Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exe
Analysis ID:1532614
MD5:c9f34d943343f0b5d62ff8c61de23b5a
SHA1:a44170b3c1a271484ea46257c44ecff7815eb2f5
SHA256:6feb92743d620750c92fac455db821d1f97361c73b275d97b96294b8a0840217
Tags:exe
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected suspicious sample
Disables security and backup related services
Found API chain indicative of debugger detection
Contains functionality to launch a program with higher privileges
Creates a process in suspended mode (likely to inject code)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Uses net.exe to stop services

Classification

  • System is w10x64
  • SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exe (PID: 8020 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exe" MD5: C9F34D943343F0B5D62FF8C61DE23B5A)
    • conhost.exe (PID: 8028 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 8144 cmdline: "C:\Windows\System32\cmd.exe" /c net stop dps MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 8152 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • net.exe (PID: 2076 cmdline: net stop dps MD5: 0BD94A338EEA5A4E1F2830AE326E6D19)
        • net1.exe (PID: 7220 cmdline: C:\Windows\system32\net1 stop dps MD5: 55693DF2BB3CBE2899DFDDF18B4EB8C9)
    • cmd.exe (PID: 7288 cmdline: "C:\Windows\System32\cmd.exe" /c net start dps MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7316 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • net.exe (PID: 7460 cmdline: net start dps MD5: 0BD94A338EEA5A4E1F2830AE326E6D19)
        • net1.exe (PID: 7500 cmdline: C:\Windows\system32\net1 start dps MD5: 55693DF2BB3CBE2899DFDDF18B4EB8C9)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: Michael Haag, Mark Woan (improvements), James Pemberton / @4A616D6573 / oscd.community (improvements): Data: Command: net stop dps, CommandLine: net stop dps, CommandLine|base64offset|contains: , Image: C:\Windows\System32\net.exe, NewProcessName: C:\Windows\System32\net.exe, OriginalFileName: C:\Windows\System32\net.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c net stop dps, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 8144, ParentProcessName: cmd.exe, ProcessCommandLine: net stop dps, ProcessId: 2076, ProcessName: net.exe
Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: net start dps, CommandLine: net start dps, CommandLine|base64offset|contains: , Image: C:\Windows\System32\net.exe, NewProcessName: C:\Windows\System32\net.exe, OriginalFileName: C:\Windows\System32\net.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c net start dps, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7288, ParentProcessName: cmd.exe, ProcessCommandLine: net start dps, ProcessId: 7460, ProcessName: net.exe
Source: Process startedAuthor: Jakob Weinzettl, oscd.community, Nasreddine Bencherchali (Nextron Systems): Data: Command: net stop dps, CommandLine: net stop dps, CommandLine|base64offset|contains: , Image: C:\Windows\System32\net.exe, NewProcessName: C:\Windows\System32\net.exe, OriginalFileName: C:\Windows\System32\net.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c net stop dps, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 8144, ParentProcessName: cmd.exe, ProcessCommandLine: net stop dps, ProcessId: 2076, ProcessName: net.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 94.9% probability
Source: SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeStatic PE information: Number of sections : 15 > 10
Source: classification engineClassification label: mal52.evad.winEXE@16/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7316:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8028:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8152:120:WilError_03
Source: SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net stop dps
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net stop dps
Source: C:\Windows\System32\net.exeProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 stop dps
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net start dps
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net start dps
Source: C:\Windows\System32\net.exeProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 start dps
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net stop dpsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net start dpsJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net stop dpsJump to behavior
Source: C:\Windows\System32\net.exeProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 stop dpsJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net start dpsJump to behavior
Source: C:\Windows\System32\net.exeProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 start dpsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{5E5F29CE-E0A8-49D3-AF32-7A7BDC173478}\InProcServer32Jump to behavior
Source: SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeStatic PE information: section name: .xdata
Source: SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeStatic PE information: section name: /4
Source: SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeStatic PE information: section name: /19
Source: SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeStatic PE information: section name: /31
Source: SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeStatic PE information: section name: /45
Source: SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeStatic PE information: section name: /57
Source: SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeStatic PE information: section name: /70
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net stop dps
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exe TID: 8024Thread sleep time: -30000s >= -30000sJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeThread delayed: delay time: 30000Jump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_0-630
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeCode function: 0_2_00401180 Sleep,Sleep,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit,_initterm,GetStartupInfoA,0_2_00401180
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeCode function: 0_2_00401830 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort,0_2_00401830
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeCode function: 0_2_00401550 ShellExecuteExW,ShellExecuteExW,WaitForSingleObject,CloseHandle,0_2_00401550
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net stop dpsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net start dpsJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net stop dpsJump to behavior
Source: C:\Windows\System32\net.exeProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 stop dpsJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net start dpsJump to behavior
Source: C:\Windows\System32\net.exeProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 start dpsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeCode function: 0_2_00401750 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00401750

