Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Ljrfk7uRvO.exe

Overview

General Information

Sample name:Ljrfk7uRvO.exe
renamed because original name is a hash value
Original sample name:8b92f9878021028541ee3ad507b2a08fb3884007cca9b659503693a41589eb22.exe
Analysis ID:1542740
MD5:e1a865386810fdd8cfe6724c251bc236
SHA1:9eca601597cd96d337b5fed54b3943bed1a35137
SHA256:8b92f9878021028541ee3ad507b2a08fb3884007cca9b659503693a41589eb22
Tags:20-25-126-96exeuser-JAMESWT_MHT
Infos:

Detection

CobaltStrike, Metasploit
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected CobaltStrike
Yara detected Metasploit Payload
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found API chain indicative of debugger detection
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • Ljrfk7uRvO.exe (PID: 5916 cmdline: "C:\Users\user\Desktop\Ljrfk7uRvO.exe" MD5: E1A865386810FDD8CFE6724C251BC236)
    • WerFault.exe (PID: 5920 cmdline: C:\Windows\system32\WerFault.exe -u -p 5916 -s 1112 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Cobalt Strike, CobaltStrikeCobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable.
  • APT 29
  • APT32
  • APT41
  • AQUATIC PANDA
  • Anunak
  • Cobalt
  • Codoso
  • CopyKittens
  • DarkHydrus
  • Earth Baxia
  • FIN6
  • FIN7
  • Leviathan
  • Mustang Panda
  • Shell Crew
  • Stone Panda
  • TianWu
  • UNC1878
  • UNC2452
  • Winnti Umbrella
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike
{"C2Server": "http://20.25.126.96:443/Sp6d", "User Agent": "User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)\r\n"}
{"Headers": "User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)\r\n", "Type": "Metasploit Download", "URL": "http://20.25.126.96/Sp6d"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\Microsoft\Windows\WER\Temp\WER74FD.tmp.dmpWindows_Trojan_Metasploit_7bc0f998Identifies the API address lookup function leverage by metasploit shellcodeunknown
  • 0x1d5b7:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
C:\ProgramData\Microsoft\Windows\WER\Temp\WER74FD.tmp.dmpWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
  • 0x1d623:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
SourceRuleDescriptionAuthorStrings
00000000.00000002.1881743168.00000000000D0000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
    00000000.00000002.1881743168.00000000000D0000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
      00000000.00000002.1881743168.00000000000D0000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_7bc0f998Identifies the API address lookup function leverage by metasploit shellcodeunknown
      • 0x11:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
      00000000.00000002.1881743168.00000000000D0000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
      • 0x7d:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-26T09:11:25.427863+020020287653Unknown Traffic192.168.2.74970320.25.126.96443TCP
      2024-10-26T09:11:27.573446+020020287653Unknown Traffic192.168.2.74970620.25.126.96443TCP
      2024-10-26T09:11:29.775318+020020287653Unknown Traffic192.168.2.74970920.25.126.96443TCP
      2024-10-26T09:11:32.034352+020020287653Unknown Traffic192.168.2.74971220.25.126.96443TCP
      2024-10-26T09:11:34.164396+020020287653Unknown Traffic192.168.2.74971520.25.126.96443TCP
      2024-10-26T09:11:36.269551+020020287653Unknown Traffic192.168.2.74971820.25.126.96443TCP
      2024-10-26T09:11:38.400931+020020287653Unknown Traffic192.168.2.74972120.25.126.96443TCP
      2024-10-26T09:11:40.513252+020020287653Unknown Traffic192.168.2.74972720.25.126.96443TCP
      2024-10-26T09:11:42.651135+020020287653Unknown Traffic192.168.2.74973220.25.126.96443TCP
      2024-10-26T09:11:44.783807+020020287653Unknown Traffic192.168.2.74973520.25.126.96443TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: Ljrfk7uRvO.exeAvira: detected
      Source: 00000000.00000002.1881743168.00000000000D0000.00000020.00001000.00020000.00000000.sdmpMalware Configuration Extractor: CobaltStrike {"C2Server": "http://20.25.126.96:443/Sp6d", "User Agent": "User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)\r\n"}
      Source: 00000000.00000002.1881743168.00000000000D0000.00000020.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Metasploit {"Headers": "User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)\r\n", "Type": "Metasploit Download", "URL": "http://20.25.126.96/Sp6d"}
      Source: Ljrfk7uRvO.exeReversingLabs: Detection: 86%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: Ljrfk7uRvO.exeJoe Sandbox ML: detected

      Networking

      barindex
      Source: Malware configuration extractorURLs: http://20.25.126.96:443/Sp6d
      Source: Malware configuration extractorURLs: http://20.25.126.96/Sp6d
      Source: Joe Sandbox ViewASN Name: MICROSOFT-CORP-MSN-AS-BLOCKUS MICROSOFT-CORP-MSN-AS-BLOCKUS
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.7:49703 -> 20.25.126.96:443
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.7:49706 -> 20.25.126.96:443
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.7:49712 -> 20.25.126.96:443
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.7:49709 -> 20.25.126.96:443
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.7:49727 -> 20.25.126.96:443
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.7:49718 -> 20.25.126.96:443
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.7:49715 -> 20.25.126.96:443
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.7:49721 -> 20.25.126.96:443
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.7:49735 -> 20.25.126.96:443
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.7:49732 -> 20.25.126.96:443
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
      Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
      Source: Ljrfk7uRvO.exe, 00000000.00000002.1881764104.0000000000164000.00000004.00000020.00020000.00000000.sdmp, Ljrfk7uRvO.exe, 00000000.00000002.1881764104.000000000018F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/
      Source: Ljrfk7uRvO.exe, 00000000.00000003.1515452427.000000000018F000.00000004.00000020.00020000.00000000.sdmp, Ljrfk7uRvO.exe, 00000000.00000003.1526311294.000000000018F000.00000004.00000020.00020000.00000000.sdmp, Ljrfk7uRvO.exe, 00000000.00000003.1493593551.000000000018F000.00000004.00000020.00020000.00000000.sdmp, Ljrfk7uRvO.exe, 00000000.00000003.1482576326.000000000018F000.00000004.00000020.00020000.00000000.sdmp, Ljrfk7uRvO.exe, 00000000.00000003.1504828649.000000000018F000.00000004.00000020.00020000.00000000.sdmp, Ljrfk7uRvO.exe, 00000000.00000002.1881764104.000000000010C000.00000004.00000020.00020000.00000000.sdmp, Ljrfk7uRvO.exe, 00000000.00000002.1881764104.000000000018F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/Sp6d
      Source: Ljrfk7uRvO.exe, 00000000.00000002.1881764104.000000000010C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/Sp6d$
      Source: Ljrfk7uRvO.exe, 00000000.00000002.1881764104.000000000010C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/Sp6dSpace_G
      Source: Ljrfk7uRvO.exe, 00000000.00000002.1881764104.000000000010C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/Sp6dbJ
      Source: Ljrfk7uRvO.exe, 00000000.00000002.1881764104.0000000000164000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/chedvmbusRFCOMM
      Source: Ljrfk7uRvO.exe, 00000000.00000002.1881764104.0000000000164000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/f
      Source: Ljrfk7uRvO.exe, 00000000.00000002.1881764104.000000000018F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/k
      Source: Ljrfk7uRvO.exe, 00000000.00000002.1881764104.000000000018F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/p
      Source: Ljrfk7uRvO.exe, 00000000.00000002.1881764104.000000000018F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/p6d
      Source: Ljrfk7uRvO.exe, 00000000.00000002.1881764104.0000000000164000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/t
      Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
      Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
      Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
      Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
      Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
      Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
      Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
      Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
      Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
      Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443

      System Summary

      barindex
      Source: 00000000.00000002.1881743168.00000000000D0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
      Source: 00000000.00000002.1881743168.00000000000D0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
      Source: C:\ProgramData\Microsoft\Windows\WER\Temp\WER74FD.tmp.dmp, type: DROPPEDMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
      Source: C:\ProgramData\Microsoft\Windows\WER\Temp\WER74FD.tmp.dmp, type: DROPPEDMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5916 -s 1112
      Source: 00000000.00000002.1881743168.00000000000D0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
      Source: 00000000.00000002.1881743168.00000000000D0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
      Source: C:\ProgramData\Microsoft\Windows\WER\Temp\WER74FD.tmp.dmp, type: DROPPEDMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
      Source: C:\ProgramData\Microsoft\Windows\WER\Temp\WER74FD.tmp.dmp, type: DROPPEDMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
      Source: classification engineClassification label: mal100.troj.evad.winEXE@2/5@0/1
      Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5916
      Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\bfe7b994-2b8f-4bf9-b957-a262dd8a2f4eJump to behavior
      Source: Ljrfk7uRvO.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: Ljrfk7uRvO.exeReversingLabs: Detection: 86%
      Source: unknownProcess created: C:\Users\user\Desktop\Ljrfk7uRvO.exe "C:\Users\user\Desktop\Ljrfk7uRvO.exe"
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5916 -s 1112
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
      Source: Ljrfk7uRvO.exeStatic PE information: section name: .xdata
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeCode function: 0_2_000D012B push eax; ret 0_2_000D0387
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeCode function: 0_2_000D0312 push eax; ret 0_2_000D0387
      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exe TID: 5948Thread sleep count: 170 > 30Jump to behavior
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exe TID: 5948Thread sleep time: -1700000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeLast function: Thread delayed
      Source: Amcache.hve.6.drBinary or memory string: VMware
      Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
      Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
      Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
      Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
      Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
      Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
      Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
      Source: Ljrfk7uRvO.exe, 00000000.00000002.1881764104.000000000017E000.00000004.00000020.00020000.00000000.sdmp, Ljrfk7uRvO.exe, 00000000.00000002.1881764104.000000000010C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
      Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
      Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
      Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
      Source: Amcache.hve.6.drBinary or memory string: vmci.sys
      Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
      Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
      Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
      Source: Amcache.hve.6.drBinary or memory string: VMware20,1
      Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
      Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
      Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
      Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
      Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
      Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
      Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
      Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
      Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
      Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
      Source: Ljrfk7uRvO.exe, 00000000.00000002.1881764104.000000000017E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@
      Source: Amcache.hve.6.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
      Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563

