Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Qe73sKzGgb.dll

Overview

General Information

Sample name:Qe73sKzGgb.dll
(renamed file extension from exe to dll, renamed because original name is a hash value)
Original sample name:17561b8a9ca5b29c23d27dd75f9d5aea43bc77625f1203a015e3d17ee33a6a61.exe
Analysis ID:1522596
MD5:91d4990ea1a6cf19d40cc96f32202b63
SHA1:6a03998802559f88b5236c8372d3683f081227bb
SHA256:17561b8a9ca5b29c23d27dd75f9d5aea43bc77625f1203a015e3d17ee33a6a61
Tags:exeRavinAcademyuser-JAMESWT_MHT
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Creates a thread in another existing process (thread injection)
Found direct / indirect Syscall (likely to bypass EDR)
Maps a DLL or memory area into another process
Uses known network protocols on non-standard ports
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll64.exe (PID: 1308 cmdline: loaddll64.exe "C:\Users\user\Desktop\Qe73sKzGgb.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 576 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3852 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Qe73sKzGgb.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 1868 cmdline: rundll32.exe "C:\Users\user\Desktop\Qe73sKzGgb.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
    • sihost.exe (PID: 3388 cmdline: sihost.exe MD5: A21E7719D73D0322E2E7D61802CB8F80)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Qe73sKzGgb.dllWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x2b23:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
Qe73sKzGgb.dllWindows_Trojan_Donutloader_5c38878dunknownunknown
  • 0x327a:$a: 24 48 03 C2 48 89 44 24 28 41 8A 00 84 C0 74 14 33 D2 FF C1
SourceRuleDescriptionAuthorStrings
00000003.00000002.2139912895.000001BDF7DF0000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x2723:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
00000003.00000002.2139912895.000001BDF7DF0000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Donutloader_5c38878dunknownunknown
  • 0x2e7a:$a: 24 48 03 C2 48 89 44 24 28 41 8A 00 84 C0 74 14 33 D2 FF C1
00000004.00000000.2092567006.0000024EB5E20000.00000020.80000000.00040000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x2723:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
00000004.00000000.2092567006.0000024EB5E20000.00000020.80000000.00040000.00000000.sdmpWindows_Trojan_Donutloader_5c38878dunknownunknown
  • 0x2e7a:$a: 24 48 03 C2 48 89 44 24 28 41 8A 00 84 C0 74 14 33 D2 FF C1
00000004.00000002.3329850570.0000024EB5E10000.00000020.00000001.00040000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x2723:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
Click to see the 5 entries
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Qe73sKzGgb.dllReversingLabs: Detection: 34%
Source: Qe73sKzGgb.dllVirustotal: Detection: 45%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.4% probability
Source: Qe73sKzGgb.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: C:\Users\NEO\Desktop\RavinAcademy\RedTeam-01\10\HTTPMalware\Persist\x64\Release\DLL.pdb source: Qe73sKzGgb.dll
Source: Binary string: C:\Users\NEO\Desktop\RavinAcademy\RedTeam-01\10\HTTPMalware\HTTPMalw\HTTPMalw\obj\Release\HTTPMalw.pdb source: sihost.exe, 00000004.00000002.3330089530.0000024EB5ED0000.00000004.10000000.00040000.00000000.sdmp, sihost.exe, 00000004.00000000.2092725357.0000024EB5E50000.00000004.00000001.00020000.00000000.sdmp, sihost.exe, 00000004.00000002.3331065779.0000024EB64E6000.00000004.00000001.00020000.00000000.sdmp, sihost.exe, 00000004.00000002.3331065779.0000024EB6421000.00000004.00000001.00020000.00000000.sdmp

Networking

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 81
Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 81
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 81
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 81
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 81
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 81
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 81
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 81
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 81
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 81
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 81
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 81
Source: global trafficHTTP traffic detected: POST / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.246Host: 192.168.1.140:81Content-Length: 133Expect: 100-continueConnection: Keep-Alive
Source: global trafficHTTP traffic detected: POST / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.246Host: 192.168.1.140:81Content-Length: 133Expect: 100-continueConnection: Keep-Alive
Source: global trafficHTTP traffic detected: POST / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.246Host: 192.168.1.140:81Content-Length: 133Expect: 100-continueConnection: Keep-Alive
Source: global trafficHTTP traffic detected: POST / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.246Host: 192.168.1.140:81Content-Length: 133Expect: 100-continueConnection: Keep-Alive
Source: global trafficHTTP traffic detected: POST / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.246Host: 192.168.1.140:81Content-Length: 133Expect: 100-continueConnection: Keep-Alive
Source: global trafficHTTP traffic detected: POST / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.246Host: 192.168.1.140:81Content-Length: 133Expect: 100-continueConnection: Keep-Alive
Source: global trafficHTTP traffic detected: POST / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.246Host: 192.168.1.140:81Content-Length: 133Expect: 100-continueConnection: Keep-Alive
Source: global trafficHTTP traffic detected: POST / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.246Host: 192.168.1.140:81Content-Length: 133Expect: 100-continueConnection: Keep-Alive
Source: global trafficHTTP traffic detected: POST / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.246Host: 192.168.1.140:81Content-Length: 133Expect: 100-continueConnection: Keep-Alive
Source: global trafficHTTP traffic detected: POST / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.246Host: 192.168.1.140:81Content-Length: 133Expect: 100-continueConnection: Keep-Alive
Source: global trafficHTTP traffic detected: POST / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.246Host: 192.168.1.140:81Content-Length: 133Expect: 100-continueConnection: Keep-Alive
Source: global trafficHTTP traffic detected: POST / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.246Host: 192.168.1.140:81Content-Length: 133Expect: 100-continueConnection: Keep-Alive
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF849230C9F recv,4_2_00007FF849230C9F
Source: unknownHTTP traffic detected: POST / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.246Host: 192.168.1.140:81Content-Length: 133Expect: 100-continueConnection: Keep-Alive
Source: sihost.exe, 00000004.00000002.3331065779.0000024EB6421000.00000004.00000001.00020000.00000000.sdmp, sihost.exe, 00000004.00000002.3331065779.0000024EB657A000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://192.168.1.140:81
Source: sihost.exe, 00000004.00000002.3331065779.0000024EB657A000.00000004.00000001.00020000.00000000.sdmp, sihost.exe, 00000004.00000002.3330504947.0000024EB62C3000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://192.168.1.140:81/
Source: sihost.exe, 00000004.00000002.3330504947.0000024EB62C3000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://192.168.1.140:81/-
Source: sihost.exe, 00000004.00000002.3330504947.0000024EB62C3000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://192.168.1.140:81/:
Source: sihost.exe, 00000004.00000002.3331065779.0000024EB65D0000.00000004.00000001.00020000.00000000.sdmp, sihost.exe, 00000004.00000002.3331065779.0000024EB65B5000.00000004.00000001.00020000.00000000.sdmp, sihost.exe, 00000004.00000002.3331065779.0000024EB64C7000.00000004.00000001.00020000.00000000.sdmp, sihost.exe, 00000004.00000002.3331065779.0000024EB659C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://192.168.1.140:81/X
Source: sihost.exe, 00000004.00000002.3331065779.0000024EB65D0000.00000004.00000001.00020000.00000000.sdmp, sihost.exe, 00000004.00000002.3331065779.0000024EB65B5000.00000004.00000001.00020000.00000000.sdmp, sihost.exe, 00000004.00000002.3331065779.0000024EB65EC000.00000004.00000001.00020000.00000000.sdmp, sihost.exe, 00000004.00000002.3331065779.0000024EB659C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://192.168.1.140:81pV
Source: sihost.exe, 00000004.00000002.3331065779.0000024EB64C7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

System Summary

barindex
Source: Qe73sKzGgb.dll, type: SAMPLEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: Qe73sKzGgb.dll, type: SAMPLEMatched rule: Windows_Trojan_Donutloader_5c38878d Author: unknown
Source: 00000003.00000002.2139912895.000001BDF7DF0000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: 00000003.00000002.2139912895.000001BDF7DF0000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_5c38878d Author: unknown
Source: 00000004.00000000.2092567006.0000024EB5E20000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: 00000004.00000000.2092567006.0000024EB5E20000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_5c38878d Author: unknown
Source: 00000004.00000002.3329850570.0000024EB5E10000.00000020.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: 00000004.00000002.3329850570.0000024EB5E10000.00000020.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_5c38878d Author: unknown
Source: 00000004.00000002.3329877059.0000024EB5E20000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: 00000004.00000002.3329877059.0000024EB5E20000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_5c38878d Author: unknown
Source: 00000000.00000002.2098220710.000001FA21A10000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: 00000000.00000002.2098220710.000001FA21A10000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_5c38878d Author: unknown
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF848FF1332 NtQuerySystemInformation,4_2_00007FF848FF1332
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF848FF2FE6 NtQuerySystemInformation,4_2_00007FF848FF2FE6
Source: C:\Windows\System32\sihost.exeCode function: 4_2_0000024EB5E137774_2_0000024EB5E13777
Source: C:\Windows\System32\sihost.exeCode function: 4_2_0000024EB5E13B974_2_0000024EB5E13B97
Source: C:\Windows\System32\sihost.exeCode function: 4_2_0000024EB5E12B4F4_2_0000024EB5E12B4F
Source: C:\Windows\System32\sihost.exeCode function: 4_2_0000024EB5E13FCF4_2_0000024EB5E13FCF
Source: C:\Windows\System32\sihost.exeCode function: 4_2_0000024EB5E144574_2_0000024EB5E14457
Source: C:\Windows\System32\sihost.exeCode function: 4_2_0000024EB5E237774_2_0000024EB5E23777
Source: C:\Windows\System32\sihost.exeCode function: 4_2_0000024EB5E23B974_2_0000024EB5E23B97
Source: C:\Windows\System32\sihost.exeCode function: 4_2_0000024EB5E22B4F4_2_0000024EB5E22B4F
Source: C:\Windows\System32\sihost.exeCode function: 4_2_0000024EB5E23FCF4_2_0000024EB5E23FCF
Source: C:\Windows\System32\sihost.exeCode function: 4_2_0000024EB5E244574_2_0000024EB5E24457
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF848FFC2054_2_00007FF848FFC205
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF848FFCA584_2_00007FF848FFCA58
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF848FF59AF4_2_00007FF848FF59AF
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF848FF2B4A4_2_00007FF848FF2B4A
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF848FFCB884_2_00007FF848FFCB88
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF848FFCBD84_2_00007FF848FFCBD8
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF849006DFB4_2_00007FF849006DFB
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF848FFF6A34_2_00007FF848FFF6A3
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF8490430704_2_00007FF849043070
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF8490077904_2_00007FF849007790
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF849001A7F4_2_00007FF849001A7F
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF849001AB04_2_00007FF849001AB0
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF8490012D84_2_00007FF8490012D8
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF849001AF34_2_00007FF849001AF3
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF849002AF34_2_00007FF849002AF3
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF849002AF04_2_00007FF849002AF0
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF848FF10FA4_2_00007FF848FF10FA
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF848FFC9394_2_00007FF848FFC939
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF848FFE9E04_2_00007FF848FFE9E0
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF848FFA3FA4_2_00007FF848FFA3FA
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF848FF83224_2_00007FF848FF8322
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF848FF83304_2_00007FF848FF8330
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF848FF13284_2_00007FF848FF1328
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF849009B604_2_00007FF849009B60
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF848FFCB804_2_00007FF848FFCB80
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF849005BD34_2_00007FF849005BD3
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF848FFCDF84_2_00007FF848FFCDF8
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF848FFD5784_2_00007FF848FFD578
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF8490025A04_2_00007FF8490025A0
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF8490025A84_2_00007FF8490025A8
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF8490025D04_2_00007FF8490025D0
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF8490055F24_2_00007FF8490055F2
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF848FF50D34_2_00007FF848FF50D3
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF848FF59604_2_00007FF848FF5960
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF849233A1D4_2_00007FF849233A1D
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF849231B9D4_2_00007FF849231B9D
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF849232B7C4_2_00007FF849232B7C
Source: Qe73sKzGgb.dll, type: SAMPLEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: Qe73sKzGgb.dll, type: SAMPLEMatched rule: Windows_Trojan_Donutloader_5c38878d os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 3b55ec6c37891880b53633b936d10f94d2b806db1723875e4ac95f8a34d97150, id = 5c38878d-ca94-4fd9-a36e-1ae5fe713ca2, last_modified = 2021-01-13
Source: 00000003.00000002.2139912895.000001BDF7DF0000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: 00000003.00000002.2139912895.000001BDF7DF0000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_5c38878d os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 3b55ec6c37891880b53633b936d10f94d2b806db1723875e4ac95f8a34d97150, id = 5c38878d-ca94-4fd9-a36e-1ae5fe713ca2, last_modified = 2021-01-13
Source: 00000004.00000000.2092567006.0000024EB5E20000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: 00000004.00000000.2092567006.0000024EB5E20000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_5c38878d os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 3b55ec6c37891880b53633b936d10f94d2b806db1723875e4ac95f8a34d97150, id = 5c38878d-ca94-4fd9-a36e-1ae5fe713ca2, last_modified = 2021-01-13
Source: 00000004.00000002.3329850570.0000024EB5E10000.00000020.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: 00000004.00000002.3329850570.0000024EB5E10000.00000020.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_5c38878d os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 3b55ec6c37891880b53633b936d10f94d2b806db1723875e4ac95f8a34d97150, id = 5c38878d-ca94-4fd9-a36e-1ae5fe713ca2, last_modified = 2021-01-13
Source: 00000004.00000002.3329877059.0000024EB5E20000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: 00000004.00000002.3329877059.0000024EB5E20000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_5c38878d os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 3b55ec6c37891880b53633b936d10f94d2b806db1723875e4ac95f8a34d97150, id = 5c38878d-ca94-4fd9-a36e-1ae5fe713ca2, last_modified = 2021-01-13
Source: 00000000.00000002.2098220710.000001FA21A10000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: 00000000.00000002.2098220710.000001FA21A10000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_5c38878d os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 3b55ec6c37891880b53633b936d10f94d2b806db1723875e4ac95f8a34d97150, id = 5c38878d-ca94-4fd9-a36e-1ae5fe713ca2, last_modified = 2021-01-13
Source: Qe73sKzGgb.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: classification engineClassification label: mal76.troj.evad.winDLL@6/0@0/1
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF848FF24B8 AdjustTokenPrivileges,4_2_00007FF848FF24B8
Source: C:\Windows\System32\sihost.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:576:120:WilError_03
Source: Qe73sKzGgb.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Qe73sKzGgb.dll",#1
Source: Qe73sKzGgb.dllReversingLabs: Detection: 34%
Source: Qe73sKzGgb.dllVirustotal: Detection: 45%
Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\Qe73sKzGgb.dll"
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Qe73sKzGgb.dll",#1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Qe73sKzGgb.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Qe73sKzGgb.dll",#1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Qe73sKzGgb.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\sihost.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\sihost.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\sihost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\sihost.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\sihost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\sihost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\sihost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\sihost.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\sihost.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\sihost.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\sihost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\sihost.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\System32\sihost.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\System32\sihost.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\System32\sihost.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\sihost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\sihost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\sihost.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\sihost.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\sihost.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\sihost.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\sihost.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
Source: Qe73sKzGgb.dllStatic PE information: Image base 0x180000000 > 0x60000000
Source: Qe73sKzGgb.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: Qe73sKzGgb.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: Qe73sKzGgb.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: Qe73sKzGgb.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Qe73sKzGgb.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: Qe73sKzGgb.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: Qe73sKzGgb.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: Qe73sKzGgb.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\NEO\Desktop\RavinAcademy\RedTeam-01\10\HTTPMalware\Persist\x64\Release\DLL.pdb source: Qe73sKzGgb.dll
Source: Binary string: C:\Users\NEO\Desktop\RavinAcademy\RedTeam-01\10\HTTPMalware\HTTPMalw\HTTPMalw\obj\Release\HTTPMalw.pdb source: sihost.exe, 00000004.00000002.3330089530.0000024EB5ED0000.00000004.10000000.00040000.00000000.sdmp, sihost.exe, 00000004.00000000.2092725357.0000024EB5E50000.00000004.00000001.00020000.00000000.sdmp, sihost.exe, 00000004.00000002.3331065779.0000024EB64E6000.00000004.00000001.00020000.00000000.sdmp, sihost.exe, 00000004.00000002.3331065779.0000024EB6421000.00000004.00000001.00020000.00000000.sdmp
Source: Qe73sKzGgb.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: Qe73sKzGgb.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: Qe73sKzGgb.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: Qe73sKzGgb.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: Qe73sKzGgb.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF848FF72F0 push ebx; retf 4_2_00007FF848FF73DA
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF848FF5458 push ebx; retf 4_2_00007FF848FF73DA
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF848FF7300 push ebx; retf 4_2_00007FF848FF73DA
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF848FF72F8 push ebx; retf 4_2_00007FF848FF73DA
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF848FF7338 push ebx; retf 4_2_00007FF848FF73DA
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF8490025A0 push FFFFFFE8h; ret 4_2_00007FF8490026F9
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF8490025A8 push FFFFFFE8h; ret 4_2_00007FF8490026F9
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF8490025D0 push FFFFFFE8h; ret 4_2_00007FF8490026F9
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF84923096A push edx; ret 4_2_00007FF84923096B
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF84923294D pushad ; ret 4_2_00007FF849232974
Source: C:\Windows\System32\sihost.exeCode function: 4_2_00007FF849236F90 pushfd ; iretd 4_2_00007FF849236F91
Source: Qe73sKzGgb.dllStatic PE information: section name: .text entropy: 7.125462328457127

