Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe
Analysis ID:1546295
MD5:3b97ad27c3ea67c7e6f51d23c8b11471
SHA1:618434d4edd1aa20c3f97c70fecedac65000b6dd
SHA256:f84215746692872e393b68b6d0dc8ef7d050da10b6994d53cbcfcddeb16499ff
Tags:exe
Infos:

Detection

Score:23
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

AI detected suspicious sample
Installs a raw input device (often for capturing keystrokes)
Queries information about the installed CPU (vendor, model number etc)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic

Classification

  • System is w10x64
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe PID: 1916JoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
    No Sigma rule has matched
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-31T18:27:24.320655+010020229301A Network Trojan was detected20.109.210.53443192.168.2.649776TCP
    2024-10-31T18:28:01.886334+010020229301A Network Trojan was detected20.109.210.53443192.168.2.649967TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 91.5% probability
    Source: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
    Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.6:49776
    Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.6:49967
    Source: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeString found in binary or memory: http://fastmm.sourceforge.net).
    Source: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeString found in binary or memory: http://www.winimage.com/zLibDll
    Source: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeString found in binary or memory: http://www.winimage.com/zLibDll-1.2.3rbr
    Source: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe, 00000000.00000002.3419312276.00000000024FC000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevicesmemstr_0dfbb972-e
    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe PID: 1916, type: MEMORYSTR
    Source: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe, 00000000.00000000.2178734994.000000000066E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename" vs SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe
    Source: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe, 00000000.00000002.3420189550.0000000004BB0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMXDWDRV.DLLj% vs SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe
    Source: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeBinary or memory string: OriginalFilename" vs SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe
    Source: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
    Source: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeStatic PE information: Section: .reloc IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeBinary string: \Device\Video0
    Source: classification engineClassification label: sus23.winEXE@1/1@0/0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeFile created: C:\Users\user\AppData\Roaming\EurekaLogJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeMutant created: NULL
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: midas.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: midas.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: dhcpcsvc.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: dhcpcsvc6.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: netprofm.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: npmproxy.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: riched20.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: usp10.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: msls31.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeWindow found: window name: TButtonJump to behavior
    Source: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeStatic file information: File size 3165184 > 1048576
    Source: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeStatic PE information: Raw size of CODE is bigger than: 0x100000 < 0x234400
    Source: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeStatic PE information: More than 200 imports for user32.dll
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeCode function: 0_3_0250F85C push ss; ret 0_3_0250F85D
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeCode function: 0_3_02510E6A push es; retf 0_3_02510E70
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeCode function: 0_3_0250EC29 push edi; iretd 0_3_0250EC41
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeCode function: 0_3_0250CCDF push edi; iretd 0_3_0250CD2D
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeCode function: 0_3_0250FAC1 push esi; retf 0_3_0250FACC
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeCode function: 0_3_0250FAE7 push esi; retf 0_3_0250FAFC
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeCode function: 0_3_0250D4EA push edi; iretd 0_3_0250D4ED
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeCode function: 0_3_0250D8EA push edi; iretd 0_3_0250D8F5
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeCode function: 0_3_0250D89B push edi; iretd 0_3_0250D89E
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeCode function: 0_3_0250F48C push edi; iretd 0_3_0250F48F
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeCode function: 0_3_0250C6A3 push ds; retf 0_3_0250C70E
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeCode function: 0_3_0250F744 push edi; iretd 0_3_0250F747
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeCode function: 0_3_0250ED45 push edi; iretd 0_3_0250ED4D
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeCode function: 0_3_0250F778 push edi; iretd 0_3_0250F77B
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeCode function: 0_3_0250E162 push edi; iretd 0_3_0250E188
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeCode function: 0_3_0250D3D1 push edi; iretd 0_3_0250D3D4
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeCode function: 0_3_0250F9D1 push edi; iretd 0_3_0250F9D4
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeCode function: 0_3_0250CDD3 pushfd ; retf 0_3_0250CDDD
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeCode function: 0_3_0250DFF1 push edi; iretd 0_3_0250DFF4
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeCode function: 0_3_0250CFF7 push ds; iretd 0_3_0250D020
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeCode function: 0_3_0250CD97 push edi; iretd 0_3_0250CD9A
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeCode function: 0_3_0250ED88 push es; iretd 0_3_0250EDA7