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net stop dps
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net stop dps
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net stop dps
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net stop dps
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net stop dps
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net stop dps
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net stop dps
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net stop dps
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net stop dps
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net stop dps
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net stop dps
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net stop dpsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net stop dpsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net stop dpsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net stop dpsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net stop dpsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net stop dpsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net stop dpsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net stop dpsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net stop dpsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net stop dpsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net stop dpsJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Service Execution
1
Windows Service
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
Windows Service
111
Virtualization/Sandbox Evasion
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
Process Injection
11
Process Injection
Security Account Manager111
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
DLL Side-Loading
1
DLL Side-Loading
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets2
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1532614 Sample: SecuriteInfo.com.Trojan.Win... Startdate: 13/10/2024 Architecture: WINDOWS Score: 52 29 AI detected suspicious sample 2->29 8 SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exe 2 2->8         started        process3 signatures4 31 Found API chain indicative of debugger detection 8->31 33 Disables security and backup related services 8->33 11 cmd.exe 1 8->11         started        13 cmd.exe 1 8->13         started        15 conhost.exe 8->15         started        process5 process6 17 net.exe 1 11->17         started        19 conhost.exe 11->19         started        21 net.exe 1 13->21         started        23 conhost.exe 13->23         started        process7 25 net1.exe 1 17->25         started        27 net1.exe 1 21->27         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exe5%ReversingLabs
SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exe3%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
s-part-0036.t-0009.t-msedge.net0%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
s-part-0036.t-0009.t-msedge.net
13.107.246.64
truefalseunknown
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1532614
Start date and time:2024-10-13 18:36:11 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 2m 23s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:11
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exe
Detection:MAL
Classification:mal52.evad.winEXE@16/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 3
  • Number of non-executed functions: 14
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): dllhost.exe
  • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
TimeTypeDescription
12:37:12API Interceptor1x Sleep call for process: SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exe modified
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
s-part-0036.t-0009.t-msedge.nethttp://dat2.storeGet hashmaliciousUnknownBrowse
  • 13.107.246.64
http://host.cloudsonicwave.comGet hashmaliciousUnknownBrowse
  • 13.107.246.64
file.exeGet hashmaliciousLummaCBrowse
  • 13.107.246.64
kwVoiAAfGm.exeGet hashmaliciousLummaCBrowse
  • 13.107.246.64
ATT4416530006_Swissquote.htmGet hashmaliciousHTMLPhisherBrowse
  • 13.107.246.64
https://clicktime.symantec.com/15tpJCqdM9QTMPCbrFFYy?h=klzqFfVRykrA0KxCmyOSMtGNk2cnn93amKCU2afEZ8c=&u=https://www.tiktok.com/link/v2?aid%3D1988%26lang%3Den%26scene%3Dbio_url%26target%3Dhttps://www.google.ht/url?q%3Dhttps://google%25E3%2580%2582com/amp/s/cli.re/kBNkWr%23a2FyZW4ubWNjcm9ob25AdXJlbmNvLmNvbQ%3D%3D%252F%26opi%3D256371986142%26usg%3DlxfGUQNysmkDx%26source%3Dgmail%26ust%3D2908128326238375%26usg%3DAO2mBxLVnqpOjng75rOWFwZ2mBxLVnqpOqR75Get hashmaliciousHTMLPhisherBrowse
  • 13.107.246.64
Quarantined Messages(11).zipGet hashmaliciousHTMLPhisherBrowse
  • 13.107.246.64
http://hans.uniformeslaamistad.com/yuop/66e6ea133c92f_crypted.exe#xinGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
  • 13.107.246.64
bJ7Q5TP1uG.exeGet hashmaliciousMetasploitBrowse
  • 13.107.246.64
1f13Cs1ogc.exeGet hashmaliciousStealcBrowse
  • 13.107.246.64
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (console) x86-64, for MS Windows
Entropy (8bit):4.735818731011617
TrID:
  • Win64 Executable Console (202006/5) 92.64%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • VXD Driver (31/22) 0.01%
File name:SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exe
File size:58'271 bytes
MD5:c9f34d943343f0b5d62ff8c61de23b5a
SHA1:a44170b3c1a271484ea46257c44ecff7815eb2f5