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 81
Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 81
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 81
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 81
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 81
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 81
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 81
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 81
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 81
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 81
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 81
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 81
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sihost.exeMemory allocated: 24EB5EA0000 memory reserve | memory write watchJump to behavior
Source: C:\Windows\System32\sihost.exeMemory allocated: 24ECE420000 memory reserve | memory write watchJump to behavior
Source: C:\Windows\System32\loaddll64.exe TID: 2000Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000Jump to behavior
Source: sihost.exe, 00000004.00000002.3330504947.0000024EB629A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Windows\System32\loaddll64.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\sihost.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\loaddll64.exeThread created: C:\Windows\System32\sihost.exe EIP: B5E10000Jump to behavior
Source: C:\Windows\System32\rundll32.exeThread created: C:\Windows\System32\sihost.exe EIP: B5E20000Jump to behavior
Source: C:\Windows\System32\loaddll64.exeNtMapViewOfSection: Direct from: 0x7FF8BFAB65DFJump to behavior
Source: C:\Windows\System32\loaddll64.exeNtCreateThreadEx: Direct from: 0x7FF8BFAB661FJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: NULL target: C:\Windows\System32\sihost.exe protection: execute and readJump to behavior
Source: C:\Windows\System32\rundll32.exeSection loaded: NULL target: C:\Windows\System32\sihost.exe protection: execute and readJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Qe73sKzGgb.dll",#1Jump to behavior
Source: sihost.exe, 00000004.00000002.3329405613.0000024EB3A21000.00000002.00000001.00040000.00000000.sdmp, sihost.exe, 00000004.00000000.2091868600.0000024EB3A21000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
Source: sihost.exe, 00000004.00000002.3329405613.0000024EB3A21000.00000002.00000001.00040000.00000000.sdmp, sihost.exe, 00000004.00000000.2091868600.0000024EB3A21000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
Source: sihost.exe, 00000004.00000002.3329405613.0000024EB3A21000.00000002.00000001.00040000.00000000.sdmp, sihost.exe, 00000004.00000000.2091868600.0000024EB3A21000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
Source: sihost.exe, 00000004.00000002.3329405613.0000024EB3A21000.00000002.00000001.00040000.00000000.sdmp, sihost.exe, 00000004.00000000.2091868600.0000024EB3A21000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
Source: C:\Windows\System32\sihost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\sihost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\sihost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Xml\v4.0_4.0.0.0__b77a5c561934e089\System.XML.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\sihost.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Access Token Manipulation
1
Disable or Modify Tools
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts212
Process Injection
21
Virtualization/Sandbox Evasion
LSASS Memory2
Process Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Abuse Elevation Control Mechanism
1
Access Token Manipulation
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
DLL Side-Loading
212
Process Injection
NTDS12
System Information Discovery
Distributed Component Object ModelInput Capture1
Non-Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Abuse Elevation Control Mechanism
LSA SecretsInternet Connection DiscoverySSHKeylogging11
Application Layer Protocol
Scheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Rundll32
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
Software Packing
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
DLL Side-Loading
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Qe73sKzGgb.dll34%ReversingLabsWin64.Exploit.DonutMarte
Qe73sKzGgb.dll46%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://192.168.1.140:81/false
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://192.168.1.140:81sihost.exe, 00000004.00000002.3331065779.0000024EB6421000.00000004.00000001.00020000.00000000.sdmp, sihost.exe, 00000004.00000002.3331065779.0000024EB657A000.00000004.00000001.00020000.00000000.sdmpfalse
      unknown
      http://192.168.1.140:81/-sihost.exe, 00000004.00000002.3330504947.0000024EB62C3000.00000004.00000001.00020000.00000000.sdmpfalse
        unknown
        http://192.168.1.140:81/Xsihost.exe, 00000004.00000002.3331065779.0000024EB65D0000.00000004.00000001.00020000.00000000.sdmp, sihost.exe, 00000004.00000002.3331065779.0000024EB65B5000.00000004.00000001.00020000.00000000.sdmp, sihost.exe, 00000004.00000002.3331065779.0000024EB64C7000.00000004.00000001.00020000.00000000.sdmp, sihost.exe, 00000004.00000002.3331065779.0000024EB659C000.00000004.00000001.00020000.00000000.sdmpfalse
          unknown
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namesihost.exe, 00000004.00000002.3331065779.0000024EB64C7000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://192.168.1.140:81/:sihost.exe, 00000004.00000002.3330504947.0000024EB62C3000.00000004.00000001.00020000.00000000.sdmpfalse
            unknown
            http://192.168.1.140:81pVsihost.exe, 00000004.00000002.3331065779.0000024EB65D0000.00000004.00000001.00020000.00000000.sdmp, sihost.exe, 00000004.00000002.3331065779.0000024EB65B5000.00000004.00000001.00020000.00000000.sdmp, sihost.exe, 00000004.00000002.3331065779.0000024EB65EC000.00000004.00000001.00020000.00000000.sdmp, sihost.exe, 00000004.00000002.3331065779.0000024EB659C000.00000004.00000001.00020000.00000000.sdmpfalse
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              IP
              192.168.1.140
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1522596
              Start date and time:2024-09-30 12:31:06 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 4m 39s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:7
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:1
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:Qe73sKzGgb.dll
              (renamed file extension from exe to dll, renamed because original name is a hash value)
              Original Sample Name:17561b8a9ca5b29c23d27dd75f9d5aea43bc77625f1203a015e3d17ee33a6a61.exe
              Detection:MAL
              Classification:mal76.troj.evad.winDLL@6/0@0/1
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:Failed
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
              • Report size getting too big, too many NtReadVirtualMemory calls found.
              TimeTypeDescription
              06:32:02API Interceptor1x Sleep call for process: loaddll64.exe modified
              No context
              No context
              No context
              No context
              No context
              No created / dropped files found
              File type:PE32+ executable (DLL) (console) x86-64, for MS Windows
              Entropy (8bit):6.590458203325001
              TrID:
              • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
              • Win64 Executable (generic) (12005/4) 10.17%
              • Generic Win/DOS Executable (2004/3) 1.70%
              • DOS Executable Generic (2002/1) 1.70%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
              File name:Qe73sKzGgb.dll
              File size:33'792 bytes
              MD5:91d4990ea1a6cf19d40cc96f32202b63
              SHA1:6a03998802559f88b5236c8372d3683f081227bb
              SHA256:17561b8a9ca5b29c23d27dd75f9d5aea43bc77625f1203a015e3d17ee33a6a61
              SHA512:6e5ff5b4b1364f62c2db983779f6abe76f813db655567a133f2d9217f708ea26db15ce520ffa5f22f6b4c86ee77916503fcf981b2f07c850913405fd69066b9a
              SSDEEP:768:dToluwJhfhRiJww1esduIKICvwphx54+Fg/CHCY:dAPKwOes8457S/ACY
              TLSH:A4E2AE94FBE500E8C572D135CDB6A92BDEF079A4232552DF539089292F333A2B93C316
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................C.....................................................I.......I.......I./.....I.......Rich...................
              Icon Hash:7ae282899bbab082
              Entrypoint:0x180006974
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x180000000
              Subsystem:windows cui
              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
              Time Stamp:0x613C382D [Sat Sep 11 05:01:33 2021 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:6
              OS Version Minor:0
              File Version Major:6
              File Version Minor:0
              Subsystem Version Major:6
              Subsystem Version Minor:0
              Import Hash:9767b8148a95fb0b17884f0c6cd6e7c4
              Instruction
              dec eax
              mov dword ptr [esp+08h], ebx
              dec eax
              mov dword ptr [esp+10h], esi
              push edi
              dec eax
              sub esp, 20h
              dec ecx
              mov edi, eax
              mov ebx, edx
              dec eax
              mov esi, ecx
              cmp edx, 01h
              jne 00007FED0C7E92E7h
              call 00007FED0C7E9480h
              dec esp
              mov eax, edi
              mov edx, ebx
              dec eax
              mov ecx, esi
              dec eax
              mov ebx, dword ptr [esp+30h]
              dec eax
              mov esi, dword ptr [esp+38h]
              dec eax
              add esp, 20h
              pop edi
              jmp 00007FED0C7E9174h
              int3
              int3
              int3
              inc eax
              push ebx
              dec eax
              sub esp, 20h
              dec eax
              mov ebx, ecx
              xor ecx, ecx
              call dword ptr [00001683h]
              dec eax
              mov ecx, ebx
              call dword ptr [00001672h]
              call dword ptr [00001634h]
              dec eax
              mov ecx, eax
              mov edx, C0000409h
              dec eax
              add esp, 20h
              pop ebx
              dec eax
              jmp dword ptr [00001668h]
              dec eax
              mov dword ptr [esp+08h], ecx
              dec eax
              sub esp, 38h
              mov ecx, 00000017h
              call dword ptr [0000165Ch]
              test eax, eax
              je 00007FED0C7E92E9h
              mov ecx, 00000002h
              int 29h
              dec eax
              lea ecx, dword ptr [000026E2h]
              call 00007FED0C7E938Eh
              dec eax
              mov eax, dword ptr [esp+38h]
              dec eax
              mov dword ptr [000027C9h], eax
              dec eax
              lea eax, dword ptr [esp+38h]
              dec eax
              add eax, 08h
              dec eax
              mov dword ptr [00002759h], eax
              dec eax
              mov eax, dword ptr [000027B2h]
              dec eax
              mov dword ptr [00002623h], eax
              Programming Language:
              • [IMP] VS2008 SP1 build 30729
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x89340x78.rdata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0xc0000x1e0.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0xb0000x240.pdata
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0xd0000x24.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x824c0x70.rdata
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x82c00x138.rdata
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x80000x138.rdata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x64780x660033436ca9217957cfc4a06e5a3be93cf6False0.7673483455882353data7.125462328457127IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rdata0x80000xe380x1000bc547a0417f81714bdeaca78bb316f39False0.39404296875data4.037276543622751IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0x90000x16040x2004e3cf939c6b9143de49c819a775b7f91False0.09375data0.44978594583004794IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .pdata0xb0000x2400x400ad3465f7531b0c8d5c05ad7c16c6ef12False0.30859375data2.445728612624437IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .rsrc0xc0000x1e00x200033f07f58c3c8ea3a98fbea3867bbc54False0.53125data4.708553337303423IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0xd0000x240x200b8255c69f8aa4a2196d987b0fd662c0cFalse0.099609375data0.5286804121647501IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_MANIFEST0xc0600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
              DLLImport
              KERNEL32.dllProcess32First, GetCurrentProcess, OpenProcess, CreateToolhelp32Snapshot, Process32Next, CloseHandle, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, GetCurrentProcessId, QueryPerformanceCounter, RtlCaptureContext
              VCRUNTIME140.dllmemcpy, __std_type_info_destroy_list, __C_specific_handler, memset
              api-ms-win-crt-stdio-l1-1-0.dll__acrt_iob_func, __stdio_common_vfprintf
              api-ms-win-crt-string-l1-1-0.dlltolower
              api-ms-win-crt-runtime-l1-1-0.dll_initialize_narrow_environment, _initterm, _cexit, _initialize_onexit_table, _execute_onexit_table, _configure_narrow_argv, _seh_filter_dll, _initterm_e
              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States
              TimestampSource PortDest PortSource IPDest IP
              Sep 30, 2024 12:32:03.123704910 CEST4970481192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:03.221426010 CEST8149704192.168.1.140192.168.2.5
              Sep 30, 2024 12:32:03.221586943 CEST4970481192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:03.221913099 CEST4970481192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:03.226705074 CEST8149704192.168.1.140192.168.2.5
              Sep 30, 2024 12:32:03.580365896 CEST4970481192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:03.585794926 CEST8149704192.168.1.140192.168.2.5
              Sep 30, 2024 12:32:10.085061073 CEST4970581192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:10.090013981 CEST8149705192.168.1.140192.168.2.5
              Sep 30, 2024 12:32:10.090107918 CEST4970581192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:10.369533062 CEST4970581192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:10.374804974 CEST8149705192.168.1.140192.168.2.5
              Sep 30, 2024 12:32:10.905343056 CEST4970581192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:10.910243988 CEST8149705192.168.1.140192.168.2.5
              Sep 30, 2024 12:32:24.600053072 CEST8149704192.168.1.140192.168.2.5
              Sep 30, 2024 12:32:24.600126028 CEST4970481192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:24.687328100 CEST4970481192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:24.692110062 CEST8149704192.168.1.140192.168.2.5
              Sep 30, 2024 12:32:24.760921001 CEST4971181192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:24.765851974 CEST8149711192.168.1.140192.168.2.5
              Sep 30, 2024 12:32:24.765957117 CEST4971181192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:24.766163111 CEST4971181192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:24.770967007 CEST8149711192.168.1.140192.168.2.5
              Sep 30, 2024 12:32:25.120131016 CEST4971181192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:25.127752066 CEST8149711192.168.1.140192.168.2.5
              Sep 30, 2024 12:32:31.440201998 CEST8149705192.168.1.140192.168.2.5
              Sep 30, 2024 12:32:31.440327883 CEST4970581192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:31.611555099 CEST4970581192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:31.616533041 CEST8149705192.168.1.140192.168.2.5
              Sep 30, 2024 12:32:31.704248905 CEST4971281192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:31.709322929 CEST8149712192.168.1.140192.168.2.5
              Sep 30, 2024 12:32:31.709419966 CEST4971281192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:31.709532022 CEST4971281192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:31.714540005 CEST8149712192.168.1.140192.168.2.5
              Sep 30, 2024 12:32:32.057497978 CEST4971281192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:32.062453985 CEST8149712192.168.1.140192.168.2.5
              Sep 30, 2024 12:32:46.145035028 CEST8149711192.168.1.140192.168.2.5
              Sep 30, 2024 12:32:46.145275116 CEST4971181192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:46.145459890 CEST4971181192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:46.150234938 CEST8149711192.168.1.140192.168.2.5
              Sep 30, 2024 12:32:46.180272102 CEST4971381192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:46.185177088 CEST8149713192.168.1.140192.168.2.5
              Sep 30, 2024 12:32:46.185362101 CEST4971381192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:46.185484886 CEST4971381192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:46.190253973 CEST8149713192.168.1.140192.168.2.5
              Sep 30, 2024 12:32:46.541853905 CEST4971381192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:46.546789885 CEST8149713192.168.1.140192.168.2.5
              Sep 30, 2024 12:32:53.081165075 CEST8149712192.168.1.140192.168.2.5
              Sep 30, 2024 12:32:53.081419945 CEST4971281192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:53.081516981 CEST4971281192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:53.086285114 CEST8149712192.168.1.140192.168.2.5
              Sep 30, 2024 12:32:53.107152939 CEST4971481192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:53.112071037 CEST8149714192.168.1.140192.168.2.5
              Sep 30, 2024 12:32:53.112189054 CEST4971481192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:53.112296104 CEST4971481192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:53.117069006 CEST8149714192.168.1.140192.168.2.5
              Sep 30, 2024 12:32:53.463738918 CEST4971481192.168.2.5192.168.1.140
              Sep 30, 2024 12:32:53.468717098 CEST8149714192.168.1.140192.168.2.5
              Sep 30, 2024 12:33:07.585616112 CEST8149713192.168.1.140192.168.2.5
              Sep 30, 2024 12:33:07.585794926 CEST4971381192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:07.587475061 CEST4971381192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:07.592279911 CEST8149713192.168.1.140192.168.2.5
              Sep 30, 2024 12:33:07.623199940 CEST4971681192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:07.628004074 CEST8149716192.168.1.140192.168.2.5
              Sep 30, 2024 12:33:07.628101110 CEST4971681192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:07.628222942 CEST4971681192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:07.633146048 CEST8149716192.168.1.140192.168.2.5
              Sep 30, 2024 12:33:07.979672909 CEST4971681192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:07.984595060 CEST8149716192.168.1.140192.168.2.5
              Sep 30, 2024 12:33:14.472104073 CEST8149714192.168.1.140192.168.2.5
              Sep 30, 2024 12:33:14.472270966 CEST4971481192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:14.476938009 CEST4971481192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:14.482496023 CEST8149714192.168.1.140192.168.2.5
              Sep 30, 2024 12:33:14.498806000 CEST4971781192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:14.504102945 CEST8149717192.168.1.140192.168.2.5
              Sep 30, 2024 12:33:14.504343033 CEST4971781192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:14.504343033 CEST4971781192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:14.510108948 CEST8149717192.168.1.140192.168.2.5
              Sep 30, 2024 12:33:14.854376078 CEST4971781192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:14.860404015 CEST8149717192.168.1.140192.168.2.5
              Sep 30, 2024 12:33:29.024735928 CEST8149716192.168.1.140192.168.2.5
              Sep 30, 2024 12:33:29.024832964 CEST4971681192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:29.025000095 CEST4971681192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:29.031708956 CEST8149716192.168.1.140192.168.2.5
              Sep 30, 2024 12:33:29.060653925 CEST4971881192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:29.065592051 CEST8149718192.168.1.140192.168.2.5
              Sep 30, 2024 12:33:29.065720081 CEST4971881192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:29.065802097 CEST4971881192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:29.071094990 CEST8149718192.168.1.140192.168.2.5
              Sep 30, 2024 12:33:29.417032003 CEST4971881192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:29.422044992 CEST8149718192.168.1.140192.168.2.5
              Sep 30, 2024 12:33:35.878846884 CEST8149717192.168.1.140192.168.2.5
              Sep 30, 2024 12:33:35.878973961 CEST4971781192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:35.879126072 CEST4971781192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:35.883944035 CEST8149717192.168.1.140192.168.2.5
              Sep 30, 2024 12:33:35.972742081 CEST4971981192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:35.977937937 CEST8149719192.168.1.140192.168.2.5
              Sep 30, 2024 12:33:35.978049994 CEST4971981192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:35.978285074 CEST4971981192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:35.983053923 CEST8149719192.168.1.140192.168.2.5
              Sep 30, 2024 12:33:36.323138952 CEST4971981192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:36.328955889 CEST8149719192.168.1.140192.168.2.5
              Sep 30, 2024 12:33:50.425817013 CEST8149718192.168.1.140192.168.2.5
              Sep 30, 2024 12:33:50.425921917 CEST4971881192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:50.426065922 CEST4971881192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:50.430835009 CEST8149718192.168.1.140192.168.2.5
              Sep 30, 2024 12:33:50.450970888 CEST4972081192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:50.455800056 CEST8149720192.168.1.140192.168.2.5
              Sep 30, 2024 12:33:50.455988884 CEST4972081192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:50.456130981 CEST4972081192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:50.460894108 CEST8149720192.168.1.140192.168.2.5
              Sep 30, 2024 12:33:50.810224056 CEST4972081192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:50.815992117 CEST8149720192.168.1.140192.168.2.5
              Sep 30, 2024 12:33:57.364347935 CEST8149719192.168.1.140192.168.2.5
              Sep 30, 2024 12:33:57.364444017 CEST4971981192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:57.364558935 CEST4971981192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:57.369340897 CEST8149719192.168.1.140192.168.2.5
              Sep 30, 2024 12:33:57.393368959 CEST4972181192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:57.399422884 CEST8149721192.168.1.140192.168.2.5
              Sep 30, 2024 12:33:57.399511099 CEST4972181192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:57.399617910 CEST4972181192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:57.404870987 CEST8149721192.168.1.140192.168.2.5
              Sep 30, 2024 12:33:57.745109081 CEST4972181192.168.2.5192.168.1.140
              Sep 30, 2024 12:33:57.749978065 CEST8149721192.168.1.140192.168.2.5
              • 192.168.1.140:81
              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.549704192.168.1.140813388C:\Windows\System32\sihost.exe
              TimestampBytes transferredDirectionData
              Sep 30, 2024 12:32:03.221913099 CEST251OUTPOST / HTTP/1.1
              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.246
              Host: 192.168.1.140:81
              Content-Length: 133
              Expect: 100-continue
              Connection: Keep-Alive