      Anti Debugging

      barindex
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_0-943
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeCode function: 0_2_00401180 Sleep,Sleep,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_initterm,GetStartupInfoA,0_2_00401180
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeCode function: 0_2_00402F69 SetUnhandledExceptionFilter,0_2_00402F69
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeCode function: 0_2_00401A70 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort,0_2_00401A70
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeCode function: 0_2_004092E4 SetUnhandledExceptionFilter,0_2_004092E4
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeCode function: 0_2_00401630 CreateNamedPipeA,ConnectNamedPipe,WriteFile,CloseHandle,0_2_00401630
      Source: C:\Users\user\Desktop\Ljrfk7uRvO.exeCode function: 0_2_00401990 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00401990
      Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
      Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
      Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
      Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
      Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000000.00000002.1881743168.00000000000D0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1881743168.00000000000D0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
      DLL Side-Loading
      2
      Process Injection
      11
      Virtualization/Sandbox Evasion
      OS Credential Dumping1
      System Time Discovery
      Remote ServicesData from Local System2
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      2
      Process Injection
      LSASS Memory111
      Security Software Discovery
      Remote Desktop ProtocolData from Removable Media11
      Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
      DLL Side-Loading
      Security Account Manager11
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Obfuscated Files or Information
      NTDS2
      System Information Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      Ljrfk7uRvO.exe87%ReversingLabsWin64.Backdoor.CobaltStrike
      Ljrfk7uRvO.exe100%AviraHEUR/AGEN.1345031
      Ljrfk7uRvO.exe100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://upx.sf.net0%URL Reputationsafe
      No contacted domains info
      NameMaliciousAntivirus DetectionReputation
      http://20.25.126.96/Sp6dtrue
        unknown
        http://20.25.126.96:443/Sp6dtrue
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://20.25.126.96/Sp6dbJLjrfk7uRvO.exe, 00000000.00000002.1881764104.000000000010C000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            https://20.25.126.96/Sp6dLjrfk7uRvO.exe, 00000000.00000003.1515452427.000000000018F000.00000004.00000020.00020000.00000000.sdmp, Ljrfk7uRvO.exe, 00000000.00000003.1526311294.000000000018F000.00000004.00000020.00020000.00000000.sdmp, Ljrfk7uRvO.exe, 00000000.00000003.1493593551.000000000018F000.00000004.00000020.00020000.00000000.sdmp, Ljrfk7uRvO.exe, 00000000.00000003.1482576326.000000000018F000.00000004.00000020.00020000.00000000.sdmp, Ljrfk7uRvO.exe, 00000000.00000003.1504828649.000000000018F000.00000004.00000020.00020000.00000000.sdmp, Ljrfk7uRvO.exe, 00000000.00000002.1881764104.000000000010C000.00000004.00000020.00020000.00000000.sdmp, Ljrfk7uRvO.exe, 00000000.00000002.1881764104.000000000018F000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              https://20.25.126.96/Sp6d$Ljrfk7uRvO.exe, 00000000.00000002.1881764104.000000000010C000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                https://20.25.126.96/Sp6dSpace_GLjrfk7uRvO.exe, 00000000.00000002.1881764104.000000000010C000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  https://20.25.126.96/Ljrfk7uRvO.exe, 00000000.00000002.1881764104.0000000000164000.00000004.00000020.00020000.00000000.sdmp, Ljrfk7uRvO.exe, 00000000.00000002.1881764104.000000000018F000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://20.25.126.96/pLjrfk7uRvO.exe, 00000000.00000002.1881764104.000000000018F000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      https://20.25.126.96/tLjrfk7uRvO.exe, 00000000.00000002.1881764104.0000000000164000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        http://upx.sf.netAmcache.hve.6.drfalse
                        • URL Reputation: safe
                        unknown
                        https://20.25.126.96/kLjrfk7uRvO.exe, 00000000.00000002.1881764104.000000000018F000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          https://20.25.126.96/chedvmbusRFCOMMLjrfk7uRvO.exe, 00000000.00000002.1881764104.0000000000164000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            https://20.25.126.96/p6dLjrfk7uRvO.exe, 00000000.00000002.1881764104.000000000018F000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              https://20.25.126.96/fLjrfk7uRvO.exe, 00000000.00000002.1881764104.0000000000164000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                20.25.126.96
                                unknownUnited States
                                8075MICROSOFT-CORP-MSN-AS-BLOCKUStrue
                                Joe Sandbox version:41.0.0 Charoite
                                Analysis ID:1542740
                                Start date and time:2024-10-26 09:10:08 +02:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 4m 23s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:11
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:Ljrfk7uRvO.exe
                                renamed because original name is a hash value
                                Original Sample Name:8b92f9878021028541ee3ad507b2a08fb3884007cca9b659503693a41589eb22.exe
                                Detection:MAL
                                Classification:mal100.troj.evad.winEXE@2/5@0/1
                                EGA Information:
                                • Successful, ratio: 100%
                                HCA Information:
                                • Successful, ratio: 86%
                                • Number of executed functions: 7
                                • Number of non-executed functions: 15
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                • Excluded IPs from analysis (whitelisted): 20.42.65.92
                                • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                • Not all processes where analyzed, report is missing behavior information
                                • VT rate limit hit for: Ljrfk7uRvO.exe
                                TimeTypeDescription
                                03:11:22API Interceptor195x Sleep call for process: Ljrfk7uRvO.exe modified
                                03:12:05API Interceptor1x Sleep call for process: WerFault.exe modified
                                No context
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                MICROSOFT-CORP-MSN-AS-BLOCKUShttps://www.google.co.uk/url?q=38pQvvq6xRyj7Y00xDjnlx9kIHOSozurMOiaAkImPuQJnOIWtJjqJLi6stjtDz3yh&rct=tTPSrMOiaAkImPuQJnOIWtJjqJLi6stjtFX08pQvvq6xRyj7Y00xDjnlx9kIjusucT&sa=t&url=amp/taxigiarebienhoa.vn/nini/ybmex/captcha/Z3VsYW1yYXN1bC5jaGVwdXdhbGFAY2V2YWxvZ2lzdGljcy5jb20Get hashmaliciousHTMLPhisher, Mamba2FABrowse
                                • 13.107.246.60
                                https://load.aberegg-immobilien.ch/Get hashmaliciousHTMLPhisherBrowse
                                • 40.126.31.73
                                la.bot.arm.elfGet hashmaliciousUnknownBrowse
                                • 22.252.12.135
                                la.bot.m68k.elfGet hashmaliciousUnknownBrowse
                                • 20.57.78.10
                                la.bot.sh4.elfGet hashmaliciousUnknownBrowse
                                • 21.238.75.88
                                la.bot.sh4.elfGet hashmaliciousUnknownBrowse
                                • 40.99.246.89
                                la.bot.mipsel.elfGet hashmaliciousUnknownBrowse
                                • 22.36.15.81
                                la.bot.powerpc.elfGet hashmaliciousUnknownBrowse
                                • 22.23.166.67
                                la.bot.mips.elfGet hashmaliciousUnknownBrowse
                                • 20.189.202.203
                                la.bot.m68k.elfGet hashmaliciousUnknownBrowse
                                • 20.253.255.210
                                No context
                                No context
                                Process:C:\Windows\System32\WerFault.exe
                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):65536
                                Entropy (8bit):0.8896411247310103
                                Encrypted:false
                                SSDEEP:96:SvuFREBUslhMoh7JfqQXIDcQWc6zcEZcw37dhT+HbHg/5jgOg0dl/phsv5o1OyW+:d4BUw0I3DUjZ7yzuiFCZ24lO8S
                                MD5:70EBBB3FC981490BEA3ECD2332644314
                                SHA1:B36CAEE8D9029E52AD46CA986FE54B3C1C2DEA46
                                SHA-256:2F1E791469A87839F142903593D80484C0A65446688F350A47483CE95A44D590
                                SHA-512:F8C8F7B9E5AF0749B67C5CF8EA02B38AB1A8E7983EFFC9E17916642E35EF488CADE85CA8E36880F39840506E05E046756E2430E8A1A33135168135DEE77C427E
                                Malicious:true
                                Reputation:low
                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.4.0.0.3.0.5.2.6.6.7.7.7.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.4.0.0.3.0.5.6.2.6.1.5.7.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.4.7.8.0.5.4.e.-.9.1.0.2.-.4.0.1.6.-.9.d.f.3.-.9.9.2.5.0.4.b.8.e.6.7.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.6.9.b.9.2.2.2.-.5.1.7.1.-.4.c.8.4.-.8.2.8.8.-.c.7.c.e.6.e.2.8.4.d.7.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.L.j.r.f.k.7.u.R.v.O...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.7.1.c.-.0.0.0.1.-.0.0.1.4.-.c.f.e.6.-.9.a.4.2.7.6.2.7.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.6.1.b.9.1.9.6.c.a.7.8.3.3.5.5.0.9.f.7.9.2.3.a.6.f.9.e.e.1.f.8.8.0.0.0.0.f.f.f.f.!.0.0.0.0.9.e.c.a.6.0.1.5.9.7.c.d.9.6.d.3.3.7.b.5.f.e.d.5.4.b.3.9.4.3.b.e.d.1.a.3.5.1.3.7.!.L.j.r.f.k.7.u.R.v.O...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.1.9.7.0././.0.1././.0.1.
                                Process:C:\Windows\System32\WerFault.exe
                                File Type:Mini DuMP crash report, 14 streams, Sat Oct 26 07:11:45 2024, 0x1205a4 type
                                Category:dropped
                                Size (bytes):148478
                                Entropy (8bit):1.3384797411052702
                                Encrypted:false
                                SSDEEP:768:hf2o2wGNPzLDNtJ/Ig/APQydIK3z71Nmz2fittJJRkP2fr:hL4eIymKD71Nmz2fittJJRkP2fr
                                MD5:90A2A2ACD778448FB09B2EBA77F81C3A
                                SHA1:10198C35F10CEB35F39001736FC8BF638AC119DF
                                SHA-256:A39E8F5072AB6EB330A79067198AB0403F2A4A9641DC1B89240BDECFE918622B
                                SHA-512:5CCFF3C767090E9BB3D781B856907968110BAEE83FFFE7404877DBACF8123D407D0846808AE2AFA0EAECA1C22425A57ACAB55CC183F0A4A6545B99FFA20B29CB
                                Malicious:false
                                Yara Hits:
                                • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: C:\ProgramData\Microsoft\Windows\WER\Temp\WER74FD.tmp.dmp, Author: unknown
                                • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: C:\ProgramData\Microsoft\Windows\WER\Temp\WER74FD.tmp.dmp, Author: unknown
                                Reputation:low
                                Preview:MDMP..a..... .......1..g.........................................Z..........T.......8...........T............/..........................................................................................................eJ..............Lw......................T..............g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\System32\WerFault.exe
                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):8796
                                Entropy (8bit):3.7069326538353247
                                Encrypted:false
                                SSDEEP:192:R6l7wVeJpkDK96YNk/fbgmfAmpD089bdt0f3/m:R6lXJpAQ6Y+XbgmfAqd+fO
                                MD5:B90D49017ACF3D4879BF62EB7DFAB705
                                SHA1:E9862062C02C835E3C65B3DB92DC2816E2401642
                                SHA-256:9AEAF5F279F60589C8413F65EC10AC7325663829EA326908DDFBF4FB064D5A74
                                SHA-512:D03FE0F9A51D602EE63E3EBD342E28E71B52E9B2B2B3AB8ACC55F5F012D5E1FCD77FA273A723A6CDEB1D8B2A5C89891833540CB43A95A8BD0BD37519A60C7E6C
                                Malicious:false
                                Reputation:low
                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.9.1.6.<./.P.i.
                                Process:C:\Windows\System32\WerFault.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):4685
                                Entropy (8bit):4.488923446996072
                                Encrypted:false
                                SSDEEP:48:cvIwWl8zsI/Jg771I9P8WpW8VYlYm8M4Jkb4COKFWeyq85gVnONG3sU3LUhQd:uIjfSI7Y17VVJoxLSGr34hQd
                                MD5:EE9BC143DCE5F229FEFA26D14AB4662E
                                SHA1:5595CF1A9A536A1540851FA16C02E5E36227A9ED
                                SHA-256:992215D2BE12C119ED2CC7E7E475CD65892B778D67D26C304460896C39F449E4
                                SHA-512:27B91F04749E93E440DC6F81147D228FECB499BBE5FE7D56896AF48B5FE2A1FCB3E5EA33A378AF42FBC51ED14ABFBEA6C263E4046F69B256323549795959D73E
                                Malicious:false
                                Reputation:low
                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="560054" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                Process:C:\Windows\System32\WerFault.exe
                                File Type:MS Windows registry file, NT/2000 or above
                                Category:dropped
                                Size (bytes):1835008
                                Entropy (8bit):4.416748870454769
                                Encrypted:false
                                SSDEEP:6144:ncifpi6ceLPL9skLmb0mkSWSPtaJG8nAgex285i2MMhA20X4WABlGuNS5+:ci58kSWIZBk2MM6AFBEo
                                MD5:D83CEF64AFFD8DF7DF9246CD4F2EB112
                                SHA1:4ACC3723CCF6C54142936A7AE89D2E2681D9BB4D
                                SHA-256:C3BA1C059284FA865F9AAC9D0D801E1DAD0E3DF7E5513602090942884F99C285
