UsoClient.exe
                    • Excluded IPs from analysis (whitelisted): 51.124.78.146, 184.28.90.27, 199.232.214.172, 40.126.31.71, 40.126.31.73, 20.190.159.23, 20.190.159.71, 20.190.159.0, 20.190.159.64, 20.190.159.75, 20.190.159.73, 13.95.65.251, 13.85.23.86, 4.231.128.59, 52.165.164.15, 20.242.39.171, 52.183.220.149, 40.68.123.157
                    • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, twc.trafficmanager.net, settings-prod-scus-2.southcentralus.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, atm-settingsfe-prod-geo2.trafficmanager.net, login.live.com, e16604.g.akamaiedge.net, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, settings-prod-weu-1.westeurope.cloudapp.azure.com, prdv4a.aadg.msidentity.com, fs.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, www.tm.v4.a.prd.aadg.akadns.net, settings-win.data.microsoft.com, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, settings-prod-neu-3.northeurope.cloudapp.azure.com, www.tm.lg.prod.aadmsa.trafficmanager.net
                    • Not all processes where analyzed, report is missing behavior information
                    • VT rate limit hit for: Gxm6KI51wl.exe
                    No simulations
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    bg.microsoft.map.fastly.nethttp://www.water-filter.comGet hashmaliciousHTMLPhisherBrowse
                    • 199.232.210.172
                    http://general72.s3-website.us-east-2.amazonaws.comGet hashmaliciousUnknownBrowse
                    • 199.232.214.172
                    http://premium.davidabostic.comGet hashmaliciousUnknownBrowse
                    • 199.232.210.172
                    https://elc-path.com/pdfglobal2/docs89q9eqwwe/login.php#wa=wsignin1.0&rpsnv=13&ct=1539585327&rver=7.0.6737.0&wp=MBI_SSL&wreply=https%3a%2f%2foutlook.live.com%2fowa%2f%3fnlp%3d1%26RpsCsrfState%3d715d44a2-2f11-4282-f625-a066679e96e2&id=292841&CBCXT=out&lw=1&fl=dob%2cflname%2cwld&cobrandid=90015Get hashmaliciousHTMLPhisherBrowse
                    • 199.232.210.172
                    https://gocloud.co.ke/ShareDocu.php/?email=cmFjaGVsakBjb21wbHl3b3Jrcy5jb20=Get hashmaliciousCaptcha Phish, HTMLPhisherBrowse
                    • 199.232.214.172
                    unitedserviceorganizationsstaff-5.8.9154-windows-installer.msiGet hashmaliciousScreenConnect ToolBrowse
                    • 199.232.214.172
                    https://mpcpallc.weebly.com/Get hashmaliciousUnknownBrowse
                    • 199.232.214.172
                    http://control.frilix.com/grace/fxc/aW5mby5jcmVkaXRldXJlbkBicmVkYS5ubA==Get hashmaliciousHTMLPhisherBrowse
                    • 199.232.210.172
                    https://set.page/cdtautomotive/Get hashmaliciousUnknownBrowse
                    • 199.232.214.172
                    https://sgsconsulting.com/Get hashmaliciousUnknownBrowse
                    • 199.232.210.172
                    No context
                    No context
                    No context
                    Process:C:\Users\user\Desktop\Gxm6KI51wl.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):42
                    Entropy (8bit):4.0050635535766075
                    Encrypted:false
                    SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
                    MD5:84CFDB4B995B1DBF543B26B86C863ADC
                    SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
                    SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
                    SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):1119
                    Entropy (8bit):5.345080863654519
                    Encrypted:false
                    SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0Hj
                    MD5:88593431AEF401417595E7A00FE86E5F
                    SHA1:1714B8F6F6DCAAB3F3853EDABA7687F16DD331F4
                    SHA-256:ED5E60336FB00579E0867B9615CBD0C560BB667FE3CEE0674F690766579F1032
                    SHA-512:1D442441F96E69D8A6D5FB7E8CF01F13AF88CA2C2D0960120151B15505DD1CADC607EF9983373BA8E422C65FADAB04A615968F335A875B5C075BB9A6D0F346C9
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                    Process:C:\Users\user\Desktop\Gxm6KI51wl.exe
                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):710656
                    Entropy (8bit):6.583072660656992
                    Encrypted:false
                    SSDEEP:12288:LItXaj3jmzqKl/sBFOh2XQifmjlK1L6cfHm8Qqz0w9H4ioVy1ymytypyeyryXyCm:Zjir/6FOh2XQifmjlK1L6cfHm8Qqz0we
                    MD5:87F783D7BB2592054664BA866379E207
                    SHA1:08EBD308E6B5384C0A8C96A748C9438CAEF0EC06
                    SHA-256:8E788B428F5997721540AAE2FD0491FAE2F189F6F10A3CB0F7F3342C41E79304
                    SHA-512:FC0C6284550C5181E2618BA4E82E8057FACD269BA2E73BF43201FD94675384897DB0016EEFB7D3FCBF8C527A514A27C8FD52AB03B390F2FF5280A6BA4CDA67FB
                    Malicious:true
                    Antivirus:
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: ReversingLabs, Detection: 61%
                    Reputation:low
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f...........!...&.$..."......^y.......@............................................@.........................@...x.......<.......................................................................@............@..L............................text....#.......$.................. ..`.rdata..Bh...@...j...(..............@..@.data...d...........................@....Jpc.........P.......$.............. ..`.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................
                    File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):7.1587006887290725
                    TrID:
                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    • Win32 Executable (generic) a (10002005/4) 49.78%
                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                    • Generic Win/DOS Executable (2004/3) 0.01%
                    • DOS Executable Generic (2002/1) 0.01%
                    File name:Gxm6KI51wl.exe
                    File size:720'896 bytes
                    MD5:1a1debc631daab24c955c28aa18e909b
                    SHA1:55e9a22c7d5d1eceffdc9657e78da59ec471f90e
                    SHA256:e09370c9adc09c15eb8d05301bd3c74ef76e98b8a2fa2089df9c4ec5d7b4e047
                    SHA512:ad13d127931ab0a75d6d6732b52df590b548adf45cd2886ee9cb49fe82a0570c474bd6efa80ae3be8364939df964bc127bdc4cb655313ff8be788d6d2a430c56
                    SSDEEP:12288:kOxjCHqsMHuZud8HWtEfGI48z2/Ne7FJTPibnlqap5meCVY4B7gxuLHYuaMPtggw:5Ie81eI48647PT
                    TLSH:61E492DD325072DFC85BC8728AA81D64FB6074BB971F5203A0671AED9A4E997CF140F2
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f................................. ... ....@.. .......................`............@................................