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeCode function: 0_3_0250E1B1 push edi; iretd 0_3_0250E188
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeCode function: 0_3_0250C5AB push edi; iretd 0_3_0250C5AE
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe, 00000000.00000002.3418859320.000000000097E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlll
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeProcess information queried: ProcessInformationJump to behavior
    Source: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeBinary or memory string: SeDelegateSessionUserImpersonatePrivilege - OFF Active Controls: ------------------------------------ 4.1 Form Class : Progman 4.2 Form Text : Program Manager 4.3 Control Class: 4.4 Control Text : Computer: ---------------------
    Source: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe, 00000000.00000002.3419312276.00000000024FC000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Program Manager
    Source: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe, 00000000.00000002.3419204141.00000000024F9000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: GetProgmanWindow t
    Source: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe, 00000000.00000002.3420260237.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe, 00000000.00000003.2229189694.0000000004BF4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: 4.1 Form Class : Progman
    Source: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe, 00000000.00000002.3419204141.00000000024F9000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: GetProgmanWindow
    Source: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe, 00000000.00000002.3420260237.0000000004BE0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe, 00000000.00000003.2229189694.0000000004BF4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: 4.2 Form Text : Program Manager
    Source: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe, 00000000.00000002.3419312276.00000000024FC000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: 4.2 Form Text: Program Manager
    Source: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe, 00000000.00000002.3419312276.00000000024FC000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Program Manager
    Source: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe, 00000000.00000002.3420189550.0000000004BB0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: 4.1 Form Class : Progman
    Source: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe, 00000000.00000002.3419312276.00000000024FC000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: SetProgmanWindow
    Source: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe, 00000000.00000002.3419312276.00000000024FC000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: 4.1 Form Class: Progman
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
    DLL Side-Loading
    1
    Process Injection
    1
    Masquerading
    11
    Input Capture
    1
    Security Software Discovery
    Remote Services11
    Input Capture
    Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Process Injection
    LSASS Memory2
    Process Discovery
    Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    DLL Side-Loading
    Security Account Manager12
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Obfuscated Files or Information
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe8%ReversingLabsWin32.Trojan.Generic
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://www.winimage.com/zLibDll0%URL Reputationsafe
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.winimage.com/zLibDllSecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exefalse
    • URL Reputation: safe
    unknown
    http://www.winimage.com/zLibDll-1.2.3rbrSecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exefalse
      unknown
      http://fastmm.sourceforge.net).SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exefalse
        unknown
        No contacted IP infos
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1546295
        Start date and time:2024-10-31 18:26:06 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 4m 13s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:7
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe
        Detection:SUS
        Classification:sus23.winEXE@1/1@0/0
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 4
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
        • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Report size getting too big, too many NtQueryValueKey calls found.
        • Report size getting too big, too many NtReadVirtualMemory calls found.
        • VT rate limit hit for: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe
        TimeTypeDescription
        13:27:23API Interceptor301x Sleep call for process: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe modified
        No context
        No context
        No context
        No context
        No context
        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe
        File Type:ISO-8859 text, with CRLF line terminators
        Category:dropped
        Size (bytes):64529
        Entropy (8bit):3.697055107791718
        Encrypted:false
        SSDEEP:1536:YukrBUDO9WVNQLwHtzE0TntpEqtfi1zYUJCkFRkjW5c7gxEn2FBlYBlvB3pCtbsN:7kwR
        MD5:79B122B8497B70AE31672DA3DFE1EA8E
        SHA1:1CA18BFB7C0944B425F688B172174F6C12F75359
        SHA-256:ECE3486B5AE1738DED6D56F2F8F89C3400519C1C6F72B2F418A46059A69AD8D3
        SHA-512:8D3C3A22917B49EB6EF740051AEC545DB41867EFAA982237B973DF25E9D74325E9913C1B9DF67F081C5249D4818F2F5C2CB6543E84703DE5FB08404552D6FC02
        Malicious:false
        Reputation:low
        Preview:EurekaLog 6.1.01 RC 1....Application:..---------------------------------------------------------------------------.. 1.1 Start Date : Thu, 31 Oct 2024 13:27:05 -0400.. 1.2 Name/Description: SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe.. 1.3 Version Number : 1.0.3.9.. 1.4 Parameters : .. 1.5 Compilation Date: Thu, 16 Apr 2020 22:35:36 -0400.. 1.6 Up Time : 0 second....Exception:..-------------------------------------------------------------------------.. 2.1 Date : Thu, 31 Oct 2024 13:27:06 -0400.. 2.2 Address : 0050E3F5.. 2.3 Module Name : SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe.. 2.4 Module Version: 1.0.3.9.. 2.5 Type : Exception.. 2.6 Message : Error loading MIDAS.DLL... 2.7 ID : 5118.. 2.8 Count : 1.. 2.9 Status : New.. 2.10 Note : ....User:..-----------------------------------------------------------------.. 3.1 ID : user.. 3.2 Name : hardz.. 3.