                                SHA-512:00FBE228E4C0F63F93DA6415BFE4FF71149E8C9E021D57ADA3446DBF61E888497159A79CD7175583EC869F13EE26C81CE2B911969D6308EEC852A5B8DE36A49C
                                Malicious:false
                                Reputation:low
                                Preview:regfE...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm>..Pv'...............................................................................................................................................................................................................................................................................................................................................h.d........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                Entropy (8bit):5.241464468454697
                                TrID:
                                • Win64 Executable (generic) (12005/4) 74.80%
                                • Generic Win/DOS Executable (2004/3) 12.49%
                                • DOS Executable Generic (2002/1) 12.47%
                                • VXD Driver (31/22) 0.19%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                                File name:Ljrfk7uRvO.exe
                                File size:19'456 bytes
                                MD5:e1a865386810fdd8cfe6724c251bc236
                                SHA1:9eca601597cd96d337b5fed54b3943bed1a35137
                                SHA256:8b92f9878021028541ee3ad507b2a08fb3884007cca9b659503693a41589eb22
                                SHA512:bd44f655f5dd8d07735622f9035e83b78da6a634745a24327501400465ef892482236071826d7a37cfbae48af2883a0cd3c8c7f4739540ff1b33801b79f13c4b
                                SSDEEP:192:0V7qaCF6Op1t2dobVXujRDcBaXWQjwOT/2JSbTRWF8qa1Dojjgi:mqaCF31cix+Dc4zjCSbYFF46gi
                                TLSH:F292EA3FE71368E8C105D57845FB3733DCB13CB286A6A32E2724D6B42F105A46EAA910
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d................./...."."...H................@............................................... ............................
                                Icon Hash:00928e8e8686b000
                                Entrypoint:0x4014c0
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                                DLL Characteristics:
                                Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                                TLS Callbacks:0x401ba0
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:147442e63270e287ed57d33257638324
                                Instruction
                                dec eax
                                sub esp, 28h
                                dec eax
                                mov eax, dword ptr [00003FF5h]
                                mov dword ptr [eax], 00000001h
                                call 00007FAC28BF61EFh
                                call 00007FAC28BF59DAh
                                nop
                                nop
                                dec eax
                                add esp, 28h
                                ret
                                nop word ptr [eax+eax+00000000h]
                                nop dword ptr [eax]
                                dec eax
                                sub esp, 28h
                                dec eax
                                mov eax, dword ptr [00003FC5h]
                                mov dword ptr [eax], 00000000h
                                call 00007FAC28BF61BFh
                                call 00007FAC28BF59AAh
                                nop
                                nop
                                dec eax
                                add esp, 28h
                                ret
                                nop word ptr [eax+eax+00000000h]
                                nop dword ptr [eax]
                                dec eax
                                sub esp, 28h
                                call 00007FAC28BF7684h
                                dec eax
                                test eax, eax
                                sete al
                                movzx eax, al
                                neg eax
                                dec eax
                                add esp, 28h
                                ret
                                nop
                                nop
                                nop
                                nop
                                nop
                                nop
                                nop
                                dec eax
                                lea ecx, dword ptr [00000009h]
                                jmp 00007FAC28BF5D09h
                                nop dword ptr [eax+00h]
                                ret
                                nop
                                nop
                                nop
                                nop
                                nop
                                nop
                                nop
                                nop
                                nop
                                nop
                                nop
                                nop
                                nop
                                nop
                                nop
                                dec eax
                                jmp ecx
                                dec eax
                                arpl word ptr [00002AC2h], ax
                                test eax, eax
                                jle 00007FAC28BF5D58h
                                cmp dword ptr [00002ABBh], 00000000h
                                jle 00007FAC28BF5D4Fh
                                dec eax
                                mov edx, dword ptr [00007CFEh]
                                dec eax
                                mov dword ptr [ecx+eax], edx
                                dec eax
                                mov edx, dword ptr [00007CFBh]
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x90000x8d8.idata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x60000x2b8.pdata
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x50600x28.rdata
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x92240x1e8.idata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x20a80x22003040ba596609d0f7ba50ac030468b13eFalse0.5708869485294118data5.9208685532060095IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .data0x40000x4f00x6006d1a81d2a0c354f61e4c08017270e9e7False0.673828125dBase III DBT, version number 0, next free block index 10, 1st item "\234\253\2477\207\024$\024\255m\271\236\342\264\342\262\222}\331\025\315\3030\0176\377\011\035Rm\025\240jW\260\266\255Xv\277\253\343\024L\364\234\010X\206\344:Z\221\247\017\007\324\204\024G\235\245\027\\333\375U"5.938441229712016IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rdata0x50000x9100xa00b02c91451e7abad85f4a5bbe48fd6333False0.2421875data4.472912660223878IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                                .pdata0x60000x2b80x400ad5ec754cf0e204a3a3c39436081f3bcFalse0.380859375data2.9668653207491333IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                                .xdata0x70000x2380x4006ce9e303fb86766d702ecb2b174cf348False0.2578125data2.6337753778508075IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                                .bss0x80000x9d00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .idata0x90000x8d80xa00ec8dedb62953693cf02784f71f75d547False0.323828125data3.7083607069283806IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .CRT0xa0000x680x20052d79e9aecf5d5c3145d3ec54aa197a8False0.0703125data0.2709192282599745IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .tls0xb0000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                DLLImport
                                KERNEL32.dllCloseHandle, ConnectNamedPipe, CreateFileA, CreateNamedPipeA, CreateThread, DeleteCriticalSection, EnterCriticalSection, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetLastError, GetModuleHandleA, GetProcAddress, GetStartupInfoA, GetSystemTimeAsFileTime, GetTickCount, InitializeCriticalSection, LeaveCriticalSection, QueryPerformanceCounter, ReadFile, RtlAddFunctionTable, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, SetUnhandledExceptionFilter, Sleep, TerminateProcess, TlsGetValue, UnhandledExceptionFilter, VirtualAlloc, VirtualProtect, VirtualQuery, WriteFile
                                msvcrt.dll__C_specific_handler, __getmainargs, __initenv, __iob_func, __lconv_init, __set_app_type, __setusermatherr, _acmdln, _amsg_exit, _cexit, _fmode, _initterm, _onexit, abort, calloc, exit, fprintf, free, fwrite, malloc, memcpy, signal, sprintf, strlen, strncmp, vfprintf
                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                2024-10-26T09:11:25.427863+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.74970320.25.126.96443TCP
                                2024-10-26T09:11:27.573446+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.74970620.25.126.96443TCP
                                2024-10-26T09:11:29.775318+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.74970920.25.126.96443TCP
                                2024-10-26T09:11:32.034352+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.74971220.25.126.96443TCP
                                2024-10-26T09:11:34.164396+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.74971520.25.126.96443TCP
                                2024-10-26T09:11:36.269551+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.74971820.25.126.96443TCP
                                2024-10-26T09:11:38.400931+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.74972120.25.126.96443TCP
                                2024-10-26T09:11:40.513252+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.74972720.25.126.96443TCP
                                2024-10-26T09:11:42.651135+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.74973220.25.126.96443TCP
                                2024-10-26T09:11:44.783807+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.74973520.25.126.96443TCP
                                TimestampSource PortDest PortSource IPDest IP
                                Oct 26, 2024 09:11:24.347485065 CEST49703443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:24.347515106 CEST4434970320.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:24.347609043 CEST49703443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:24.360912085 CEST49703443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:24.360923052 CEST4434970320.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:25.427726984 CEST4434970320.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:25.427862883 CEST49703443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:25.428028107 CEST49703443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:25.428047895 CEST4434970320.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:25.428662062 CEST49704443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:25.428721905 CEST4434970420.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:25.428802967 CEST49704443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:25.429037094 CEST49704443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:25.429054022 CEST4434970420.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:26.486571074 CEST4434970420.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:26.486833096 CEST49704443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:26.486887932 CEST49704443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:26.486915112 CEST4434970420.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:26.487579107 CEST49705443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:26.487634897 CEST4434970520.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:26.487719059 CEST49705443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:26.487885952 CEST49705443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:26.487919092 CEST4434970520.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:26.487973928 CEST49705443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:26.495556116 CEST49706443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:26.495594025 CEST4434970620.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:26.495697021 CEST49706443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:26.496076107 CEST49706443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:26.496089935 CEST4434970620.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:27.573246956 CEST4434970620.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:27.573446035 CEST49706443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:27.589557886 CEST49706443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:27.589582920 CEST4434970620.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:27.645404100 CEST49707443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:27.645457983 CEST4434970720.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:27.645535946 CEST49707443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:27.645925045 CEST49707443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:27.645942926 CEST4434970720.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:28.712574005 CEST4434970720.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:28.712678909 CEST49707443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:28.712812901 CEST49707443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:28.712831974 CEST4434970720.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:28.715961933 CEST49708443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:28.716017962 CEST4434970820.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:28.716114044 CEST49708443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:28.716204882 CEST49708443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:28.716232061 CEST4434970820.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:28.716270924 CEST49708443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:28.717173100 CEST49709443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:28.717210054 CEST4434970920.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:28.717278004 CEST49709443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:28.717515945 CEST49709443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:28.717525959 CEST4434970920.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:29.775165081 CEST4434970920.