                    Icon Hash:00928e8e8686b000
                    Entrypoint:0x4b139e
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows cui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Time Stamp:0x66CCB3BB [Mon Aug 26 16:56:27 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                    Instruction
                    jmp dword ptr [00402000h]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0xb134c0x4f.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xb20000x6d8.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xb40000xc.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x20000xaf3a40xaf4004c9453a3faa2713eb33a08cf2a62ef63False0.705741240192582data7.165136221561172IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rsrc0xb20000x6d80x8000974655a9b5ccc8255df2c008d7bde96False0.36181640625data3.7232127339524883IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0xb40000xc0x200987bec5518cef9b50a068eab2f87a73aFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_VERSION0xb20a00x44cdata0.3981818181818182
                    RT_MANIFEST0xb24ec0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                    DLLImport
                    mscoree.dll_CorExeMain
                    TimestampSource PortDest PortSource IPDest IP
                    Aug 29, 2024 17:06:55.177093983 CEST49671443192.168.2.7204.79.197.203
                    Aug 29, 2024 17:06:55.489334106 CEST49671443192.168.2.7204.79.197.203
                    Aug 29, 2024 17:06:56.098843098 CEST49671443192.168.2.7204.79.197.203
                    Aug 29, 2024 17:06:57.114434958 CEST49674443192.168.2.7104.98.116.138
                    Aug 29, 2024 17:06:57.114434004 CEST49675443192.168.2.7104.98.116.138
                    Aug 29, 2024 17:06:57.255024910 CEST49672443192.168.2.7104.98.116.138
                    Aug 29, 2024 17:06:57.301841021 CEST49671443192.168.2.7204.79.197.203
                    Aug 29, 2024 17:06:59.708086967 CEST49671443192.168.2.7204.79.197.203
                    Aug 29, 2024 17:07:03.724240065 CEST49677443192.168.2.720.50.201.200
                    Aug 29, 2024 17:07:04.098731995 CEST49677443192.168.2.720.50.201.200
                    Aug 29, 2024 17:07:04.520602942 CEST49671443192.168.2.7204.79.197.203
                    Aug 29, 2024 17:07:04.848722935 CEST49677443192.168.2.720.50.201.200
                    Aug 29, 2024 17:07:06.348726034 CEST49677443192.168.2.720.50.201.200
                    Aug 29, 2024 17:07:06.723714113 CEST49674443192.168.2.7104.98.116.138
                    Aug 29, 2024 17:07:06.723731041 CEST49675443192.168.2.7104.98.116.138
                    Aug 29, 2024 17:07:06.864379883 CEST49672443192.168.2.7104.98.116.138
                    Aug 29, 2024 17:07:09.319602966 CEST44349698104.98.116.138192.168.2.7
                    Aug 29, 2024 17:07:09.319713116 CEST49698443192.168.2.7104.98.116.138
                    Aug 29, 2024 17:07:09.333182096 CEST49677443192.168.2.720.50.201.200
                    Aug 29, 2024 17:07:14.130019903 CEST49671443192.168.2.7204.79.197.203
                    Aug 29, 2024 17:07:15.286293030 CEST49677443192.168.2.720.50.201.200
                    Aug 29, 2024 17:07:17.917107105 CEST49698443192.168.2.7104.98.116.138
                    Aug 29, 2024 17:07:17.918224096 CEST49716443192.168.2.7104.98.116.138
                    Aug 29, 2024 17:07:17.918251991 CEST44349716104.98.116.138192.168.2.7
                    Aug 29, 2024 17:07:17.918309927 CEST49716443192.168.2.7104.98.116.138
                    Aug 29, 2024 17:07:17.923335075 CEST49716443192.168.2.7104.98.116.138
                    Aug 29, 2024 17:07:17.923355103 CEST44349716104.98.116.138192.168.2.7
                    Aug 29, 2024 17:07:17.927005053 CEST44349698104.98.116.138192.168.2.7
                    Aug 29, 2024 17:07:27.192569971 CEST49677443192.168.2.720.50.201.200
                    Aug 29, 2024 17:08:00.728403091 CEST44349716104.98.116.138192.168.2.7
                    Aug 29, 2024 17:08:00.728487015 CEST49716443192.168.2.7104.98.116.138
                    TimestampSource PortDest PortSource IPDest IP
                    Aug 29, 2024 17:07:08.456845999 CEST6206753192.168.2.71.1.1.1
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Aug 29, 2024 17:07:08.456845999 CEST192.168.2.71.1.1.10x4965Standard query (0)time.windows.comA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Aug 29, 2024 17:07:06.627248049 CEST1.1.1.1192.168.2.70x1a48No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                    Aug 29, 2024 17:07:06.627248049 CEST1.1.1.1192.168.2.70x1a48No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                    Aug 29, 2024 17:07:08.464217901 CEST1.1.1.1192.168.2.70x4965No error (0)time.windows.comtwc.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                    Aug 29, 2024 17:07:56.337891102 CEST1.1.1.1192.168.2.70xffffNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                    Aug 29, 2024 17:07:56.337891102 CEST1.1.1.1192.168.2.70xffffNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:11:06:59
                    Start date:29/08/2024
                    Path:C:\Users\user\Desktop\Gxm6KI51wl.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\Gxm6KI51wl.exe"
                    Imagebase:0x2c0000
                    File size:720'896 bytes
                    MD5 hash:1A1DEBC631DAAB24C955C28AA18E909B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmp, Author: Joe Security
                    • Rule: MALWARE_Win_zgRAT, Description: Detects zgRAT, Source: 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmp, Author: ditekSHen
                    Reputation:low
                    Has exited:true

                    Target ID:1
                    Start time:11:06:59
                    Start date:29/08/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff75da10000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:3
                    Start time:11:07:00
                    Start date:29/08/2024
                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    Imagebase:0x3d0000
                    File size:262'432 bytes
                    MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000003.00000002.1241589726.0000000000802000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:high
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:2.6%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:45%
                      Total number of Nodes:60
                      Total number of Limit Nodes:3
                      execution_graph 61940 6d857b47 15 API calls ___std_type_info_destroy_list 61917 6d841000 5 API calls CatchGuardHandler 61941 6d862040 20 API calls __startOneArgErrorHandling 61923 6d85f88f 15 API calls __freea 61925 6d857c8b 21 API calls 2 library calls 61926 6d85b30b 6 API calls 61927 6d85db95 FreeLibrary 61943 6d857c57 14 API calls ___scrt_release_startup_lock 61883 6d8411d0 61891 6d8411f8 CallUnexpected CatchIt 61883->61891 61884 6d847c8e FindCloseChangeNotification CloseHandle 61884->61891 61885 6d84849f CreateFileMappingA 61885->61891 61886 6d8470c5 GetCurrentProcess 61886->61891 61887 6d847525 CreateFileMappingA 61887->61891 61888 6d847d3e CloseHandle 61888->61891 61889 6d8484f3 CloseHandle 61889->61891 61890 6d847a84 VirtualProtect 61890->61891 61891->61884 61891->61885 61891->61886 61891->61887 61891->61888 61891->61889 61891->61890 61892 6d847b1d VirtualProtect 61891->61892 61893 6d84734a CreateFileA 61891->61893 61894 6d8472e2 K32GetModuleInformation GetModuleFileNameA 61891->61894 61895 6d84845d GetModuleHandleA 61891->61895 61896 6d8476ef MapViewOfFile 61891->61896 61897 6d847e6c 61891->61897 61900 6d847179 GetModuleHandleA 61891->61900 61901 6d848586 CloseHandle 61891->61901 61902 6d847680 CloseHandle 61891->61902 61892->61891 61893->61891 61894->61891 61895->61891 61896->61891 61903 6d857610 5 API calls CatchGuardHandler 61897->61903 61899 6d847e76 61900->61891 61901->61891 61902->61891 61903->61899 61929 6d85c99c 32 API calls 2 library calls 61930 6d85d69f 20 API calls __freea 61944 6d85dbe6 32 API calls 61875 6d848da0 61878 6d848dc0 CallUnexpected 61875->61878 61876 6d84906b GetModuleHandleW 61876->61878 61877 6d8493da 61882 6d857610 5 API calls CatchGuardHandler 61877->61882 61878->61876 61878->61877 61881 6d8490be NtQueryInformationProcess 61878->61881 61880 6d8493ea 61881->61878 61882->61880 61932 6d857aa3 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 61946 6d85bce2 7 API calls 61934 6d860e2f 69 API calls ___std_exception_copy 61947 6d858bec 49 API calls 2 library calls 61948 6d85e2ee LeaveCriticalSection 61935 6d85d9a9 6 API calls _unexpected 61936 6d85c32b 46 API calls 3 library calls 61949 6d857cf4 4 API calls 2 library calls 61938 6d858930 6 API calls 4 library calls 61951 6d85f2f0 39 API calls 61939 6d8617b0 15 API calls 61952 6d859df3 52 API calls 3 library calls 61953 6d859efe 29 API calls std::exception::exception 61904 6d857cbb 61905 6d857cc4 61904->61905 61912 6d858018 IsProcessorFeaturePresent 61905->61912 61907 6d857cd0 61913 6d858aed 10 API calls 2 library calls 61907->61913 61909 6d857cd5 61910 6d857cd9 61909->61910 61914 6d858b1f 7 API calls 2 library calls 61909->61914 61912->61907 61913->61909 61914->61910 61954 6d85aafb 53 API calls 3 library calls
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1249955717.000000006D841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D840000, based on PE: true
                      • Associated: 00000000.00000002.1249928556.000000006D840000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250012730.000000006D864000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250193109.000000006D8E5000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250226545.000000006D8EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d840000_Gxm6KI51wl.jbxd