SHA256:6feb92743d620750c92fac455db821d1f97361c73b275d97b96294b8a0840217
SHA512:37325dec60091b9cc9e84f91fce6f7ee145fad8b5e024f1d50d1ab23cd8c07f58fb8287081b8174f9d438fc0a61833594c347787d0ddb55aca1e9cb5054ada25
SSDEEP:768:MHsfsJYg+P2rfEqTIYv4gKNwFPfFBlb7Esk8gbO/+j:M2soP+EqTIm4gKN2PfFBlb7Eskmg
TLSH:1C4362D53AD88C9AEA14523C41FA9231267DBAE087534B536A30B7320F13BE17DD725E
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....mf.n........'...... ...>................@.............................. ......SU........ ............................
Icon Hash:90cececece8e8eb0
Entrypoint:0x4014e0
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows cui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LARGE_ADDRESS_AWARE
DLL Characteristics:
Time Stamp:0x666DE2C2 [Sat Jun 15 18:51:46 2024 UTC]
TLS Callbacks:0x401960
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:d40077e654b71a9d16abb8886fe24aa3
Instruction
dec eax
sub esp, 28h
dec eax
mov eax, dword ptr [00002FE5h]
mov dword ptr [eax], 00000000h
call 00007FAC38E09B9Fh
call 00007FAC38E095CAh
nop
nop
dec eax
add esp, 28h
ret
nop dword ptr [eax+00h]
nop word ptr [eax+eax+00000000h]
dec eax
sub esp, 28h
call 00007FAC38E0AFACh
dec eax
test eax, eax
sete al
movzx eax, al
neg eax
dec eax
add esp, 28h
ret
nop
nop
nop
nop
nop
nop
nop
dec eax
lea ecx, dword ptr [00000009h]
jmp 00007FAC38E09919h
nop dword ptr [eax+00h]
ret
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
push ebp
push edi
dec eax
sub esp, 00000098h
dec eax
lea ebp, dword ptr [esp+00000080h]
dec eax
mov dword ptr [ebp+30h], ecx
dec eax
lea edx, dword ptr [ebp-60h]
mov eax, 00000000h
mov ecx, 0000000Eh
dec eax
mov edi, edx
dec eax
stosd
mov dword ptr [ebp-60h], 00000070h
mov dword ptr [ebp-5Ch], 00000040h
dec eax
lea eax, dword ptr [00002A72h]
dec eax
mov dword ptr [ebp-50h], eax
dec eax
lea eax, dword ptr [00002A73h]
dec eax
mov dword ptr [ebp-48h], eax
dec eax
mov eax, dword ptr [ebp+30h]
dec eax
mov dword ptr [ebp-40h], eax
mov dword ptr [ebp-30h], 00000000h
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x80000x86c.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x50000x288.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x40a00x28.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x822c0x1c8.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x1e180x2000096049bb6747aec4c682dffca531406fFalse0.5618896484375data5.784054051693567IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0x30000xd00x200cdafbabd2e4c5313ac1773fac9fd79f1False0.1328125data0.7983628322298817IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rdata0x40000x5600x60048e8151de0c0f03e18d877183d899e1aFalse0.3938802083333333data3.6298793403816116IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
.pdata0x50000x2880x400c88bd171e43b9a6d5a6e0bc381e40136False0.3623046875data2.737050847787977IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
.xdata0x60000x20c0x4000a79ef6ec59470443827e1e566d9a0b6False0.2490234375data2.4219552963185955IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
.bss0x70000x9800x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata0x80000x86c0xa0068c68cc6576c5bad50b898864acc1382False0.321484375data3.5871409730139856IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.CRT0x90000x680x2008e3a2e06a884908cbfbf32ab6aa0edb0False0.0703125data0.2655385886073115IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.tls0xa0000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
/40xb0000x500x2004e202c4288169e9e4a7b896d6197a626False0.0703125data0.2162069074398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/190xc0000x1f080x20000b7bb40b6b51a29b28edb81995a80166False0.45947265625data5.821443031684246IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/310xe0000x1490x2005d291f74219487bffd06356d36f3a0e4False0.375data3.2872917906726884IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/450xf0000x2220x4009a088ddc03d93c16a278708634e42432False0.2890625data3.228510811933141IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/570x100000x480x20051f393494473a7b97facf4c6ad2238f0False0.119140625data0.6931503241542495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/700x110000x9b0x200406b70665a5983d1f1682455c669f732False0.259765625data2.320780444544343IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
DLLImport
KERNEL32.dllCloseHandle, DeleteCriticalSection, EnterCriticalSection, GetConsoleWindow, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetLastError, GetStartupInfoA, GetSystemTimeAsFileTime, GetTickCount, InitializeCriticalSection, LeaveCriticalSection, QueryPerformanceCounter, RtlAddFunctionTable, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, SetUnhandledExceptionFilter, Sleep, TerminateProcess, TlsGetValue, UnhandledExceptionFilter, VirtualProtect, VirtualQuery, WaitForSingleObject
msvcrt.dll__C_specific_handler, __getmainargs, __initenv, __iob_func, __lconv_init, __set_app_type, __setusermatherr, _acmdln, _amsg_exit, _cexit, _fmode, _initterm, _onexit, abort, calloc, exit, fprintf, free, fwrite, malloc, memcpy, signal, strlen, strncmp, vfprintf
SHELL32.dllShellExecuteExW
USER32.dllShowWindow
TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
Oct 13, 2024 18:37:09.217513084 CEST1.1.1.1192.168.2.110xdad9No error (0)shed.dual-low.s-part-0036.t-0009.t-msedge.nets-part-0036.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
Oct 13, 2024 18:37:09.217513084 CEST1.1.1.1192.168.2.110xdad9No error (0)s-part-0036.t-0009.t-msedge.net13.107.246.64A (IP address)IN (0x0001)false

Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:12:37:12
Start date:13/10/2024
Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Inject.4588.21334.exe"
Imagebase:0x400000
File size:58'271 bytes
MD5 hash:C9F34D943343F0B5D62FF8C61DE23B5A
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:1
Start time:12:37:12
Start date:13/10/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff68cce0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:3
Start time:12:37:12
Start date:13/10/2024
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:"C:\Windows\System32\cmd.exe" /c net stop dps
Imagebase:0x7ff627830000
File size:289'792 bytes
MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:4
Start time:12:37:12
Start date:13/10/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff68cce0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:5
Start time:12:37:12
Start date:13/10/2024
Path:C:\Windows\System32\net.exe
Wow64 process (32bit):false
Commandline:net stop dps
Imagebase:0x7ff606c30000
File size:59'904 bytes
MD5 hash:0BD94A338EEA5A4E1F2830AE326E6D19
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:6
Start time:12:37:12
Start date:13/10/2024
Path:C:\Windows\System32\net1.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\net1 stop dps
Imagebase:0x7ff767d70000
File size:183'808 bytes
MD5 hash:55693DF2BB3CBE2899DFDDF18B4EB8C9
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
Has exited:true

Target ID:7
Start time:12:37:12
Start date:13/10/2024
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:"C:\Windows\System32\cmd.exe" /c net start dps
Imagebase:0x7ff627830000
File size:289'792 bytes
MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:8
Start time:12:37:12
Start date:13/10/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff68cce0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:9
Start time:12:37:12
Start date:13/10/2024
Path:C:\Windows\System32\net.exe
Wow64 process (32bit):false
Commandline:net start dps
Imagebase:0x7ff606c30000
File size:59'904 bytes
MD5 hash:0BD94A338EEA5A4E1F2830AE326E6D19
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:10
Start time:12:37:12
Start date:13/10/2024
Path:C:\Windows\System32\net1.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\net1 start dps
Imagebase:0x7ff767d70000
File size:183'808 bytes
MD5 hash:55693DF2BB3CBE2899DFDDF18B4EB8C9
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:12.7%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:20.6%
    Total number of Nodes:155
    Total number of Limit Nodes:3
    execution_graph 624 4014e0 629 401750 624->629 626 4014f6 633 401180 626->633 628 4014fb 630 401790 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 629->630 631 401779 629->631 632 4017eb 630->632 631->626 632->626 634 401470 GetStartupInfoA 633->634 635 4011b4 633->635 640 401480 634->640 636 4011dc Sleep 635->636 637 4011f1 635->637 636->635 638 401224 637->638 639 40143c _initterm 637->639 637->640 657 401d50 638->657 639->638 643 401750 5 API calls 640->643 642 40124c SetUnhandledExceptionFilter 687 4021b0 642->687 645 4014c6 643->645 646 401180 26 API calls 645->646 647 4014cb 646->647 647->628 648 401315 malloc 650 401387 648->650 651 40133c 648->651 649 401268 649->648 650->640 654 4013db 650->654 652 401350 strlen malloc memcpy 651->652 652->652 653 401382 652->653 653->650 655 4013f0 654->655 656 4013e5 _cexit 654->656 655->628 656->655 658 401d72 657->658 659 401d83 657->659 658->642 659->658 660 401df0 659->660 664 401ec3 659->664 660->658 663 401df9 660->663 661 401fea 667 402080 661->667 668 40201d 661->668 666 401e47 663->666 693 401b80 663->693 664->658 664->661 665 401f0a 664->665 664->666 665->664 673 401b80 11 API calls 665->673 680 401b80 11 API calls 665->680 666->658 677 401e72 VirtualProtect 666->677 669 402140 667->669 670 40208b 667->670 671 402024 668->671 672 40209f signal 668->672 676 4020b1 669->676 682 402156 signal 669->682 674 40208d 670->674 678 4020c4 670->678 671->676 671->678 679 402035 671->679 675 402120 signal 672->675 672->676 673->665 674->672 674->676 675->676 676->642 677->666 678->676 681 4020d2 signal 678->681 679->676 684 40204b signal 679->684 680->664 683 402170 signal 681->683 686 402061 681->686 682->686 683->686 685 402190 signal 684->685 684->686 685->686 686->642 688 4021bf 687->688 689 4021ec 688->689 722 402790 688->722 689->649 691 4021e7 691->689 692 402280 RtlAddFunctionTable 691->692 692->689 694 401ba2 693->694 695 401c4e 693->695 694->695 696 401c0c VirtualQuery 694->696 705 401d20 694->705 695->663 695->695 697 401c3a 696->697 696->705 697->695 699 401cb0 VirtualProtect 697->699 698 401d72 698->663 699->695 700 401ce0 GetLastError 699->700 700->695 701 401fea 703 402080 701->703 704 40201d 701->704 702 401df0 702->698 713 401e72 VirtualProtect 702->713 706 402140 703->706 707 40208b 703->707 708 402024 704->708 709 40209f signal 704->709 705->698 705->701 705->702 712 4020b1 706->712 717 402156 signal 706->717 710 40208d 707->710 714 4020c4 707->714 708->712 708->714 715 402035 708->715 711 402120 signal 709->711 709->712 710->709 710->712 711->712 712->663 713->702 714->712 716 4020d2 signal 714->716 715->712 719 40204b signal 715->719 718 402170 signal 716->718 721 402061 716->721 717->721 718->721 720 402190 signal 719->720 719->721 720->721 721->663 723 40279f 722->723 724 402810 723->724 725 4027ee strncmp 723->725 724->691 725->723 726 402803 725->726 726->691 738 402580 739 4025a0 EnterCriticalSection 738->739 740 402591 738->740 741 4025d3 LeaveCriticalSection 739->741 744 4025b9 739->744 743 4025e0 741->743 742 4025bf free LeaveCriticalSection 742->743 744->741 744->742 759 401960 760 401972 759->760 761 401982 760->761 764 402620 760->764 763 4019c7 765 4026c0 764->765 768 40262e 764->768 766 4026e0 InitializeCriticalSection 765->766 767 4026ca 765->767 766->767 767->763 769 402685 free 768->769 770 402696 DeleteCriticalSection 768->770 771 402630 768->771 769->769 769->770 770->771 771->763 775 4022a0 776 4022c1 775->776 777 402308 776->777 779 40234b signal 776->779 783 4022f2 signal 776->783 785 402366 776->785 778 4023f0 signal 777->778 777->779 782 4023a7 signal 777->782 777->785 778->777 781 402406 signal 778->781 779->777 780 402440 signal 779->780 780->785 781->785 782->777 784 402470 signal 782->784 783->777 786 402459 signal 783->786 784->785 786->785 787 402ca9 RtlCaptureContext 727 4015ec GetConsoleWindow 728 401626 727->728 733 401550 ShellExecuteExW 728->733 731 401550 ShellExecuteExW 732 40164c 731->732 734 4015d1 SleepEx 733->734 734->731 749 401a50 750 401a6f 749->750 751 401aa6 fprintf 750->751 752 401010 753 401058 752->753 754 40106b __set_app_type 753->754 755 401075 753->755 754->755 794 401830 RtlCaptureContext RtlLookupFunctionEntry 795 40186a RtlVirtualUnwind 794->795 796 40190d 794->796 797 4018a3 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess abort 795->797 796->797 797->796 798 401930 799 401939 798->799 800 40193d 799->800 801 402620 3 API calls 799->801 802 401955 801->802 803 4024f5 804 402524 803->804 805 402519 803->805 804->805 806 40253b EnterCriticalSection LeaveCriticalSection 804->806

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_00401740 1 Function_00402740 2 Function_00401B50 3 Function_00401D50 3->2 15 Function_00402AE0 3->15 18 Function_00402D70 3->18 27 Function_00401B80 3->27 39 Function_004028A0 3->39 4 Function_00401750 5 Function_00401550 6 Function_00402950 26 Function_00402700 6->26 7 Function_00401A50 8 Function_00402BD0 7->8 9 Function_004019E0 10 Function_00401B60 11 Function_00401960 42 Function_00402620 11->42 12 Function_004014E0 12->4 23 Function_00401180 12->23 13 Function_00401660 14 Function_004028E0 14->26 16 Function_004015EC 16->5 17 Function_00401B70 18->8 19 Function_00401AF0 19->8 20 Function_004019F0 21 Function_00402BF0 22 Function_004024F5 23->2 23->3 23->4 23->23 25 Function_00402C00 23->25 34 Function_00402C10 23->34 35 Function_00401710 23->35 49 Function_00402D30 23->49 55 Function_004021B0 23->55 24 Function_00401B00 24->8 27->2 27->6 27->15 27->18 27->27 27->39 40 Function_00402820 27->40 28 Function_00402580 29 Function_00401A81 29->8 30 Function_00401510 31 Function_00402790 31->26 32 Function_00401010 32->0 38 Function_00402C20 32->38 33 Function_00402990 33->26 36 Function_00401B10 36->8 37 Function_00401B20 37->8 39->26 40->26 41 Function_004022A0 41->2 42->2 43 Function_00402BA1 44 Function_00402722 45 Function_004082A4 46 Function_00402D29 47 Function_00402CA9 48 Function_00402A30 48->26 49->35 50 Function_00401130 51 Function_00401530 52 Function_00401830 53 Function_00401930 53->42 54 Function_00401B30 54->8 55->6 55->14 55->31