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:29.775317907 CEST49709443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:29.775398970 CEST49709443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:29.775412083 CEST4434970920.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:29.779630899 CEST49710443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:29.779685020 CEST4434971020.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:29.779774904 CEST49710443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:29.780332088 CEST49710443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:29.780364990 CEST4434971020.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:30.842201948 CEST4434971020.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:30.842298985 CEST49710443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:30.861244917 CEST49710443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:30.861290932 CEST4434971020.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:30.945029020 CEST49711443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:30.945075035 CEST4434971120.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:30.945152044 CEST49711443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:30.945280075 CEST49711443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:30.945344925 CEST4434971120.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:30.945406914 CEST49711443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:30.985575914 CEST49712443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:30.985620975 CEST4434971220.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:30.985682011 CEST49712443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:30.987669945 CEST49712443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:30.987687111 CEST4434971220.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:32.034229994 CEST4434971220.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:32.034352064 CEST49712443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:32.034440041 CEST49712443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:32.034466982 CEST4434971220.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:32.035149097 CEST49713443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:32.035171032 CEST4434971320.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:32.035252094 CEST49713443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:32.035475016 CEST49713443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:32.035487890 CEST4434971320.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:33.103915930 CEST4434971320.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:33.104166985 CEST49713443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:33.104166985 CEST49713443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:33.104847908 CEST49714443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:33.104898930 CEST4434971420.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:33.104975939 CEST49714443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:33.105093002 CEST49714443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:33.105210066 CEST4434971420.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:33.105269909 CEST49714443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:33.106197119 CEST49715443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:33.106262922 CEST4434971520.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:33.106347084 CEST49715443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:33.106687069 CEST49715443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:33.106704950 CEST4434971520.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:33.418685913 CEST49713443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:33.418730974 CEST4434971320.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:34.164303064 CEST4434971520.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:34.164396048 CEST49715443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:34.164522886 CEST49715443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:34.164571047 CEST4434971520.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:34.165323973 CEST49716443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:34.165364981 CEST4434971620.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:34.165432930 CEST49716443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:34.165731907 CEST49716443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:34.165745974 CEST4434971620.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:35.215598106 CEST4434971620.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:35.215722084 CEST49716443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:35.215816975 CEST49716443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:35.215826988 CEST4434971620.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:35.216649055 CEST49717443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:35.216691017 CEST4434971720.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:35.216758013 CEST49717443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:35.216845989 CEST49717443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:35.216867924 CEST4434971720.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:35.216929913 CEST49717443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:35.217917919 CEST49718443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:35.217945099 CEST4434971820.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:35.217999935 CEST49718443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:35.218261003 CEST49718443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:35.218272924 CEST4434971820.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:36.269315958 CEST4434971820.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:36.269551039 CEST49718443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:36.269771099 CEST49718443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:36.269790888 CEST4434971820.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:36.270736933 CEST49719443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:36.270804882 CEST4434971920.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:36.270912886 CEST49719443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:36.271197081 CEST49719443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:36.271213055 CEST4434971920.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:37.335484028 CEST4434971920.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:37.335628033 CEST49719443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:37.351965904 CEST49719443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:37.352026939 CEST4434971920.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:37.352752924 CEST49720443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:37.352788925 CEST4434972020.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:37.352880955 CEST49720443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:37.352941990 CEST49720443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:37.353086948 CEST4434972020.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:37.353144884 CEST49720443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:37.355560064 CEST49721443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:37.355616093 CEST4434972120.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:37.355676889 CEST49721443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:37.355902910 CEST49721443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:37.355918884 CEST4434972120.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:38.400852919 CEST4434972120.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:38.400930882 CEST49721443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:38.401042938 CEST49721443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:38.401060104 CEST4434972120.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:38.401768923 CEST49723443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:38.401798010 CEST4434972320.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:38.401873112 CEST49723443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:38.402172089 CEST49723443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:38.402185917 CEST4434972320.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:39.445089102 CEST4434972320.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:39.445166111 CEST49723443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:39.445269108 CEST49723443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:39.445290089 CEST4434972320.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:39.445868015 CEST49726443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:39.445914984 CEST4434972620.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:39.445992947 CEST49726443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:39.446156025 CEST49726443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:39.446213961 CEST4434972620.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:39.446309090 CEST49726443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:39.447244883 CEST49727443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:39.447283030 CEST4434972720.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:39.447393894 CEST49727443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:39.447643042 CEST49727443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:39.447657108 CEST4434972720.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:40.513101101 CEST4434972720.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:40.513252020 CEST49727443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:40.513289928 CEST49727443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:40.513315916 CEST4434972720.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:40.513863087 CEST49730443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:40.513899088 CEST4434973020.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:40.514061928 CEST49730443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:40.514246941 CEST49730443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:40.514262915 CEST4434973020.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:41.563702106 CEST4434973020.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:41.563853979 CEST49730443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:41.564079046 CEST49730443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:41.564096928 CEST4434973020.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:41.564644098 CEST49731443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:41.564681053 CEST4434973120.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:41.564815998 CEST49731443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:41.564949989 CEST49731443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:41.564980984 CEST4434973120.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:41.565120935 CEST49731443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:41.566339970 CEST49732443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:41.566389084 CEST4434973220.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:41.566450119 CEST49732443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:41.566875935 CEST49732443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:41.566891909 CEST4434973220.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:42.651056051 CEST4434973220.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:42.651134968 CEST49732443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:42.654162884 CEST49732443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:42.654185057 CEST4434973220.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:42.658229113 CEST49733443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:42.658274889 CEST4434973320.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:42.658348083 CEST49733443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:42.665616989 CEST49733443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:42.665632010 CEST4434973320.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:43.708178997 CEST4434973320.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:43.711437941 CEST49733443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:43.711529016 CEST49733443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:43.711549997 CEST4434973320.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:43.712038040 CEST49734443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:43.712101936 CEST4434973420.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:43.715440989 CEST49734443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:43.716020107 CEST49734443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:43.716059923 CEST4434973420.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:43.716119051 CEST49734443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:43.718342066 CEST49735443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:43.718369961 CEST4434973520.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:43.718564987 CEST49735443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:43.718791962 CEST49735443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:43.718803883 CEST4434973520.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:44.783668041 CEST4434973520.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:44.783807039 CEST49735443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:44.783896923 CEST49735443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:44.783915043 CEST4434973520.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:44.784646988 CEST49736443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:44.784755945 CEST4434973620.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:44.784847975 CEST49736443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:44.785063028 CEST49736443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:44.785100937 CEST4434973620.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:45.839387894 CEST4434973620.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:45.839500904 CEST49736443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:45.839595079 CEST49736443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:45.839622021 CEST4434973620.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:45.840228081 CEST49737443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:45.840272903 CEST4434973720.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:45.840353966 CEST49737443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:45.840445995 CEST49737443192.168.2.720.25.126.96
                                Oct 26, 2024 09:11:45.840465069 CEST4434973720.25.126.96192.168.2.7
                                Oct 26, 2024 09:11:45.840512991 CEST49737443192.168.2.720.25.126.96