                      Yara matches
                      Similarity
                      • API ID: Handle$File$CloseModule$Create$MappingProtectVirtual$CurrentInformationNameProcessView
                      • String ID: $<tE$)/rF$,N}"$,N}"$.;yp$/c~<$0r0$5}$5}$@$TCX)$a1-t$a1-t$c00$h#s=$w9vY$x3^w$x3^w$z8a$O \$YhH$pA[
                      • API String ID: 1213677244-3495332049
                      • Opcode ID: f3574032e9f9eaf810e92c518d9b4a642dd97943a26bde7249a7e6dd6eba56a8
                      • Instruction ID: 4253f4fcfc4fc3e09e8184851d0e41fb567ddabea9b413cef1158b9f18517d39
                      • Opcode Fuzzy Hash: f3574032e9f9eaf810e92c518d9b4a642dd97943a26bde7249a7e6dd6eba56a8
                      • Instruction Fuzzy Hash: 8CC34232E6421D8FDF15CE3CC9D97DDB7F2BB8A320F01CA4598199B295D63689898F40

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1169 6d848da0-6d848db9 1170 6d848dc0-6d848dcb 1169->1170 1171 6d848f57-6d848fc5 1170->1171 1172 6d848dd1-6d848dde 1170->1172 1173 6d849431 1171->1173 1175 6d848de4-6d848df1 1172->1175 1176 6d84930d-6d84931b 1172->1176 1173->1170 1178 6d848df7-6d848e04 1175->1178 1179 6d84932c-6d849375 1175->1179 1176->1173 1181 6d84942a 1178->1181 1182 6d848e0a-6d848e17 1178->1182 1179->1173 1181->1173 1184 6d849301-6d849308 1182->1184 1185 6d848e1d-6d848e2a 1182->1185 1184->1173 1187 6d848e30-6d848e3d 1185->1187 1188 6d84912b-6d849199 1185->1188 1190 6d848e43-6d848e50 1187->1190 1191 6d84937a-6d8493c9 1187->1191 1188->1173 1193 6d848e56-6d848e63 1190->1193 1194 6d8493ce-6d8493d5 1190->1194 1191->1173 1196 6d849219-6d849220 1193->1196 1197 6d848e69-6d848e76 1193->1197 1194->1173 1196->1173 1199 6d849116-6d849126 1197->1199 1200 6d848e7c-6d848e89 1197->1200 1199->1173 1202 6d848e8f-6d848e9c 1200->1202 1203 6d849409-6d849413 1200->1203 1205 6d848ea2-6d848eaf 1202->1205 1206 6d848fca-6d84905a 1202->1206 1203->1173 1208 6d848eb5-6d848ec2 1205->1208 1209 6d849418-6d849425 1205->1209 1206->1173 1211 6d849320-6d849327 1208->1211 1212 6d848ec8-6d848ed5 1208->1212 1209->1173 1211->1173 1214 6d849225-6d84928b 1212->1214 1215 6d848edb-6d848ee8 1212->1215 1214->1173 1217 6d849290-6d8492fc 1215->1217 1218 6d848eee-6d848efb 1215->1218 1217->1173 1220 6d8493f5-6d849404 1218->1220 1221 6d848f01-6d848f0e 1218->1221 1220->1173 1223 6d848f14-6d848f21 1221->1223 1224 6d84919e-6d849214 1221->1224 1226 6d848f27-6d848f34 1223->1226 1227 6d84905f-6d849066 1223->1227 1224->1173 1229 6d848f3a-6d848f47 1226->1229 1230 6d84906b-6d849111 GetModuleHandleW call 6d8485c0 call 6d858210 NtQueryInformationProcess 1226->1230 1227->1173 1233 6d848f4d-6d848f52 1229->1233 1234 6d8493da-6d8493f4 call 6d857610 1229->1234 1230->1173 1233->1173
                      APIs
                      • GetModuleHandleW.KERNEL32 ref: 6D849077
                      • NtQueryInformationProcess.NTDLL ref: 6D8490FA
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1249955717.000000006D841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D840000, based on PE: true
                      • Associated: 00000000.00000002.1249928556.000000006D840000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250012730.000000006D864000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250193109.000000006D8E5000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250226545.000000006D8EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d840000_Gxm6KI51wl.jbxd
                      Yara matches
                      Similarity
                      • API ID: HandleInformationModuleProcessQuery
                      • String ID: NtQueryInformationProcess$ntdll.dll
                      • API String ID: 2776635927-2906145389
                      • Opcode ID: 6d72c4d7698f800ebcf1a93fa012e21f3bfe9f4ad64f9bc0dbbf1f8aee478a2d
                      • Instruction ID: 67cdb367cb512b48c16aff14070b6e901d061490ee867a81cadfccdde4ba64c5
                      • Opcode Fuzzy Hash: 6d72c4d7698f800ebcf1a93fa012e21f3bfe9f4ad64f9bc0dbbf1f8aee478a2d
                      • Instruction Fuzzy Hash: 41F10572A552098FCF04DE7CD6987DE7BF2BB8A320F11D919E515DB394C63A8809CB81
                      APIs
                      • IsProcessorFeaturePresent.KERNEL32(00000017,00000000), ref: 6D857E66
                      • IsDebuggerPresent.KERNEL32 ref: 6D857F32
                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6D857F4B
                      • UnhandledExceptionFilter.KERNEL32(?), ref: 6D857F55
                      Memory Dump Source
                      • Source File: 00000000.00000002.1249955717.000000006D841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D840000, based on PE: true
                      • Associated: 00000000.00000002.1249928556.000000006D840000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250012730.000000006D864000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250193109.000000006D8E5000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250226545.000000006D8EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d840000_Gxm6KI51wl.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                      • String ID:
                      • API String ID: 254469556-0
                      • Opcode ID: 77fa969f91616a75a3301a468fd8eafbf0d1ca52c796035346d505000b5b444d
                      • Instruction ID: 377bb94b56ce268a4cf5585964b21b45825c7b0ab1cde31d66ca6413695ad87f
                      • Opcode Fuzzy Hash: 77fa969f91616a75a3301a468fd8eafbf0d1ca52c796035346d505000b5b444d
                      • Instruction Fuzzy Hash: 9331F875D052299BDF51DFA4D9497CDBBB8EF08304F1095AAE50CAB240EB709A84CF85
                      APIs
                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,6D857AA1,6D864934), ref: 6D857986
                      • UnhandledExceptionFilter.KERNEL32(?), ref: 6D85798F
                      • GetCurrentProcess.KERNEL32(C0000409), ref: 6D85799A
                      • TerminateProcess.KERNEL32(00000000), ref: 6D8579A1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1249955717.000000006D841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D840000, based on PE: true
                      • Associated: 00000000.00000002.1249928556.000000006D840000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250012730.000000006D864000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250193109.000000006D8E5000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250226545.000000006D8EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d840000_Gxm6KI51wl.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionFilterProcessUnhandled$CurrentTerminate
                      • String ID:
                      • API String ID: 3231755760-0
                      • Opcode ID: ecccddbc71b0952095a687e615e3c48562d2f90404c97a7fe24df0e74b150e10
                      • Instruction ID: 88da1caff558d3586100d3c58724a8c91d36b4aeb333b31b6b4665024d6584b2
                      • Opcode Fuzzy Hash: ecccddbc71b0952095a687e615e3c48562d2f90404c97a7fe24df0e74b150e10
                      • Instruction Fuzzy Hash: F3D0C932008194ABCE852BE8DA1CBAD3B38EB8E626F011000F71981001CB314454CB92
                      APIs
                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 6D85BEEF
                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 6D85BEF9
                      • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 6D85BF06
                      Memory Dump Source
                      • Source File: 00000000.00000002.1249955717.000000006D841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D840000, based on PE: true
                      • Associated: 00000000.00000002.1249928556.000000006D840000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250012730.000000006D864000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250193109.000000006D8E5000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250226545.000000006D8EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d840000_Gxm6KI51wl.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                      • String ID:
                      • API String ID: 3906539128-0
                      • Opcode ID: 8676fc82905c9a1b810d628a398100968f6ffdacef88656b1d3d358bc7a90ea1
                      • Instruction ID: 8192a7e2a4f305a49916f05c6929ea0b3914a08db4c1399cbdabca6287782b49
                      • Opcode Fuzzy Hash: 8676fc82905c9a1b810d628a398100968f6ffdacef88656b1d3d358bc7a90ea1
                      • Instruction Fuzzy Hash: 8131D2B4905229ABCB61DF68DD8879DBBB8FF08310F5085EAE51CA7250E7309B918F45
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1249955717.000000006D841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D840000, based on PE: true
                      • Associated: 00000000.00000002.1249928556.000000006D840000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250012730.000000006D864000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250193109.000000006D8E5000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250226545.000000006D8EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d840000_Gxm6KI51wl.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: UmL!$hck
                      • API String ID: 0-940997351
                      • Opcode ID: 99e7b329b91ca936d68fcb9f096d3005f54e7d5fe34f2649242ac8c576c78949
                      • Instruction ID: 6eecd9dbb2ac895550a19803f1c38fa98f74a159ca046c3377c59daccd7a5b40
                      • Opcode Fuzzy Hash: 99e7b329b91ca936d68fcb9f096d3005f54e7d5fe34f2649242ac8c576c78949
                      • Instruction Fuzzy Hash: 5A225675A5520D8FCB05CEACC599BADBBF2BB4A318F10C91AE818EB345C7359805CF81