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1343283337.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1343247896.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343303540.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343322787.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandled_cexitmemcpystrlen
    • String ID: @v@$py@$xy@
    • API String ID: 1640792405-2148754610
    • Opcode ID: 34766a99da830c1b3b73a049980ba02f88cdf6b2e7f4ee8de1703b2971f9d531
    • Instruction ID: f61040157b9ab14210d7bd0fd37eb3bcba0b4eec42d2a3fc5dceeb298ebc88c4
    • Opcode Fuzzy Hash: 34766a99da830c1b3b73a049980ba02f88cdf6b2e7f4ee8de1703b2971f9d531
    • Instruction Fuzzy Hash: 5B819CB560564486EB24AF66E99076A33A1B785B88F84843BEF48773F1DF7CD841C309

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 73 401550-4015eb ShellExecuteExW
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1343283337.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1343247896.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343303540.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343322787.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ExecuteShell
    • String ID: cmd$runas
    • API String ID: 587946157-60640312
    • Opcode ID: b01852272fd66988f6c3295ddb34043be3187056cc96adf705a72caf1947378a
    • Instruction ID: b6d53a8ea57a91f8b02f311b64cfb39c913c077d4837d462ceb35a7cc770c6a3
    • Opcode Fuzzy Hash: b01852272fd66988f6c3295ddb34043be3187056cc96adf705a72caf1947378a
    • Instruction Fuzzy Hash: 5E01E276711B949DEB908FA5E84438C33B5B788798F50822ADF5C6BBA8DF38C548C344

    Control-flow Graph

    APIs
    • GetConsoleWindow.KERNELBASE ref: 0040160B
      • Part of subcall function 00401550: ShellExecuteExW.SHELL32 ref: 004015BA
    • SleepEx.KERNELBASE ref: 0040163E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1343283337.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1343247896.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343303540.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343322787.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ConsoleExecuteShellSleepWindow
    • String ID: /c net start dps$/c net stop dps
    • API String ID: 599060321-2952981288
    • Opcode ID: e5799b1b03686444d3959dd64eeb0193a4ceff0d1e11a016b23a3da34200e4be
    • Instruction ID: b4960f33086fe31331f5afd6f8e4b77142d23bda735e606a3014341cbe9ca3c3
    • Opcode Fuzzy Hash: e5799b1b03686444d3959dd64eeb0193a4ceff0d1e11a016b23a3da34200e4be
    • Instruction Fuzzy Hash: FBF08CB2610F0099E740AF65FC923993374E794788F04016AEB5D6B7B4EE38C6618388

    Control-flow Graph

    APIs
    • RtlCaptureContext.KERNEL32 ref: 00401844
    • RtlLookupFunctionEntry.KERNEL32 ref: 0040185B
    • RtlVirtualUnwind.KERNEL32 ref: 0040189D
    • SetUnhandledExceptionFilter.KERNEL32 ref: 004018E1
    • UnhandledExceptionFilter.KERNEL32 ref: 004018EE
    • GetCurrentProcess.KERNEL32 ref: 004018F4
    • TerminateProcess.KERNEL32 ref: 00401902
    • abort.MSVCRT ref: 00401908
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1343283337.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1343247896.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343303540.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343322787.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentEntryFunctionLookupTerminateUnwindVirtualabort
    • String ID: @u@
    • API String ID: 4278921479-2874120433
    • Opcode ID: 64dd720258001e6a9add5ec7e82dc8c6e9edb5c3ee09e20689457ae5489c85e8
    • Instruction ID: b1c151bb61c023455e294b7dd413e4e4c0a0066d6c6bf75f24da43921eb891c8
    • Opcode Fuzzy Hash: 64dd720258001e6a9add5ec7e82dc8c6e9edb5c3ee09e20689457ae5489c85e8
    • Instruction Fuzzy Hash: 8A2104B5A16F44D9EB009B65FC8439937B4BB48B84F54412ADB8E677A4EF38C104C308

    Control-flow Graph

    APIs
    • GetSystemTimeAsFileTime.KERNEL32 ref: 00401795
    • GetCurrentProcessId.KERNEL32 ref: 004017A0
    • GetCurrentThreadId.KERNEL32 ref: 004017A9
    • GetTickCount.KERNEL32 ref: 004017B1
    • QueryPerformanceCounter.KERNEL32 ref: 004017BE
    Memory Dump Source
    • Source File: 00000000.00000002.1343283337.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1343247896.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343303540.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343322787.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
    • String ID:
    • API String ID: 1445889803-0
    • Opcode ID: 005e4d6f4335a43e20920343d4b6f2b3dc0a67de5b6495c410f755cf3543f680
    • Instruction ID: f91319260887b59586992985d8b325d55ca4e91f5fcda6ec9c6ed990604cca4b
    • Opcode Fuzzy Hash: 005e4d6f4335a43e20920343d4b6f2b3dc0a67de5b6495c410f755cf3543f680
    • Instruction Fuzzy Hash: 5C119EA6766A1081FB105B25FD04316B3A4B788BB1F0847799F9C537A8EF3CC589C308