        File type:PE32 executable (GUI) Intel 80386, for MS Windows
        Entropy (8bit):6.827192022928079
        TrID:
        • Win32 Executable (generic) a (10002005/4) 98.12%
        • Windows ActiveX control (116523/4) 1.14%
        • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
        • Win32 Executable Delphi generic (14689/80) 0.14%
        • Windows Screen Saver (13104/52) 0.13%
        File name:SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe
        File size:3'165'184 bytes
        MD5:3b97ad27c3ea67c7e6f51d23c8b11471
        SHA1:618434d4edd1aa20c3f97c70fecedac65000b6dd
        SHA256:f84215746692872e393b68b6d0dc8ef7d050da10b6994d53cbcfcddeb16499ff
        SHA512:ec5456b456b684aabde3e7534b0b21b6ffb03247f4e642b9050dde9a2686b477a953250148eee168a2d9d72af8a8729c6f1bfa534c66e96773e6a94c2281c693
        SSDEEP:98304:zxY7fjyXSF+cFURSdAFjjdjjA/YiY0Y0Y0Y0YI:BCocFoSdAFjjdjjA/YiY0Y0Y0Y0YI
        TLSH:D8E54B22F38D8837D5231A749C5B73896833BF152E3895EA7FE4BE0D5F3A1913516282
        File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
        Icon Hash:8737656535170646
        Entrypoint:0x635254
        Entrypoint Section:CODE
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        DLL Characteristics:
        Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:3d0bebeafdf04540444a2561eaa54737
        Instruction
        push ebp
        mov ebp, esp
        add esp, FFFFFFF0h
        push ebx
        mov eax, 00634BACh
        call 00007F43D4928438h
        mov ebx, dword ptr [0064010Ch]
        mov eax, dword ptr [ebx]
        call 00007F43D49F5703h
        push 00000080h
        push FFFFFFECh
        mov eax, dword ptr [ebx]
        mov eax, dword ptr [eax+30h]
        push eax
        call 00007F43D4929529h
        mov ecx, dword ptr [0064038Ch]
        mov eax, dword ptr [ebx]
        mov edx, dword ptr [0062FB1Ch]
        call 00007F43D49F56F6h
        mov ecx, dword ptr [00640410h]
        mov eax, dword ptr [ebx]
        mov edx, dword ptr [0062E520h]
        call 00007F43D49F56E3h
        mov ecx, dword ptr [00640064h]
        mov eax, dword ptr [ebx]
        mov edx, dword ptr [0062F0C4h]
        call 00007F43D49F56D0h
        mov eax, dword ptr [ebx]
        call 00007F43D49F5749h
        pop ebx
        call 00007F43D49259B3h
        mov eax, eax
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x24a0000x2ef.edata
        IMAGE_DIRECTORY_ENTRY_IMPORT0x2460000x324c.idata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x26e0000xc2400.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x24c0000x18.rdata
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x00x0
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        CODE0x10000x2342cc0x234400a6bca98be67a6173766ef28307db731aunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        DATA0x2360000xa4e80xa600f2ba09a39ced9448a493b8adb480832bFalse0.34702089608433734data4.719928335088199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        BSS0x2410000x4f450x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .idata0x2460000x324c0x34004f0c80e2aaa027afc7c371df52290eabFalse0.34164663461538464data4.892566155659306IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .edata0x24a0000x2ef0x400efb52ebab655a39a4a116a00d15f8b40False0.37109375data4.453556782408975IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
        .tls0x24b0000x1830x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .rdata0x24c0000x180x20051f7315f820b2eb2230112b150c158a3False0.0546875data0.2147325177871819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
        .reloc0x24d0000x204200x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .rsrc0x26e0000xc24000xc2400c7c25b50e32ca307ff20094d21890ad7False0.29079442165379665data6.907156554237606IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_CURSOR0x2709200x134Targa image data - Map 64 x 65536 x 1 +32 "\001"0.38636363636363635
        RT_CURSOR0x270a540x134Targa image data 64 x 65536 x 1 +32 "\001"RussianRussia0.29545454545454547
        RT_CURSOR0x270b880x134data0.4805194805194805
        RT_CURSOR0x270cbc0x134data0.38311688311688313
        RT_CURSOR0x270df00x134data0.36038961038961037
        RT_CURSOR0x270f240x134data0.4090909090909091
        RT_CURSOR0x2710580x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"0.4967532467532468
        RT_CURSOR0x27118c0x134dataArabicSaudi Arabia0.2597402597402597
        RT_CURSOR0x2712c00x134Targa image data 64 x 65536 x 1 +32 "\001"RussianRussia0.2824675324675325
        RT_CURSOR0x2713f40x134dataDutchNetherlands0.38636363636363635
        RT_CURSOR0x2715280x134Targa image data 64 x 65536 x 1 +32 "\001"DutchNetherlands0.30194805194805197
        RT_CURSOR0x27165c0x134Targa image data - RLE 64 x 65536 x 1 +32 "\001"DutchNetherlands0.275974025974026
        RT_CURSOR0x2717900x134data0.4642857142857143