                      APIs
                      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,6D862A40,?,?,00000008,?,?,6D862643,00000000), ref: 6D862C72
                      Memory Dump Source
                      • Source File: 00000000.00000002.1249955717.000000006D841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D840000, based on PE: true
                      • Associated: 00000000.00000002.1249928556.000000006D840000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250012730.000000006D864000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250193109.000000006D8E5000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250226545.000000006D8EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d840000_Gxm6KI51wl.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionRaise
                      • String ID:
                      • API String ID: 3997070919-0
                      • Opcode ID: 5f0f958e1448195127db6fe5a71d38a17b91542f145b15ced8ff2c7529c82d27
                      • Instruction ID: 7b21c82f125b2012f2bb41ba9eb7363acc31eb9b0fa235f6cf9cec56507c30be
                      • Opcode Fuzzy Hash: 5f0f958e1448195127db6fe5a71d38a17b91542f145b15ced8ff2c7529c82d27
                      • Instruction Fuzzy Hash: D0B15C31620649DFD725CF28C48AB647BE0FF45365F258A98F8A9CF2A1C339D991CB50
                      APIs
                      • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 6D85802E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1249955717.000000006D841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D840000, based on PE: true
                      • Associated: 00000000.00000002.1249928556.000000006D840000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250012730.000000006D864000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250193109.000000006D8E5000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250226545.000000006D8EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d840000_Gxm6KI51wl.jbxd
                      Yara matches
                      Similarity
                      • API ID: FeaturePresentProcessor
                      • String ID:
                      • API String ID: 2325560087-0
                      • Opcode ID: bb8e42bb0c569133f0646261280989ac6a1154a795c1201a71fc3999fab15797
                      • Instruction ID: 02cd47598271cdb21112c38af7bc828234b1a4eae02b764edeb9c22a811313cc
                      • Opcode Fuzzy Hash: bb8e42bb0c569133f0646261280989ac6a1154a795c1201a71fc3999fab15797
                      • Instruction Fuzzy Hash: 4B516EB1A2121A9FDF45CF99C4897AABBF4FB8D314F108AAAD415EB250D374D910CF90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1249955717.000000006D841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D840000, based on PE: true
                      • Associated: 00000000.00000002.1249928556.000000006D840000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250012730.000000006D864000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250193109.000000006D8E5000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250226545.000000006D8EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d840000_Gxm6KI51wl.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c0753689597fd77c90b55eb7682ab5b95e1e519cce12fdb3b559f2eaa8e93857
                      • Instruction ID: a584ad554904be19be1e698b7c0b2e4030f3baacb60b8e36c92f7810692bef07
                      • Opcode Fuzzy Hash: c0753689597fd77c90b55eb7682ab5b95e1e519cce12fdb3b559f2eaa8e93857
                      • Instruction Fuzzy Hash: 4A41A1B5808219AFDB50DFA9CC8CEBABBB9EB45304F1446D9E419E3201DB359E94CF50
                      APIs
                      • type_info::operator==.LIBVCRUNTIME ref: 6D8599A9
                      • ___TypeMatch.LIBVCRUNTIME ref: 6D859AB7
                      • CatchIt.LIBVCRUNTIME ref: 6D859B08
                      • _UnwindNestedFrames.LIBCMT ref: 6D859C09
                      • CallUnexpected.LIBVCRUNTIME ref: 6D859C24
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1249955717.000000006D841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D840000, based on PE: true
                      • Associated: 00000000.00000002.1249928556.000000006D840000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250012730.000000006D864000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250193109.000000006D8E5000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250226545.000000006D8EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d840000_Gxm6KI51wl.jbxd
                      Yara matches
                      Similarity
                      • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                      • String ID: csm$csm$csm
                      • API String ID: 4119006552-393685449
                      • Opcode ID: 9077f829502bca238bbbcea08ea7c814c476a605dde04bd2d516c472ae8ba532
                      • Instruction ID: 88ddd61622e01d7b18f0142bcce23db6a244aa9295c1546282d8406fee7fac13
                      • Opcode Fuzzy Hash: 9077f829502bca238bbbcea08ea7c814c476a605dde04bd2d516c472ae8ba532
                      • Instruction Fuzzy Hash: F0B16BB1C0421AEFDF45EF94C9889AEBBB5FF05314F12495AE9146B201D331EA71CB92
                      APIs
                      • _ValidateLocalCookies.LIBCMT ref: 6D858967
                      • ___except_validate_context_record.LIBVCRUNTIME ref: 6D85896F
                      • _ValidateLocalCookies.LIBCMT ref: 6D8589F8
                      • __IsNonwritableInCurrentImage.LIBCMT ref: 6D858A23
                      • _ValidateLocalCookies.LIBCMT ref: 6D858A78
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1249955717.000000006D841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D840000, based on PE: true
                      • Associated: 00000000.00000002.1249928556.000000006D840000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250012730.000000006D864000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250193109.000000006D8E5000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250226545.000000006D8EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d840000_Gxm6KI51wl.jbxd
                      Yara matches
                      Similarity
                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                      • String ID: csm
                      • API String ID: 1170836740-1018135373
                      • Opcode ID: ca53d4e6df3123c6709ff26fcf5e19ddd00b40801325204936d2c9d9d823e735
                      • Instruction ID: e347b37825988a6b6d284dedfc820ad3075bc0da2a9496825c8dde5bc5bbe926
                      • Opcode Fuzzy Hash: ca53d4e6df3123c6709ff26fcf5e19ddd00b40801325204936d2c9d9d823e735
                      • Instruction Fuzzy Hash: E841C234A14259DBCF41CF6DC888ABE7FB5AF46328F108896E9145B351D7329921CF91
                      APIs
                      • FreeLibrary.KERNEL32(00000000,?,6D85D909,00000000,6D85B110,00000000,00000000,00000001,?,6D85DA82,00000022,FlsSetValue,6D865CD8,6D865CE0,00000000), ref: 6D85D8BB
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1249955717.000000006D841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D840000, based on PE: true
                      • Associated: 00000000.00000002.1249928556.000000006D840000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250012730.000000006D864000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250193109.000000006D8E5000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250226545.000000006D8EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d840000_Gxm6KI51wl.jbxd
                      Yara matches
                      Similarity
                      • API ID: FreeLibrary
                      • String ID: api-ms-$ext-ms-
                      • API String ID: 3664257935-537541572
                      • Opcode ID: 06e2ed7caa21ca99a50c7cbf7629950dfb33efd5607af7d6536ba2d36a98f465
                      • Instruction ID: 4b16a9071153aeb9a0e84bc03977586809a028d04e06906ee7fa3442969b39d0
                      • Opcode Fuzzy Hash: 06e2ed7caa21ca99a50c7cbf7629950dfb33efd5607af7d6536ba2d36a98f465
                      • Instruction Fuzzy Hash: 48210B31D05226ABCB515A29CC4CB6A37B9EBC7770F1A0DA0FD15A7280D730E920CAD1
                      APIs
                      • GetLastError.KERNEL32(?,?,6D858ED3,6D858C30), ref: 6D858EEA
                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6D858EF8
                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6D858F11
                      • SetLastError.KERNEL32(00000000,6D858ED3,6D858C30), ref: 6D858F63
                      Memory Dump Source
                      • Source File: 00000000.00000002.1249955717.000000006D841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D840000, based on PE: true
                      • Associated: 00000000.00000002.1249928556.000000006D840000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250012730.000000006D864000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250193109.000000006D8E5000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250226545.000000006D8EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d840000_Gxm6KI51wl.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLastValue___vcrt_
                      • String ID:
                      • API String ID: 3852720340-0
                      • Opcode ID: 8918315997076fc2d671cd7c4dfa408a2efce9e29026af9deb73a174da331af4
                      • Instruction ID: b2058f3c7aa6bce835dd7628afcafdba5d28cf3dbe156848bdcae4e6ef730cd2
                      • Opcode Fuzzy Hash: 8918315997076fc2d671cd7c4dfa408a2efce9e29026af9deb73a174da331af4
                      • Instruction Fuzzy Hash: 4D012D7611D2269E9A8025BE6C4C72E26F5D74A37A3210B3BF134550E0EF114C308684