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:03:11:21
                                Start date:26/10/2024
                                Path:C:\Users\user\Desktop\Ljrfk7uRvO.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Users\user\Desktop\Ljrfk7uRvO.exe"
                                Imagebase:0x400000
                                File size:19'456 bytes
                                MD5 hash:E1A865386810FDD8CFE6724C251BC236
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.1881743168.00000000000D0000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.1881743168.00000000000D0000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000002.1881743168.00000000000D0000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000002.1881743168.00000000000D0000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
                                Reputation:low
                                Has exited:true

                                Target ID:6
                                Start time:03:11:45
                                Start date:26/10/2024
                                Path:C:\Windows\System32\WerFault.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\WerFault.exe -u -p 5916 -s 1112
                                Imagebase:0x7ff755c30000
                                File size:570'736 bytes
                                MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:12.6%
                                  Dynamic/Decrypted Code Coverage:0.9%
                                  Signature Coverage:14.3%
                                  Total number of Nodes:217
                                  Total number of Limit Nodes:6
                                  execution_graph 937 4014c0 942 401990 937->942 939 4014d6 946 401180 939->946 941 4014db 943 4019d0 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 942->943 944 4019b9 942->944 945 401a2b 943->945 944->939 945->939 947 401460 GetStartupInfoA 946->947 948 4011b4 946->948 950 4013b4 947->950 949 4011e1 Sleep 948->949 953 4011f6 948->953 949->948 950->941 951 401229 964 401fd0 951->964 952 40142c _initterm 952->951 953->950 953->951 953->952 955 401251 SetUnhandledExceptionFilter 984 4024e0 955->984 957 40126d 958 40130e malloc 957->958 959 401335 958->959 960 40137b 958->960 961 401340 strlen malloc memcpy 959->961 990 403040 960->990 961->961 962 401376 961->962 962->960 969 402008 964->969 983 401ff2 964->983 965 402240 966 40223a 965->966 965->983 966->965 970 401dc0 8 API calls 966->970 971 40228c 966->971 967 4021ce 967->971 995 401dc0 967->995 968 4022a8 972 401d50 8 API calls 968->972 969->965 969->967 969->968 979 4020b0 969->979 969->983 970->966 1025 401d50 971->1025 976 4022b4 972->976 973 402208 977 401dc0 8 API calls 973->977 976->955 977->966 978 401dc0 8 API calls 978->979 979->967 979->971 979->973 979->978 980 402156 979->980 981 402160 979->981 980->981 982 402192 VirtualProtect 981->982 981->983 982->981 983->955 986 4024ef 984->986 985 40251c 985->957 986->985 1055 402a80 986->1055 988 402517 988->985 989 4025c5 RtlAddFunctionTable 988->989 989->985 991 40304a 990->991 1059 4017f8 GetTickCount 991->1059 994 403058 SleepEx 994->994 996 401f64 995->996 997 401de2 995->997 996->973 998 401e90 997->998 999 401fa2 997->999 1000 401e2b 997->1000 1001 401eb9 998->1001 1004 401d50 4 API calls 998->1004 1002 401d50 4 API calls 999->1002 1003 401e4c VirtualQuery 1000->1003 1001->973 1002->998 1003->998 1005 401e78 1003->1005 1022 401fcc 1004->1022 1005->998 1006 401f20 VirtualProtect 1005->1006 1006->998 1007 401f50 GetLastError 1006->1007 1009 401d50 4 API calls 1007->1009 1008 401ff2 1008->973 1009->996 1010 4021ce 1014 40228c 1010->1014 1018 401dc0 4 API calls 1010->1018 1011 4022a8 1015 401d50 4 API calls 1011->1015 1012 401dc0 4 API calls 1013 40223a 1012->1013 1013->1008 1013->1012 1013->1014 1017 401d50 4 API calls 1014->1017 1019 4022b4 1015->1019 1016 402208 1020 401dc0 4 API calls 1016->1020 1017->1011 1018->1016 1019->973 1020->1013 1021 401dc0 VirtualQuery VirtualProtect GetLastError VirtualProtect 1021->1022 1022->1008 1022->1010 1022->1011 1022->1013 1022->1014 1022->1016 1022->1021 1023 402156 1022->1023 1023->1008 1024 402192 VirtualProtect 1023->1024 1024->1023 1027 401d7d 1025->1027 1026 401f64 1026->968 1027->1026 1028 401e90 1027->1028 1029 401fa2 1027->1029 1030 401e2b 1027->1030 1031 401eb9 1028->1031 1034 401d50 4 API calls 1028->1034 1032 401d50 4 API calls 1029->1032 1033 401e4c VirtualQuery 1030->1033 1031->968 1032->1028 1033->1028 1035 401e78 1033->1035 1050 401fcc 1034->1050 1035->1028 1036 401f20 VirtualProtect 1035->1036 1036->1028 1037 401f50 GetLastError 1036->1037 1038 401d50 4 API calls 1037->1038 1038->1026 1039 4021ce 1044 40228c 1039->1044 1048 401dc0 4 API calls 1039->1048 1040 4022a8 1045 401d50 4 API calls 1040->1045 1041 401dc0 4 API calls 1043 40223a 1041->1043 1042 401ff2 1042->968 1043->1041 1043->1042 1043->1044 1047 401d50 4 API calls 1044->1047 1049 4022b4 1045->1049 1046 402208 1051 401dc0 4 API calls 1046->1051 1047->1040 1048->1046 1049->968 1050->1039 1050->1040 1050->1042 1050->1043 1050->1044 1050->1046 1052 401dc0 VirtualQuery VirtualProtect GetLastError VirtualProtect 1050->1052 1053 402156 1050->1053 1051->1043 1052->1050 1053->1042 1054 402192 VirtualProtect 1053->1054 1054->1053 1057 402a90 1055->1057 1056 402afe 1056->988 1057->1056 1058 402ae9 strncmp 1057->1058 1058->1056 1058->1057 1060 402e28 1059->1060 1061 401866 CreateThread 1060->1061 1062 4017a6 malloc 1061->1062 1077 4016e6 1061->1077 1063 4017c8 SleepEx 1062->1063 1069 401704 CreateFileA 1063->1069 1066 4017de 1074 401595 VirtualAlloc 1066->1074 1068 4017ed 1068->994 1070 40179c 1069->1070 1071 40175e 1069->1071 1070->1063 1070->1066 1072 401781 CloseHandle 1071->1072 1073 401762 ReadFile 1071->1073 1072->1070 1073->1071 1073->1072 1075 4015c7 1074->1075 1076 4015e8 VirtualProtect CreateThread 1075->1076 1076->1068 1080 401630 CreateNamedPipeA 1077->1080 1081 4016dc 1080->1081 1082 40168f ConnectNamedPipe 1080->1082 1082->1081 1083 4016a3 1082->1083 1084 4016c6 CloseHandle 1083->1084 1085 4016a7 WriteFile 1083->1085 1084->1081 1085->1084 1086 4016d1 1085->1086 1086->1083 1089 401c40 1090 401c5f 1089->1090 1091 401c9d fprintf 1090->1091 1155 402880 1156 4028a0 EnterCriticalSection 1155->1156 1157 402891 1155->1157 1158 4028e3 LeaveCriticalSection 1156->1158 1159 4028b9 1156->1159 1159->1158 1160 4028de free 1159->1160 1160->1158 1161 403009 CreateThread 1162 401010 1164 401058 1162->1164 1163 40107a __set_app_type 1165 401084 1163->1165 1164->1163 1164->1165 1092 402352 signal 1093 402368 signal 1092->1093 1094 40237c 1092->1094 1093->1094 1095 402fd9 GetLastError 1169 403019 CreateFileA 1099 4025e0 1100 402602 1099->1100 1101 402718 signal 1100->1101 1103 402683 signal 1100->1103 1105 402614 1100->1105 1101->1100 1102 402779 signal 1101->1102 1103->1100 1104 402740 signal 1103->1104 1104->1105 1173 401ba0 1174 401bb2 1173->1174 1175 402910 3 API calls 1174->1175 1177 401bc2 1174->1177 1176 401c15 1175->1176 1087 d012b HttpOpenRequestA 1088 d0152 1087->1088 1106 402f69 SetUnhandledExceptionFilter 1107 4026e9 signal 1108 402760 signal 1107->1108 1109 402602 1107->1109 1110 402718 signal 1109->1110 1112 402683 signal 1109->1112 1114 402614 1109->1114 1110->1109 1111 402779 signal 1110->1111 1112->1109 1113 402740 signal 1112->1113 1113->1114 1178 402fa9 InitializeCriticalSection 1179 40262e signal 1180 402644 signal 1179->1180 1182 402602 1179->1182 1181 402614 1180->1181 1182->1181 1183 402718 signal 1182->1183 1185 402683 signal 1182->1185 1183->1182 1184 402779 signal 1183->1184 1185->1182 1186 402740 signal 1185->1186 1186->1181 1115 401a70 RtlCaptureContext RtlLookupFunctionEntry 1116 401b4d 1115->1116 1117 401aad RtlVirtualUnwind 1115->1117 1118 401ae3 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess abort 1116->1118 1117->1118 1118->1116 1119 401b70 1120 401b79 1119->1120 1121 401b7d 1120->1121 1124 402910 1120->1124 1123 401b95 1125 4029e0 1124->1125 1126 40291e 1124->1126 1125->1123 1127 40292e 1126->1127 1128 402924 1126->1128 1130 402970 1126->1130 1127->1123 1128->1127 1129 402960 InitializeCriticalSection 1128->1129 1129->1127 1130->1127 1131 4029b1 DeleteCriticalSection 1130->1131 1132 4029a0 free 1130->1132 1131->1127 1132->1131 1132->1132 1133 4014f0 1134 401990 5 API calls 1133->1134 1135 401506 1134->1135 1136 401180 34 API calls 1135->1136 1137 40150b 1136->1137 1187 402f31 VirtualQuery 1141 4027f6 1142 402820 1141->1142 1143 402816 1141->1143 1142->1143 1144 402837 EnterCriticalSection LeaveCriticalSection 1142->1144 1145 4023f7 signal 1146 4024a0 signal 1145->1146 1147 40237f 1145->1147 1151 402f79 RtlLookupFunctionEntry

                                  Callgraph

                                  • Executed
                                  • Not Executed
                                  • Opacity -> Relevance
                                  • Disassembly available
                                  callgraph 0 Function_00401C40 6 Function_00402EC0 0->6 1 Function_00401540 2 Function_00401D40 3 Function_004014C0 51 Function_00401180 3->51 63 Function_00401990 3->63 4 Function_00403040 12 Function_00401950 4->12 41 Function_004017F8 4->41 5 Function_00401DC0 5->5 10 Function_00401D50 5->10 11 Function_00402C50 5->11 13 Function_00402DD0 5->13 72 Function_00402B20 5->72 85 Function_00402BB0 5->85 7 Function_00409244 8 Function_000D0000 9 Function_00401FD0 9->5 9->10 9->13 9->85 10->5 10->6 10->10 10->11 10->13 10->72 10->85 35 Function_004029F0 11->35 14 Function_00402352 14->2 15 Function_004092D4 16 Function_000D0298 17 Function_004051D7 18 Function_00402FD9 19 Function_000D0312 20 Function_004024E0 20->11 21 Function_00402BE0 20->21 49 Function_00402A80 20->49 21->35 22 Function_00401CE0 22->6 23 Function_004025E0 24 Function_00402EE0 25 Function_00401563 26 Function_004092E4 27 Function_004016E6 81 Function_00401630 27->81 28 Function_000D012B 29 Function_00402F69 30 Function_004026E9 31 Function_00401A70 32 Function_00401B70 60 Function_00402910 32->60 33 Function_004014F0 33->51 33->63 34 Function_00402EF0 36 Function_00401CF0 36->6 37 Function_00401972 38 Function_00409274 39 Function_004027F6 40 Function_004023F7 41->27 53 Function_00401704 41->53 67 Function_00401595 41->67 42 Function_00401C78 42->6 43 Function_00402F79 44 Function_004052F9 45 Function_000D02B6 46 Function_00401980 47 Function_00402C80 47->35 48 Function_00401D00 48->6 49->35 50 Function_00402880 51->2 51->4 51->9 51->12 51->20 51->34 52 Function_00402F00 51->52 54 Function_00409304 55 Function_00405305 56 Function_00403009 57 Function_0040930C 58 Function_00402F10 59 Function_00401010 59->46 59->58 60->2 61 Function_00401D10 61->6 62 Function_00402D10 62->35 64 Function_00405311 65 Function_00402A12 66 Function_00409314 67->25 68 Function_00403019 69 Function_00402E99 70 Function_0040931C 71 Function_00401520 72->35 73 Function_00401D20 73->6 74 Function_00401BA0 74->60 75 Function_004018A0 76 Function_004092A4 77 Function_00402EA9 78 Function_00402FA9 79 Function_0040262E 79->2 80 Function_000D01E2 82 Function_00401130 83 Function_00401C30 84 Function_00402A30 85->35 86 Function_00402F31 87 Function_00409234