        RT_BITMAP0x2718c40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.43103448275862066
        RT_BITMAP0x271a940x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 3800.46487603305785125
        RT_BITMAP0x271c780x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.43103448275862066
        RT_BITMAP0x271e480x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39870689655172414
        RT_BITMAP0x2720180x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.4245689655172414
        RT_BITMAP0x2721e80x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5021551724137931
        RT_BITMAP0x2723b80x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5064655172413793
        RT_BITMAP0x2725880x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39655172413793105
        RT_BITMAP0x2727580x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5344827586206896
        RT_BITMAP0x2729280x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39655172413793105
        RT_BITMAP0x272af80xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors0.5208333333333334
        RT_BITMAP0x272bb80xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.42857142857142855
        RT_BITMAP0x272c980xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.4955357142857143
        RT_BITMAP0x272d780x5cDevice independent bitmap graphic, 6 x 11 x 1, image size 440.391304347826087
        RT_BITMAP0x272dd40x5cDevice independent bitmap graphic, 6 x 11 x 1, image size 440.391304347826087
        RT_BITMAP0x272e300x5cDevice independent bitmap graphic, 6 x 11 x 1, image size 440.532608695652174
        RT_BITMAP0x272e8c0x5cDevice independent bitmap graphic, 6 x 11 x 1, image size 440.532608695652174
        RT_BITMAP0x272ee80x94Device independent bitmap graphic, 6 x 11 x 4, image size 44RussianRussia0.5
        RT_BITMAP0x272f7c0x5cDevice independent bitmap graphic, 6 x 11 x 1, image size 440.4782608695652174
        RT_BITMAP0x272fd80x5cDevice independent bitmap graphic, 6 x 11 x 1, image size 440.4782608695652174
        RT_BITMAP0x2730340x5cDevice independent bitmap graphic, 6 x 11 x 1, image size 440.5543478260869565
        RT_BITMAP0x2730900x5cDevice independent bitmap graphic, 6 x 11 x 1, image size 440.5543478260869565
        RT_BITMAP0x2730ec0x5cDevice independent bitmap graphic, 6 x 11 x 1, image size 440.4673913043478261
        RT_BITMAP0x2731480x5cDevice independent bitmap graphic, 6 x 11 x 1, image size 440.4673913043478261
        RT_BITMAP0x2731a40x138Device independent bitmap graphic, 28 x 13 x 4, image size 2080.41025641025641024
        RT_BITMAP0x2732dc0x138Device independent bitmap graphic, 28 x 13 x 4, image size 2080.27564102564102566
        RT_BITMAP0x2734140x138Device independent bitmap graphic, 28 x 13 x 4, image size 2080.3685897435897436
        RT_BITMAP0x27354c0x138Device independent bitmap graphic, 28 x 13 x 4, image size 2080.3685897435897436
        RT_BITMAP0x2736840x138Device independent bitmap graphic, 28 x 13 x 4, image size 2080.34294871794871795
        RT_BITMAP0x2737bc0x138Device independent bitmap graphic, 28 x 13 x 4, image size 2080.3717948717948718
        RT_BITMAP0x2738f40x104Device independent bitmap graphic, 20 x 13 x 4, image size 1560.5038461538461538
        RT_BITMAP0x2739f80x138Device independent bitmap graphic, 28 x 13 x 4, image size 2080.4326923076923077
        RT_BITMAP0x273b300x104Device independent bitmap graphic, 20 x 13 x 4, image size 1560.5153846153846153
        RT_BITMAP0x273c340x138Device independent bitmap graphic, 28 x 13 x 4, image size 2080.46474358974358976
        RT_BITMAP0x273d6c0xb0Device independent bitmap graphic, 10 x 9 x 4, image size 72RussianRussia0.5056818181818182
        RT_BITMAP0x273e1c0xb0Device independent bitmap graphic, 10 x 9 x 4, image size 72RussianRussia0.4943181818181818
        RT_BITMAP0x273ecc0xb0Device independent bitmap graphic, 10 x 9 x 4, image size 72RussianRussia0.4375
        RT_BITMAP0x273f7c0xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128, resolution 2835 x 2835 px/m, 16 important colors0.5775862068965517
        RT_BITMAP0x2740640x528Device independent bitmap graphic, 16 x 16 x 8, image size 256, resolution 2835 x 2835 px/m0.625
        RT_BITMAP0x27458c0x852Device independent bitmap graphic, 32 x 32 x 8, 1 compression, image size 1066, resolution 3779 x 3779 px/m, 256 important colors0.8431924882629108
        RT_BITMAP0x274de00xf8Device independent bitmap graphic, 13 x 13 x 4, 2 compression, image size 144, resolution 2835 x 2835 px/m0.782258064516129
        RT_BITMAP0x274ed80x528Device independent bitmap graphic, 16 x 16 x 8, image size 256, resolution 2835 x 2835 px/m0.5825757575757575
        RT_BITMAP0x2754000xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128, resolution 3780 x 3780 px/m0.5689655172413793
        RT_BITMAP0x2754e80xf8Device independent bitmap graphic, 13 x 13 x 4, 2 compression, image size 144, resolution 2835 x 2835 px/m0.8024193548387096