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              1192.168.2.549705192.168.1.140813388C:\Windows\System32\sihost.exe
              TimestampBytes transferredDirectionData
              Sep 30, 2024 12:32:10.369533062 CEST251OUTPOST / HTTP/1.1
              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.246
              Host: 192.168.1.140:81
              Content-Length: 133
              Expect: 100-continue
              Connection: Keep-Alive


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              2192.168.2.549711192.168.1.140813388C:\Windows\System32\sihost.exe
              TimestampBytes transferredDirectionData
              Sep 30, 2024 12:32:24.766163111 CEST251OUTPOST / HTTP/1.1
              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.246
              Host: 192.168.1.140:81
              Content-Length: 133
              Expect: 100-continue
              Connection: Keep-Alive


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              3192.168.2.549712192.168.1.140813388C:\Windows\System32\sihost.exe
              TimestampBytes transferredDirectionData
              Sep 30, 2024 12:32:31.709532022 CEST251OUTPOST / HTTP/1.1
              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.246
              Host: 192.168.1.140:81
              Content-Length: 133
              Expect: 100-continue
              Connection: Keep-Alive


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              4192.168.2.549713192.168.1.140813388C:\Windows\System32\sihost.exe
              TimestampBytes transferredDirectionData
              Sep 30, 2024 12:32:46.185484886 CEST251OUTPOST / HTTP/1.1
              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.246
              Host: 192.168.1.140:81
              Content-Length: 133
              Expect: 100-continue
              Connection: Keep-Alive


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              5192.168.2.549714192.168.1.140813388C:\Windows\System32\sihost.exe
              TimestampBytes transferredDirectionData
              Sep 30, 2024 12:32:53.112296104 CEST251OUTPOST / HTTP/1.1
              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.246
              Host: 192.168.1.140:81
              Content-Length: 133
              Expect: 100-continue
              Connection: Keep-Alive


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              6192.168.2.549716192.168.1.140813388C:\Windows\System32\sihost.exe
              TimestampBytes transferredDirectionData
              Sep 30, 2024 12:33:07.628222942 CEST251OUTPOST / HTTP/1.1
              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.246
              Host: 192.168.1.140:81
              Content-Length: 133
              Expect: 100-continue
              Connection: Keep-Alive


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              7192.168.2.549717192.168.1.140813388C:\Windows\System32\sihost.exe
              TimestampBytes transferredDirectionData
              Sep 30, 2024 12:33:14.504343033 CEST251OUTPOST / HTTP/1.1
              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.246
              Host: 192.168.1.140:81
              Content-Length: 133
              Expect: 100-continue
              Connection: Keep-Alive


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              8192.168.2.549718192.168.1.140813388C:\Windows\System32\sihost.exe
              TimestampBytes transferredDirectionData
              Sep 30, 2024 12:33:29.065802097 CEST251OUTPOST / HTTP/1.1
              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.246
              Host: 192.168.1.140:81
              Content-Length: 133
              Expect: 100-continue
              Connection: Keep-Alive


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              9192.168.2.549719192.168.1.140813388C:\Windows\System32\sihost.exe
              TimestampBytes transferredDirectionData
              Sep 30, 2024 12:33:35.978285074 CEST251OUTPOST / HTTP/1.1
              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.246
              Host: 192.168.1.140:81
              Content-Length: 133
              Expect: 100-continue
              Connection: Keep-Alive


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              10192.168.2.549720192.168.1.140813388C:\Windows\System32\sihost.exe
              TimestampBytes transferredDirectionData
              Sep 30, 2024 12:33:50.456130981 CEST251OUTPOST / HTTP/1.1
              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.246
              Host: 192.168.1.140:81
              Content-Length: 133
              Expect: 100-continue
              Connection: Keep-Alive


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              11192.168.2.549721192.168.1.140813388C:\Windows\System32\sihost.exe
              TimestampBytes transferredDirectionData
              Sep 30, 2024 12:33:57.399617910 CEST251OUTPOST / HTTP/1.1
              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.246
              Host: 192.168.1.140:81
              Content-Length: 133
              Expect: 100-continue
              Connection: Keep-Alive


              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:06:32:01
              Start date:30/09/2024
              Path:C:\Windows\System32\loaddll64.exe
              Wow64 process (32bit):false
              Commandline:loaddll64.exe "C:\Users\user\Desktop\Qe73sKzGgb.dll"
              Imagebase:0x7ff674e80000
              File size:165'888 bytes
              MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000002.2098220710.000001FA21A10000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_Donutloader_5c38878d, Description: unknown, Source: 00000000.00000002.2098220710.000001FA21A10000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
              Reputation:high
              Has exited:true

              Target ID:1
              Start time:06:32:01
              Start date:30/09/2024
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff6d64d0000
              File size:862'208 bytes
              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:2
              Start time:06:32:01
              Start date:30/09/2024
              Path:C:\Windows\System32\cmd.exe
              Wow64 process (32bit):false
              Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Qe73sKzGgb.dll",#1
              Imagebase:0x7ff607bd0000
              File size:289'792 bytes
              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:3
              Start time:06:32:01
              Start date:30/09/2024
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe "C:\Users\user\Desktop\Qe73sKzGgb.dll",#1
              Imagebase:0x7ff615fd0000
              File size:71'680 bytes
              MD5 hash:EF3179D498793BF4234F708D3BE28633
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000003.00000002.2139912895.000001BDF7DF0000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_Donutloader_5c38878d, Description: unknown, Source: 00000003.00000002.2139912895.000001BDF7DF0000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
              Reputation:high
              Has exited:true

              Target ID:4
              Start time:06:32:01
              Start date:30/09/2024
              Path:C:\Windows\System32\sihost.exe
              Wow64 process (32bit):false
              Commandline:sihost.exe
              Imagebase:0x7ff6f27b0000
              File size:111'616 bytes
              MD5 hash:A21E7719D73D0322E2E7D61802CB8F80
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000004.00000000.2092567006.0000024EB5E20000.00000020.80000000.00040000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_Donutloader_5c38878d, Description: unknown, Source: 00000004.00000000.2092567006.0000024EB5E20000.00000020.80000000.00040000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000004.00000002.3329850570.0000024EB5E10000.00000020.00000001.00040000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_Donutloader_5c38878d, Description: unknown, Source: 00000004.00000002.3329850570.0000024EB5E10000.00000020.00000001.00040000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000004.00000002.3329877059.0000024EB5E20000.00000020.80000000.00040000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_Donutloader_5c38878d, Description: unknown, Source: 00000004.00000002.3329877059.0000024EB5E20000.00000020.80000000.00040000.00000000.sdmp, Author: unknown
              Reputation:moderate
              Has exited:false

              Reset < >

                Execution Graph

                Execution Coverage:15.1%
                Dynamic/Decrypted Code Coverage:45.2%
                Signature Coverage:34.8%
                Total number of Nodes:115
                Total number of Limit Nodes:12
                execution_graph 23459 7ff848ff2fe6 23460 7ff848ff301f NtQuerySystemInformation 23459->23460 23462 7ff848ff30c1 23460->23462 23352 7ff848ff2601 23353 7ff848ff260f CloseHandle 23352->23353 23355 7ff848ff26ab 23353->23355 23356 7ff84923512d 23357 7ff84923513b 23356->23357 23358 7ff849235198 23357->23358 23359 7ff84923537a setsockopt 23357->23359 23360 7ff8492353d8 23359->23360 23463 7ff849237ecd 23464 7ff849237ed7 shutdown 23463->23464 23466 7ff849237fb1 23464->23466 23361 24eb5e13777 23362 24eb5e1379e 23361->23362 23363 24eb5e137d9 VirtualAlloc 23362->23363 23373 24eb5e137f6 23362->23373 23364 24eb5e13822 23363->23364 23363->23373 23365 24eb5e139aa 23364->23365 23364->23373 23380 24eb5e1291f VirtualProtect VirtualProtect 23364->23380 23366 24eb5e139b4 VirtualAlloc 23365->23366 23365->23373 23372 24eb5e139dc 23366->23372 23366->23373 23368 24eb5e13980 23369 24eb5e13984 23368->23369 23376 24eb5e12a37 23368->23376 23369->23368 23369->23373 23371 24eb5e13999 23371->23365 23371->23373 23372->23373 23374 24eb5e13a43 VirtualAlloc 23372->23374 23375 24eb5e13aa5 VirtualFree 23374->23375 23375->23373 23377 24eb5e12a54 23376->23377 23378 24eb5e12a96 VirtualProtect 23377->23378 23379 24eb5e12a5c 23377->23379 23378->23379 23379->23371 23380->23368 23381 24eb5e23777 23382 24eb5e2379e 23381->23382 23383 24eb5e237d9 VirtualAlloc 23382->23383 23395 24eb5e237f6 23382->23395 23384 24eb5e23822 23383->23384 23383->23395 23385 24eb5e238db LoadLibraryA 23384->23385 23386 24eb5e238f6 23384->23386 23384->23395 23385->23384 23387 24eb5e239aa 23386->23387 23386->23395 23409 24eb5e2291f LoadLibraryA VirtualProtect VirtualProtect VirtualProtect VirtualProtect 23386->23409 23389 24eb5e239b4 VirtualAlloc 23387->23389 23397 24eb5e239f5 23387->23397 23394 24eb5e239dc 23389->23394 23389->23395 23390 24eb5e23980 23391 24eb5e23984 23390->23391 23400 24eb5e22a37 23390->23400 23391->23390 23391->23395 23394->23395 23394->23397 23398 24eb5e23a43 VirtualAlloc 23394->23398 23397->23395 23406 24eb5e2352f 23397->23406 23399 24eb5e23aa5 VirtualFree 23398->23399 23399->23395 23399->23397 23401 24eb5e22a54 23400->23401 23402 24eb5e22a7f VirtualProtect 23401->23402 23403 24eb5e22a5c 23401->23403 23402->23403 23404 24eb5e22ab4 23402->23404 23403->23387 23403->23395 23405 24eb5e22ac2 VirtualProtect 23404->23405 23405->23403 23407 24eb5e2356f CLRCreateInstance 23406->23407 23408 24eb5e23584 23406->23408 23407->23408 23408->23395 23409->23390 23432 24eb5e22afc VirtualProtect 23433 24eb5e22b16 23432->23433 23434 24eb5e22a5c 23432->23434 23435 24eb5e22b24 VirtualProtect 23433->23435 23435->23434 23467 7ff848ff14da 23468 7ff84902eed0 K32EnumProcessModules 23467->23468 23470 7ff84902efa4 23468->23470 23473 7ff84902eff3 23470->23473 23474 7ff84902f019 K32GetModuleInformation 23473->23474 23476 7ff84902f15e 23474->23476 23455 7ff848ff24b8 23456 7ff848ff24c1 AdjustTokenPrivileges 23455->23456 23458 7ff848ff25c8 23456->23458 23436 24eb5e12afc VirtualProtect 23437 24eb5e12a5c 23436->23437 23451 7ff848ff21b2 23452 7ff848ff21c9 LookupPrivilegeValueW 23451->23452 23454 7ff848ff22aa 23452->23454 23438 7ff849230c9f 23439 7ff849230caf 23438->23439 23440 7ff849230ccf 23439->23440 23441 7ff8492310a4 recv 23439->23441 23442 7ff8492310ff 23441->23442 23443 7ff849235a9c 23446 7ff849231000 23443->23446 23445 7ff849235aa9 23447 7ff849231011 23446->23447 23448 7ff84923100b 23446->23448 23447->23445 23448->23447 23449 7ff8492310a4 recv 23448->23449 23450 7ff8492310ff 23449->23450 23450->23445 23410 24eb5e12984 VirtualProtect 23411 24eb5e1299c 23410->23411 23413 24eb5e12944 23410->23413 23412 24eb5e129e5 VirtualProtect 23411->23412 23411->23413 23412->23413 23477 7ff848ff1cee 23479 7ff848ff1cf7 23477->23479 23478 7ff848ff1d4d 23479->23478 23480 7ff848ff20d4 23479->23480 23481 7ff848ff20d9 23479->23481 23485 7ff848ff2174 LookupPrivilegeValueW 23480->23485 23484 7ff848ff2162 23481->23484 23486 7ff848ff2174 LookupPrivilegeValueW 23481->23486 23485->23484 23486->23484 23418 7ff848ff276d 23419 7ff848ff2777 EnumWindows 23418->23419 23421 7ff848ff2831 23419->23421 23414 7ff848ff152a 23415 7ff84902f230 K32GetModuleBaseNameW 23414->23415 23417 7ff84902f428 23415->23417 23422 24eb5e2292c LoadLibraryA 23423 24eb5e22944 23422->23423 23424 24eb5e2294e 23422->23424 23424->23423 23425 24eb5e2297e VirtualProtect 23424->23425 23425->23423 23426 24eb5e2299c 23425->23426 23427 24eb5e229aa VirtualProtect 23426->23427 23428 24eb5e229ca 23427->23428 23428->23423 23429 24eb5e229e5 VirtualProtect 23428->23429 23429->23423 23430 24eb5e229fe 23429->23430 23431 24eb5e22a0c VirtualProtect 23430->23431 23431->23423

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 102 24eb5e23777-24eb5e237cd call 24eb5e249f7 * 3 109 24eb5e237cf-24eb5e237d2 102->109 110 24eb5e23804 102->110 109->110 112 24eb5e237d4-24eb5e237d7 109->112 111 24eb5e23807-24eb5e23821 110->111 112->110 113 24eb5e237d9-24eb5e237f4 VirtualAlloc 112->113 114 24eb5e23822-24eb5e2384d call 24eb5e24f4b call 24eb5e24f6b 113->114 115 24eb5e237f6-24eb5e237fd 113->115 121 24eb5e2384f-24eb5e23884 call 24eb5e24bb3 call 24eb5e24a6b 114->121 122 24eb5e2388a-24eb5e238a1 call 24eb5e249f7 114->122 115->110 117 24eb5e237ff-24eb5e23801 115->117 117->110 121->122 133 24eb5e23b21-24eb5e23b2d 121->133 122->110 127 24eb5e238a7-24eb5e238a8 122->127 129 24eb5e238ae-24eb5e238b4 127->129 131 24eb5e238f6-24eb5e23900 129->131 132 24eb5e238b6 129->132 135 24eb5e2392e-24eb5e23937 131->135 136 24eb5e23902-24eb5e2391d call 24eb5e249f7 131->136 134 24eb5e238b8-24eb5e238ba 132->134 137 24eb5e23b2f-24eb5e23b39 133->137 138 24eb5e23b63-24eb5e23b87 call 24eb5e24f6b 133->138 140 24eb5e238d7-24eb5e238d9 134->140 141 24eb5e238bc-24eb5e238c2 134->141 144 24eb5e23952-24eb5e23955 135->144 145 24eb5e23939-24eb5e23943 call 24eb5e22b4f 135->145 136->133 157 24eb5e23923-24eb5e2392c 136->157 137->138 139 24eb5e23b3b-24eb5e23b5c call 24eb5e24f6b 137->139 164 24eb5e23b8e-24eb5e23b90 138->164 165 24eb5e23b89-24eb5e23b8b 138->165 139->138 140->131 149 24eb5e238db-24eb5e238f4 LoadLibraryA 140->149 141->140 148 24eb5e238c4-24eb5e238d5 141->148 144->133 147 24eb5e2395b-24eb5e23965 144->147 145->133 158 24eb5e23949-24eb5e23950 145->158 155 24eb5e2396f-24eb5e23976 147->155 156 24eb5e23967-24eb5e23968 147->156 148->134 148->140 149->129 159 24eb5e23978-24eb5e23979 155->159 160 24eb5e239aa-24eb5e239ae 155->160 156->155 157->135 157->136 158->155 163 24eb5e2397b call 24eb5e2291f 159->163 166 24eb5e239b4-24eb5e239d6 VirtualAlloc 160->166 167 24eb5e23abc-24eb5e23ac4 160->167 169 24eb5e23980-24eb5e23982 163->169 164->111 165->164 166->133 168 24eb5e239dc-24eb5e239f3 call 24eb5e24f4b 166->168 170 24eb5e23b16-24eb5e23b1c call 24eb5e23fcf 167->170 171 24eb5e23ac6-24eb5e23acc 167->171 183 24eb5e239f5-24eb5e239f8 168->183 184 24eb5e23a16-24eb5e23a3d 168->184 175 24eb5e23991-24eb5e23994 call 24eb5e22a37 169->175 176 24eb5e23984-24eb5e2398b 169->176 170->133 172 24eb5e23ace-24eb5e23ad4 171->172 173 24eb5e23ae3-24eb5e23af5 call 24eb5e2352f 171->173 172->133 178 24eb5e23ad6-24eb5e23ae1 call 24eb5e24457 172->178 189 24eb5e23b07-24eb5e23b14 call 24eb5e22fcf 173->189 190 24eb5e23af7-24eb5e23b02 call 24eb5e23b97 173->190 186 24eb5e23999-24eb5e2399b 175->186 176->133 176->175 178->133 183->167 188 24eb5e239fe-24eb5e23a11 call 24eb5e24ccf 183->188 184->133 197 24eb5e23a43-24eb5e23ab7 VirtualAlloc VirtualFree 184->197 186->160 191 24eb5e2399d-24eb5e239a4 186->191 199 24eb5e23ab9-24eb5e23aba 188->199 189->133 190->189 191->133 191->160 197->133 197->199 199->167
                APIs
                Memory Dump Source
                • Source File: 00000004.00000002.3329877059.0000024EB5E20000.00000020.80000000.00040000.00000000.sdmp, Offset: 0000024EB5E20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_24eb5e20000_sihost.jbxd
                Yara matches
                Similarity
                • API ID: Virtual$Alloc$FreeLibraryLoad
                • String ID:
                • API String ID: 352157779-0
                • Opcode ID: 60595fa5053f1866d63c87b1b8d7f0fee698ebc8641127cacdaf14d5899dacb3
                • Instruction ID: 1be3d720e8da04a3ad09c55f3770599f5f7e42a0851172349de712626d89e83d
                • Opcode Fuzzy Hash: 60595fa5053f1866d63c87b1b8d7f0fee698ebc8641127cacdaf14d5899dacb3
                • Instruction Fuzzy Hash: 54D15730614A084BFF78EB28C8997AAB3D1FB9D30CF55496DD48BC718ADA21D9468B41