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 10 401180-4011ae 11 401460-401463 GetStartupInfoA 10->11 12 4011b4-4011d1 10->12 14 401470-40148a call 402e88 11->14 13 4011e9-4011f4 12->13 15 4011f6-401204 13->15 16 4011d8-4011db 13->16 20 401417-401426 call 402e90 15->20 21 40120a-40120e 15->21 18 401400-401411 16->18 19 4011e1-4011e6 Sleep 16->19 18->20 18->21 19->13 26 401229-40122b 20->26 27 40142c-401447 _initterm 20->27 24 401490-4014a9 call 402e80 21->24 25 401214-401223 21->25 36 4014ae-4014b6 call 402e60 24->36 25->26 25->27 30 401231-40123e 26->30 31 40144d-401452 26->31 27->30 27->31 33 401240-401248 30->33 34 40124c-401299 call 401fd0 SetUnhandledExceptionFilter call 4024e0 call 402ef0 call 401d40 call 402f00 30->34 31->30 33->34 48 4012b2-4012b8 34->48 49 40129b 34->49 51 4012a0-4012a2 48->51 52 4012ba-4012c8 48->52 50 4012f0-4012f6 49->50 56 4012f8-401302 50->56 57 40130e-401333 malloc 50->57 53 4012a4-4012a7 51->53 54 4012e9 51->54 55 4012ae 52->55 58 4012d0-4012d2 53->58 59 4012a9 53->59 54->50 55->48 60 4013f0-4013f5 56->60 61 401308 56->61 62 401335-40133a 57->62 63 40137b-4013af call 401950 call 403040 57->63 58->54 66 4012d4 58->66 59->55 60->61 61->57 64 401340-401374 strlen malloc memcpy 62->64 72 4013b4-4013c2 63->72 64->64 67 401376 64->67 69 4012d8-4012e2 66->69 67->63 69->54 71 4012e4-4012e7 69->71 71->54 71->69 72->36 73 4013c8-4013d0 72->73 73->14 74 4013d6-4013e5 73->74
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1882022563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1882000489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882044750.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882068118.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882091531.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Ljrfk7uRvO.jbxd
                                  Similarity
                                  • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandledmemcpystrlen
                                  • String ID: @P@
                                  • API String ID: 649803965-1136412694
                                  • Opcode ID: b78087a4727109617a980b8b34e7f88b19eb7fde71d655465aeb3eeb3b98bcac
                                  • Instruction ID: 0837f65e99a2b31b617579b96e5607858f818787d00fb595da640d4b13c89ff1
                                  • Opcode Fuzzy Hash: b78087a4727109617a980b8b34e7f88b19eb7fde71d655465aeb3eeb3b98bcac
                                  • Instruction Fuzzy Hash: FB7199B2601B0486EB259F56E99476A33A1F745B88F84803BEF49773A1DF7CC884C748

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 75 401630-40168d CreateNamedPipeA 76 4016dc-4016e5 75->76 77 40168f-4016a1 ConnectNamedPipe 75->77 77->76 78 4016a3-4016a5 77->78 79 4016c6-4016cf CloseHandle 78->79 80 4016a7-4016c4 WriteFile 78->80 79->76 80->79 81 4016d1-4016da 80->81 81->78
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1882022563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1882000489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882044750.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882068118.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882091531.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Ljrfk7uRvO.jbxd
                                  Similarity
                                  • API ID: NamedPipe$CloseConnectCreateFileHandleWrite
                                  • String ID:
                                  • API String ID: 2239253087-0
                                  • Opcode ID: c91bc22eb4ab6627967eacdcd294d58c4f35a533641819062c461ff4691d2373
                                  • Instruction ID: 792960597df4a3593b3ed71ec0f1f42691249fcecf88183cb5a5311cb3ffe816
                                  • Opcode Fuzzy Hash: c91bc22eb4ab6627967eacdcd294d58c4f35a533641819062c461ff4691d2373
                                  • Instruction Fuzzy Hash: 7311A57171464487E7208B12EC4871B7660B785BA4F588639EF59277E4DF7DC409CB08

                                  Control-flow Graph

                                  APIs
                                  • malloc.MSVCRT ref: 004017B9
                                  • SleepEx.KERNELBASE ref: 004017CD
                                    • Part of subcall function 00401704: CreateFileA.KERNEL32 ref: 0040174D
                                    • Part of subcall function 00401704: ReadFile.KERNEL32 ref: 00401777
                                    • Part of subcall function 00401704: CloseHandle.KERNEL32 ref: 00401784
                                  • GetTickCount.KERNEL32 ref: 004017FC
                                  • CreateThread.KERNEL32 ref: 00401885
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1882022563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1882000489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882044750.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882068118.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882091531.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Ljrfk7uRvO.jbxd
                                  Similarity
                                  • API ID: CreateFile$CloseCountHandleReadSleepThreadTickmalloc
                                  • String ID: @@$%c%c%c%c%c%c%c%c%cMSSE-%d-server$.$\$\$e$i$p$p
                                  • API String ID: 3660650057-1020837823
                                  • Opcode ID: f49c4c9a7e10605904a6a10e00f2c520319c1cb0802325312295c4206e11c210
                                  • Instruction ID: b1b191c08856ce7a5ac3e1961f061f1fb3c952ac0291ac520aaac2e6cde2bc09
                                  • Opcode Fuzzy Hash: f49c4c9a7e10605904a6a10e00f2c520319c1cb0802325312295c4206e11c210
                                  • Instruction Fuzzy Hash: BB11E1B2214A80C6F714DF62F84975BBBA0F384749F44412ADB49277A8CB7CC445CF48

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 82 401595-4015c5 VirtualAlloc 83 4015c7-4015c9 82->83 84 4015e0-40162c call 401563 VirtualProtect CreateThread 83->84 85 4015cb-4015de 83->85 85->83
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1882022563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1882000489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882044750.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882068118.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882091531.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Ljrfk7uRvO.jbxd
                                  Similarity
                                  • API ID: Virtual$AllocCreateProtectThread
                                  • String ID:
                                  • API String ID: 3039780055-0
                                  • Opcode ID: 4aacca1e8eccfaf740ded84acdafb972c0e8b5e828dd24c9fd05ba3d77ec4f75
                                  • Instruction ID: a871edb487987511a762a7aedd3aa3d9a3b96542bc8ba466cbe2f33faf2e38cc
                                  • Opcode Fuzzy Hash: 4aacca1e8eccfaf740ded84acdafb972c0e8b5e828dd24c9fd05ba3d77ec4f75
                                  • Instruction Fuzzy Hash: 3D012B9231558051E7249B73AC08B9AAA91A38DBC9F48C139EF4B5BBA5DA3CC505C708

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 88 401704-40175c CreateFileA 89 40179c-4017a5 88->89 90 40175e-401760 88->90 91 401781-40178f CloseHandle 90->91 92 401762-40177f ReadFile 90->92 91->89 92->91 93 401791-40179a 92->93 93->90
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1882022563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1882000489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882044750.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882068118.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882091531.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Ljrfk7uRvO.jbxd
                                  Similarity
                                  • API ID: File$CloseCreateHandleRead
                                  • String ID:
                                  • API String ID: 1035965006-0
                                  • Opcode ID: a9a6f3105b428fa11eb0a8b9509746e60382a865a5325daa86df34bad7210379
                                  • Instruction ID: 40b2c8f30f00ef97869f90130fa51706c158e82a26dd4cfec866ebc6162fc2d5
                                  • Opcode Fuzzy Hash: a9a6f3105b428fa11eb0a8b9509746e60382a865a5325daa86df34bad7210379
                                  • Instruction Fuzzy Hash: 2101F77531460186E7219B16F90471776A0B394BA4F648339EFA917BD4DB7DC50ACB08

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 94 d012b-d0151 HttpOpenRequestA 95 d0152-d018e 94->95 98 d0194-d0197 95->98 99 d0331-d0352 95->99 100 d019d 98->100 101 d0329-d032a 98->101 104 d0354-d0371 99->104 100->95 101->99 104->101 106 d0373-d037b 104->106 106->104 107 d037d-d0387 106->107
                                  APIs
                                  • HttpOpenRequestA.WININET(00000000,00000000,84C03200,00000000), ref: 000D0146
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1881743168.00000000000D0000.00000020.00001000.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d0000_Ljrfk7uRvO.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: HttpOpenRequest
                                  • String ID: U.;
                                  • API String ID: 1984915467-4213443877
                                  • Opcode ID: 384db265c013720a470dfad14405f5eea7b7aafc50a111f5be8b2763f8998fcb
                                  • Instruction ID: b043179f8e7ab60c6ca85c4edca9a9e742e03efe6a78e8fd4646591d42716523
                                  • Opcode Fuzzy Hash: 384db265c013720a470dfad14405f5eea7b7aafc50a111f5be8b2763f8998fcb
                                  • Instruction Fuzzy Hash: 6B116D6034890D1BF62C91AE7C5A73A21CAD7D8765F24812FB54EC33D6DC68CC82416A

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 108 403040-403051 call 401950 call 4017f8 113 403058-40305f SleepEx 108->113 113->113
                                  APIs
                                    • Part of subcall function 004017F8: malloc.MSVCRT ref: 004017B9
                                    • Part of subcall function 004017F8: SleepEx.KERNELBASE ref: 004017CD
                                    • Part of subcall function 004017F8: GetTickCount.KERNEL32 ref: 004017FC
                                    • Part of subcall function 004017F8: CreateThread.KERNEL32 ref: 00401885
                                  • SleepEx.KERNELBASE(?,?,?,004013B4), ref: 0040305D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1882022563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1882000489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882044750.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882068118.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882091531.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Ljrfk7uRvO.jbxd
                                  Similarity
                                  • API ID: Sleep$CountCreateThreadTickmalloc
                                  • String ID:
                                  • API String ID: 345437100-0
                                  • Opcode ID: b6d36b54cf31cf0f426623e933f06735054b4a30bed8d9593c1a6858c86775c1
                                  • Instruction ID: 8364c3e29ff4e62ba415e97045e67fc6fb748e7a580f304519b0ce082c56ecd4
                                  • Opcode Fuzzy Hash: b6d36b54cf31cf0f426623e933f06735054b4a30bed8d9593c1a6858c86775c1
                                  • Instruction Fuzzy Hash: B4C022A030208880EF08B3B280AB32E0A080B08388F0C083FEF0B322E28C3CC000030E

                                  Control-flow Graph

                                  APIs
                                  • RtlCaptureContext.KERNEL32 ref: 00401A84
                                  • RtlLookupFunctionEntry.KERNEL32 ref: 00401A9B
                                  • RtlVirtualUnwind.KERNEL32 ref: 00401ADD
                                  • SetUnhandledExceptionFilter.KERNEL32 ref: 00401B21
                                  • UnhandledExceptionFilter.KERNEL32 ref: 00401B2E
                                  • GetCurrentProcess.KERNEL32 ref: 00401B34
                                  • TerminateProcess.KERNEL32 ref: 00401B42
                                  • abort.MSVCRT ref: 00401B48
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1882022563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1882000489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882044750.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882068118.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882091531.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Ljrfk7uRvO.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentEntryFunctionLookupTerminateUnwindVirtualabort
                                  • String ID:
                                  • API String ID: 4278921479-0
                                  • Opcode ID: 27e43dfa7ef0e7d63c314b0127c2fc61b110ad3033d9dc91a01dad9a926d3ef7
                                  • Instruction ID: cf336b0ec7d2cb6baae35a739632777ca23f94a65b3f666190a75c6fcbb7d788
                                  • Opcode Fuzzy Hash: 27e43dfa7ef0e7d63c314b0127c2fc61b110ad3033d9dc91a01dad9a926d3ef7
                                  • Instruction Fuzzy Hash: B5210FB5202F45E9EB009B61F98438A33B4BB08B88F40452ADF8E27775EF38C519C708