        RT_BITMAP0x2755e00x828Device independent bitmap graphic, 32 x 32 x 8, image size 1024, resolution 7874 x 7874 px/m0.4794061302681992
        RT_BITMAP0x275e080xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128, resolution 3779 x 3779 px/m, 16 important colors0.6293103448275862
        RT_BITMAP0x275ef00xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.38392857142857145
        RT_BITMAP0x275fd00xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors0.4947916666666667
        RT_BITMAP0x2760900xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors0.484375
        RT_BITMAP0x2761500xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.42410714285714285
        RT_BITMAP0x2762300xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors0.5104166666666666
        RT_BITMAP0x2762f00xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.5
        RT_BITMAP0x2763d00xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.4870689655172414
        RT_BITMAP0x2764b80xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors0.4895833333333333
        RT_BITMAP0x2765780xd0Device independent bitmap graphic, 12 x 13 x 4, image size 1040.5625
        RT_BITMAP0x2766480xd0Device independent bitmap graphic, 12 x 13 x 4, image size 1040.4855769230769231
        RT_BITMAP0x2767180xd0Device independent bitmap graphic, 12 x 13 x 4, image size 1040.4326923076923077
        RT_BITMAP0x2767e80xd0Device independent bitmap graphic, 12 x 13 x 4, image size 1040.5576923076923077
        RT_BITMAP0x2768b80xd0Device independent bitmap graphic, 12 x 13 x 4, image size 1040.4807692307692308
        RT_BITMAP0x2769880xd0Device independent bitmap graphic, 12 x 13 x 4, image size 1040.5625
        RT_BITMAP0x276a580x188Device independent bitmap graphic, 24 x 24 x 4, image size 288EnglishCanada0.34183673469387754
        RT_BITMAP0x276be00x88Device independent bitmap graphic, 16 x 4 x 4, image size 32EnglishUnited States0.4852941176470588
        RT_BITMAP0x276c680xa8Device independent bitmap graphic, 4 x 16 x 4, image size 64EnglishUnited States0.40476190476190477
        RT_BITMAP0x276d100x450Device independent bitmap graphic, 5 x 5 x 8, image size 40DutchNetherlands0.32608695652173914
        RT_BITMAP0x2771600x450Device independent bitmap graphic, 7 x 5 x 8, image size 40DutchNetherlands0.322463768115942
        RT_BITMAP0x2775b00x4acDevice independent bitmap graphic, 11 x 11 x 8, image size 132DutchNetherlands0.41555183946488294
        RT_BITMAP0x277a5c0x480Device independent bitmap graphic, 6 x 11 x 8, image size 88DutchNetherlands0.3559027777777778
        RT_BITMAP0x277edc0x4acDevice independent bitmap graphic, 9 x 11 x 8, image size 132DutchNetherlands0.41638795986622074
        RT_BITMAP0x2783880x4c4Device independent bitmap graphic, 12 x 13 x 8, image size 156DutchNetherlands0.4024590163934426
        RT_BITMAP0x27884c0x4c4Device independent bitmap graphic, 12 x 13 x 8, image size 156DutchNetherlands0.40491803278688526
        RT_BITMAP0x278d100x4c4Device independent bitmap graphic, 12 x 13 x 8, image size 156DutchNetherlands0.40491803278688526
        RT_BITMAP0x2791d40x448Device independent bitmap graphic, 7 x 4 x 8, image size 32DutchNetherlands0.43156934306569344
        RT_BITMAP0x27961c0x444Device independent bitmap graphic, 4 x 7 x 8, image size 28DutchNetherlands0.4358974358974359
        RT_BITMAP0x279a600x444Device independent bitmap graphic, 4 x 7 x 8, image size 28DutchNetherlands0.43223443223443225
        RT_BITMAP0x279ea40x448Device independent bitmap graphic, 7 x 4 x 8, image size 32DutchNetherlands0.43156934306569344
        RT_BITMAP0x27a2ec0x188Device independent bitmap graphic, 24 x 24 x 4, image size 288EnglishUnited States0.3137755102040816
        RT_BITMAP0x27a4740x188Device independent bitmap graphic, 24 x 24 x 4, image size 288DutchNetherlands0.413265306122449
        RT_BITMAP0x27a5fc0x188Device independent bitmap graphic, 24 x 24 x 4, image size 288EnglishUnited States0.25510204081632654
        RT_BITMAP0x27a7840xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.3794642857142857
        RT_BITMAP0x27a8640xb0Device independent bitmap graphic, 64 x 16 x 1, image size 128EnglishUnited States0.5113636363636364
        RT_ICON0x27a9140x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512ChineseChina0.42338709677419356
        RT_DIALOG0x27abfc0x52data0.7682926829268293
        RT_DIALOG0x27ac500x268data0.564935064935065
        RT_DIALOG0x27aeb80x540data0.43601190476190477
        RT_DIALOG0x27b3f80x114data0.6521739130434783
        RT_DIALOG0x27b50c0xb2data0.7247191011235955
        RT_DIALOG0x27b5c00xbcdata0.7393617021276596
        RT_DIALOG0x27b67c0xc0data0.7291666666666666
        RT_DIALOG0x27b73c0xbcdata0.7393617021276596
        RT_DIALOG0x27b7f80xbcdata0.7393617021276596
        RT_DIALOG0x27b8b40xc0data0.7291666666666666
        RT_DIALOG0x27b9740xc0data0.7291666666666666