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 218 7ff849232b7c-7ff849232bab 221 7ff849232bad-7ff849232bd1 218->221 222 7ff849232bd7-7ff849232bde 218->222 221->222 223 7ff849232ca0-7ff849232cda 222->223 224 7ff849232be4-7ff849232be7 222->224 226 7ff849232ce1-7ff849232d04 223->226 225 7ff849232bed-7ff849232bef 224->225 224->226 229 7ff849232d1b-7ff849232d1c 225->229 230 7ff849232bf5-7ff849232bfa 225->230 234 7ff849232d1e-7ff849232d4d 226->234 236 7ff849232d06-7ff849232d14 226->236 229->234 230->229 233 7ff849232c00-7ff849232c02 230->233 237 7ff849232c08-7ff849232c0c 233->237 238 7ff849232d54-7ff849232d77 233->238 234->238 236->229 237->238 241 7ff849232c12-7ff849232c19 237->241 249 7ff849232d79-7ff849232d90 238->249 250 7ff849232d91-7ff849232da9 238->250 252 7ff849232c1b-7ff849232c3c 241->252 253 7ff849232c43-7ff849232c5c 241->253 249->250 255 7ff849232dab-7ff849232dcb 250->255 256 7ff849232dcc-7ff849232df7 250->256 252->253 261 7ff849232c63-7ff849232c6a 253->261 255->256 258 7ff84923343b-7ff849233440 256->258 259 7ff849232dfd-7ff849232e08 256->259 266 7ff849233448-7ff84923346a 258->266 263 7ff849232e0a-7ff849232e15 259->263 264 7ff849232e1b-7ff849232e2c 259->264 267 7ff849232c6c-7ff849232c94 261->267 268 7ff849232c96-7ff849232c9f 261->268 263->264 263->266 272 7ff849232e2e-7ff849232e39 264->272 273 7ff849232e3f-7ff849232e59 264->273 275 7ff8492334da-7ff8492334f7 266->275 276 7ff84923346c-7ff84923349c 266->276 267->268 272->273 277 7ff8492334a3-7ff8492334ae 272->277 278 7ff849232e5b-7ff849232e5f 273->278 279 7ff849232e65-7ff849232e6e 273->279 280 7ff8492334fe-7ff84923356e 275->280 290 7ff8492334a0-7ff8492334a2 276->290 277->290 291 7ff8492334b0-7ff8492334d9 277->291 278->279 278->280 281 7ff849232ec3-7ff849232ed0 279->281 282 7ff849232e70-7ff849232e72 279->282 341 7ff8492335a9-7ff8492335ba 280->341 342 7ff849233570-7ff84923357a 280->342 288 7ff849233386-7ff849233391 281->288 289 7ff849232ed6-7ff849232ee1 281->289 282->281 284 7ff849232e74-7ff849232e89 282->284 306 7ff849232eab-7ff849232ebc 284->306 307 7ff849232e8b-7ff849232e96 284->307 294 7ff8492333ad-7ff8492333b1 288->294 295 7ff849233393-7ff84923339c 288->295 289->288 293 7ff849232ee7-7ff849232ef2 289->293 290->277 291->275 293->288 301 7ff849232ef8-7ff849232f03 293->301 297 7ff84923340b-7ff849233413 294->297 298 7ff8492333b3-7ff849233404 294->298 295->294 302 7ff84923339e-7ff8492333a0 295->302 309 7ff84923341d-7ff84923343a call 7ff84923382a 297->309 298->297 301->288 310 7ff849232f09-7ff849232f14 301->310 302->294 303 7ff8492333a2-7ff8492333aa 302->303 303->294 306->281 307->306 313 7ff849232e98-7ff849232ea9 307->313 311 7ff849232f1a-7ff849232f38 310->311 312 7ff8492331b9-7ff8492331bd 310->312 324 7ff849232f3e-7ff849232f92 311->324 325 7ff849232fc4-7ff849233068 311->325 317 7ff8492331bf-7ff8492331c2 312->317 318 7ff8492331c4-7ff849233228 312->318 313->281 313->306 322 7ff84923322c-7ff849233239 317->322 318->322 327 7ff84923329a-7ff84923329e 322->327 328 7ff84923323b-7ff849233246 322->328 324->325 325->312 332 7ff849233318-7ff84923333b 327->332 333 7ff8492332a0-7ff8492332b5 327->333 334 7ff849233248-7ff84923326a 328->334 335 7ff849233289-7ff84923328d 328->335 365 7ff84923333d-7ff849233348 332->365 366 7ff849233361-7ff84923337c 332->366 351 7ff8492332db 333->351 352 7ff8492332b7-7ff8492332c2 333->352 353 7ff8492332dc-7ff849233313 334->353 354 7ff84923326c-7ff849233282 334->354 335->327 337 7ff84923328f-7ff849233297 335->337 337->327 367 7ff8492335bc-7ff8492335d1 341->367 368 7ff849233636-7ff849233647 341->368 342->341 364 7ff84923357c-7ff849233580 342->364 351->353 352->351 360 7ff8492332c4-7ff8492332d6 352->360 369 7ff849233415-7ff84923341a 353->369 354->335 360->369 370 7ff849233589-7ff8492335a8 364->370 371 7ff849233582 364->371 365->366 373 7ff84923334a-7ff84923335b 365->373 366->369 379 7ff8492335ea-7ff84923362f 367->379 380 7ff8492335d3-7ff8492335e8 367->380 383 7ff849233649-7ff849233660 368->383 384 7ff849233665-7ff849233670 368->384 369->309 371->370 373->366 373->369 379->368 380->368 380->379 383->384 389 7ff84923368c-7ff849233698 384->389 390 7ff849233672-7ff849233681 384->390 394 7ff84923369d-7ff8492336b4 389->394 390->394 395 7ff849233683-7ff84923368a 390->395 395->394
                Strings
                Memory Dump Source
                • Source File: 00000004.00000002.3339175273.00007FF849230000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF849230000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff849230000_sihost.jbxd
                Similarity
                • API ID:
                • String ID: x1 I$x1 I$x1 I$x1 I
                • API String ID: 0-3632624455
                • Opcode ID: d00ff6eb508413aa2a5b7bc626f6c8f2031e4659dae01dcbe7525f45f3d93ca6
                • Instruction ID: 85e13a38c0b1ae47e6b767245bc1ba0d1a1ff8b6a120cd0428f25a60599f6499
                • Opcode Fuzzy Hash: d00ff6eb508413aa2a5b7bc626f6c8f2031e4659dae01dcbe7525f45f3d93ca6
                • Instruction Fuzzy Hash: 6D72B230E1CA9A4FFBA9EF2884556BA77E1FF59344F54007ED45EC72D2CE28A8428741

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 401 7ff848ff59af-7ff849025362 403 7ff84902537e-7ff84902538e 401->403 404 7ff849025364-7ff84902536e 401->404 407 7ff849025390-7ff8490253a3 403->407 408 7ff8490253a4-7ff8490253b9 call 7ff848ff56e8 403->408 405 7ff849025a2c-7ff849025a41 404->405 406 7ff849025374-7ff849025377 404->406 412 7ff849025a4c-7ff849025a97 405->412 413 7ff849025a43-7ff849025a4b 405->413 406->403 414 7ff8490253bf-7ff8490253cc 408->414 415 7ff849025640-7ff84902568c 408->415 440 7ff849025b19-7ff849025b3f 412->440 441 7ff849025a9d call 7ff848ff3258 412->441 413->412 417 7ff8490254dd-7ff8490254e4 414->417 418 7ff8490253d2-7ff84902541e 414->418 424 7ff849025749-7ff84902574c 415->424 425 7ff849025692-7ff84902569c 415->425 421 7ff8490255f9-7ff84902563b 417->421 422 7ff8490254ea-7ff8490254f1 417->422 435 7ff849025420-7ff849025423 418->435 436 7ff849025425-7ff84902542d 418->436 421->424 422->421 423 7ff8490254f7-7ff8490254fe 422->423 428 7ff849025558-7ff849025586 call 7ff848ff7940 423->428 429 7ff849025500-7ff849025514 423->429 433 7ff84902574e-7ff84902575c 424->433 434 7ff849025781-7ff84902578b 424->434 430 7ff84902569e-7ff8490256a1 425->430 431 7ff8490256a3-7ff8490256ab 425->431 460 7ff849025588-7ff8490255a8 428->460 461 7ff8490255aa-7ff8490255c5 428->461 429->405 437 7ff84902551a-7ff849025524 429->437 438 7ff8490256ae-7ff8490256b3 430->438 431->438 433->405 442 7ff849025762-7ff84902576c 433->442 444 7ff849025791-7ff8490257b2 call 7ff848ff59c0 434->444 445 7ff849025880-7ff84902588f 434->445 443 7ff849025430-7ff849025435 435->443 436->443 437->428 448 7ff849025526-7ff849025557 437->448 438->424 449 7ff8490256b9-7ff8490256c0 438->449 485 7ff849025b40 440->485 462 7ff849025aa2-7ff849025aaf 441->462 442->434 452 7ff84902576e-7ff849025771 442->452 443->424 454 7ff84902543b-7ff849025442 443->454 444->405 467 7ff8490257b8-7ff8490257c2 444->467 446 7ff849025891-7ff84902589b 445->446 447 7ff8490258d0-7ff8490258d4 445->447 446->447 456 7ff84902589d-7ff8490258a4 446->456 457 7ff8490258da-7ff8490258e8 447->457 458 7ff849025a13-7ff849025a16 447->458 448->428 449->424 459 7ff8490256c6-7ff8490256d0 call 7ff848ff7940 449->459 452->405 463 7ff849025777-7ff84902577a 452->463 454->424 464 7ff849025448-7ff849025452 call 7ff848ff7940 454->464 456->447 468 7ff8490258a6 456->468 457->458 470 7ff8490258ee-7ff8490258f1 457->470 475 7ff849025a18-7ff849025a2b 458->475 459->424 493 7ff8490256d2-7ff8490256d8 459->493 472 7ff8490255ca-7ff8490255f4 call 7ff84901d160 460->472 461->472 473 7ff849025ab1 462->473 474 7ff849025ab6-7ff849025ad1 462->474 463->434 464->424 486 7ff849025458-7ff84902545e 464->486 478 7ff8490257dc-7ff8490257e0 467->478 479 7ff8490257c4-7ff8490257cb 467->479 480 7ff8490258a9-7ff8490258ac 468->480 481 7ff8490258f7-7ff8490258fb 470->481 482 7ff849025976-7ff849025977 470->482 472->424 473->474 507 7ff849025b10-7ff849025b18 call 7ff849025b41 474->507 508 7ff849025ad3-7ff849025adf call 7ff84901d1d8 474->508 478->447 489 7ff8490257e6-7ff8490257ed 478->489 479->405 487 7ff8490257d1-7ff8490257d6 479->487 480->405 490 7ff8490258b2-7ff8490258bb 480->490 491 7ff8490258fd-7ff849025904 481->491 492 7ff849025934-7ff84902593e call 7ff848ff7940 481->492 488 7ff849025979-7ff8490259ac 482->488 496 7ff849025460-7ff849025464 486->496 497 7ff849025466-7ff84902546c 486->497 487->478 542 7ff8490259ae-7ff8490259b4 488->542 543 7ff8490259b6-7ff8490259bb 488->543 489->447 499 7ff8490257f3-7ff8490257fe 489->499 501 7ff8490258bd-7ff8490258c0 490->501 502 7ff8490258c7-7ff8490258ce 490->502 503 7ff84902594d-7ff849025954 491->503 504 7ff849025906-7ff84902590d 491->504 523 7ff849025948-7ff849025949 492->523 524 7ff849025940-7ff849025946 492->524 505 7ff8490256da-7ff8490256de 493->505 506 7ff8490256e0-7ff8490256e6 493->506 496->497 509 7ff84902546e-7ff849025472 496->509 510 7ff849025480-7ff84902549a 497->510 499->447 511 7ff849025804-7ff84902582e call 7ff848ff7940 499->511 501->502 502->447 502->480 513 7ff84902595e-7ff84902595f 503->513 514 7ff849025956-7ff84902595c 503->514 519 7ff84902590f-7ff849025914 504->519 520 7ff849025916 504->520 505->506 515 7ff8490256e8-7ff8490256ec 505->515 516 7ff8490256fa-7ff849025714 506->516 507->440 539 7ff849025afd-7ff849025b0c 508->539 540 7ff849025ae1-7ff849025aec 508->540 509->405 522 7ff849025478-7ff84902547d 509->522 525 7ff84902549c-7ff8490254a3 510->525 526 7ff8490254a5-7ff8490254a7 510->526 559 7ff849025840-7ff849025849 511->559 560 7ff849025830-7ff84902583e 511->560 527 7ff849025964-7ff84902596e call 7ff848ff7940 513->527 514->527 515->405 528 7ff8490256f2-7ff8490256f7 515->528 530 7ff84902571f-7ff849025721 516->530 531 7ff849025716-7ff84902571d 516->531 521 7ff84902591b-7ff84902592c call 7ff848ff7940 519->521 520->521 521->488 553 7ff84902592e-7ff849025932 521->553 522->510 536 7ff84902594b 523->536 524->536 537 7ff8490254ac-7ff8490254d2 call 7ff848ff59b8 525->537 526->537 527->488 556 7ff849025970-7ff849025974 527->556 528->516 541 7ff849025726-7ff849025746 call 7ff848ff59b8 530->541 531->541 536->488 537->434 561 7ff8490254d8 537->561 539->485 550 7ff849025b0e-7ff849025b0f 539->550 540->539 541->424 551 7ff8490259c5-7ff849025a11 call 7ff849024b50 542->551 543->405 552 7ff8490259bd-7ff8490259c2 543->552 550->507 551->475 552->551 553->488 556->488 563 7ff84902584e-7ff84902587e call 7ff84901d160 559->563 560->563 561->433 563->447
                Strings
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID: #$#$/$?
                • API String ID: 0-581573540
                • Opcode ID: 984dcbf51dab4a6baaca7d6ccd1eab407f846dd54177bb54a29e1ab8d0131bf0
                • Instruction ID: 3a86fcdfc9f734c9fd9e7d9887ad88975fe522a29949634f9a94e77d9cbeec12
                • Opcode Fuzzy Hash: 984dcbf51dab4a6baaca7d6ccd1eab407f846dd54177bb54a29e1ab8d0131bf0
                • Instruction Fuzzy Hash: BA52AB30A1CA8A8FEB69EF188455679B7E1FF88350F50427DD48AC7295DB38FC428785