                      Strings
                      • C:\Users\user\Desktop\Gxm6KI51wl.exe, xrefs: 6D85CA4A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1249955717.000000006D841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D840000, based on PE: true
                      • Associated: 00000000.00000002.1249928556.000000006D840000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250012730.000000006D864000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250193109.000000006D8E5000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250226545.000000006D8EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d840000_Gxm6KI51wl.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: C:\Users\user\Desktop\Gxm6KI51wl.exe
                      • API String ID: 0-1939077431
                      • Opcode ID: 7ab875e7ecbbd31dcffcc576a0753df4f47e084661b37fd2aff4e51226299951
                      • Instruction ID: 70a7e411ba978295e75580d7068d61acf99a104335ae407e042d63dd92a8ec97
                      • Opcode Fuzzy Hash: 7ab875e7ecbbd31dcffcc576a0753df4f47e084661b37fd2aff4e51226299951
                      • Instruction Fuzzy Hash: 7921C2B1208206AFDB92DF69885896B7BBCFF053687018D14FA15D7102D732DC20CF91
                      APIs
                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BCBE4344,00000000,?,00000000,6D863342,000000FF,?,6D85A9D8,?,?,6D85A9AC,?), ref: 6D85AA73
                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6D85AA85
                      • FreeLibrary.KERNEL32(00000000,?,00000000,6D863342,000000FF,?,6D85A9D8,?,?,6D85A9AC,?), ref: 6D85AAA7
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1249955717.000000006D841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D840000, based on PE: true
                      • Associated: 00000000.00000002.1249928556.000000006D840000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250012730.000000006D864000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250193109.000000006D8E5000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250226545.000000006D8EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d840000_Gxm6KI51wl.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressFreeHandleLibraryModuleProc
                      • String ID: CorExitProcess$mscoree.dll
                      • API String ID: 4061214504-1276376045
                      • Opcode ID: 7a27718751f66994ed9e972289bbdc825e1315ce46716dca72b1a8e378e9c20f
                      • Instruction ID: 3ff0a6d943be79ca81af67b257d1e7964bb357f3944d57e41e4952876e02ad24
                      • Opcode Fuzzy Hash: 7a27718751f66994ed9e972289bbdc825e1315ce46716dca72b1a8e378e9c20f
                      • Instruction Fuzzy Hash: F101A7715046AAEFDB028B44CD0CFBE7BF9FB49721F004925F811A2291DB359900CAA0
                      APIs
                      • EncodePointer.KERNEL32(00000000,?), ref: 6D859C54
                      • CatchIt.LIBVCRUNTIME ref: 6D859D3A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1249955717.000000006D841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D840000, based on PE: true
                      • Associated: 00000000.00000002.1249928556.000000006D840000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250012730.000000006D864000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250193109.000000006D8E5000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250226545.000000006D8EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d840000_Gxm6KI51wl.jbxd
                      Yara matches
                      Similarity
                      • API ID: CatchEncodePointer
                      • String ID: MOC$RCC
                      • API String ID: 1435073870-2084237596
                      • Opcode ID: 649b7a9750521bc1b8b4c4c9897449cbb2f47a2fb6058efb02a9dc0a0c9d8388
                      • Instruction ID: d29376d0f8eb47a70e372b375a5cdfbd6e3a0cfffcf9350756d678be27dfc86d
                      • Opcode Fuzzy Hash: 649b7a9750521bc1b8b4c4c9897449cbb2f47a2fb6058efb02a9dc0a0c9d8388
                      • Instruction Fuzzy Hash: BA41AFB190020AEFCF45DF98CC84AEE7BB5FF08304F158599FA18AB220D3759960DB50
                      APIs
                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,6D859463,00000000,?,6D8E44D0,?,?,?,6D859606,00000004,InitializeCriticalSectionEx,6D8653E8,InitializeCriticalSectionEx), ref: 6D8594BF
                      • GetLastError.KERNEL32(?,6D859463,00000000,?,6D8E44D0,?,?,?,6D859606,00000004,InitializeCriticalSectionEx,6D8653E8,InitializeCriticalSectionEx,00000000,?,6D858FD2), ref: 6D8594C9
                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 6D8594F1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1249955717.000000006D841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D840000, based on PE: true
                      • Associated: 00000000.00000002.1249928556.000000006D840000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250012730.000000006D864000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250193109.000000006D8E5000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250226545.000000006D8EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d840000_Gxm6KI51wl.jbxd
                      Yara matches
                      Similarity
                      • API ID: LibraryLoad$ErrorLast
                      • String ID: api-ms-
                      • API String ID: 3177248105-2084034818
                      • Opcode ID: ffb06edf3e266ee8dd1c926a95a4616ca5c58fd868da63054f8ad643a4aaf8ec
                      • Instruction ID: 9d5a23c9d1add0353a71b4fe709f6ec75984efd2fde957527ba3546c25223c2a
                      • Opcode Fuzzy Hash: ffb06edf3e266ee8dd1c926a95a4616ca5c58fd868da63054f8ad643a4aaf8ec
                      • Instruction Fuzzy Hash: B3E04871248247FBEF802A64DC4DF7D3FA99B45F61F114820F90CE81D1EB629864D9C5
                      APIs
                      • GetConsoleOutputCP.KERNEL32(BCBE4344,00000000,00000000,?), ref: 6D85FC25
                        • Part of subcall function 6D85D5FC: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6D85F660,?,00000000,-00000008), ref: 6D85D65D
                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 6D85FE77
                      • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6D85FEBD
                      • GetLastError.KERNEL32 ref: 6D85FF60
                      Memory Dump Source
                      • Source File: 00000000.00000002.1249955717.000000006D841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D840000, based on PE: true
                      • Associated: 00000000.00000002.1249928556.000000006D840000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250012730.000000006D864000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250193109.000000006D8E5000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250226545.000000006D8EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d840000_Gxm6KI51wl.jbxd
                      Yara matches
                      Similarity
                      • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                      • String ID:
                      • API String ID: 2112829910-0
                      • Opcode ID: f1281f76a18c0711b02822b760a8f91b713b8c04b6b8ba25b7e239c3ec3a83a0
                      • Instruction ID: f8d88f4d22c30901a144bbda26f9af7b1c0c586c92078e4a4366fa5103bf5707
                      • Opcode Fuzzy Hash: f1281f76a18c0711b02822b760a8f91b713b8c04b6b8ba25b7e239c3ec3a83a0
                      • Instruction Fuzzy Hash: 64D19A75D04259AFCF01CFA8D888AADBBB5FF1A314F14492AE916EB341DB30A951CF50
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1249955717.000000006D841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D840000, based on PE: true
                      • Associated: 00000000.00000002.1249928556.000000006D840000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250012730.000000006D864000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250193109.000000006D8E5000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250226545.000000006D8EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d840000_Gxm6KI51wl.jbxd
                      Yara matches
                      Similarity
                      • API ID: AdjustPointer
                      • String ID:
                      • API String ID: 1740715915-0
                      • Opcode ID: 92c0361b6072211ab99df49e14407b454272f53522200cfb61b0c85fc8f8dc50
                      • Instruction ID: 999edcb102fdbe9dc19f0932f210e06afe0f02b87924eb51a24814907a51969a
                      • Opcode Fuzzy Hash: 92c0361b6072211ab99df49e14407b454272f53522200cfb61b0c85fc8f8dc50
                      • Instruction Fuzzy Hash: F751F0F5608607AFDB85AF58C888BBA73B8FF05714F114D2AE91947290E731E860CB90
                      APIs
                        • Part of subcall function 6D85D5FC: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6D85F660,?,00000000,-00000008), ref: 6D85D65D
                      • GetLastError.KERNEL32 ref: 6D85C2AC
                      • __dosmaperr.LIBCMT ref: 6D85C2B3
                      • GetLastError.KERNEL32(?,?,?,?), ref: 6D85C2ED
                      • __dosmaperr.LIBCMT ref: 6D85C2F4
                      Memory Dump Source
                      • Source File: 00000000.00000002.1249955717.000000006D841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D840000, based on PE: true
                      • Associated: 00000000.00000002.1249928556.000000006D840000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250012730.000000006D864000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250193109.000000006D8E5000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250226545.000000006D8EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d840000_Gxm6KI51wl.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                      • String ID:
                      • API String ID: 1913693674-0
                      • Opcode ID: a2fe546e33c23aad499325b82eca2e73f5307373b22c5a897e23afe4594ae17a
                      • Instruction ID: b9182ba73055ebbdc697a6e381dfc2a9f2996d0ea19c67999771fa72de48c8cd
                      • Opcode Fuzzy Hash: a2fe546e33c23aad499325b82eca2e73f5307373b22c5a897e23afe4594ae17a
                      • Instruction Fuzzy Hash: A321D73260821AAFDB909FA9C88896AB7BDFF453687058D28F919D7101D730EC60CF90
                      APIs
                      • GetEnvironmentStringsW.KERNEL32 ref: 6D85D6A7
                        • Part of subcall function 6D85D5FC: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6D85F660,?,00000000,-00000008), ref: 6D85D65D
                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6D85D6DF
                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6D85D6FF
                      Memory Dump Source
                      • Source File: 00000000.00000002.1249955717.000000006D841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D840000, based on PE: true
                      • Associated: 00000000.00000002.1249928556.000000006D840000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250012730.000000006D864000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250193109.000000006D8E5000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250226545.000000006D8EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d840000_Gxm6KI51wl.jbxd
                      Yara matches
                      Similarity
                      • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                      • String ID:
                      • API String ID: 158306478-0
                      • Opcode ID: 0744af90c7704bd10091f570eaeea811fabfdbdeeaa56966e1d37a7103ceaf26
                      • Instruction ID: a2d01769e16c7ddc2cfda236e41ff75cc3940af611340fdf102f97b5baf0c216
                      • Opcode Fuzzy Hash: 0744af90c7704bd10091f570eaeea811fabfdbdeeaa56966e1d37a7103ceaf26
                      • Instruction Fuzzy Hash: BA11C4F691951ABFAB41177D4CCCC7F2AACEEEA6A97110824FD01D5101FF60CD2286B1
                      APIs
                      • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,6D860CF6,00000000,00000001,00000000,?,?,6D85FFB4,?,00000000,00000000), ref: 6D86154D
                      • GetLastError.KERNEL32(?,6D860CF6,00000000,00000001,00000000,?,?,6D85FFB4,?,00000000,00000000,?,?,?,6D860557,00000000), ref: 6D861559
                        • Part of subcall function 6D86151F: CloseHandle.KERNEL32(FFFFFFFE,6D861569,?,6D860CF6,00000000,00000001,00000000,?,?,6D85FFB4,?,00000000,00000000,?,?), ref: 6D86152F
                      • ___initconout.LIBCMT ref: 6D861569
                        • Part of subcall function 6D8614E1: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6D861510,6D860CE3,?,?,6D85FFB4,?,00000000,00000000,?), ref: 6D8614F4
                      • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,6D860CF6,00000000,00000001,00000000,?,?,6D85FFB4,?,00000000,00000000,?), ref: 6D86157E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1249955717.000000006D841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D840000, based on PE: true
                      • Associated: 00000000.00000002.1249928556.000000006D840000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250012730.000000006D864000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250040094.000000006D86B000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250193109.000000006D8E5000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.1250226545.000000006D8EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d840000_Gxm6KI51wl.jbxd
                      Yara matches
                      Similarity
                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                      • String ID:
                      • API String ID: 2744216297-0
                      • Opcode ID: f9efdd93d4f1f0469fbfba188caf844b59d574dc51c38cb6f25b86eb05840760
                      • Instruction ID: 1aa8b116234c0008f8da5e98fa0fcbe58f62f36ccf458f5305e982ecf27bc992
                      • Opcode Fuzzy Hash: f9efdd93d4f1f0469fbfba188caf844b59d574dc51c38cb6f25b86eb05840760
                      • Instruction Fuzzy Hash: E2F0F8360041A5BBCF921FD9DC0CA9D7E76EB8D7B0B014420FB1D85121D7328920DBE1

                      Execution Graph

                      Execution Coverage:11.1%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:203
                      Total number of Limit Nodes:10
                      execution_graph 27314 f8b428 27315 f8b3f7 27314->27315 27317 f8b382 27315->27317 27319 f8ba23 27315->27319 27316 f8b421 27322 f8b9f3 27319->27322 27321 f8dee4 27321->27316 27323 f8ba5a 27322->27323 27324 f8cc34 27322->27324 27323->27316 27325 f8cc3f 27324->27325 27327 f8e015 27325->27327 27328 f8ba04 27325->27328 27327->27321 27329 f8ba0f 27328->27329 27331 f8e4ef 27329->27331 27332 f8cd28 27329->27332 27331->27327 27334 f8cd33 27332->27334 27333 f8e661 27333->27331 27334->27333 27335 f8e5c2 27334->27335 27339 f8e6a8 27334->27339 27344 f8e6c0 27334->27344 27335->27333 27336 f8cd28 2 API calls 27335->27336 27336->27335 27340 f8e6c0 27339->27340 27341 f8e6fd 27340->27341 27349 f8f920 27340->27349 27354 f8f910 27340->27354 27341->27335 27345 f8e6f1 27344->27345 27346 f8e6fd 27344->27346 27345->27346 27347 f8f920 2 API calls 27345->27347 27348 f8f910 2 API calls 27345->27348 27346->27335 27347->27346 27348->27346 27350 f8f94b 27349->27350 27351 f8f9fa 27350->27351 27359 4dd0888 27350->27359 27363 4dd0887 27350->27363 27355 f8f920 27354->27355 27356 f8f9fa 27355->27356 27357 4dd0888 2 API calls 27355->27357 27358 4dd0887 2 API calls 27355->27358 27357->27356 27358->27356 27367 4dd08cc 27359->27367 27371 4dd08d8 27359->27371 27364 4dd08bd 27363->27364 27365 4dd08cc CreateWindowExW 27363->27365 27366 4dd08d8 CreateWindowExW 27363->27366 27364->27351 27365->27364 27366->27364 27368 4dd0940 CreateWindowExW 27367->27368 27370 4dd09fc 27368->27370 27372 4dd0940 CreateWindowExW 27371->27372 27374 4dd09fc 27372->27374 27374->27374 27375 f8c098 27376 f8c0de 27375->27376 27380 f8c278 27376->27380 27383 f8c268 27376->27383 27377 f8c1cb 27386 f8b980 27380->27386 27384 f8b980 DuplicateHandle 27383->27384 27385 f8c2a6 27383->27385 27384->27385 27385->27377 27387 f8c2e0 DuplicateHandle 27386->27387 27388 f8c2a6 27387->27388 27388->27377 27389 f89d18 27393 f89e03 27389->27393 27405 f89e10 27389->27405 27390 f89d27 27394 f89e10 27393->27394 27396 f89e44 27394->27396 27402 f89e10 3 API calls 27394->27402 27404 f89e03 3 API calls 27394->27404 27417 f8a000 27394->27417 27395 f89e2c 27395->27396 27421 f8a0ff 27395->27421 27426 f8a0a8 27395->27426 27430 f8a0a3 27395->27430 27396->27390 27397 f8a048 GetModuleHandleW 27397->27396 27398 f89e3c 27398->27396 27398->27397 27402->27395 27404->27395 27406 f89e21 27405->27406 27408 f89e44 27405->27408 27411 f89e10 3 API calls 27406->27411 27412 f8a000 GetModuleHandleW 27406->27412 27413 f89e03 3 API calls 27406->27413 27407 f89e2c 27407->27408 27414 f8a0a8 LoadLibraryExW 27407->27414 27415 f8a0ff LoadLibraryExW 27407->27415 27416 f8a0a3 LoadLibraryExW 27407->27416 27408->27390 27409 f8a048 GetModuleHandleW 27409->27408 27410 f89e3c 27410->27408 27410->27409 27411->27407 27412->27407 27413->27407 27414->27410 27415->27410 27416->27410 27418 f8a048 GetModuleHandleW 27417->27418 27419 f8a042 27417->27419 27420 f8a06a 27418->27420 27419->27418 27420->27395 27422 f8a0cf 27421->27422 27425 f8a103 27421->27425 27424 f8a0e1 27422->27424 27434 f89850 27422->27434 27424->27398 27428 f8a0bc 27426->27428 27427 f8a0e1 27427->27398 27428->27427 27429 f89850 LoadLibraryExW 27428->27429 27429->27427 27431 f8a0bc 27430->27431 27432 f89850 LoadLibraryExW 27431->27432 27433 f8a0e1 27431->27433 27432->27433 27433->27398 27435 f8a288 LoadLibraryExW 27434->27435 27437 f8a301 27435->27437 27437->27424 27560 f8cdc8 27561 f8cdf6 27560->27561 27562 f8cec7 27561->27562 27564 f8cec2 KiUserCallbackDispatcher 27561->27564 27565 f8cf33 27561->27565 27563 f8ba04 2 API calls 27562->27563 27562->27565 27563->27565 27564->27562 27438 f8da50 27440 f8da6d 27438->27440 27439 f8dab1 27440->27439 27441 f8ba04 2 API calls 27440->27441 27441->27439 27442 f8bdd0 27443 f8bde0 27442->27443 27444 f8be15 27443->27444 27447 f8bf80 27443->27447 27451 f8bf70 27443->27451 27449 f8bf8d 27447->27449 27448 f8bfc7 27448->27444 27449->27448 27455 f8b8b8 27449->27455 27453 f8bf8d 27451->27453 27452 f8bfc7 27452->27444 27453->27452 27454 f8b8b8 2 API calls 27453->27454 27454->27452 27456 f8b8c3 27455->27456 27458 f8c8d8 27456->27458 27459 f8b9e4 27456->27459 27458->27458 27460 f8b9ef 27459->27460 27468 f8b9f4 27460->27468 27462 f8c970 27463 f8ba04 2 API calls 27462->27463 27464 f8c977 27463->27464 27466 f8e6a8 2 API calls 27464->27466 27467 f8e6c0 2 API calls 27464->27467 27465 f8c981 27465->27458 27466->27465 27467->27465 27469 f8b9ff 27468->27469 27470 f8cc34 2 API calls 27469->27470 27472 f8dee9 27469->27472 27471 f8dee4 27470->27471 27471->27462 27472->27462 27473 b5d01c 27474 b5d034 27473->27474 27475 b5d08e 27474->27475 27481 4dd17f8 27474->27481 27488 4dd0a80 27474->27488 27494 4dd0a90 27474->27494 27499 4dd0bb1 27474->27499 27502 4dd17e8 27474->27502 27482 4dd1825 27481->27482 27483 4dd1857 27482->27483 27509 4dd1a4c 27482->27509 27515 4dd1970 27482->27515 27520 4dd1980 27482->27520 27525 4dd1a28 27482->27525 27489 4dd0a5c 27488->27489 27490 4dd0a8f 27488->27490 27489->27475 27492 4dd17f8 2 API calls 