        RT_STRING0x27ba340x380data0.37723214285714285
        RT_STRING0x27bdb40x3fcAmigaOS bitmap font "o", fc_YSize 26880, 18432 elements, 2nd "n", 3rd "e"0.3715686274509804
        RT_STRING0x27c1b00x37cdata0.39349775784753366
        RT_STRING0x27c52c0x3b0data0.3241525423728814
        RT_STRING0x27c8dc0x2a4data0.4541420118343195
        RT_STRING0x27cb800x3ccdata0.43004115226337447
        RT_STRING0x27cf4c0x420data0.4100378787878788
        RT_STRING0x27d36c0x398data0.375
        RT_STRING0x27d7040xb0data0.7102272727272727
        RT_STRING0x27d7b40x394data0.43231441048034935
        RT_STRING0x27db480x388data0.4004424778761062
        RT_STRING0x27ded00x398data0.4043478260869565
        RT_STRING0x27e2680x410data0.4115384615384615
        RT_STRING0x27e6780x494data0.32081911262798635
        RT_STRING0x27eb0c0x4d8data0.3233870967741935
        RT_STRING0x27efe40x598data0.25139664804469275
        RT_STRING0x27f57c0x3d0data0.3709016393442623
        RT_STRING0x27f94c0x270AmigaOS bitmap font "n", fc_YSize 8192, 18688 elements, 2nd "e", 3rd "s"0.46314102564102566
        RT_STRING0x27fbbc0x200data0.361328125
        RT_STRING0x27fdbc0xf8data0.592741935483871
        RT_STRING0x27feb40x3a0data0.4213362068965517
        RT_STRING0x2802540x168data0.5111111111111111
        RT_STRING0x2803bc0xe8data0.6077586206896551
        RT_STRING0x2804a40x2c4data0.4138418079096045
        RT_STRING0x2807680x268data0.4707792207792208
        RT_STRING0x2809d00x3fcdata0.36764705882352944
        RT_STRING0x280dcc0x390data0.4024122807017544
        RT_STRING0x28115c0x374data0.34615384615384615
        RT_STRING0x2814d00x464data0.3505338078291815
        RT_STRING0x2819340x1b0data0.4675925925925926
        RT_STRING0x281ae40xecdata0.5508474576271186
        RT_STRING0x281bd00x20cdata0.5
        RT_STRING0x281ddc0x454data0.3231046931407942
        RT_STRING0x2822300x3d0data0.36168032786885246
        RT_STRING0x2826000x2fcdata0.36649214659685864
        RT_STRING0x2828fc0x354data0.318075117370892
        RT_RCDATA0x282c500x10data1.5
        RT_RCDATA0x282c600x1ebb5data1.0003654361003202
        RT_RCDATA0x2a18180x9b4data0.607085346215781
        RT_RCDATA0x2a21cc0x1772Delphi compiled form 'TCalculatorEh'0.12812395868043985
        RT_RCDATA0x2a39400x971Delphi compiled form 'TDBGridEhFindDlg'0.4666942490690939
        RT_RCDATA0x2a42b40x4bedDelphi compiled form 'TForm1'0.1893296290579822
        RT_RCDATA0x2a8ea40xa44bDelphi compiled form 'TForm2'0.7075536745999668
        RT_RCDATA0x2b32f00x89d6Delphi compiled form 'TForm3'0.8169245593153092
        RT_RCDATA0x2bbcc80x7365eDelphi compiled form 'TFTemplate'0.03429453953075084
        RT_RCDATA0x32f3280x494Delphi compiled form 'TLoginDialog'0.4931740614334471
        RT_RCDATA0x32f7bc0x3c4Delphi compiled form 'TPasswordDialog'0.4678423236514523
        RT_GROUP_CURSOR0x32fb800x14Lotus unknown worksheet or configuration, revision 0x1RussianRussia1.25
        RT_GROUP_CURSOR0x32fb940x14Lotus unknown worksheet or configuration, revision 0x1ArabicSaudi Arabia1.3
        RT_GROUP_CURSOR0x32fba80x14Lotus unknown worksheet or configuration, revision 0x1RussianRussia1.3
        RT_GROUP_CURSOR0x32fbbc0x14Lotus unknown worksheet or configuration, revision 0x1DutchNetherlands1.3
        RT_GROUP_CURSOR0x32fbd00x14Lotus unknown worksheet or configuration, revision 0x1DutchNetherlands1.3
        RT_GROUP_CURSOR0x32fbe40x14Lotus unknown worksheet or configuration, revision 0x1DutchNetherlands1.3
        RT_GROUP_CURSOR0x32fbf80x14Lotus unknown worksheet or configuration, revision 0x11.25
        RT_GROUP_CURSOR0x32fc0c0x14Lotus unknown worksheet or configuration, revision 0x11.3
        RT_GROUP_CURSOR0x32fc200x14Lotus unknown worksheet or configuration, revision 0x11.3
        RT_GROUP_CURSOR0x32fc340x14Lotus unknown worksheet or configuration, revision 0x11.3
        RT_GROUP_CURSOR0x32fc480x14Lotus unknown worksheet or configuration, revision 0x11.3
        RT_GROUP_CURSOR0x32fc5c0x14Lotus unknown worksheet or configuration, revision 0x11.3
        RT_GROUP_CURSOR0x32fc700x14Lotus unknown worksheet or configuration, revision 0x11.3
        RT_GROUP_ICON0x32fc840x14dataChineseChina1.2
        RT_VERSION0x32fc980x274dataChineseChina0.46656050955414013
        DLLImport
        kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetVersion, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, SetCurrentDirectoryA, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetCurrentDirectoryA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, ExitThread, CreateThread, WriteFile, UnhandledExceptionFilter, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetFileType, CreateFileA, CloseHandle
        user32.dllGetKeyboardType, LoadStringA, MessageBoxA, CharNextA
        advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
        oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
        kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
        advapi32.dllRegSetValueExA, RegQueryValueExA, RegQueryValueA, RegOpenKeyExA, RegFlushKey, RegEnumKeyExA, RegCreateKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeNameA, GetUserNameA, GetTokenInformation
        kernel32.dlllstrcpyA, lstrcmpA, WritePrivateProfileStringA, WriteFile, WaitForSingleObject, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, UnmapViewOfFile, TerminateThread, TerminateProcess, SuspendThread, Sleep, SizeofResource, SetUnhandledExceptionFilter, SetThreadPriority, SetThreadLocale, SetLastError, SetFilePointer, SetFileAttributesA, SetEvent, SetErrorMode, SetEnvironmentVariableA, SetEndOfFile, SetCurrentDirectoryA, ResumeThread, ResetEvent, ReleaseMutex, ReadFile, OutputDebugStringA, OpenProcess, MultiByteToWideChar, MulDiv, MoveFileA, MapViewOfFile, LockResource, LoadResource, LoadLibraryExA, LoadLibraryA, LeaveCriticalSection, IsBadReadPtr, InitializeCriticalSection, GlobalUnlock, GlobalSize, GlobalReAlloc, GlobalMemoryStatus, GlobalHandle, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetWindowsDirectoryA, GetVersionExA, GetVersion, GetTimeZoneInformation, GetTickCount, GetThreadPriority, GetThreadLocale, GetThreadContext, GetTempPathA, GetSystemTime, GetSystemInfo, GetSystemDefaultLangID, GetStringTypeExA, GetStdHandle, GetStartupInfoA, GetProfileStringA, GetProcAddress, GetPrivateProfileStringA, GetPriorityClass, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoW, GetLocaleInfoA, GetLocalTime, GetLastError, GetHandleInformation, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeThread, GetExitCodeProcess, GetEnvironmentVariableA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentThread, GetCurrentProcessId, GetCurrentProcess, GetComputerNameA, GetCommandLineA, GetCPInfo, GetACP, FreeResource, InterlockedIncrement, InterlockedExchange, InterlockedDecrement, FreeLibrary, FormatMessageA, FlushInstructionCache, FindResourceA, FindNextFileA, FindFirstFileA, FindClose, FileTimeToLocalFileTime, FileTimeToDosDateTime, ExitThread, EnumSystemLocalesA, EnumCalendarInfoA, EnterCriticalSection, DuplicateHandle, DeleteFileA, DeleteCriticalSection, CreateThread, CreateProcessA, CreateMutexA, CreateFileMappingA, CreateFileA, CreateEventA, CreateDirectoryA, CompareStringA, CloseHandle
        version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
        gdi32.dllUnrealizeObject, TextOutA, StretchBlt, SetWindowOrgEx, SetWindowExtEx, SetWinMetaFileBits, SetViewportOrgEx, SetViewportExtEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetMapMode, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SelectClipRgn, SaveDC, RoundRect, RestoreDC, Rectangle, RectVisible, RealizePalette, Polyline, Polygon, PolyPolyline, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, LPtoDP, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetViewportOrgEx, GetTextMetricsA, GetTextExtentPointA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetPixel, GetPaletteEntries, GetOutlineTextMetricsA, GetObjectA, GetNearestColor, GetMapMode, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetCurrentObject, GetClipRgn, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, ExtTextOutA, ExtSelectClipRgn, ExtCreateRegion, ExtCreatePen, ExcludeClipRect, Ellipse, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreateRectRgnIndirect, CreateRectRgn, CreatePolygonRgn, CreatePenIndirect, CreatePen, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateFontA, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, CombineRgn, BitBlt
        user32.dllCreateWindowExA, WindowFromPoint, WinHelpA, WaitMessage, WaitForInputIdle, ValidateRect, UpdateWindow, UnregisterClassA, UnionRect, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCursor, ShowCaret, SetWindowRgn, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongW, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetKeyboardState, SetForegroundWindow, SetFocus, SetCursor, SetClipboardData, SetClassLongA, SetCaretPos, SetCapture, SetActiveWindow, SendMessageTimeoutA, SendMessageA, ScrollWindowEx, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageA, OpenClipboard, OffsetRect, OemToCharA, MsgWaitForMultipleObjects, MoveWindow, MessageBoxA, MessageBeep, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, IsClipboardFormatAvailable, IsChild, IsCharAlphaNumericA, IsCharAlphaA, InvalidateRgn, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, HideCaret, GetWindowThreadProcessId, GetWindowTextLengthW, GetWindowTextW, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongW, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessageTime, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDoubleClickTime, GetDlgItem, GetDlgCtrlID, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameA, GetClassInfoA, GetCaretPos, GetCapture, GetActiveWindow, FrameRect, FindWindowExA, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EnumClipboardFormats, EndPaint, EndDialog, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextExA, DrawTextW, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageA, DialogBoxParamA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DestroyCaret, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, CreateDialogParamA, CreateCaret, CopyRect, CopyImage, CloseClipboard, ClientToScreen, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