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 566 24eb5e13777-24eb5e137cd call 24eb5e149f7 * 3 573 24eb5e137cf-24eb5e137d2 566->573 574 24eb5e13804 566->574 573->574 575 24eb5e137d4-24eb5e137d7 573->575 576 24eb5e13807-24eb5e13821 574->576 575->574 577 24eb5e137d9-24eb5e137f4 VirtualAlloc 575->577 578 24eb5e13822-24eb5e1384d call 24eb5e14f4b call 24eb5e14f6b 577->578 579 24eb5e137f6-24eb5e137fd 577->579 585 24eb5e1384f-24eb5e13884 call 24eb5e14bb3 call 24eb5e14a6b 578->585 586 24eb5e1388a-24eb5e138a1 call 24eb5e149f7 578->586 579->574 580 24eb5e137ff-24eb5e13801 579->580 580->574 585->586 595 24eb5e13b21-24eb5e13b2d 585->595 586->574 592 24eb5e138a7-24eb5e138a8 586->592 594 24eb5e138ae-24eb5e138b4 592->594 596 24eb5e138f6-24eb5e13900 594->596 597 24eb5e138b6 594->597 600 24eb5e13b2f-24eb5e13b39 595->600 601 24eb5e13b63-24eb5e13b87 call 24eb5e14f6b 595->601 598 24eb5e1392e-24eb5e13937 596->598 599 24eb5e13902-24eb5e1391d call 24eb5e149f7 596->599 602 24eb5e138b8-24eb5e138ba 597->602 604 24eb5e13952-24eb5e13955 598->604 605 24eb5e13939-24eb5e13943 call 24eb5e12b4f 598->605 599->595 617 24eb5e13923-24eb5e1392c 599->617 600->601 606 24eb5e13b3b-24eb5e13b5c call 24eb5e14f6b 600->606 627 24eb5e13b8e-24eb5e13b90 601->627 628 24eb5e13b89-24eb5e13b8b 601->628 607 24eb5e138d7-24eb5e138d9 602->607 608 24eb5e138bc-24eb5e138c2 602->608 604->595 613 24eb5e1395b-24eb5e13965 604->613 605->595 623 24eb5e13949-24eb5e13950 605->623 606->601 607->596 615 24eb5e138db-24eb5e138f4 607->615 608->607 614 24eb5e138c4-24eb5e138d5 608->614 620 24eb5e1396f-24eb5e13976 613->620 621 24eb5e13967-24eb5e13968 613->621 614->602 614->607 615->594 617->598 617->599 624 24eb5e13978-24eb5e13979 620->624 625 24eb5e139aa-24eb5e139ae 620->625 621->620 623->620 632 24eb5e1397b call 24eb5e1291f 624->632 629 24eb5e139b4-24eb5e139d6 VirtualAlloc 625->629 630 24eb5e13abc-24eb5e13ac4 625->630 627->576 628->627 629->595 635 24eb5e139dc-24eb5e139f3 call 24eb5e14f4b 629->635 633 24eb5e13b16-24eb5e13b1c call 24eb5e13fcf 630->633 634 24eb5e13ac6-24eb5e13acc 630->634 636 24eb5e13980-24eb5e13982 632->636 633->595 640 24eb5e13ace-24eb5e13ad4 634->640 641 24eb5e13ae3-24eb5e13af5 call 24eb5e1352f 634->641 649 24eb5e139f5-24eb5e139f8 635->649 650 24eb5e13a16-24eb5e13a3d 635->650 637 24eb5e13991-24eb5e13994 call 24eb5e12a37 636->637 638 24eb5e13984-24eb5e1398b 636->638 647 24eb5e13999-24eb5e1399b 637->647 638->595 638->637 640->595 644 24eb5e13ad6-24eb5e13ae1 call 24eb5e14457 640->644 655 24eb5e13b07-24eb5e13b14 call 24eb5e12fcf 641->655 656 24eb5e13af7-24eb5e13b02 call 24eb5e13b97 641->656 644->595 647->625 652 24eb5e1399d-24eb5e139a4 647->652 649->630 654 24eb5e139fe-24eb5e13a11 call 24eb5e14ccf 649->654 650->595 661 24eb5e13a43-24eb5e13ab7 VirtualAlloc VirtualFree 650->661 652->595 652->625 664 24eb5e13ab9-24eb5e13aba 654->664 655->595 656->655 661->595 661->664 664->630
                APIs
                Memory Dump Source
                • Source File: 00000004.00000002.3329850570.0000024EB5E10000.00000020.00000001.00040000.00000000.sdmp, Offset: 0000024EB5E10000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_24eb5e10000_sihost.jbxd
                Yara matches
                Similarity
                • API ID: Virtual$Alloc$Free
                • String ID:
                • API String ID: 3668210933-0
                • Opcode ID: 60595fa5053f1866d63c87b1b8d7f0fee698ebc8641127cacdaf14d5899dacb3
                • Instruction ID: 48348d5cc30b1550d8d06f8e5947d455fe652339ea161bb8d7c4c377ffb95f17
                • Opcode Fuzzy Hash: 60595fa5053f1866d63c87b1b8d7f0fee698ebc8641127cacdaf14d5899dacb3
                • Instruction Fuzzy Hash: BCD15630614A094BFF78EB28CC99BAA73D1FB5C30CF55457DD48BC7286DA24E9468742

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 725 7ff848ffcb88-7ff84900d442 call 7ff84900c2c0 733 7ff84900d448-7ff84900d479 725->733 734 7ff84900e77c-7ff84900e78c 725->734 737 7ff84900d47b-7ff84900d492 733->737 738 7ff84900d4d7-7ff84900d508 733->738 743 7ff84900d498-7ff84900d4af 737->743 744 7ff84900da62-7ff84900daeb 737->744 741 7ff84900d50e-7ff84900d532 738->741 742 7ff84900d5c5-7ff84900d5dc 738->742 749 7ff84900d5fb-7ff84900d602 742->749 750 7ff84900d5de-7ff84900d5f4 742->750 751 7ff84900e5c9-7ff84900e5df 743->751 752 7ff84900d4b5-7ff84900d4cc 743->752 766 7ff84900daf1-7ff84900db13 call 7ff848ffeb28 744->766 767 7ff84900de06-7ff84900de22 744->767 754 7ff84900d62f-7ff84900d634 749->754 755 7ff84900d604-7ff84900d62a call 7ff848ffd858 call 7ff848ffece8 749->755 750->749 762 7ff84900e5e1-7ff84900e614 751->762 763 7ff84900e654-7ff84900e66b 751->763 764 7ff84900e6af-7ff84900e6c3 752->764 765 7ff84900d4d2 752->765 759 7ff84900d646 754->759 760 7ff84900d636-7ff84900d644 754->760 784 7ff84900e75c-7ff84900e776 755->784 768 7ff84900d64b-7ff84900d64d 759->768 760->768 762->763 788 7ff84900e68a-7ff84900e691 763->788 789 7ff84900e66d-7ff84900e683 763->789 792 7ff84900e6ef-7ff84900e6f3 764->792 793 7ff84900e6c5-7ff84900e6d0 call 7ff848ffed10 764->793 771 7ff84900e6d2-7ff84900e6e8 call 7ff848ffed28 call 7ff848ffece8 765->771 807 7ff84900db4e-7ff84900db53 766->807 808 7ff84900db15-7ff84900db1a 766->808 786 7ff84900de41-7ff84900de48 767->786 787 7ff84900de24-7ff84900de3a 767->787 772 7ff84900d64f-7ff84900d652 768->772 773 7ff84900d654-7ff84900d657 768->773 771->792 779 7ff84900d690-7ff84900d6ae 772->779 780 7ff84900d659-7ff84900d663 773->780 781 7ff84900d665 773->781 805 7ff84900d6b0-7ff84900d6bd 779->805 806 7ff84900d6c7-7ff84900d6ca 779->806 790 7ff84900d66a-7ff84900d66c 780->790 781->790 784->733 784->734 797 7ff84900de4a-7ff84900de67 call 7ff848ffd858 786->797 798 7ff84900de6c-7ff84900de70 786->798 787->786 788->792 799 7ff84900e693-7ff84900e6ad call 7ff848ffcc08 788->799 789->788 800 7ff84900d66e-7ff84900d672 790->800 801 7ff84900d674-7ff84900d68e 790->801 792->784 803 7ff84900e6f5-7ff84900e71a call 7ff84900c2c0 792->803 793->771 793->792 797->792 810 7ff84900de8e-7ff84900ded1 798->810 811 7ff84900de72-7ff84900de89 call 7ff848ffed18 798->811 799->792 800->779 801->779 803->784 854 7ff84900e71c-7ff84900e73b call 7ff848ffed28 803->854 805->806 828 7ff84900d6bf-7ff84900d6c5 805->828 820 7ff84900d6d0-7ff84900d7a3 call 7ff848ffb7f0 806->820 821 7ff84900d7d6-7ff84900d80f call 7ff848ffcb68 806->821 825 7ff84900db6c-7ff84900db71 807->825 826 7ff84900db55-7ff84900db5a 807->826 818 7ff84900db1c-7ff84900db21 808->818 819 7ff84900db33-7ff84900db38 808->819 845 7ff84900df1b-7ff84900df20 810->845 846 7ff84900ded3-7ff84900deee 810->846 811->810 829 7ff84900dbcb-7ff84900dbda 818->829 830 7ff84900db27-7ff84900db2c 818->830 832 7ff84900db3e-7ff84900db43 819->832 833 7ff84900dc53-7ff84900dc62 819->833 943 7ff84900d7a8-7ff84900d7d1 call 7ff848ffd4f8 820->943 944 7ff84900d7a5-7ff84900d7a6 820->944 852 7ff84900d815-7ff84900d820 821->852 853 7ff84900d976-7ff84900d979 821->853 837 7ff84900dc75-7ff84900dc84 825->837 838 7ff84900db77-7ff84900db7c 825->838 835 7ff84900dbed-7ff84900dbfc 826->835 836 7ff84900db60-7ff84900db65 826->836 828->806 841 7ff84900dba9-7ff84900dbb8 830->841 842 7ff84900db2e 830->842 843 7ff84900db49 832->843 844 7ff84900dc31-7ff84900dc40 832->844 847 7ff84900db87-7ff84900db96 836->847 848 7ff84900db67 836->848 849 7ff84900dc0f-7ff84900dc1e 838->849 850 7ff84900db82 838->850 856 7ff84900ddde-7ff84900de00 call 7ff848ffed10 842->856 843->856 858 7ff84900df32 845->858 859 7ff84900df22-7ff84900df30 845->859 846->845 848->856 850->856 862 7ff84900d85b-7ff84900d943 call 7ff848ffb7f0 852->862 863 7ff84900d822-7ff84900d835 852->863 860 7ff84900d97b-7ff84900d995 call 7ff84900d260 853->860 861 7ff84900d997-7ff84900da02 853->861 854->784 894 7ff84900e73d-7ff84900e75a call 7ff848ffecd0 854->894 856->766 856->767 866 7ff84900df37-7ff84900df39 858->866 859->866 886 7ff84900da04-7ff84900da16 860->886 861->886 967 7ff84900d948-7ff84900d974 call 7ff848ffd4f8 862->967 968 7ff84900d945-7ff84900d946 862->968 869 7ff84900d83e-7ff84900d844 863->869 870 7ff84900d837-7ff84900d83c 863->870 875 7ff84900df3b-7ff84900df42 866->875 876 7ff84900df44-7ff84900df4c 866->876 880 7ff84900d852-7ff84900d855 869->880 870->869 879 7ff84900d846-7ff84900d84f call 7ff84900d360 870->879 882 7ff84900df90-7ff84900dfae 875->882 883 7ff84900df4e-7ff84900df5f 876->883 884 7ff84900df61 876->884 879->880 880->853 880->862 899 7ff84900dfcd-7ff84900dfd0 882->899 900 7ff84900dfb0-7ff84900dfcb 882->900 892 7ff84900df66-7ff84900df68 883->892 884->892 904 7ff84900da1c-7ff84900da5d call 7ff848ffd858 * 2 call 7ff848ffcb88 886->904 896 7ff84900df6a-7ff84900df6e 892->896 897 7ff84900df70-7ff84900df84 892->897 894->784 896->882 897->882 907 7ff84900e0e4-7ff84900e11d call 7ff848ffcb68 899->907 908 7ff84900dfd6-7ff84900e029 899->908 900->899 904->784 925 7ff84900e123-7ff84900e12e 907->925 926 7ff84900e3a5-7ff84900e3a8 907->926 931 7ff84900e244-7ff84900e294 call 7ff84900d370 925->931 932 7ff84900e134-7ff84900e187 925->932 929 7ff84900e4ce-7ff84900e50d 926->929 930 7ff84900e3ae-7ff84900e4c9 call 7ff848ffd858 926->930 941 7ff84900e50f-7ff84900e572 call 7ff84900d250 929->941 956 7ff84900e57e-7ff84900e5c4 call 7ff848ffd858 * 2 930->956 931->926 954 7ff84900e29a-7ff84900e2eb 931->954 932->931 952 7ff84900e577-7ff84900e578 941->952 943->904 944->943 952->956 954->926 956->792 967->853 968->967
                Strings
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID: C4_L$[-Gi
                • API String ID: 0-1041822024
                • Opcode ID: dfaf711af4b613d7534c71d6bc116d83c94e324345b798efb851285d4dc504c5
                • Instruction ID: cdc207a9f3ad8d4c93ac8843316fd6a5267e9f32f21474a22ede9c61a778dd42
                • Opcode Fuzzy Hash: dfaf711af4b613d7534c71d6bc116d83c94e324345b798efb851285d4dc504c5
                • Instruction Fuzzy Hash: 5772743091CA899FDF98EF28C495BA97BE1FF59344F1401EDD44ED7292DA24E842CB81
                Strings
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID: @
                • API String ID: 0-2766056989
                • Opcode ID: 7bcae29d72fc093ccf68a9a2c7dcf28dec4fa0fcc8172f1cb409f0d7ff5ab0ab
                • Instruction ID: db87d97f1de3737fddc5f250dac2083b35f7cc3174b6d725c5b5b305c3d353bd
                • Opcode Fuzzy Hash: 7bcae29d72fc093ccf68a9a2c7dcf28dec4fa0fcc8172f1cb409f0d7ff5ab0ab
                • Instruction Fuzzy Hash: 09A24930918A8A4FEBACEF58C8957B973E1FF59354F54457DD48AC7292CA28EC42CB40