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 81 401d50-401d70 82 401d72-401d82 81->82 83 401d83-401dda call 4028a0 call 402ae0 81->83 83->82 88 401ddc-401de2 83->88 89 401eb0-401eb2 88->89 90 401de8-401dea 88->90 91 401df0-401df3 89->91 92 401eb8-401ebd 89->92 90->91 93 401e94-401e99 90->93 91->82 94 401df9-401e18 91->94 92->91 95 401ec3-401ec9 92->95 93->91 96 401e9f-401ea4 93->96 97 401e24-401e45 call 401b80 94->97 98 401ffe-40201b call 402d70 95->98 99 401ecf-401eeb 95->99 96->95 100 401ea6-401ead 96->100 111 401e20 97->111 112 401e47-401e58 97->112 113 402080-402085 98->113 114 40201d-402022 98->114 101 401f35-401f4a 99->101 102 401eed 99->102 100->89 107 401ef2 101->107 108 401f4c-401f7d call 401b80 101->108 102->82 109 401fb0-401fb3 107->109 110 401ef8-401efb 107->110 138 401f28-401f2f 108->138 116 401fb5-401fe5 call 401b80 109->116 117 401fea-401ff9 call 402d70 109->117 118 401f80-401faa call 401b80 110->118 119 401f01-401f04 110->119 111->97 112->82 122 401e5e 112->122 120 402140-402150 call 402b38 113->120 121 40208b 113->121 123 402024-402029 114->123 124 40209f-4020af signal 114->124 116->138 117->98 118->138 119->117 129 401f0a-401f23 call 401b80 119->129 134 4020b1-4020b4 120->134 155 402156-402167 signal 120->155 130 4020c4-4020c9 121->130 131 40208d-402092 121->131 132 401e60-401e70 122->132 136 402134-40213a 123->136 137 40202f 123->137 133 402120-40212f signal call 401b50 124->133 124->134 129->138 130->136 139 4020cb-4020d0 130->139 131->136 149 402098-40209d 131->149 142 401e80-401e8d 132->142 143 401e72-401e7d VirtualProtect 132->143 133->136 150 4020b6-4020c3 134->150 151 40210e-402117 134->151 146 402100-402105 137->146 147 402035-40203a 137->147 138->101 138->112 139->151 152 4020d2-4020e2 signal 139->152 142->132 154 401e8f 142->154 143->142 146->152 153 402107-40210c 146->153 147->136 156 402040-402045 147->156 149->124 149->151 157 402170-402181 signal 152->157 158 4020e8-4020eb 152->158 153->136 153->151 154->82 159 402073-402077 155->159 156->151 160 40204b-40205b signal 156->160 157->159 162 4020f1-4020fe 158->162 163 4021a6-4021ab 158->163 164 402190-4021a1 signal 160->164 165 402061-402064 160->165 163->159 164->159 165->163 166 40206a-402071 165->166 166->159
    APIs
    • VirtualProtect.KERNEL32(00407610,00007FFEFE3AADA0,?,?,?,00000001,0040124C), ref: 00401E7D
    Strings
    • `E@, xrefs: 00401DA9
    • `E@, xrefs: 00401DBA
    • Unknown pseudo relocation bit size %d., xrefs: 00401FEA
    • Unknown pseudo relocation protocol version %d., xrefs: 00401FFE
    Memory Dump Source
    • Source File: 00000000.00000002.1343283337.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1343247896.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343303540.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343322787.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ProtectVirtual
    • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.$`E@$`E@
    • API String ID: 544645111-2660773367
    • Opcode ID: 2269dc8aa27a426d268b85a6c817b95a1c1ca146ff00244c5d8c9b458006eddb
    • Instruction ID: dca5683da72d807886d86375f5707f703bf4d304d08726f4f2fcd40ee53290e8
    • Opcode Fuzzy Hash: 2269dc8aa27a426d268b85a6c817b95a1c1ca146ff00244c5d8c9b458006eddb
    • Instruction Fuzzy Hash: C7919871B0064146EB249B6ACA4871F7362BB843A8F54853BDF09777E4DA7DD882C30D

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 169 4022a0-4022bb 170 402380-402384 169->170 171 4022c1-4022c6 169->171 170->171 172 40238a-402394 170->172 173 402330-402335 171->173 174 4022c8-4022cd 171->174 175 4023f0-402400 signal 173->175 176 40233b 173->176 177 40234b-40235b signal 174->177 178 4022cf-4022d4 174->178 183 402361-402364 175->183 184 402406-40241a signal 175->184 180 402395-40239a 176->180 181 40233d-402342 176->181 182 402440-402454 signal call 401b50 177->182 177->183 178->172 179 4022da 178->179 186 4022e0-4022e5 179->186 187 4023d4-4023d9 179->187 180->172 188 40239c-4023a1 180->188 181->172 190 402344-402349 181->190 182->172 191 402311-40231b 183->191 192 402366-40236d 183->192 185 402372-402377 184->185 186->172 193 4022eb-4022f0 186->193 194 4023a7-4023b7 signal 187->194 198 4023db-4023e0 187->198 188->191 188->194 190->177 190->191 196 402431-402433 191->196 197 402321-402328 191->197 192->185 193->191 200 4022f2-402302 signal 193->200 201 402470-402482 signal 194->201 202 4023bd-4023c0 194->202 196->185 197->173 198->191 203 4023e6 198->203 204 402308-40230b 200->204 205 402459-40246b signal 200->205 201->185 202->191 206 4023c6-4023d2 202->206 203->172 204->191 207 402420-40242c 204->207 205->185 206->185 207->185
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1343283337.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1343247896.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343303540.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343322787.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: signal
    • String ID: CCG
    • API String ID: 1946981877-1584390748
    • Opcode ID: e92f40cea0a9825c8c759c6b1fc838814e23495f2d567f744961d1a0c5aa1c13
    • Instruction ID: 24bfa5f7dfcdfcdea129f73ce5d1dd7ae3667d051b1cbb233547e031a2e469f3
    • Opcode Fuzzy Hash: e92f40cea0a9825c8c759c6b1fc838814e23495f2d567f744961d1a0c5aa1c13
    • Instruction Fuzzy Hash: 0731402060150186EF38567A475C33B11015B9A338F288A3BAE6DAB3E1DDFC98C5021F