27490->27492 27493 4dd17e8 2 API calls 27490->27493 27491 4dd0ad7 27491->27475 27492->27491 27493->27491 27495 4dd0ab6 27494->27495 27497 4dd17f8 2 API calls 27495->27497 27498 4dd17e8 2 API calls 27495->27498 27496 4dd0ad7 27496->27475 27497->27496 27498->27496 27500 4dd0bc7 27499->27500 27548 4dd0cfe 27499->27548 27500->27475 27503 4dd1825 27502->27503 27504 4dd1857 27503->27504 27505 4dd1a4c 2 API calls 27503->27505 27506 4dd1a28 2 API calls 27503->27506 27507 4dd1980 2 API calls 27503->27507 27508 4dd1970 2 API calls 27503->27508 27505->27504 27506->27504 27507->27504 27508->27504 27510 4dd1a0a 27509->27510 27511 4dd1a5a 27509->27511 27514 4dd1a28 2 API calls 27510->27514 27533 4dd1a38 27510->27533 27512 4dd1a20 27512->27483 27514->27512 27517 4dd1975 27515->27517 27516 4dd1a20 27516->27483 27518 4dd1a38 2 API calls 27517->27518 27519 4dd1a28 2 API calls 27517->27519 27518->27516 27519->27516 27522 4dd1994 27520->27522 27521 4dd1a20 27521->27483 27523 4dd1a38 2 API calls 27522->27523 27524 4dd1a28 2 API calls 27522->27524 27523->27521 27524->27521 27526 4dd1a04 27525->27526 27527 4dd1a37 27525->27527 27529 4dd1a38 2 API calls 27526->27529 27530 4dd1a28 2 API calls 27526->27530 27531 4dd2e7f 2 API calls 27527->27531 27532 4dd1a49 27527->27532 27528 4dd1a20 27528->27483 27529->27528 27530->27528 27531->27532 27532->27483 27534 4dd1a49 27533->27534 27536 4dd2e7f 27533->27536 27534->27512 27540 4dd2e90 27536->27540 27544 4dd2ea0 27536->27544 27537 4dd2e8a 27537->27534 27541 4dd2ee2 27540->27541 27543 4dd2ee9 27540->27543 27542 4dd2f3a CallWindowProcW 27541->27542 27541->27543 27542->27543 27543->27537 27545 4dd2ee2 27544->27545 27547 4dd2ee9 27544->27547 27546 4dd2f3a CallWindowProcW 27545->27546 27545->27547 27546->27547 27547->27537 27549 4dd0d07 27548->27549 27550 4dd0e56 27549->27550 27552 4dd0af0 27549->27552 27556 4dd0b19 SetWindowLongW 27552->27556 27558 4dd0b20 SetWindowLongW 27552->27558 27553 4dd0b08 27553->27550 27557 4dd0b8c 27556->27557 27557->27553 27559 4dd0b8c 27558->27559 27559->27553

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 517 f89e10-f89e1f 518 f89e4b-f89e4f 517->518 519 f89e21 517->519 520 f89e51-f89e5b 518->520 521 f89e63-f89ea4 518->521 573 f89e27 call f89e10 519->573 574 f89e27 call f8a000 519->574 575 f89e27 call f89e03 519->575 520->521 527 f89eb1-f89ebf 521->527 528 f89ea6-f89eae 521->528 522 f89e2c-f89e2e 523 f89e30 522->523 524 f89e44 522->524 576 f89e36 call f8a0a8 523->576 577 f89e36 call f8a0ff 523->577 578 f89e36 call f8a0a3 523->578 524->518 530 f89ec1-f89ec6 527->530 531 f89ee3-f89ee5 527->531 528->527 529 f89e3c-f89e3e 529->524 534 f89f80-f89ff8 529->534 532 f89ec8-f89ecf call f897f4 530->532 533 f89ed1 530->533 535 f89ee8-f89eef 531->535 537 f89ed3-f89ee1 532->537 533->537 566 f8a06a-f8a073 534->566 567 f89ffa-f8a040 534->567 538 f89efc-f89f03 535->538 539 f89ef1-f89ef9 535->539 537->535 541 f89f10-f89f19 call f89804 538->541 542 f89f05-f89f0d 538->542 539->538 547 f89f1b-f89f23 541->547 548 f89f26-f89f2b 541->548 542->541 547->548 550 f89f49-f89f56 548->550 551 f89f2d-f89f34 548->551 557 f89f58-f89f76 550->557 558 f89f79-f89f7f 550->558 551->550 552 f89f36-f89f46 call f89814 call f89824 551->552 552->550 557->558 568 f8a07c-f8a090 566->568 569 f8a075-f8a07b 566->569 570 f8a048-f8a068 GetModuleHandleW 567->570 571 f8a042-f8a045 567->571 569->568 570->566 571->570 573->522 574->522 575->522 576->529 577->529 578->529
                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000), ref: 00F8A066
                      Memory Dump Source
                      • Source File: 00000003.00000002.1242790840.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_f80000_MSBuild.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: 20fbf67e1e807377e6fa1df6fdc8c254b33476979afb36d027dd48b04e3aa7f4
                      • Instruction ID: d15fb0ae4a374bea0b2b686c7c2a70556236d82f79778cc1e933181ae1f4fb6c
                      • Opcode Fuzzy Hash: 20fbf67e1e807377e6fa1df6fdc8c254b33476979afb36d027dd48b04e3aa7f4
                      • Instruction Fuzzy Hash: 18818970A00B058FE724EF2AD4457AABBF1FF88314F04892DD086D7A50D7B5E849CB91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 579 4dd08cc-4dd093e 580 4dd0949-4dd0950 579->580 581 4dd0940-4dd0946 579->581 582 4dd095b-4dd09fa CreateWindowExW 580->582 583 4dd0952-4dd0958 580->583 581->580 585 4dd09fc-4dd0a02 582->585 586 4dd0a03-4dd0a3b 582->586 583->582 585->586 590 4dd0a3d-4dd0a40 586->590 591 4dd0a48 586->591 590->591 592 4dd0a49 591->592 592->592
                      APIs
                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04DD09EA
                      Memory Dump Source
                      • Source File: 00000003.00000002.1243394692.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_4dd0000_MSBuild.jbxd
                      Similarity
                      • API ID: CreateWindow
                      • String ID:
                      • API String ID: 716092398-0
                      • Opcode ID: 75b4faeba1d3ebf037ee602d8f33059af08bbb0cf11bb7584416d0fa17797d9f
                      • Instruction ID: 64ce77c67a348367499189a3389d034e5d1a88c5cf92478817f95e67ad9886e4
                      • Opcode Fuzzy Hash: 75b4faeba1d3ebf037ee602d8f33059af08bbb0cf11bb7584416d0fa17797d9f
                      • Instruction Fuzzy Hash: AA51C1B1D003099FDB15CF9AC884ADEBBB5BF88314F24812AE519AB210D775A945CF90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 593 4dd08d8-4dd093e 594 4dd0949-4dd0950 593->594 595 4dd0940-4dd0946 593->595 596 4dd095b-4dd09fa CreateWindowExW 594->596 597 4dd0952-4dd0958 594->597 595->594 599 4dd09fc-4dd0a02 596->599 600 4dd0a03-4dd0a3b 596->600 597->596 599->600 604 4dd0a3d-4dd0a40 600->604 605 4dd0a48 600->605 604->605 606 4dd0a49 605->606 606->606
                      APIs
                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04DD09EA
                      Memory Dump Source
                      • Source File: 00000003.00000002.1243394692.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_4dd0000_MSBuild.jbxd
                      Similarity
                      • API ID: CreateWindow
                      • String ID:
                      • API String ID: 716092398-0
                      • Opcode ID: adf25d4e3c5e298aafd5a05ad4b185c01524d456af7415917976279995a79e2c
                      • Instruction ID: 012be8b4a29eadf93bbcd181b956c9d3ba0af37d37a09e26d941a4444efcfcdc
                      • Opcode Fuzzy Hash: adf25d4e3c5e298aafd5a05ad4b185c01524d456af7415917976279995a79e2c
                      • Instruction Fuzzy Hash: C241A2B1D00309DFDB15CF9AC884ADEBBF5BF88314F24812AE919AB210D775A945CF90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 607 f8a280-f8a281 608 f8a24f 607->608 609 f8a283-f8a2c8 607->609 612 f8a1dc-f8a203 608->612 613 f8a251-f8a260 608->613 610 f8a2ca-f8a2cd 609->610 611 f8a2d0-f8a2ff LoadLibraryExW 609->611 610->611 615 f8a308-f8a325 611->615 616 f8a301-f8a307 611->616 620 f8a20c-f8a23d 612->620 621 f8a205-f8a20b 612->621 618 f8a262 613->618 619 f8a267-f8a26e 613->619 616->615 618->619 626 f8a24d 620->626 627 f8a23f-f8a243 620->627 621->620 630 f8a24e 626->630 627->626 628 f8a245-f8a248 call f87c90 627->628 628->626 630->630
                      APIs
                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00F8A0E1,00000800,00000000,00000000), ref: 00F8A2F2
                      Memory Dump Source
                      • Source File: 00000003.00000002.1242790840.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_f80000_MSBuild.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: 1ce8269c75b5ec471911345015f54a871f53cf134f7b5cd9ecef4e6ee9ad4f68
                      • Instruction ID: ce28dd9eb02d564fee185dcdc5bf537bba4e3442efca2261fb156353345594af
                      • Opcode Fuzzy Hash: 1ce8269c75b5ec471911345015f54a871f53cf134f7b5cd9ecef4e6ee9ad4f68
                      • Instruction Fuzzy Hash: F94145B2C05348CFEB20EF99D444BDEBBF0EB59324F20815AD429A7251C37A5845CF62

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 631 4dd2ea0-4dd2edc 632 4dd2f8c-4dd2fac 631->632 633 4dd2ee2-4dd2ee7 631->633 639 4dd2faf-4dd2fbc 632->639 634 4dd2ee9-4dd2f20 633->634 635 4dd2f3a-4dd2f72 CallWindowProcW 633->635 642 4dd2f29-4dd2f38 634->642 643 4dd2f22-4dd2f28 634->643 637 4dd2f7b-4dd2f8a 635->637 638 4dd2f74-4dd2f7a 635->638 637->639 638->637 642->639 643->642
                      APIs
                      • CallWindowProcW.USER32(?,?,?,?,?), ref: 04DD2F61
                      Memory Dump Source
                      • Source File: 00000003.00000002.1243394692.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_4dd0000_MSBuild.jbxd
                      Similarity
                      • API ID: CallProcWindow
                      • String ID:
                      • API String ID: 2714655100-0
                      • Opcode ID: e2aadf067f2c28578356d6197757a816b71896fc5314682ecbfef0b49834eed2
                      • Instruction ID: 85e788784da469ab52c4aaac7e30467eb7e1437583437db9bac12ba309f67439
                      • Opcode Fuzzy Hash: e2aadf067f2c28578356d6197757a816b71896fc5314682ecbfef0b49834eed2
                      • Instruction Fuzzy Hash: 254118B89003099FDB14DF96C449AAAFBF5FB88314F24C499E519AB321D775A841CFA0

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 725 f8b980-f8c374 DuplicateHandle 727 f8c37d-f8c39a 725->727 728 f8c376-f8c37c 725->728 728->727
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00F8C2A6,?,?,?,?,?), ref: 00F8C367
                      Memory Dump Source
                      • Source File: 00000003.00000002.1242790840.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_f80000_MSBuild.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: ce550ebd711ea726e2e74f85a6f720c3fcd8083eb6fade5b12978a504e8e0f17