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1370 7ff848ffc939-7ff848ffc986 1375 7ff848ffc9bd-7ff848ffc9c2 1370->1375 1376 7ff848ffc988-7ff848ffc99c 1370->1376 1377 7ff848ffc9c4-7ff848ffc9c9 1375->1377 1378 7ff848ffc9f9 1375->1378 1379 7ff848ffca01-7ff848ffca1a 1377->1379 1380 7ff848ffc9cc-7ff848ffca4f 1377->1380 1378->1379 1387 7ff848ffca51-7ff848ffca62 1379->1387 1388 7ff848ffca1c-7ff848ffca2b 1379->1388 1384 7ff848ffd8e0-7ff848ffd8f1 1380->1384 1385 7ff848ffd8f3-7ff848ffd936 1384->1385 1386 7ff848ffd93b-7ff848ffd94f 1384->1386 1385->1386 1394 7ff848ffd951-7ff848ffd969 1386->1394 1395 7ff848ffd96b-7ff848ffd9a2 1386->1395 1390 7ff848ffca64-7ff848ffca6f 1387->1390 1391 7ff848ffca99 1387->1391 1390->1391 1391->1384 1394->1395 1402 7ff848ffd9a9-7ff848ffd9ac call 7ff848ffd550 1395->1402 1404 7ff848ffd9b1-7ff848ffd9ca 1402->1404 1406 7ff848ffd9ed-7ff848ffda19 1404->1406 1407 7ff848ffd9cc-7ff848ffd9eb call 7ff848ffcaa8 1404->1407 1414 7ff848ffda20-7ff848ffda29 1406->1414 1407->1414 1415 7ff848ffe730-7ff848ffe73c 1414->1415 1416 7ff848ffda2f-7ff848ffda4e 1414->1416 1418 7ff848ffda73 1416->1418 1419 7ff848ffda50-7ff848ffda71 1416->1419 1421 7ff848ffda75-7ff848ffda79 1418->1421 1419->1421 1422 7ff848ffda85-7ff848ffda87 1421->1422 1423 7ff848ffda7b-7ff848ffda83 1421->1423 1424 7ff848ffda8d-7ff848ffda99 1422->1424 1423->1424 1424->1421 1425 7ff848ffda9b-7ff848ffdaba 1424->1425 1427 7ff848ffdadf 1425->1427 1428 7ff848ffdabc-7ff848ffdadd 1425->1428 1430 7ff848ffdae1-7ff848ffdae5 1427->1430 1428->1430 1431 7ff848ffdae7-7ff848ffdaef 1430->1431 1432 7ff848ffdaf1-7ff848ffdaf3 1430->1432 1433 7ff848ffdaf9-7ff848ffdb05 1431->1433 1432->1433 1433->1430 1434 7ff848ffdb07-7ff848ffdb26 1433->1434 1436 7ff848ffdb37 1434->1436 1437 7ff848ffdb28-7ff848ffdb35 1434->1437 1438 7ff848ffdb3c-7ff848ffdb40 1436->1438 1437->1438 1439 7ff848ffdb42-7ff848ffdb4c 1438->1439 1440 7ff848ffdb4e-7ff848ffdb52 1438->1440 1441 7ff848ffdb58-7ff848ffdb69 1439->1441 1440->1441 1441->1438 1442 7ff848ffdb6b-7ff848ffdb94 1441->1442 1444 7ff848ffdb97-7ff848ffdb9b 1442->1444 1445 7ff848ffdb9d-7ff848ffdba7 1444->1445 1446 7ff848ffdba9-7ff848ffdbad 1444->1446 1447 7ff848ffdbb3-7ff848ffdbca 1445->1447 1446->1447 1447->1444 1448 7ff848ffdbcc-7ff848ffdbf5 1447->1448 1450 7ff848ffdbf8-7ff848ffdbfc 1448->1450 1451 7ff848ffdbfe-7ff848ffdc06 1450->1451 1452 7ff848ffdc08-7ff848ffdc0a 1450->1452 1453 7ff848ffdc10-7ff848ffdc24 1451->1453 1452->1453 1453->1450 1454 7ff848ffdc26-7ff848ffdc39 1453->1454 1455 7ff848ffdc97-7ff848ffdcbd 1454->1455 1456 7ff848ffdc3b-7ff848ffdc6c 1454->1456 1457 7ff848ffdcbf-7ff848ffdcc8 1455->1457 1459 7ff848ffdc6f-7ff848ffdc95 1456->1459 1460 7ff848ffdccb-7ff848ffdccf 1457->1460 1459->1455 1462 7ff848ffdcd1-7ff848ffdcd9 1460->1462 1463 7ff848ffdcdb-7ff848ffdcdd 1460->1463 1464 7ff848ffdce3-7ff848ffdcf5 1462->1464 1463->1464 1464->1460 1466 7ff848ffdcf7-7ff848ffdd13 1464->1466 1467 7ff848ffe595-7ff848ffe59e 1466->1467 1468 7ff848ffdd19-7ff848ffdd22 1466->1468 1469 7ff848ffe5a0-7ff848ffe5a4 call 7ff848ffca58 1467->1469 1470 7ff848ffe5ae-7ff848ffe5b6 1467->1470 1471 7ff848ffde60-7ff848ffdec1 1468->1471 1472 7ff848ffdd28-7ff848ffdd38 1468->1472 1469->1470 1470->1415 1474 7ff848ffe5bc-7ff848ffe5f5 1470->1474 1482 7ff848ffdec7-7ff848ffded6 1471->1482 1483 7ff848ffe1b2-7ff848ffe1d9 1471->1483 1472->1471 1475 7ff848ffdd3e-7ff848ffdd6a call 7ff848ffcbf0 1472->1475 1488 7ff848ffe727-7ff848ffe72f call 7ff848ffe7f7 1474->1488 1489 7ff848ffe5fb-7ff848ffe61d 1474->1489 1475->1471 1491 7ff848ffdd70-7ff848ffdd94 1475->1491 1486 7ff848ffe18e-7ff848ffe1ac 1482->1486 1487 7ff848ffdedc-7ff848ffdf21 call 7ff848ffcbf0 1482->1487 1496 7ff848ffe1db-7ff848ffe1e8 1483->1496 1497 7ff848ffe25a-7ff848ffe2e9 1483->1497 1486->1482 1486->1483 1519 7ff848ffdf27-7ff848ffdf49 1487->1519 1520 7ff848ffe185-7ff848ffe18d call 7ff848ffe73d 1487->1520 1488->1415 1500 7ff848ffe61f-7ff848ffe63a 1489->1500 1501 7ff848ffe63c-7ff848ffe6b4 call 7ff848ffcc38 1489->1501 1508 7ff848ffdd96-7ff848ffddab 1491->1508 1509 7ff848ffddad-7ff848ffde5a 1491->1509 1500->1501 1544 7ff848ffe6b6-7ff848ffe6e2 call 7ff848ffd420 1501->1544 1545 7ff848ffe70e-7ff848ffe721 1501->1545 1508->1509 1509->1471 1509->1491 1527 7ff848ffdf62-7ff848ffdf6b 1519->1527 1528 7ff848ffdf4b-7ff848ffdf58 1519->1528 1520->1486 1530 7ff848ffe164-7ff848ffe17f 1527->1530 1531 7ff848ffdf71-7ff848ffdf8e call 7ff848ffd7b8 1527->1531 1528->1527 1538 7ff848ffdf5a-7ff848ffdf60 1528->1538 1530->1519 1530->1520 1531->1530 1540 7ff848ffdf94-7ff848ffdfb1 call 7ff848ffd7b8 1531->1540 1538->1527 1540->1530 1548 7ff848ffdfb7-7ff848ffdff2 1540->1548 1555 7ff848ffe6e4-7ff848ffe6e6 1544->1555 1556 7ff848ffe6e8 1544->1556 1545->1488 1545->1489 1548->1530 1558 7ff848ffdff8-7ff848ffe000 1548->1558 1557 7ff848ffe6eb-7ff848ffe6ed 1555->1557 1556->1557 1559 7ff848ffe706-7ff848ffe70d 1557->1559 1560 7ff848ffe6ef-7ff848ffe701 call 7ff848ffd858 1557->1560 1561 7ff848ffe002-7ff848ffe025 1558->1561 1562 7ff848ffe02b-7ff848ffe051 1558->1562 1559->1545 1560->1559 1561->1562 1566 7ff848ffe0a6-7ff848ffe14b 1562->1566 1567 7ff848ffe053-7ff848ffe09c 1562->1567 1566->1530 1582 7ff848ffe14d-7ff848ffe15f call 7ff848ffd858 1566->1582 1567->1566 1582->1530
                Strings
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID: z5_^
                • API String ID: 0-3063318007
                • Opcode ID: 5760202720cd516495280400df15b46d08491c81333f526abd76c0c30aa1d86d
                • Instruction ID: 6f6846ec747445c1c8d74fbc6c8acdd5ac1e29b2c7831f5f130dcc77ea66dc29
                • Opcode Fuzzy Hash: 5760202720cd516495280400df15b46d08491c81333f526abd76c0c30aa1d86d
                • Instruction Fuzzy Hash: 79623A31A0C94A8FDB98FF28C490BA577E1FF98344F1444AAD54EDB2D6DB35A842CB44
                Memory Dump Source
                • Source File: 00000004.00000002.3339175273.00007FF849230000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF849230000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff849230000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c342c68c14476c785ff6824844d339e1b63480a17e7764126b513857a37514c6
                • Instruction ID: 6fcfa636d472df6e2c5475e3490b5a37fd4e24bd0349b04a9374d3b215be647e
                • Opcode Fuzzy Hash: c342c68c14476c785ff6824844d339e1b63480a17e7764126b513857a37514c6
                • Instruction Fuzzy Hash: A6B10531E1C6994FEB79BB7898562B97BE0EF55350F04017FD09EC3193DE28A8468782
                APIs
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID: InformationQuerySystem
                • String ID:
                • API String ID: 3562636166-0
                • Opcode ID: 23572fceca3b68fa246262d4ce7fd4c89d6eff11b2dc1af3ac1fb6cd3fd28465
                • Instruction ID: f88a8d165f7373a8ab4d2809ccfb580a79aa8bcf874777333ad9f7b3dfd5d6e3
                • Opcode Fuzzy Hash: 23572fceca3b68fa246262d4ce7fd4c89d6eff11b2dc1af3ac1fb6cd3fd28465
                • Instruction Fuzzy Hash: 6F614C3190DA894FD709EB6CD8955F87FA0EF46365F0842BFD088C7193DB64684AC791
                APIs
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID: InformationQuerySystem
                • String ID:
                • API String ID: 3562636166-0
                • Opcode ID: f7a1de9979badb2aa948a1b7e0e7db032b063b8b50bd140f408018164e27a17d
                • Instruction ID: c021abb4ce4e4a22563810b71c359c787d0edd43d3cf4f6c099f3efd2183b600
                • Opcode Fuzzy Hash: f7a1de9979badb2aa948a1b7e0e7db032b063b8b50bd140f408018164e27a17d
                • Instruction Fuzzy Hash: 7541273090DBC84FD71A97A89C555E9BFF1EF57324F0842AFD088C7193CA69584AC792
                APIs
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID: AdjustPrivilegesToken
                • String ID:
                • API String ID: 2874748243-0
                • Opcode ID: 24cd3511078c3dc5780ca914db6f473356d83f41f912a6d63a3612a5d0e7a33f
                • Instruction ID: 85c304a17812f891d558fdbb736bcce37777a2a7d790aad575f1203f68f9e24f
                • Opcode Fuzzy Hash: 24cd3511078c3dc5780ca914db6f473356d83f41f912a6d63a3612a5d0e7a33f
                • Instruction Fuzzy Hash: 1E41F93190DB884FDB19DB6C98456E8BBF0EF56321F0842AFE049D3192DB78A845C795
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c287e06b61c6df4f72e64a40b76c35958920066ee58c376784187b2e968f769d
                • Instruction ID: adfcc6586ad504ee412d29842635409906109d6835594b3d4fc1421be3546e8b
                • Opcode Fuzzy Hash: c287e06b61c6df4f72e64a40b76c35958920066ee58c376784187b2e968f769d
                • Instruction Fuzzy Hash: 63923C70A1894A8FDF98EF28C495BA977E1FF58344F1441ADD44EC7292DB35E842CB41
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0923150fcd9a04ca9cb3b9da5aa2017fde3ff7fcb8d539721f0893b59767de58
                • Instruction ID: c1d84d431e34513bfbd5860abb5fdaaa0887b2ecfe0dc013236039b4f7f9cbea
                • Opcode Fuzzy Hash: 0923150fcd9a04ca9cb3b9da5aa2017fde3ff7fcb8d539721f0893b59767de58
                • Instruction Fuzzy Hash: B342D621E1DAC78EEBB9AA28A4546B577D1FF95780F1445FEC04EC31C2EE2CE8428351
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 083cda04a1b92c15e22e9a965fdc58290643507e2985fef46dadd8832b117b01
                • Instruction ID: 17cdcd3f3e28a1caa13b3e001d092a27ddd9875397ddd17b21d0cab52e811329
                • Opcode Fuzzy Hash: 083cda04a1b92c15e22e9a965fdc58290643507e2985fef46dadd8832b117b01
                • Instruction Fuzzy Hash: 12523D30A1CA8A8FEFA9EF28D495AA977E1FF58344F5441B9D40DC7296DE34E841CB40
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 938cc36c2e31927d415235c6575b9889962a2c3c243eafedf8ad163c4fd8c712
                • Instruction ID: 4f7d3847202c8dd00008ddf2bf01ac686c96469c16a8969dd46ee46bc67ee6c7
                • Opcode Fuzzy Hash: 938cc36c2e31927d415235c6575b9889962a2c3c243eafedf8ad163c4fd8c712
                • Instruction Fuzzy Hash: D3320630A1CE494FEB69FB2888556F977D2EF59340F1405BED94EC72D3DE28A8028785
                Memory Dump Source
                • Source File: 00000004.00000002.3339175273.00007FF849230000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF849230000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff849230000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 104ca61a4a4f19e0dbcc794025e696420547e90b3ebc85c1b1dff6a75950e94a
                • Instruction ID: 0cbf953344026f0f7c0fee30e5db1400d5fb3c5403fcb74ab2c5f1f3e62bbf26
                • Opcode Fuzzy Hash: 104ca61a4a4f19e0dbcc794025e696420547e90b3ebc85c1b1dff6a75950e94a
                • Instruction Fuzzy Hash: 45126030A1C99A8FEBA8EF68C4557BA77E1FF58344F5405BAD05DD72D2CE28A842C740
                Memory Dump Source
                • Source File: 00000004.00000002.3339175273.00007FF849230000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF849230000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff849230000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7c8ef870b8481ae660a4b839ec0933d3aee2b119160d7357e57990d610032ce0
                • Instruction ID: e9826baccdf5e854133b36ad375a9fcab642507b0fa3a81af3483b2e233524e3
                • Opcode Fuzzy Hash: 7c8ef870b8481ae660a4b839ec0933d3aee2b119160d7357e57990d610032ce0
                • Instruction Fuzzy Hash: 2CD14631A1DA994FF779AB3C48555B97BE2EF86350B0841BBD05ED71D3DE28A8028341
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: eaf3d21019396a8e9e7baaf564aad04617e2e8d11eb1d3e8b33f8134c8019de9
                • Instruction ID: fe0e3fcb98e223169976a2ee3555c3e4563b3369dc8d7058843b43aeb429c778
                • Opcode Fuzzy Hash: eaf3d21019396a8e9e7baaf564aad04617e2e8d11eb1d3e8b33f8134c8019de9
                • Instruction Fuzzy Hash: 5EF16330618A468FDB69DE28D8956B6B3E1FF99344F14457DC49E83186DF38B842C781
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6a40f147608364735fe880e72b25139f91784296c3e4171a2c356d90a006ae6e
                • Instruction ID: 40c40ca741a8fbfbc6ddc5185bd5374660d5abb433cd6165509c4e811a34a6a8
                • Opcode Fuzzy Hash: 6a40f147608364735fe880e72b25139f91784296c3e4171a2c356d90a006ae6e
                • Instruction Fuzzy Hash: 59D1E231E1C94A4FE799EB6898652FDB7E1FF88750F5840BAD50EC32C2DF2868428745
                Memory Dump Source
                • Source File: 00000004.00000002.3329850570.0000024EB5E10000.00000020.00000001.00040000.00000000.sdmp, Offset: 0000024EB5E10000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_24eb5e10000_sihost.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fada67dd69a878079f445c3374591fcb82eea671de6f7e20ef545f7ea71a1fb7
                • Instruction ID: 149918a0fb826c5baf87f57800d524ef075c46ba65f135c5b23b6427cda7afc9
                • Opcode Fuzzy Hash: fada67dd69a878079f445c3374591fcb82eea671de6f7e20ef545f7ea71a1fb7
                • Instruction Fuzzy Hash: 69E14C71508B488FEF59DF28C889AAAB7E2FF98304F14466DE84AC7155DF30E945CB42
                Memory Dump Source
                • Source File: 00000004.00000002.3329877059.0000024EB5E20000.00000020.80000000.00040000.00000000.sdmp, Offset: 0000024EB5E20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_24eb5e20000_sihost.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fada67dd69a878079f445c3374591fcb82eea671de6f7e20ef545f7ea71a1fb7
                • Instruction ID: 9b0e1f5bd637090aff85aeaf1009fdacde4cbc478002b2b09ffac70d0b8b24a3
                • Opcode Fuzzy Hash: fada67dd69a878079f445c3374591fcb82eea671de6f7e20ef545f7ea71a1fb7
                • Instruction Fuzzy Hash: 06E14D31508B488BEF59DF28D889AAAB7E2FF98304F14462EE84BC7155DF31E5468B41
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: df321609bf2f6019d5c084f60ef762129d0b57a6208c38585fe93d867ef5c2a2
                • Instruction ID: 3e0fec29ed30b665e894447f2be3fa26b70402914944fec7d687d265286a9410
                • Opcode Fuzzy Hash: df321609bf2f6019d5c084f60ef762129d0b57a6208c38585fe93d867ef5c2a2
                • Instruction Fuzzy Hash: 83B11331A1CA8A4FEBA9EF2C94556B977E1FF59391F0801BAD04EC71D2CE28E8458741
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 89cb8a15862a3d0dc9e9d002925f42c3e722f152126b4958b51910ce609db11a
                • Instruction ID: c1c0af6dee51071b9ddc4cd9995c460c302306898f78276bd85576dafdf19509
                • Opcode Fuzzy Hash: 89cb8a15862a3d0dc9e9d002925f42c3e722f152126b4958b51910ce609db11a
                • Instruction Fuzzy Hash: ADA17762A1DAD65FE759BB7C94565F07BC0EF42760F0841BAC0CECB1D3EE09A8468349

                Control-flow Graph

                APIs
                Memory Dump Source
                • Source File: 00000004.00000002.3329877059.0000024EB5E20000.00000020.80000000.00040000.00000000.sdmp, Offset: 0000024EB5E20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_24eb5e20000_sihost.jbxd
                Yara matches
                Similarity
                • API ID: ProtectVirtual$LibraryLoad
                • String ID:
                • API String ID: 895956442-0
                • Opcode ID: 8376526e6f9b08ac5ded5f047546a3d77998a4ba4b3fbcf6a418e03179d0eef1
                • Instruction ID: ca0493555cf12c94009ad198da440ae774becb4c0b7d2a6842ad959ac0220020
                • Opcode Fuzzy Hash: 8376526e6f9b08ac5ded5f047546a3d77998a4ba4b3fbcf6a418e03179d0eef1
                • Instruction Fuzzy Hash: 0531913171CA084FEF69AA58AC5936973D5FBD8324F010669EC4BC72C9ED61DD0587C1

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 983 24eb5e1291f-24eb5e12942 985 24eb5e1294e-24eb5e12961 983->985 986 24eb5e12944-24eb5e12949 983->986 989 24eb5e12a23 985->989 990 24eb5e12967-24eb5e12996 VirtualProtect 985->990 987 24eb5e12a25-24eb5e12a35 986->987 989->987 990->989 991 24eb5e1299c-24eb5e129d0 call 24eb5e14f4b 990->991 991->989 996 24eb5e129d2-24eb5e129e3 991->996 996->989 997 24eb5e129e5-24eb5e129fc VirtualProtect 996->997 997->989 998 24eb5e129fe-24eb5e12a1e call 24eb5e14f4b 997->998 998->986
                APIs
                Memory Dump Source
                • Source File: 00000004.00000002.3329850570.0000024EB5E10000.00000020.00000001.00040000.00000000.sdmp, Offset: 0000024EB5E10000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_24eb5e10000_sihost.jbxd
                Yara matches
                Similarity
                • API ID: ProtectVirtual
                • String ID:
                • API String ID: 544645111-0
                • Opcode ID: bfda783f5ca1fd6fb9186c17778dacb2659a1bebf61e0df8ac96dde0cb6dbf3c
                • Instruction ID: 238674f87fee1462fe41387f8c262c24a82042ec20c32dcb90a1ab46e92037be
                • Opcode Fuzzy Hash: bfda783f5ca1fd6fb9186c17778dacb2659a1bebf61e0df8ac96dde0cb6dbf3c
                • Instruction Fuzzy Hash: B431613171CA084FEF69AA5C9C5936973D5FB98324F050269EC4BC32C6EE60DD4687C2

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1002 24eb5e22a37-24eb5e22a5a 1004 24eb5e22a66-24eb5e22a79 1002->1004 1005 24eb5e22a5c-24eb5e22a61 1002->1005 1008 24eb5e22a7f-24eb5e22aae VirtualProtect 1004->1008 1009 24eb5e22b3b 1004->1009 1006 24eb5e22b3d-24eb5e22b4d 1005->1006 1008->1009 1010 24eb5e22ab4-24eb5e22add call 24eb5e24f4b VirtualProtect 1008->1010 1009->1006 1013 24eb5e22ae2-24eb5e22ae8 1010->1013 1013->1009 1014 24eb5e22aea-24eb5e22af8 1013->1014 1014->1009
                APIs
                Memory Dump Source
                • Source File: 00000004.00000002.3329877059.0000024EB5E20000.00000020.80000000.00040000.00000000.sdmp, Offset: 0000024EB5E20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_24eb5e20000_sihost.jbxd
                Yara matches
                Similarity
                • API ID: ProtectVirtual
                • String ID:
                • API String ID: 544645111-0
                • Opcode ID: 18a4ee0c0fbbbd8b54119e5cc46d63908d3b74472e1bde1c0fec93ee136364e9
                • Instruction ID: 7789d11d26f460eb2520df089a8614656abaccbbdd9603fa1690754c2cd11cba
                • Opcode Fuzzy Hash: 18a4ee0c0fbbbd8b54119e5cc46d63908d3b74472e1bde1c0fec93ee136364e9
                • Instruction Fuzzy Hash: E421223120CA094FEF58FF58DC882AA37E6FB94354F00056AEC4BC718AEE64D94287C1