                                  Control-flow Graph

                                  APIs
                                  • GetSystemTimeAsFileTime.KERNEL32 ref: 004019D5
                                  • GetCurrentProcessId.KERNEL32 ref: 004019E0
                                  • GetCurrentThreadId.KERNEL32 ref: 004019E8
                                  • GetTickCount.KERNEL32 ref: 004019F0
                                  • QueryPerformanceCounter.KERNEL32 ref: 004019FE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1882022563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1882000489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882044750.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882068118.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882091531.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Ljrfk7uRvO.jbxd
                                  Similarity
                                  • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                  • String ID:
                                  • API String ID: 1445889803-0
                                  • Opcode ID: 180d7ae7fc5b59493381c36575e32c3318445472d573a77b1124f7da9349a765
                                  • Instruction ID: 088ae4e322ac71afa1741572681cd55a149c1471ea95f8004f9c9491386c013f
                                  • Opcode Fuzzy Hash: 180d7ae7fc5b59493381c36575e32c3318445472d573a77b1124f7da9349a765
                                  • Instruction Fuzzy Hash: AA1170A6756B1092FB209B25F90431973A0B788BF4F081A759F9D53BB4DA3CC986C708
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1882091531.0000000000409000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1882000489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882022563.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882044750.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882068118.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Ljrfk7uRvO.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 89d9dc15cd2323b1969d31b34d058e400771375719eba9729399da7e2cb3c015
                                  • Instruction ID: 265011cb5c43256728371d0b914e7cb99591770fb7db1c99b981b3b74fc6fd5e
                                  • Opcode Fuzzy Hash: 89d9dc15cd2323b1969d31b34d058e400771375719eba9729399da7e2cb3c015
                                  • Instruction Fuzzy Hash: 40D017E780DBC05BD3134EB888B618B3F90B2A2E0030FC0BF96C0523DBA52C1C018B46
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1882022563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1882000489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882044750.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882068118.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882091531.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Ljrfk7uRvO.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 19992302b57e0ae1e896caf69d358159d2cdd7c295cfb7410856e5c68f34a958
                                  • Instruction ID: 82f505fb4451acb9e8d1e12f81e5a21f5fcc3540fe401e05c5c992db50528185
                                  • Opcode Fuzzy Hash: 19992302b57e0ae1e896caf69d358159d2cdd7c295cfb7410856e5c68f34a958
                                  • Instruction Fuzzy Hash: 62A0029244DD0290E3101B40D9413A07279D306240F0424A6421461072853D8520414C

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 122 401d50-401ddc call 402ec0 call 402e48 call 402ec0 call 402e10 call 402e70 134 401de2-401def 122->134 135 401f68-401f6a 122->135 136 401df0-401df6 134->136 137 401df8-401e06 136->137 138 401e0c-401e15 136->138 137->138 139 401e97-401e9a 137->139 138->136 140 401e17-401e25 call 402b20 138->140 141 401ec8-401ef3 139->141 142 401e9c-401e9f 139->142 151 401fa2-401fac call 401d50 140->151 152 401e2b-401e72 call 402c50 VirtualQuery 140->152 146 401ef5-401ef8 141->146 147 401eb9-401ec3 141->147 144 401f70-401f81 142->144 145 401ea5-401ea7 142->145 144->147 145->147 149 401ea9-401eb3 145->149 150 401efa-401f09 146->150 149->147 153 401f90-401f9d 149->153 150->150 154 401f0b-401f15 150->154 157 401fb1-401ff0 call 401d50 151->157 152->157 160 401e78-401e82 152->160 153->147 153->157 167 401ff2-402002 157->167 168 402008-40205f call 402bb0 call 402dd0 157->168 161 401e90 160->161 162 401e84-401e8a 160->162 161->139 162->161 164 401f20-401f4a VirtualProtect 162->164 164->161 166 401f50-401f64 GetLastError call 401d50 164->166 166->135 168->167 175 402061-402067 168->175 176 4021b8-4021ba 175->176 177 40206d-40206f 175->177 178 402240-402243 176->178 179 4021c0-4021c8 176->179 177->178 180 402075 177->180 178->167 182 402249-402264 178->182 181 402078-40207a 179->181 183 4021ce-4021d1 179->183 180->181 181->178 184 402080-402086 181->184 185 402268-40228a call 401dc0 182->185 189 4021e0-4021e4 183->189 186 4022a8-4022ce call 401d50 184->186 187 40208c-4020a8 184->187 196 40228c 185->196 204 4022d0-4022fb 186->204 205 4022fc-402300 186->205 190 4020e9-402100 187->190 191 4020aa 187->191 193 402291-4022a3 call 401d50 189->193 194 4021ea-402208 call 401dc0 189->194 197 402210-40223a call 401dc0 190->197 198 402106 190->198 191->167 193->186 194->197 196->193 197->178 198->189 202 40210c-402110 198->202 208 4020b0-4020e7 call 401dc0 202->208 209 402112-402116 202->209 204->205 208->190 215 402160-402168 208->215 209->193 212 40211c-402154 call 401dc0 209->212 212->190 218 402156 212->218 215->167 217 40216e-402177 215->217 219 402180-402190 217->219 218->215 220 4021a0-4021ad 219->220 221 402192-40219d VirtualProtect 219->221 220->219 222 4021af 220->222 221->220 222->167
                                  APIs
                                  Strings
                                  • VirtualQuery failed for %d bytes at address %p, xrefs: 00401FBB
                                  • Address %p has no image-section, xrefs: 00401DC0
                                  • Mingw-w64 runtime failure:, xrefs: 00401D88
                                  • VirtualProtect failed with code 0x%x, xrefs: 00401F56
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1882022563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1882000489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882044750.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882068118.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882091531.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Ljrfk7uRvO.jbxd
                                  Similarity
                                  • API ID: QueryVirtual
                                  • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
                                  • API String ID: 1804819252-1534286854
                                  • Opcode ID: eb96bce5aba28f4b7fd5428a67a7dc765e3f26f51d184c285f7c9c3ca2c1b9e4
                                  • Instruction ID: 10d76aa513752d408286ffc26ec959f6f169e193d9772deefbdc98a11bb0eab9
                                  • Opcode Fuzzy Hash: eb96bce5aba28f4b7fd5428a67a7dc765e3f26f51d184c285f7c9c3ca2c1b9e4
                                  • Instruction Fuzzy Hash: 2C51DFB2701B4086DB109F26E94475E77A1F799BA4F58423AEF98233E1EA3CC485C748

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 227 4025e0-4025fc 228 4026d0-4026d4 227->228 229 402602-402607 227->229 228->229 232 4026da 228->232 230 4026b7-4026c1 229->230 231 40260d-402612 229->231 233 4026e0-4026e8 230->233 234 4026c3-4026ca 230->234 235 402614-40261c 231->235 236 402668-40266d 231->236 237 402658 232->237 234->228 235->237 238 40261e-402629 235->238 240 402673 236->240 241 402718-402728 signal 236->241 239 40265d-402663 237->239 238->237 244 4026b0-4026b5 240->244 245 402675-40267a 240->245 242 402779-402788 signal 241->242 243 40272a-40272d 241->243 243->230 246 40272f-40273b 243->246 244->230 244->237 245->237 247 40267c-402681 245->247 246->239 247->230 248 402683-402693 signal 247->248 249 402740-402752 signal 248->249 250 402699-40269c 248->250 249->239 250->230 252 40269e-4026aa 250->252 252->239
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1882022563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1882000489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882044750.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882068118.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882091531.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Ljrfk7uRvO.jbxd
                                  Similarity
                                  • API ID: signal
                                  • String ID: CCG
                                  • API String ID: 1946981877-1584390748
                                  • Opcode ID: 02ca0884ae1087a20c21e45c5c541f93375eef4ab3a09d0df9e107311897ccd7
                                  • Instruction ID: 8a37928041284c8a434aeccdd4db6f983c568c8f0cf3e4f2934023fa32f313ab
                                  • Opcode Fuzzy Hash: 02ca0884ae1087a20c21e45c5c541f93375eef4ab3a09d0df9e107311897ccd7
                                  • Instruction Fuzzy Hash: C321A171B0154146EE296279865D33B10019B9A374F284E379A3DA73E0DEFECCC2830E

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 260 401fd0-401ff0 261 401ff2-402002 260->261 262 402008-40205f call 402bb0 call 402dd0 260->262 262->261 267 402061-402067 262->267 268 4021b8-4021ba 267->268 269 40206d-40206f 267->269 270 402240-402243 268->270 271 4021c0-4021c8 268->271 269->270 272 402075 269->272 270->261 274 402249-402264 270->274 273 402078-40207a 271->273 275 4021ce-4021d1 271->275 272->273 273->270 276 402080-402086 273->276 277 402268-40228a call 401dc0 274->277 281 4021e0-4021e4 275->281 278 4022a8-4022ce call 401d50 276->278 279 40208c-4020a8 276->279 288 40228c 277->288 296 4022d0-4022fb 278->296 297 4022fc-402300 278->297 282 4020e9-402100 279->282 283 4020aa 279->283 285 402291-4022a3 call 401d50 281->285 286 4021ea-402208 call 401dc0 281->286 289 402210-40223a call 401dc0 282->289 290 402106 282->290 283->261 285->278 286->289 288->285 289->270 290->281 294 40210c-402110 290->294 300 4020b0-4020e7 call 401dc0 294->300 301 402112-402116 294->301 296->297 300->282 307 402160-402168 300->307 301->285 304 40211c-402154 call 401dc0 301->304 304->282 310 402156 304->310 307->261 309 40216e-402177 307->309 311 402180-402190 309->311 310->307 312 4021a0-4021ad 311->312 313 402192-40219d VirtualProtect 311->313 312->311 314 4021af 312->314 313->312 314->261
                                  Strings
                                  • Unknown pseudo relocation bit size %d., xrefs: 00402294
                                  • Unknown pseudo relocation protocol version %d., xrefs: 004022A8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1882022563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1882000489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882044750.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882068118.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882091531.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Ljrfk7uRvO.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.
                                  • API String ID: 0-395989641
                                  • Opcode ID: 8caf0c066df89f6cee4c07a50155e792156557ee52966e310dcb16b3cca200fb
                                  • Instruction ID: 42e0c3400c77c9dd47adb4fdb8995eb2357067ceb312bbd9be83e7c2f840df7f
                                  • Opcode Fuzzy Hash: 8caf0c066df89f6cee4c07a50155e792156557ee52966e310dcb16b3cca200fb
                                  • Instruction Fuzzy Hash: 6A712272B10B9486DF10CF61DA0875A7761FB58BA8F58862ADF08377E8DB7DC540CA08