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 214 401b80-401b9c 215 401ba2-401baf 214->215 216 401d08 214->216 217 401bb0-401bb6 215->217 218 401d0f-401d1b 216->218 219 401bb8-401bc6 217->219 220 401bcc-401bd5 217->220 221 401c78-401c82 218->221 219->220 222 401c55-401c58 219->222 220->217 223 401bd7-401be5 call 402820 220->223 224 401c83-401c95 222->224 225 401c5a-401c5e 222->225 231 401beb-401c34 call 402950 VirtualQuery 223->231 232 401d3d-401d70 call 402d70 223->232 224->221 229 401c97-401c9a 224->229 227 401cf4-401d03 225->227 228 401c64-401c66 225->228 227->221 228->221 233 401c68-401c72 228->233 234 401c9c-401cac 229->234 240 401d20-401d38 call 402d70 231->240 241 401c3a-401c44 231->241 246 401d72-401d82 232->246 247 401d83-401dda call 4028a0 call 402ae0 232->247 233->218 233->221 234->234 237 401cae 234->237 237->221 240->232 243 401c46-401c4c 241->243 244 401c4e 241->244 243->244 248 401cb0-401cda VirtualProtect 243->248 244->222 247->246 255 401ddc-401de2 247->255 248->244 250 401ce0-401cef GetLastError call 402d70 248->250 250->227 256 401eb0-401eb2 255->256 257 401de8-401dea 255->257 258 401df0-401df3 256->258 259 401eb8-401ebd 256->259 257->258 260 401e94-401e99 257->260 258->246 261 401df9-401e18 258->261 259->258 262 401ec3-401ec9 259->262 260->258 263 401e9f-401ea4 260->263 264 401e24-401e45 call 401b80 261->264 265 401ffe-40201b call 402d70 262->265 266 401ecf-401eeb 262->266 263->262 267 401ea6-401ead 263->267 278 401e20 264->278 279 401e47-401e58 264->279 280 402080-402085 265->280 281 40201d-402022 265->281 268 401f35-401f4a 266->268 269 401eed 266->269 267->256 274 401ef2 268->274 275 401f4c-401f7d call 401b80 268->275 269->246 276 401fb0-401fb3 274->276 277 401ef8-401efb 274->277 305 401f28-401f2f 275->305 283 401fb5-401fe5 call 401b80 276->283 284 401fea-401ff9 call 402d70 276->284 285 401f80-401faa call 401b80 277->285 286 401f01-401f04 277->286 278->264 279->246 289 401e5e 279->289 287 402140-402150 call 402b38 280->287 288 40208b 280->288 290 402024-402029 281->290 291 40209f-4020af signal 281->291 283->305 284->265 285->305 286->284 296 401f0a-401f23 call 401b80 286->296 301 4020b1-4020b4 287->301 322 402156-402167 signal 287->322 297 4020c4-4020c9 288->297 298 40208d-402092 288->298 299 401e60-401e70 289->299 303 402134-40213a 290->303 304 40202f 290->304 300 402120-40212f signal call 401b50 291->300 291->301 296->305 297->303 306 4020cb-4020d0 297->306 298->303 316 402098-40209d 298->316 309 401e80-401e8d 299->309 310 401e72-401e7d VirtualProtect 299->310 300->303 317 4020b6-4020c3 301->317 318 40210e-402117 301->318 313 402100-402105 304->313 314 402035-40203a 304->314 305->268 305->279 306->318 319 4020d2-4020e2 signal 306->319 309->299 321 401e8f 309->321 310->309 313->319 320 402107-40210c 313->320 314->303 323 402040-402045 314->323 316->291 316->318 324 402170-402181 signal 319->324 325 4020e8-4020eb 319->325 320->303 320->318 321->246 326 402073-402077 322->326 323->318 327 40204b-40205b signal 323->327 324->326 329 4020f1-4020fe 325->329 330 4021a6-4021ab 325->330 331 402190-4021a1 signal 327->331 332 402061-402064 327->332 330->326 331->326 332->330 333 40206a-402071 332->333 333->326
    APIs
    Strings
    • VirtualProtect failed with code 0x%x, xrefs: 00401CE6
    • Address %p has no image-section, xrefs: 00401D3D
    • VirtualQuery failed for %d bytes at address %p, xrefs: 00401D27
    Memory Dump Source
    • Source File: 00000000.00000002.1343283337.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1343247896.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343303540.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343322787.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Virtual$ErrorLastProtectQuery
    • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section
    • API String ID: 637304234-2123141913
    • Opcode ID: c0b59577e5cd97fe0715eaae8c30ed78fd31b71169e74243a61e95e4c8da94fb
    • Instruction ID: 0bd241eedf3dbf15b1e916ea10f7df5b614333080103f6031fda88f349f5300d
    • Opcode Fuzzy Hash: c0b59577e5cd97fe0715eaae8c30ed78fd31b71169e74243a61e95e4c8da94fb
    • Instruction Fuzzy Hash: 3B5113B3705A5186EB118F26ED4075A77A0BB99BA4F448126DF4E633E4EB3CD942C308

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 342 401010-401056 343 4010b0-4010bd 342->343 344 401058-401069 342->344 343->344 345 4010bf-4010c8 343->345 346 4010a0-4010aa call 402ba8 344->346 347 40106b-401070 __set_app_type 344->347 349 401103-401107 345->349 350 4010ca-4010cf 345->350 351 401075-401094 call 402c20 call 401740 346->351 347->351 349->344 355 40110d-40111c 349->355 350->344 353 4010d1-4010d8 350->353 360 4010f0-401102 call 401a40 351->360 361 401096-40109c 351->361 353->344 356 4010de-4010eb 353->356 355->344 356->344
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1343283337.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1343247896.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343303540.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343322787.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: __set_app_type
    • String ID: 0v@$@p@$`0@
    • API String ID: 1108511539-3268658271
    • Opcode ID: 7392dc7e9a0bbf52ed55200be09cb53b61de662a5a4148638275b3825dbad887
    • Instruction ID: fd9d19e994baf7e2f11b5d28e98c86898c8701afe80eade77481b5ca9ced20ae
    • Opcode Fuzzy Hash: 7392dc7e9a0bbf52ed55200be09cb53b61de662a5a4148638275b3825dbad887
    • Instruction Fuzzy Hash: 7C2179B1A0064586E718AF1AE89136A37A1F7C4B44F85C037DB0A67BF1DB7E8885D718

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 364 401a50-401a69 365 401b40-401b47 364->365 366 401a6f-401a7c 364->366 367 401a88-401ae7 call 402bd0 fprintf 365->367 366->367
    APIs
    Strings
    • Unknown error, xrefs: 00401B40
    • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00401AB9
    Memory Dump Source
    • Source File: 00000000.00000002.1343283337.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1343247896.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343303540.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343322787.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-3474627141
    • Opcode ID: edf048563546d7573fb3b8e49876c7ac760cce1aa7f9c381c1cdae167f7dd8dc
    • Instruction ID: 1717d74e9015c440a66cfa6e9fbcd0f8d0c1013e5a7df2e0d80e07d0fbbdb39d
    • Opcode Fuzzy Hash: edf048563546d7573fb3b8e49876c7ac760cce1aa7f9c381c1cdae167f7dd8dc
    • Instruction Fuzzy Hash: D70188A2504E88C2D6169F1DD8053DA7374FF99799F145316EF8836260DB39D593C704