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1015 24eb5e12984-24eb5e12996 VirtualProtect 1016 24eb5e12a23 1015->1016 1017 24eb5e1299c-24eb5e129d0 call 24eb5e14f4b 1015->1017 1018 24eb5e12a25-24eb5e12a35 1016->1018 1017->1016 1023 24eb5e129d2-24eb5e129e3 1017->1023 1023->1016 1024 24eb5e129e5-24eb5e129fc VirtualProtect 1023->1024 1024->1016 1025 24eb5e129fe-24eb5e12a1e call 24eb5e14f4b 1024->1025 1025->1018
                APIs
                Memory Dump Source
                • Source File: 00000004.00000002.3329850570.0000024EB5E10000.00000020.00000001.00040000.00000000.sdmp, Offset: 0000024EB5E10000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_24eb5e10000_sihost.jbxd
                Yara matches
                Similarity
                • API ID: ProtectVirtual
                • String ID:
                • API String ID: 544645111-0
                • Opcode ID: d51cd149a33023f9f63d0840ea467992e07603848864701ae833ffcc32a164d4
                • Instruction ID: e37348bac5e19592b4325c706876f1217e7fcc90d247d91fd3f864f915c4efcf
                • Opcode Fuzzy Hash: d51cd149a33023f9f63d0840ea467992e07603848864701ae833ffcc32a164d4
                • Instruction Fuzzy Hash: B1217F3171CA184BEF69AA5CAC5936973D1FBD8724F110269EC4BC32C6DD64DD0287C2