                      • Instruction ID: 12c539ccd1c419dac3f07c4ae90aa920558ab67f116fad6d84a534b03350db3c
                      • Opcode Fuzzy Hash: ce550ebd711ea726e2e74f85a6f720c3fcd8083eb6fade5b12978a504e8e0f17
                      • Instruction Fuzzy Hash: D02103B5D003089FDB10DFAAD884ADEBBF8EB48320F20801AE914A3350C775A951DFA4

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 731 f8c2d8-f8c374 DuplicateHandle 732 f8c37d-f8c39a 731->732 733 f8c376-f8c37c 731->733 733->732
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00F8C2A6,?,?,?,?,?), ref: 00F8C367
                      Memory Dump Source
                      • Source File: 00000003.00000002.1242790840.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_f80000_MSBuild.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: e0e0ce48f8a5845e00a4af6ffafc9615e521602e148bb8e922a86ad8d977420d
                      • Instruction ID: 37b55ef1f6903b6b75b78175265f72012737fdb58a516937d50dabbc13b4a2f4
                      • Opcode Fuzzy Hash: e0e0ce48f8a5845e00a4af6ffafc9615e521602e148bb8e922a86ad8d977420d
                      • Instruction Fuzzy Hash: 832105B5D003489FDB10DFAAD884ADEBFF4EB48320F14801AE958A3350D7749941DFA0
                      APIs
                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00F8A0E1,00000800,00000000,00000000), ref: 00F8A2F2
                      Memory Dump Source
                      • Source File: 00000003.00000002.1242790840.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_f80000_MSBuild.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: 759817bc36595685dbc8b84506c1cca1ced1de26d93a9dc14d17b5714d40ff36
                      • Instruction ID: a0409973ba4c7152729d9830ce330b80409d648f15a236f49fb253af8399dbcf
                      • Opcode Fuzzy Hash: 759817bc36595685dbc8b84506c1cca1ced1de26d93a9dc14d17b5714d40ff36
                      • Instruction Fuzzy Hash: 061114B6D003499FDB20DF9AC444BDEFBF4EB48320F10842AE919A7200C779A945CFA5
                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000), ref: 00F8A066
                      Memory Dump Source
                      • Source File: 00000003.00000002.1242790840.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_f80000_MSBuild.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: e514be6edaf4ee860da93b712dd11dd7b7f287622e397893573c2886b654521f
                      • Instruction ID: f5b9bbc31a25c0116e47e5b6d77590f29a200cfd47e29e41b96d844f6751b4ef
                      • Opcode Fuzzy Hash: e514be6edaf4ee860da93b712dd11dd7b7f287622e397893573c2886b654521f
                      • Instruction Fuzzy Hash: AC11D2B5C003498FDB20DF9AC444ADEFBF4EB48324F10841AD529B7210D379A949CFA1
                      APIs
                      • SetWindowLongW.USER32(?,?,?), ref: 04DD0B7D
                      Memory Dump Source
                      • Source File: 00000003.00000002.1243394692.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_4dd0000_MSBuild.jbxd
                      Similarity
                      • API ID: LongWindow
                      • String ID:
                      • API String ID: 1378638983-0
                      • Opcode ID: c27984881c41bbf7876ee30afca117443e97e33d1e209a9ae07867c962aaa363
                      • Instruction ID: af3d791b9796a4c1de526fbb69b2c2279cc9bf8d8828bf14fe94c2d7a43bd0a0
                      • Opcode Fuzzy Hash: c27984881c41bbf7876ee30afca117443e97e33d1e209a9ae07867c962aaa363
                      • Instruction Fuzzy Hash: DF1115B58003498FDB20DF9AD485BDEFBF4EB88324F20841AD959A7340C379A945CFA1
                      APIs
                      • SetWindowLongW.USER32(?,?,?), ref: 04DD0B7D
                      Memory Dump Source
                      • Source File: 00000003.00000002.1243394692.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_4dd0000_MSBuild.jbxd
                      Similarity
                      • API ID: LongWindow
                      • String ID:
                      • API String ID: 1378638983-0
                      • Opcode ID: 830dd724be2468928cc0d7b1b90de60f0ac3ac0dbb09db4c61c93c8f98ad1d24
                      • Instruction ID: b0d28c23a531572ee14fbf470c6218ab6b8b4f296ea0abf5da5c315a7208c758
                      • Opcode Fuzzy Hash: 830dd724be2468928cc0d7b1b90de60f0ac3ac0dbb09db4c61c93c8f98ad1d24
                      • Instruction Fuzzy Hash: BA11E2B58003499FDB20DF9AD585BDEFBF8EB88324F20841AD959A7340C375A944CFA5
                      Memory Dump Source
                      • Source File: 00000003.00000002.1242554087.0000000000B4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B4D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_b4d000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0cc93dff36d6b68ab0b69e78432f5e195d6a49f2420c03816e48a67f45515b3c
                      • Instruction ID: 2d819fd01341e34ceffcca3fb80bdd44630fe10d383b7790cb53997394cdd511
                      • Opcode Fuzzy Hash: 0cc93dff36d6b68ab0b69e78432f5e195d6a49f2420c03816e48a67f45515b3c
                      • Instruction Fuzzy Hash: 37212575604204DFDB15DF14D9C0B16BBA5FB98324F20C6ADE8090F356C33AE956EBA2
                      Memory Dump Source
                      • Source File: 00000003.00000002.1242554087.0000000000B4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B4D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_b4d000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f399a58db75b0253982dcb91e92c941da549b01c23670cf3bfaf0bec064026e1
                      • Instruction ID: 4ce47a957714d1121e94918e73ecff7a0e12e94569a88a11fbe32de6bf00cd04
                      • Opcode Fuzzy Hash: f399a58db75b0253982dcb91e92c941da549b01c23670cf3bfaf0bec064026e1
                      • Instruction Fuzzy Hash: 5E212871604240DFDB15DF14D9C0B26BFA5FBA4318F20C5A9E8090B256C736D956EBA2
                      Memory Dump Source
                      • Source File: 00000003.00000002.1242582108.0000000000B5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B5D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_b5d000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5f191a632418e02b440a1183d34cfea7bce248787787a02a9d8efb73e6b15998
                      • Instruction ID: a2c118000b663a37e2fc6543dc712dfcd59484c6f2f1b644c76921395ac2943f
                      • Opcode Fuzzy Hash: 5f191a632418e02b440a1183d34cfea7bce248787787a02a9d8efb73e6b15998
                      • Instruction Fuzzy Hash: 2D21D3716043009FDB25DF10D9C0B15BBA5FB84315F20C6EDDC494B292C377D84ACA61
                      Memory Dump Source
                      • Source File: 00000003.00000002.1242582108.0000000000B5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B5D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_b5d000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f5384e09063aa15b1d78e07062c81fa653753df7efb91df101a332630c3bfd62
                      • Instruction ID: f2ddfca519b6493c7b74ebf041a79f4c9187301debec53f8b86911a4995cddbd
                      • Opcode Fuzzy Hash: f5384e09063aa15b1d78e07062c81fa653753df7efb91df101a332630c3bfd62
                      • Instruction Fuzzy Hash: 05210371604200DFDB24DF10D9D4B16BBA1EB84315F28C6EDDC094B296C336D80BCA62
                      Memory Dump Source
                      • Source File: 00000003.00000002.1242582108.0000000000B5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B5D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_b5d000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d9c5ca5e0868b265c9a4ce90f0990f34a43e14e43aef3160da183ee46bae6c88
                      • Instruction ID: e78b6ba9d875bb659af9eccacc3574f6f95486aabe81b9d18ad85a648b0c5c2b
                      • Opcode Fuzzy Hash: d9c5ca5e0868b265c9a4ce90f0990f34a43e14e43aef3160da183ee46bae6c88
                      • Instruction Fuzzy Hash: 122187755093C08FDB16CF24D594715BF71EB45314F28C6DAD8498B697C33A980BCB62
                      Memory Dump Source
                      • Source File: 00000003.00000002.1242554087.0000000000B4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B4D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_b4d000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                      • Instruction ID: be6bd3c8d9dd62cf325f0c4dc3cf817488457f46f7f71b71bccc194b6387aa2b
                      • Opcode Fuzzy Hash: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                      • Instruction Fuzzy Hash: D111DF76504240CFCB05CF10D5C0B16BFB2FB94324F24C2A9D8490B356C33AE956DBA1
                      Memory Dump Source
                      • Source File: 00000003.00000002.1242554087.0000000000B4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B4D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_b4d000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                      • Instruction ID: cfbd7adf2ea99597be9d75f809ecc1161da0a88970c1d2072c12d2eb7e6f2c63
                      • Opcode Fuzzy Hash: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                      • Instruction Fuzzy Hash: E8110376504280CFCB05CF14D5C0B16BFB2FB94324F24C6E9D8490B256C336D956DBA1
                      Memory Dump Source
                      • Source File: 00000003.00000002.1242582108.0000000000B5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B5D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_b5d000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                      • Instruction ID: c58f015953d03c79a9429f5eb1a2199f340468aecaabeeda658b497f2e7c7aab
                      • Opcode Fuzzy Hash: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                      • Instruction Fuzzy Hash: C6117975604280DFCB15DF14D5C4B15BBA2FB84325F24C6EDDC494B696C33AD84ACB61