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 370 401af0-401af7 call 402bd0 fprintf
    APIs
    Strings
    • Argument singularity (SIGN), xrefs: 00401AF0
    • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00401AB9
    Memory Dump Source
    • Source File: 00000000.00000002.1343283337.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1343247896.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343303540.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343322787.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-2468659920
    • Opcode ID: 151d3e77c1ddb13c28ece62127f607bf7abaae325ba231e1e244808f3a2dce09
    • Instruction ID: 36daf1d5667cca1cab3a3dabc4a2107a5d96b249ca579a6d074505834bc63413
    • Opcode Fuzzy Hash: 151d3e77c1ddb13c28ece62127f607bf7abaae325ba231e1e244808f3a2dce09
    • Instruction Fuzzy Hash: 61F09662504E4881C2019F1DA8003ABB370FF9D789F185316EF893A564DF38D6838704

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 374 401b00-401b07 call 402bd0 fprintf
    APIs
    Strings
    • Overflow range error (OVERFLOW), xrefs: 00401B00
    • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00401AB9
    Memory Dump Source
    • Source File: 00000000.00000002.1343283337.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1343247896.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343303540.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343322787.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-4064033741
    • Opcode ID: 66cac9fea47ed298782a02216b209abc09f3a389415dc09856040a25b4597757
    • Instruction ID: f6d4facb65d6c38deb25a2634443a4eea8d103c94b9cd778989fc9e2e7ae0962
    • Opcode Fuzzy Hash: 66cac9fea47ed298782a02216b209abc09f3a389415dc09856040a25b4597757
    • Instruction Fuzzy Hash: 60F03662504E4881D2019F1DA8043ABB374FF9D799F595716EF893A564DF38D6838704

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 378 401b10-401b17 call 402bd0 fprintf
    APIs
    Strings
    • The result is too small to be represented (UNDERFLOW), xrefs: 00401B10
    • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00401AB9
    Memory Dump Source
    • Source File: 00000000.00000002.1343283337.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1343247896.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343303540.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343322787.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: fprintf
    • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-2187435201
    • Opcode ID: e2dfb09408b24940db909e2efd1456621b80fcc864c66ba868ac76ae221c4521
    • Instruction ID: e1f1debda1e726c58272f207414565285d4e89a7795f1e471707632806906dd2
    • Opcode Fuzzy Hash: e2dfb09408b24940db909e2efd1456621b80fcc864c66ba868ac76ae221c4521
    • Instruction Fuzzy Hash: 08F03662504E4881D2019F1DA8043ABB374FF9D799F595716EF893A564DF38D6838704

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 382 401b20-401b27 call 402bd0 fprintf
    APIs
    Strings
    • Total loss of significance (TLOSS), xrefs: 00401B20
    • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00401AB9
    Memory Dump Source
    • Source File: 00000000.00000002.1343283337.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1343247896.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343303540.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343322787.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-4273532761
    • Opcode ID: ba10a8e036e3208dd75491ed570a48e2ab6c9c02d6703965f98c992e82e08590
    • Instruction ID: 2c4b4c1f6c9eef1b2439ef335247dc8519df53e696df31e12774712fafac3b28
    • Opcode Fuzzy Hash: ba10a8e036e3208dd75491ed570a48e2ab6c9c02d6703965f98c992e82e08590
    • Instruction Fuzzy Hash: 31F09662504E4881C2019F2DA8003ABB370FF9D789F195316EF893A564DF38D683C704
    APIs
    Strings
    • Partial loss of significance (PLOSS), xrefs: 00401B30
    • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00401AB9
    Memory Dump Source
    • Source File: 00000000.00000002.1343283337.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1343247896.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343303540.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343322787.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-4283191376
    • Opcode ID: bf6baefa6a00c9342a2119fb24cf72473f61a69570fce31df4b659fdb0e749d4
    • Instruction ID: 79202755b55f08cf2a298ed996ffb4ecfb0f22c6230b9952b1720332fbd345a4
    • Opcode Fuzzy Hash: bf6baefa6a00c9342a2119fb24cf72473f61a69570fce31df4b659fdb0e749d4
    • Instruction Fuzzy Hash: 8AF03662504E4881D2019F1DA8043ABB374FF9D799F595716EF893A564DF38D6838704
    APIs
    Strings
    • Argument domain error (DOMAIN), xrefs: 00401A81
    • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00401AB9
    Memory Dump Source
    • Source File: 00000000.00000002.1343283337.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1343247896.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343303540.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343322787.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-2713391170
    • Opcode ID: 8b231581f6086cfd70346b105ff5f9f32b0d1a10f1b91497b035981503104c88
    • Instruction ID: c7a7dfaab92556413fb8eec377ba0ac71315c197c3e0b4ea742a0652beb020c6
    • Opcode Fuzzy Hash: 8b231581f6086cfd70346b105ff5f9f32b0d1a10f1b91497b035981503104c88
    • Instruction Fuzzy Hash: DEF09656404F4881C2019F19A80039BB370FF9D789F145316EF893A164DB28D6838704
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1343283337.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1343247896.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343303540.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343322787.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1343341395.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeavefree
    • String ID:
    • API String ID: 4020351045-0
    • Opcode ID: 8deff2b90dcf990df99764e0c033885e985dc562dd55141c764cf6d1c32405c4
    • Instruction ID: f689d4ad56698b7a11b7b7c56a7925263ab266b630ebde4a8ba00ed67c8c8438
    • Opcode Fuzzy Hash: 8deff2b90dcf990df99764e0c033885e985dc562dd55141c764cf6d1c32405c4
    • Instruction Fuzzy Hash: BD0152B171660496EF48DB55ED9832623A0B794B40F64847ACB0DA73D0EBBCD881D34D