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1030 24eb5e22afc-24eb5e22b14 VirtualProtect 1031 24eb5e22b16-24eb5e22b36 call 24eb5e24f4b VirtualProtect 1030->1031 1032 24eb5e22b3b 1030->1032 1031->1032 1036 24eb5e22a5c-24eb5e22a61 1031->1036 1033 24eb5e22b3d-24eb5e22b4d 1032->1033 1036->1033
                APIs
                Memory Dump Source
                • Source File: 00000004.00000002.3329877059.0000024EB5E20000.00000020.80000000.00040000.00000000.sdmp, Offset: 0000024EB5E20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_24eb5e20000_sihost.jbxd
                Yara matches
                Similarity
                • API ID: ProtectVirtual
                • String ID:
                • API String ID: 544645111-0
                • Opcode ID: cfae08904b5e4da564dc9ff95eef1beca8b2af7edbc7850c7c6da6351f9cbcf2
                • Instruction ID: 6660754e02833a815e0d5f2222a8984dc954f5904c970c4543e1f36052bc1f11
                • Opcode Fuzzy Hash: cfae08904b5e4da564dc9ff95eef1beca8b2af7edbc7850c7c6da6351f9cbcf2
                • Instruction Fuzzy Hash: 8FF0E93070C7444BEB14EA58A85A269B3D2FBC4314F10145AE88BC328ACD55DD578782
                Memory Dump Source
                • Source File: 00000004.00000002.3339175273.00007FF849230000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF849230000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff849230000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8013d0b25fe2130a8da41c916c502543bf38a8ef32a1d68c7d565a22dddd2b0e
                • Instruction ID: c843355d20c5e963d9d66ce7f6e7acf305bd32c53dea003565a20065c8f6ad3e
                • Opcode Fuzzy Hash: 8013d0b25fe2130a8da41c916c502543bf38a8ef32a1d68c7d565a22dddd2b0e
                • Instruction Fuzzy Hash: 3BB1E63190C69D8FEB64EF68D845AE97BE1FF59320F1401BBE44DC7282DA34A845CB41
                APIs
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID: BaseModuleName
                • String ID:
                • API String ID: 595626670-0
                • Opcode ID: 9f26d4dab2cca1f9fac8cb7dcb1a5eac69899935286dc1d360101d68b21785a1
                • Instruction ID: 85ff7456f784aa0f717bd93ea782ef99347c922420af00696d3d3c34bfb53fec
                • Opcode Fuzzy Hash: 9f26d4dab2cca1f9fac8cb7dcb1a5eac69899935286dc1d360101d68b21785a1
                • Instruction Fuzzy Hash: B491AE30508A8D8FEBA9EF18C8457F937E1FF59340F14822AD84EC7282CB74A945CB81
                APIs
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID: BaseModuleName
                • String ID:
                • API String ID: 595626670-0
                • Opcode ID: 1720b17bae01793d51a728b3343e2f602b62aa07d6c376c37e30e0058d983bbf
                • Instruction ID: c321ff3e7065af193c88693fecbbe5a57c56906887791d2d02243b91306708cc
                • Opcode Fuzzy Hash: 1720b17bae01793d51a728b3343e2f602b62aa07d6c376c37e30e0058d983bbf
                • Instruction Fuzzy Hash: 29819E30518A8D8FDBA9EF18C8457F977E1FF59340F14822AD84EC7282DB74A945CB81
                APIs
                Memory Dump Source
                • Source File: 00000004.00000002.3329877059.0000024EB5E20000.00000020.80000000.00040000.00000000.sdmp, Offset: 0000024EB5E20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_24eb5e20000_sihost.jbxd
                Yara matches
                Similarity
                • API ID: CreateInstance
                • String ID:
                • API String ID: 542301482-0
                • Opcode ID: e37ef25e2111d73c0337327c8f8530a4bc554f1c567b3b8c72cc7807f61a1e03
                • Instruction ID: c7f0ca0bcb6b8e8a8c9a2480ff55f5eede6bc258089bdfd8e678e6a184d9b5c0
                • Opcode Fuzzy Hash: e37ef25e2111d73c0337327c8f8530a4bc554f1c567b3b8c72cc7807f61a1e03
                • Instruction Fuzzy Hash: EB815231208B488FEB68DF28C889BA6B7E5FF99309F014A6DD48BC7155EA31E5458B41
                APIs
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID: InformationModule
                • String ID:
                • API String ID: 3425974696-0
                • Opcode ID: 9523907ac102b513e677b4737da8d973925180a3a62c74aa5de729a6d58de9f3
                • Instruction ID: 436022a9a3269494eaba4a8c6bb1a2c150fa86bd55d9a620715f267c2647dbdd
                • Opcode Fuzzy Hash: 9523907ac102b513e677b4737da8d973925180a3a62c74aa5de729a6d58de9f3
                • Instruction Fuzzy Hash: 8451073190CA8C8FDB58EF68D846AF9BBF0EF56311F04426AD04DD7252DA74A846CB91
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1b1ba17914a082f8991f91d4dcfab1e3519167f81a551f0be84bd6ee5843c515
                • Instruction ID: a06af77f117e70d7566170838daabc5042ea50c1d2a0e951ef63c8975e31c696
                • Opcode Fuzzy Hash: 1b1ba17914a082f8991f91d4dcfab1e3519167f81a551f0be84bd6ee5843c515
                • Instruction Fuzzy Hash: 7C41023190CA4C8FDB68AB9898056FA7BE0EF95310F00427FD04ED3292DF74A845CB90
                APIs
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID: LookupPrivilegeValue
                • String ID:
                • API String ID: 3899507212-0
                • Opcode ID: 5d8f6e93735d53084d69d96ad427a6a2b1c4a671f56866e1986fbacceac8675d
                • Instruction ID: 5e46144c2601668394c00c654cefb32e7eed2fa636edd1e858b95a565fe9c63f
                • Opcode Fuzzy Hash: 5d8f6e93735d53084d69d96ad427a6a2b1c4a671f56866e1986fbacceac8675d
                • Instruction Fuzzy Hash: 7F41D33190CB588FD719DB98D845AFA7BE0EB55321F04426FD04AD3292CB74A945CB91
                APIs
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID: InformationModule
                • String ID:
                • API String ID: 3425974696-0
                • Opcode ID: a426db13b0ad2385b4b6f960a77cc2b370df9c5aa3753378a5d8fc7917a03a79
                • Instruction ID: 86cf4185242b5402b11f668a7779aeb2a9eba7456ca35593feaefb51bd796bbd
                • Opcode Fuzzy Hash: a426db13b0ad2385b4b6f960a77cc2b370df9c5aa3753378a5d8fc7917a03a79
                • Instruction Fuzzy Hash: 02417F31908A4C8FDB58EF98D849BF9B7F1FB98311F00826AD40DD7256CA70A885CB81
                APIs
                Memory Dump Source
                • Source File: 00000004.00000002.3339175273.00007FF849230000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF849230000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff849230000_sihost.jbxd
                Similarity
                • API ID: shutdown
                • String ID:
                • API String ID: 2510479042-0
                • Opcode ID: 600cf3a07adde0db239f0f963a83f0233583966f03a9eadeeea6843f639ad918
                • Instruction ID: b7ee090042ac39b5ada891b8c4d7abede7ed59ed4a585fce8ed70c21ee7cc5f0
                • Opcode Fuzzy Hash: 600cf3a07adde0db239f0f963a83f0233583966f03a9eadeeea6843f639ad918
                • Instruction Fuzzy Hash: 4941D57190CA5C8FDB68EFA8D8466E9BBF0FB55310F00426BD00CD7252CB346946CB91
                APIs
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID: EnumModulesProcess
                • String ID:
                • API String ID: 1082081703-0
                • Opcode ID: c1a2d7019c96b776c7a3e7283ba0372e0280d9b8092f04749c424a3adfb697d2
                • Instruction ID: 0e6fbf857c09c3b6e0bf3f982cd852a3384e779cd9fac5c6df97cd48227bf86f
                • Opcode Fuzzy Hash: c1a2d7019c96b776c7a3e7283ba0372e0280d9b8092f04749c424a3adfb697d2
                • Instruction Fuzzy Hash: BB416E30908A5C8FDB58EF98D849AFDB7F1EB98311F10416FD40DD7252CA70A885CB81
                APIs
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID: EnumWindows
                • String ID:
                • API String ID: 1129996299-0
                • Opcode ID: 40d63ad4ab9ef78772e4a67218b98477ef0c4a6405be93eb20f9d67bbb96b958
                • Instruction ID: 3c31ac6802ead0e7d283e07d64e4b4cc1d2971bd57febb75050a5accabf3d65d
                • Opcode Fuzzy Hash: 40d63ad4ab9ef78772e4a67218b98477ef0c4a6405be93eb20f9d67bbb96b958
                • Instruction Fuzzy Hash: 7131E231A0CA588FDB58EF68C84A7F97BE1EF59311F04416BD44DC7292DB74A801CB91
                APIs
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID: EnumWindows
                • String ID:
                • API String ID: 1129996299-0
                • Opcode ID: 16569c5e348fcd4b2bfe672cebbf23e519282e54926cc2f1595aa1f75171bf5f
                • Instruction ID: 5a6519fbaec6e2b5a60a9a135cfbde92944dd9c2ad7fdc2d634ea9c6ffa73c25
                • Opcode Fuzzy Hash: 16569c5e348fcd4b2bfe672cebbf23e519282e54926cc2f1595aa1f75171bf5f
                • Instruction Fuzzy Hash: 56317071A0CA1C8FDB98EF58C84A7BD77E1EB59311F14412BD44ED3292DB74A812CB91
                APIs
                Memory Dump Source
                • Source File: 00000004.00000002.3329850570.0000024EB5E10000.00000020.00000001.00040000.00000000.sdmp, Offset: 0000024EB5E10000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_24eb5e10000_sihost.jbxd
                Yara matches
                Similarity
                • API ID: ProtectVirtual
                • String ID:
                • API String ID: 544645111-0
                • Opcode ID: 21ee1aac594a535b75769d2789b3ff089ba461df40fcfc1960a676b839515576
                • Instruction ID: 1babd8905cf3cc7c7ea4fba823c4faa80250b8dbef74b544f9d8d19d787ce4cd
                • Opcode Fuzzy Hash: 21ee1aac594a535b75769d2789b3ff089ba461df40fcfc1960a676b839515576
                • Instruction Fuzzy Hash: D521F23120CA094FEF58EF69DC896AA77D6FB94354F010169DC4BC718AEE64D94287C2
                APIs
                Memory Dump Source
                • Source File: 00000004.00000002.3329850570.0000024EB5E10000.00000020.00000001.00040000.00000000.sdmp, Offset: 0000024EB5E10000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_24eb5e10000_sihost.jbxd
                Yara matches
                Similarity
                • API ID: ProtectVirtual
                • String ID:
                • API String ID: 544645111-0
                • Opcode ID: cfae08904b5e4da564dc9ff95eef1beca8b2af7edbc7850c7c6da6351f9cbcf2
                • Instruction ID: dcdf73d32a754f1852e3685ca1a93b600e9fb8e6bd795cab4c49a92dd05c9a8b
                • Opcode Fuzzy Hash: cfae08904b5e4da564dc9ff95eef1beca8b2af7edbc7850c7c6da6351f9cbcf2
                • Instruction Fuzzy Hash: E2F0E93030C7484BEB14EA59AC5A269B3D2FBC4314F14106AE88BC3286D954DD478783
                APIs
                Memory Dump Source
                • Source File: 00000004.00000002.3329877059.0000024EB5E20000.00000020.80000000.00040000.00000000.sdmp, Offset: 0000024EB5E20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_24eb5e20000_sihost.jbxd
                Yara matches
                Similarity
                • API ID: ProtectVirtual$LibraryLoad
                • String ID:
                • API String ID: 895956442-0
                • Opcode ID: e4a5286ffe1b2342e106e94802514f7029e58dd553e54f75e1adad82c9e662dd
                • Instruction ID: a23511867953195bbd5007bf3b22c4ec6d4e7e17043252a9986839b021a2aa0c
                • Opcode Fuzzy Hash: e4a5286ffe1b2342e106e94802514f7029e58dd553e54f75e1adad82c9e662dd
                • Instruction Fuzzy Hash: 5DE0263160CA0D0FFB6CAA9CDC8A3B563C8F798279F00003EE58AC2216F046D8824391
                APIs
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID: CloseHandle
                • String ID:
                • API String ID: 2962429428-0
                • Opcode ID: 2d1f74e8073297a2b416e59878d255c5593ac42ad1315b159a27d3704190981c
                • Instruction ID: 4726babada3a17551d6ec23dc6cf48f5215d3f4ec2f2baddbc871c4d87ae24f2
                • Opcode Fuzzy Hash: 2d1f74e8073297a2b416e59878d255c5593ac42ad1315b159a27d3704190981c
                • Instruction Fuzzy Hash: C941263180CA899FDB5DDB6888456E9BBE0FF56321F0842AFC049C35D2DB746855CB91
                Memory Dump Source
                • Source File: 00000004.00000002.3336140488.00007FF848F40000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848f40000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 62766e366a233b107f49519b5b6432fb784922b47b3d16ca94a836e775abead0
                • Instruction ID: 6018ee524d5104887b6fcc13f9aa96bfe82c7a113285434a4ee1b4af6ec66329
                • Opcode Fuzzy Hash: 62766e366a233b107f49519b5b6432fb784922b47b3d16ca94a836e775abead0
                • Instruction Fuzzy Hash: 56610A2061D9882FE395F77C44AA6BA7FE1EF9A550F5804F9D4C9DB2A3DD189842C340
                Memory Dump Source
                • Source File: 00000004.00000002.3336140488.00007FF848F40000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848f40000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 96fa98aa7ad1b7843ff259b886fe18ec823dd71b60add948254a9041bf29d28f
                • Instruction ID: fc894af7b7a0124bb17397ac28e66d6caf42365ecdc9ae8c265d361ee0f77903
                • Opcode Fuzzy Hash: 96fa98aa7ad1b7843ff259b886fe18ec823dd71b60add948254a9041bf29d28f
                • Instruction Fuzzy Hash: 95519031A1D8489FDB95FB2C8459AA97BE1EFA9341B0500FAE44DCB2B3DE24EC41C741
                Memory Dump Source
                • Source File: 00000004.00000002.3336140488.00007FF848F40000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848f40000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 022e69cae10d43dc94be0ea51e25852044459a55aa0657d19e8d238faa00d05e
                • Instruction ID: e70cbaa206d7e8e93c57f2144daa96fbd469c3a2419a03e2b43a0f028eee7111
                • Opcode Fuzzy Hash: 022e69cae10d43dc94be0ea51e25852044459a55aa0657d19e8d238faa00d05e
                • Instruction Fuzzy Hash: 47517D30A198489FDB94FB2CC459A697BE1FFA9741B0500BAE44ED72B2DE24EC41C741
                Memory Dump Source
                • Source File: 00000004.00000002.3336140488.00007FF848F40000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848f40000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: cec22daed85d58cd233f79aa98f855a77ca1d3afab01bcbc75d5f6da9c9ae093
                • Instruction ID: 99f5cc8570c89ec1e3e92f44e2792fb4de89f1f5444585436a84383cea325a09
                • Opcode Fuzzy Hash: cec22daed85d58cd233f79aa98f855a77ca1d3afab01bcbc75d5f6da9c9ae093
                • Instruction Fuzzy Hash: 5C51F720A1DE816FE709B37858266AAFFE1EF49240F6855FEE089C32C3DD1998018755
                Memory Dump Source
                • Source File: 00000004.00000002.3336140488.00007FF848F40000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848f40000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 327453114d5fa0c643452c2e3bc58b452bdb5b6d951d8034ef92d2ee83a6c2fd
                • Instruction ID: b2fd1efe88e784f98a12fb09b83bb3bc8f92f45557f67e0d68a1fa7099b26590
                • Opcode Fuzzy Hash: 327453114d5fa0c643452c2e3bc58b452bdb5b6d951d8034ef92d2ee83a6c2fd
                • Instruction Fuzzy Hash: 0641E47080D3889FD74AAB789C156E47FE0EFA6321F0941EFC088CB193C758584AC7A2
                Memory Dump Source
                • Source File: 00000004.00000002.3336140488.00007FF848F40000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848f40000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1447cbb7869594855696833fde0e81459870a908e5fcbe8ad14b60ed8327052c
                • Instruction ID: 883fdf7174e3817bedcd7fd644f98606f6c949708709ca7410f3d9723003135b
                • Opcode Fuzzy Hash: 1447cbb7869594855696833fde0e81459870a908e5fcbe8ad14b60ed8327052c
                • Instruction Fuzzy Hash: 6021D120A1E9896FE386B37C486976A7BD1DF9A204F0804FAD489CB2F3DD1D9C46C341
                Memory Dump Source
                • Source File: 00000004.00000002.3336140488.00007FF848F40000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848f40000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 883423d53aa0fb09e80f79126376c63e2aebafcf6c69355891496c6551bd98fc
                • Instruction ID: f2839fe08de8cc24ab992e63eb4f972ff619e3ac21755a8912ee634519482049
                • Opcode Fuzzy Hash: 883423d53aa0fb09e80f79126376c63e2aebafcf6c69355891496c6551bd98fc
                • Instruction Fuzzy Hash: 1A21037090DAD85FE7A2F778485A6AE7FF1EF9A650F0400EFD489C7193DA281802C741
                Memory Dump Source
                • Source File: 00000004.00000002.3336140488.00007FF848F40000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848f40000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: cbf7902d66dbeac3e041cc3ef0f4b69d7071a91ddadf8da783370193cdef7c6f
                • Instruction ID: 153a26d654b8a6778f8d517bf556c77b218f0fc9e6a2424a643b1e0c9ae8def3
                • Opcode Fuzzy Hash: cbf7902d66dbeac3e041cc3ef0f4b69d7071a91ddadf8da783370193cdef7c6f
                • Instruction Fuzzy Hash: 6511A1606199856FE78AB77844697AA7BD2DF8A604F0404FDD489C72F3DE2998468340
                Strings
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID: t5_^$v5_^$[v5
                • API String ID: 0-441636731
                • Opcode ID: a00236fcb5a5742462eaf363ec5e0e8560cd7cd25983e0ebaba34970c650d30c
                • Instruction ID: 04f3eaf200e0d419beeb8752cfeb9971de0a6f78c7c60c15a7f157833accc688
                • Opcode Fuzzy Hash: a00236fcb5a5742462eaf363ec5e0e8560cd7cd25983e0ebaba34970c650d30c
                • Instruction Fuzzy Hash: BC8158A3D4D9662EE758B77CB8810F97790EF412A4F0C457BD28DCB1C3DF18A8468698
                Strings
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID: 15_^
                • API String ID: 0-4202912459
                • Opcode ID: b4a4274447a1e064c941891ca4f7b84e6cb312dc43c0aacea821a612a68f26b5
                • Instruction ID: d82b600c5b5b169ae72e264e66c38c2b84aa3916ba22ff23ec6ec30b4c6a425a
                • Opcode Fuzzy Hash: b4a4274447a1e064c941891ca4f7b84e6cb312dc43c0aacea821a612a68f26b5
                • Instruction Fuzzy Hash: 9FA1FCA7C4E6D21EE75E7A78B8515F63F10EF42668B0C81F7D08C8E0A3DE085545C7A9
                Strings
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID: m5_^
                • API String ID: 0-2069424849
                • Opcode ID: f92ab4069c455a39f69131b31b0534cfff05eb6a2e197ba2e17d977b8620df0d
                • Instruction ID: 23d64589733ce02c53645c4cebb009ee437e21eaf78533bac5e50217c9df65d9
                • Opcode Fuzzy Hash: f92ab4069c455a39f69131b31b0534cfff05eb6a2e197ba2e17d977b8620df0d
                • Instruction Fuzzy Hash: 6A5193E688E5A23EE24DB7B8F4520F53750EF016ACF0CD5B6D09C8D093DF1864458AAD
                Strings
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID: 4_^
                • API String ID: 0-3117248850
                • Opcode ID: 71e196f22f7704f3eaa6ac57a753390f7b932202c27c51f3d8bb44d7075cb2aa
                • Instruction ID: 72db9d3e1c7ef4372c2aed3666fcc8f93f9100c663b449bb6501139f1502a4f3
                • Opcode Fuzzy Hash: 71e196f22f7704f3eaa6ac57a753390f7b932202c27c51f3d8bb44d7075cb2aa
                • Instruction Fuzzy Hash: FB31C7D6C8E7633FE618BA7CB4960E53780EF027B4B0CB5B6D08C4D093ED1894429998
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6c61967627a29d469e0c93f6153f08143d8605f7543ada790f0c78cb734958fb
                • Instruction ID: 112ab3694b251b3a20c863479ac92a2600e9a3b4a73181d7b0a9b10966d1bcd4
                • Opcode Fuzzy Hash: 6c61967627a29d469e0c93f6153f08143d8605f7543ada790f0c78cb734958fb
                • Instruction Fuzzy Hash: 1262393051DAC95FDB66EB3898556FA7BE0EF46350F1801FED49EC7193EA28A842C341
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a6eb3ab97b0dd39ecb3758c1cf4b32173b01e59e60adf13d57202df70a52cfbd
                • Instruction ID: aa0445da2fec3e51a2608108d276ea11a7437f24cf425f32f3355f32cede201f
                • Opcode Fuzzy Hash: a6eb3ab97b0dd39ecb3758c1cf4b32173b01e59e60adf13d57202df70a52cfbd
                • Instruction Fuzzy Hash: 22329030A1CA498FDF98EF28D455AB977E1FFA8340F1441ADD44EC7292DE25E842CB81
                Memory Dump Source
                • Source File: 00000004.00000002.3329850570.0000024EB5E10000.00000020.00000001.00040000.00000000.sdmp, Offset: 0000024EB5E10000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_24eb5e10000_sihost.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3ae6622aa1becc6f0b3361d8082316eeb2111423ed2edd8e8b06ab6ec02ac85a
                • Instruction ID: 3dde882326e24ac1b20d56a90fa9215ff6345974d281b046893a414aa861ce94
                • Opcode Fuzzy Hash: 3ae6622aa1becc6f0b3361d8082316eeb2111423ed2edd8e8b06ab6ec02ac85a
                • Instruction Fuzzy Hash: 43F18530618B098BEB68EF28CC497A573E1FB54319F55463DD89BC7291EB34E842C792
                Memory Dump Source
                • Source File: 00000004.00000002.3329877059.0000024EB5E20000.00000020.80000000.00040000.00000000.sdmp, Offset: 0000024EB5E20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_24eb5e20000_sihost.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3ae6622aa1becc6f0b3361d8082316eeb2111423ed2edd8e8b06ab6ec02ac85a
                • Instruction ID: ca59f1a7d427e26620da2b9c539ae7fbc2a8576c2ee70ff346ff713513152f1b
                • Opcode Fuzzy Hash: 3ae6622aa1becc6f0b3361d8082316eeb2111423ed2edd8e8b06ab6ec02ac85a
                • Instruction Fuzzy Hash: 60F1B530218B098BEB68EF19CC497A5B3D1FB54319F554A2DD88BC7295EF35E8028B91
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5b199fd9308e994a65bd7be8def7f12de664468a90059d895145728e354524da
                • Instruction ID: 3e5e38965e8c43ea72db2ff2bddd7626222312bb6c543ae1d9bd5cda092ada73
                • Opcode Fuzzy Hash: 5b199fd9308e994a65bd7be8def7f12de664468a90059d895145728e354524da
                • Instruction Fuzzy Hash: 6EB1C8E288D9927EE61CBABCF4820F97750EF013A8F0CD576D09D49093EE1874458AAD
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 55815dfeffbe63752a4b117cb11ef8b88f7ee0b96f07b59866d74a8327fe2315
                • Instruction ID: 2a968b4a1338508a912a63a710c67580ce355c9015c14bf2d677543a7aa2e17d
                • Opcode Fuzzy Hash: 55815dfeffbe63752a4b117cb11ef8b88f7ee0b96f07b59866d74a8327fe2315
                • Instruction Fuzzy Hash: 5E911731F1DA995FEB69AB7C58193B977D1EF99750F0840BED04DC3283DE28A8428781
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b3a6dbc74a9df9ebd0fae764264dcd953b5be7cdc0ab1c7acf65ccd864f91b6c
                • Instruction ID: 1f190519d24392f64398d7844b0418e6b020508469612d278f8498ac9b76e250
                • Opcode Fuzzy Hash: b3a6dbc74a9df9ebd0fae764264dcd953b5be7cdc0ab1c7acf65ccd864f91b6c
                • Instruction Fuzzy Hash: 7791A7E68CE9A27EE61DB6BCF4820F93750EF017A8F0CD577D09C4D093AE18648549AD
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b1e42aa19e33c24c91d14f570f7f010c09645dbd95e0be10b21f4ecfb0a943e0
                • Instruction ID: e4efa0912e7ae2bcbc7ecdfc04c4185c0cd9cccd8ec2665f6cecc58169450fac
                • Opcode Fuzzy Hash: b1e42aa19e33c24c91d14f570f7f010c09645dbd95e0be10b21f4ecfb0a943e0
                • Instruction Fuzzy Hash: AA913AF295D9566FEA49B77CA4114F93B90EF81398F0C41B6D19CCB0D3DF08A48187A9
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 35ae10848d4cda9fad458db94d3bbda12dba55fe208b88a0302413a562ba65f3
                • Instruction ID: f14159a03bf0c6c7d63206e57765b46422c7cc896377722b505d32bd986e89a2
                • Opcode Fuzzy Hash: 35ae10848d4cda9fad458db94d3bbda12dba55fe208b88a0302413a562ba65f3
                • Instruction Fuzzy Hash: F291E562D0EAC28FE72B573C78201356FA5AFA3654B0D01FBC288CB0DFD5649D858389
                Memory Dump Source
                • Source File: 00000004.00000002.3329850570.0000024EB5E10000.00000020.00000001.00040000.00000000.sdmp, Offset: 0000024EB5E10000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_24eb5e10000_sihost.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 84009931e7f848139f79284c09e5e23a1816cabe5d90ed6c98f401aee13329b7
                • Instruction ID: 5d0eb1ce3a3312eed524574f80a0ddbd96f97be02cb48b327abafc6d973a3e7a
                • Opcode Fuzzy Hash: 84009931e7f848139f79284c09e5e23a1816cabe5d90ed6c98f401aee13329b7
                • Instruction Fuzzy Hash: 65A12E31608A0C8FDB55EF28C889BEA77F5FBA8319F10462EE44AD7160EB30D645CB41
                Memory Dump Source
                • Source File: 00000004.00000002.3329877059.0000024EB5E20000.00000020.80000000.00040000.00000000.sdmp, Offset: 0000024EB5E20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_24eb5e20000_sihost.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 84009931e7f848139f79284c09e5e23a1816cabe5d90ed6c98f401aee13329b7
                • Instruction ID: bd4ae280760525c584ddbba8f3950be1af45d77b30160fd2cd67fb773574055a
                • Opcode Fuzzy Hash: 84009931e7f848139f79284c09e5e23a1816cabe5d90ed6c98f401aee13329b7
                • Instruction Fuzzy Hash: 8FA12D31608A0C8FDB55EF28C889BEA77F5FBA8315F10462EE44AC7160EB31D645CB41
                Memory Dump Source
                • Source File: 00000004.00000002.3329850570.0000024EB5E10000.00000020.00000001.00040000.00000000.sdmp, Offset: 0000024EB5E10000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_24eb5e10000_sihost.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: baf9f8ba10b3c58b15deb0dbe79cd3853049ecf256b57d1b0a981b6d20cc13aa
                • Instruction ID: 33ad3ceef2661e16b57fa726ede6373fb15901e07387ad5b123d47478d0211b2
                • Opcode Fuzzy Hash: baf9f8ba10b3c58b15deb0dbe79cd3853049ecf256b57d1b0a981b6d20cc13aa
                • Instruction Fuzzy Hash: 89817271618B494BEBA8DF25CC897EAB7E5FB58309F01463ED89BC2141DF30E5458B82
                Memory Dump Source
                • Source File: 00000004.00000002.3329877059.0000024EB5E20000.00000020.80000000.00040000.00000000.sdmp, Offset: 0000024EB5E20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_24eb5e20000_sihost.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: baf9f8ba10b3c58b15deb0dbe79cd3853049ecf256b57d1b0a981b6d20cc13aa
                • Instruction ID: e5c093404620af875fbb4a9ca642e349d8008f4d5351aeca5640634972694670
                • Opcode Fuzzy Hash: baf9f8ba10b3c58b15deb0dbe79cd3853049ecf256b57d1b0a981b6d20cc13aa
                • Instruction Fuzzy Hash: 8E816471618B494BEBA8DF24C8897EAB7E5FB58305F014A2ED89FC2145DF30E5458BC1
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: dbca3f245e09cc090c6e49640930dfa2f0602d1a0b3f946075a8a75a46275876
                • Instruction ID: 7a8f2e257f8615c8200a0c2208c4da318e3cbbf45e28b16f5cdea1136c992f72
                • Opcode Fuzzy Hash: dbca3f245e09cc090c6e49640930dfa2f0602d1a0b3f946075a8a75a46275876
                • Instruction Fuzzy Hash: 74513AE299E8963FE26CB77CB4520F67B50EF052A8B0CD576D0CC8A093DE09644646A8
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7eab45629e2580248d91d3bd0761c53b6581f60286176e8214e6cdcb08887c1a
                • Instruction ID: 81ce939aa04c4e904ce8f98bff2fa8082c1d3086ac0521ce369cc4f0efef0f7c
                • Opcode Fuzzy Hash: 7eab45629e2580248d91d3bd0761c53b6581f60286176e8214e6cdcb08887c1a
                • Instruction Fuzzy Hash: 86513AF159DA866FD259B778AC054F53750EF012A8F0C8B7BD1AE890D3CF1460429A9D
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9a2dead3d81cc2ba13f90c0577daba1245b86902f464439d72bd17e966c4977b
                • Instruction ID: a271b03985a1f011e99083fad138c4b47514990149f408cd820154a056f4b27b
                • Opcode Fuzzy Hash: 9a2dead3d81cc2ba13f90c0577daba1245b86902f464439d72bd17e966c4977b
                • Instruction Fuzzy Hash: 8E4188E7C8E6923EE219B7B8B4560F97B50EF016B8F0CD5B7D1CC4D0939E0960458A6D
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 68e46feaaec314101b3c9b7424273102e67068dfe295e95930bfb8cfd9c9daea
                • Instruction ID: ab026294ed6ab51844b117453bd3d6ebb374c5a654996a92d5b7a8df7aee2413
                • Opcode Fuzzy Hash: 68e46feaaec314101b3c9b7424273102e67068dfe295e95930bfb8cfd9c9daea
                • Instruction Fuzzy Hash: 5031E1C385A73A39961835BCB4440F72384DA13BF5B48B237D54CCC063598590CB7AD4
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ca05d170a36e0c3f45624d36c6e56ff19f03a26e843bdcf197615e507d33a169
                • Instruction ID: 37fc86bb32bff2128e4cd747fbd19a14ae720e372734b53322eaed521e4da8b8
                • Opcode Fuzzy Hash: ca05d170a36e0c3f45624d36c6e56ff19f03a26e843bdcf197615e507d33a169
                • Instruction Fuzzy Hash: 2941B6E68CE9A27DE64C7AB8B0460F97710FF01798F0CD676D0DD8D0839F1964814AAD
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: cc7c2de9dca404b95eea67251cfb59500c515c542caf17bbf69335ee09a8fea6
                • Instruction ID: a0761886dfa3c14d60fc96e06702d82f882cd9fc2660935ab85a203713dab77b
                • Opcode Fuzzy Hash: cc7c2de9dca404b95eea67251cfb59500c515c542caf17bbf69335ee09a8fea6
                • Instruction Fuzzy Hash: 2241DDF7899A126DE208BE7CF4814FA7350FF44675B189A7BD1DDC9043DB14A08145B4
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1e371c62c58207b73cc92d263da71412ec43bd4768bc29e2bdd9adc6a9779d3f
                • Instruction ID: 1c8906421999c47faf9357b78a38d0adf62591a1fd984a4b47e9afc1214b06dd
                • Opcode Fuzzy Hash: 1e371c62c58207b73cc92d263da71412ec43bd4768bc29e2bdd9adc6a9779d3f
                • Instruction Fuzzy Hash: AD311BE799D9126DE648BABCF4814E97340FF80779B18DA37D1E9C80839B24A08145F8
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: bbb0adba0990282a1ce53a43167835343f613ffbf296f8927febced5037c83a5
                • Instruction ID: 2ee086a69856f286fc39536560b003338808fbca87efed34aa748d643336f220
                • Opcode Fuzzy Hash: bbb0adba0990282a1ce53a43167835343f613ffbf296f8927febced5037c83a5
                • Instruction Fuzzy Hash: D5313EE68DA9A27DE64C7AB8F0061F96310BF047A8F1CE636D0DD4D0839F1864814DAD
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 849f05ab3470c2c5feee52ef941397049cb3fe35a297d5cc72de243c88025068
                • Instruction ID: 52ce5f72a72888451e79556e38bd9f76bfbdf93cbba4539c428739377a6a7297
                • Opcode Fuzzy Hash: 849f05ab3470c2c5feee52ef941397049cb3fe35a297d5cc72de243c88025068
                • Instruction Fuzzy Hash: 1A31D9E75999566CE608BEBCF4814E96340FF40B75F58DA37E1EDC80839F24A08145B9
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 20e0b3644c5f6db763c748312832b90eb239985e76473186595e992d424ff93c
                • Instruction ID: 4e921232dc5b774ebd6f40e539fe6daf4117efc1276cb54875f7dfa21db92e5d
                • Opcode Fuzzy Hash: 20e0b3644c5f6db763c748312832b90eb239985e76473186595e992d424ff93c
                • Instruction Fuzzy Hash: 8F31D5F15D9952BED24C7AB8F8054F92300AF016A8F0CDF35D0BE8A0D3CF14A0419AAD
                Memory Dump Source
                • Source File: 00000004.00000002.3336675266.00007FF848FF0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00007FF848FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ff848ff0000_sihost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1a79efc34b0f953a52130ff138b830dc1cb45dda38ecbc4a175567ca75dfc84d
                • Instruction ID: cc92f562a426ad1d84978fea49d0815f8d10734aef72bfd06358b55677f82ec4
                • Opcode Fuzzy Hash: 1a79efc34b0f953a52130ff138b830dc1cb45dda38ecbc4a175567ca75dfc84d
                • Instruction Fuzzy Hash: 312144E68D99A27DE64C7AB8F0061F96310BF047A8F1CE636D0DD4D0839F1964814DBD