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 315 401dc0-401ddc 316 401de2-401def 315->316 317 401f68-401f6a 315->317 318 401df0-401df6 316->318 319 401df8-401e06 318->319 320 401e0c-401e15 318->320 319->320 321 401e97-401e9a 319->321 320->318 322 401e17-401e25 call 402b20 320->322 323 401ec8-401ef3 321->323 324 401e9c-401e9f 321->324 333 401fa2-401fac call 401d50 322->333 334 401e2b-401e72 call 402c50 VirtualQuery 322->334 328 401ef5-401ef8 323->328 329 401eb9-401ec3 323->329 326 401f70-401f81 324->326 327 401ea5-401ea7 324->327 326->329 327->329 331 401ea9-401eb3 327->331 332 401efa-401f09 328->332 331->329 335 401f90-401f9d 331->335 332->332 336 401f0b-401f15 332->336 339 401fb1-401ff0 call 401d50 333->339 334->339 342 401e78-401e82 334->342 335->329 335->339 349 401ff2-402002 339->349 350 402008-40205f call 402bb0 call 402dd0 339->350 343 401e90 342->343 344 401e84-401e8a 342->344 343->321 344->343 346 401f20-401f4a VirtualProtect 344->346 346->343 348 401f50-401f64 GetLastError call 401d50 346->348 348->317 350->349 357 402061-402067 350->357 358 4021b8-4021ba 357->358 359 40206d-40206f 357->359 360 402240-402243 358->360 361 4021c0-4021c8 358->361 359->360 362 402075 359->362 360->349 364 402249-402264 360->364 363 402078-40207a 361->363 365 4021ce-4021d1 361->365 362->363 363->360 366 402080-402086 363->366 367 402268-40228a call 401dc0 364->367 371 4021e0-4021e4 365->371 368 4022a8-4022ce call 401d50 366->368 369 40208c-4020a8 366->369 378 40228c 367->378 386 4022d0-4022fb 368->386 387 4022fc-402300 368->387 372 4020e9-402100 369->372 373 4020aa 369->373 375 402291-4022a3 call 401d50 371->375 376 4021ea-402208 call 401dc0 371->376 379 402210-40223a call 401dc0 372->379 380 402106 372->380 373->349 375->368 376->379 378->375 379->360 380->371 384 40210c-402110 380->384 390 4020b0-4020e7 call 401dc0 384->390 391 402112-402116 384->391 386->387 390->372 397 402160-402168 390->397 391->375 394 40211c-402154 call 401dc0 391->394 394->372 400 402156 394->400 397->349 399 40216e-402177 397->399 401 402180-402190 399->401 400->397 402 4021a0-4021ad 401->402 403 402192-40219d VirtualProtect 401->403 402->401 404 4021af 402->404 403->402 404->349
                                  APIs
                                  Strings
                                  • VirtualQuery failed for %d bytes at address %p, xrefs: 00401FBB
                                  • Address %p has no image-section, xrefs: 00401DC0, 00401FA5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1882022563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1882000489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882044750.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882068118.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882091531.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Ljrfk7uRvO.jbxd
                                  Similarity
                                  • API ID: QueryVirtual
                                  • String ID: VirtualQuery failed for %d bytes at address %p$Address %p has no image-section
                                  • API String ID: 1804819252-157664173
                                  • Opcode ID: 24b42db9420a0036ba5551ca2cf6389df1f73159e8ba1386f4a30517d06c5471
                                  • Instruction ID: 52aafb0f448170306d42bca5540912cc2139dda9d14def77d71a33c16101a6f6
                                  • Opcode Fuzzy Hash: 24b42db9420a0036ba5551ca2cf6389df1f73159e8ba1386f4a30517d06c5471
                                  • Instruction Fuzzy Hash: 4B31E3B3702A4195EF118F12EA4175A3761BB95BA4F49413AEF4C273A1EF3CD486C788
                                  APIs
                                  Strings
                                  • Unknown error, xrefs: 00401D2C
                                  • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00401CA7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1882022563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1882000489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882044750.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882068118.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882091531.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Ljrfk7uRvO.jbxd
                                  Similarity
                                  • API ID: fprintf
                                  • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
                                  • API String ID: 383729395-3474627141
                                  • Opcode ID: d6c75893a8b8cdba1cdccd7648c7c79805f69453ca37c984926281bf3413687d
                                  • Instruction ID: 8762e6e2ae6541d4c7c6524eaf70c560080aac858bcbb5099d5ba83032827fc6
                                  • Opcode Fuzzy Hash: d6c75893a8b8cdba1cdccd7648c7c79805f69453ca37c984926281bf3413687d
                                  • Instruction Fuzzy Hash: 1E016163D18F88C2D6018F18E8003AB7331FB6E749F259316EB8C3A565DB79D592C704
                                  APIs
                                  Strings
                                  • Argument domain error (DOMAIN), xrefs: 00401CE0
                                  • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00401CA7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1882022563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1882000489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882044750.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882068118.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882091531.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Ljrfk7uRvO.jbxd
                                  Similarity
                                  • API ID: fprintf
                                  • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                  • API String ID: 383729395-2713391170
                                  • Opcode ID: 1d2f049123975630175d9b48e20279646fed079e7b419bc05d7036498ca68734
                                  • Instruction ID: 8c7bf1553abe8d1c1cf5b10b417118f64097995adaaa4f0d994d3f7e231e07fb
                                  • Opcode Fuzzy Hash: 1d2f049123975630175d9b48e20279646fed079e7b419bc05d7036498ca68734
                                  • Instruction Fuzzy Hash: ECF06D62858E8882D2029F1CE4003AB7331FB9EB88F28531AEF8D3A155DB28D5828704
                                  APIs
                                  Strings
                                  • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00401CA7
                                  • Partial loss of significance (PLOSS), xrefs: 00401CF0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1882022563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1882000489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882044750.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882068118.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882091531.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Ljrfk7uRvO.jbxd
                                  Similarity
                                  • API ID: fprintf
                                  • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                  • API String ID: 383729395-4283191376
                                  • Opcode ID: 7751c0dc0e5f4d0d5a77e2b05341f0464b5ada29b978619af56a2b80f2ae8e47
                                  • Instruction ID: 5cd091db9141fe0e6e89e9efff11c316d26cc63b3b889972c32c6c159b948a40
                                  • Opcode Fuzzy Hash: 7751c0dc0e5f4d0d5a77e2b05341f0464b5ada29b978619af56a2b80f2ae8e47
                                  • Instruction Fuzzy Hash: C4F06262858E8882D2029F1CE4003AB7331FB5E788F245316EF8D3A555DB28D5828704
                                  APIs
                                  Strings
                                  • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00401CA7
                                  • Overflow range error (OVERFLOW), xrefs: 00401D00
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1882022563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1882000489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882044750.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882068118.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882091531.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Ljrfk7uRvO.jbxd
                                  Similarity
                                  • API ID: fprintf
                                  • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                  • API String ID: 383729395-4064033741
                                  • Opcode ID: 2da7071e0933fc8cd59be707335068b51f9eec2d662f944c6a91e8b8bb5ba5d0
                                  • Instruction ID: c612fb770c622c5d72669c3638e63aa4b2f428d8e56e9d424d6433c91b575293
                                  • Opcode Fuzzy Hash: 2da7071e0933fc8cd59be707335068b51f9eec2d662f944c6a91e8b8bb5ba5d0
                                  • Instruction Fuzzy Hash: 6FF01D62958E8882D2029F1DE4003AB7331FB9EB99F68531AEF8D3A555DB29D5828704
                                  APIs
                                  Strings
                                  • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00401CA7
                                  • The result is too small to be represented (UNDERFLOW), xrefs: 00401D10
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1882022563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1882000489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882044750.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882068118.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882091531.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Ljrfk7uRvO.jbxd
                                  Similarity
                                  • API ID: fprintf
                                  • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                  • API String ID: 383729395-2187435201
                                  • Opcode ID: 20ed77b3cd1f5ce30684c910d9c1ef4ed1bc2c10df881c0e026ae3cc509b1426
                                  • Instruction ID: abe9318e7ccd880ee09ac2f980ce11207d3172f5f88a25f0641f3127fee3ffee
                                  • Opcode Fuzzy Hash: 20ed77b3cd1f5ce30684c910d9c1ef4ed1bc2c10df881c0e026ae3cc509b1426
                                  • Instruction Fuzzy Hash: 77F06D62858E8882D2029F1DE4003AB7331FB9EB88F28531AEF8D3A155DB28D5828704
                                  APIs
                                  Strings
                                  • Total loss of significance (TLOSS), xrefs: 00401D20
                                  • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00401CA7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1882022563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1882000489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882044750.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882068118.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882091531.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Ljrfk7uRvO.jbxd
                                  Similarity
                                  • API ID: fprintf
                                  • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                  • API String ID: 383729395-4273532761
                                  • Opcode ID: 2868899dc0ce06e4a194e0e488d1f1fc1f92f94880d84b2dd2216e23dea375c1
                                  • Instruction ID: 7a53e470b351231260d633d6082b1e766a8645853782131be27a1b39d9499402
                                  • Opcode Fuzzy Hash: 2868899dc0ce06e4a194e0e488d1f1fc1f92f94880d84b2dd2216e23dea375c1
                                  • Instruction Fuzzy Hash: 52F01262958E8882D2029F1DE4003AB7331FB9E799F245316EF8D3A555DB39D5828704
                                  APIs
                                  Strings
                                  • Argument singularity (SIGN), xrefs: 00401C78
                                  • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00401CA7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1882022563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1882000489.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882044750.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882068118.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1882091531.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_Ljrfk7uRvO.jbxd
                                  Similarity
                                  • API ID: fprintf
                                  • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                  • API String ID: 383729395-2468659920
                                  • Opcode ID: bfa7157af2bfae74903953b95ccb901f8d552bd3022b870c14073aba30280489
                                  • Instruction ID: b6e0ecebc6e2091bb6bcdfd9ecb9f8b620cfa756c99f7cd1274eda0ebaf44184
                                  • Opcode Fuzzy Hash: bfa7157af2bfae74903953b95ccb901f8d552bd3022b870c14073aba30280489
                                  • Instruction Fuzzy Hash: CBF03062954F8882D202DF2DE4003AB7331FB5EB9DF649316EF8D3A555DB29D5828704