        ole32.dllCoTaskMemFree, StringFromCLSID
        kernel32.dllSleep
        oleaut32.dllSafeArrayPtrOfIndex, SafeArrayPutElement, SafeArrayGetElement, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayRedim, SafeArrayCreate, VariantChangeType, VariantCopyInd, VariantCopy, VariantClear, VariantInit
        ole32.dllCoCreateInstance, CoGetMalloc, CoUninitialize, CoInitialize, IsEqualGUID
        oleaut32.dllCreateErrorInfo, GetErrorInfo, SetErrorInfo, SafeArrayCopy, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetUBound, SafeArrayDestroy, SafeArrayCreate, SysFreeString
        shell32.dllShellExecuteA
        gdi32.dllTranslateCharsetInfo
        comctl32.dllImageList_Destroy, ImageList_Add, ImageList_Create
        comctl32.dllImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_SetDragCursorImage, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_LoadImageA, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create, InitCommonControls
        comdlg32.dllGetSaveFileNameA, GetOpenFileNameA
        kernel32.dllMulDiv
        kernel32.dllMulDiv
        NameOrdinalAddress
        EurekaLog_AttachedFilesRequestEvent150x464bb0
        EurekaLog_CallCreateThread20x47e9a8
        EurekaLog_CallExceptObject50x47e128
        EurekaLog_CallExitThread40x47eaec
        EurekaLog_CallGeneralRaise60x47dfa4
        EurekaLog_CallResumeThread30x47ea48
        EurekaLog_CustomButtonClickEvent170x464cf8
        EurekaLog_CustomDataRequestEventEx140x464b0c
        EurekaLog_CustomWebFieldsRequestEvent160x464c54
        EurekaLog_ExceptionActionNotifyEvent120x4649c4
        EurekaLog_ExceptionErrorNotifyEvent130x464a68
        EurekaLog_ExceptionNotifyEvent100x46487c
        EurekaLog_HandledExceptionNotifyEvent110x464920
        EurekaLog_LastDelphiException10x47e9a0
        EurekaLog_PasswordRequestEvent80x464768
        EurekaLog_PasswordRequestEventEx90x4647ac
        ExceptionManager70x47fbe8
        Language of compilation systemCountry where language is spokenMap
        RussianRussia
        ArabicSaudi Arabia
        DutchNetherlands
        EnglishCanada
        EnglishUnited States
        ChineseChina
        No network behavior found

        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Target ID:0
        Start time:13:27:05
        Start date:31/10/2024
        Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe"
        Imagebase:0x400000
        File size:3'165'184 bytes
        MD5 hash:3B97AD27C3EA67C7E6F51D23C8B11471
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:Borland Delphi
        Reputation:low
        Has exited:false

        Reset < >

          Execution Graph

          Execution Coverage:13.6%
          Dynamic/Decrypted Code Coverage:0%
          Signature Coverage:0%
          Total number of Nodes:24
          Total number of Limit Nodes:2
          execution_graph 1184 4d48ac 1185 4d48b2 1184->1185 1186 4d4814 2 API calls 1185->1186 1187 4d48bf 1185->1187 1186->1185 1168 4d4a68 1171 4d4a94 1168->1171 1169 4d4b2e 1171->1169 1172 4d48c4 1171->1172 1173 4d4814 2 API calls 1172->1173 1174 4d48d3 1173->1174 1174->1171 1179 4042c5 1182 404418 1179->1182 1180 40453c 1181 4044cc RtlUnwind 1183 4044f9 1181->1183 1182->1180 1182->1181 1157 63500e 1160 63501e 1157->1160 1158 635157 1159 635275 SetWindowLongA 1161 635291 1159->1161 1160->1158 1160->1159 1160->1161 1164 4d4814 PeekMessageA 1161->1164 1165 4d489e 1164->1165 1166 4d4830 1164->1166 1166->1165 1167 4d4896 DispatchMessageA 1166->1167 1167->1165

          Control-flow Graph

          APIs
          • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001,?,?,?,?,004D48D3), ref: 004D4827
          • DispatchMessageA.USER32(?,?,?,00000000,00000000,00000000,00000001,?,?,?,?), ref: 004D4897
          Memory Dump Source
          • Source File: 00000000.00000002.3418475369.00000000004D4000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D4000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_4d4000_SecuriteInfo.jbxd
          Similarity
          • API ID: Message$DispatchPeek
          • String ID:
          • API String ID: 1770753511-0
          • Opcode ID: b5971df827e3733edc16958296d6ae0ff2c7f9d466f20e2a83e3be021236ed64
          • Instruction ID: bf65f9a7294fb7e18f7fb1c92887795ad1e79058c01c0486106249368103e85e
          • Opcode Fuzzy Hash: b5971df827e3733edc16958296d6ae0ff2c7f9d466f20e2a83e3be021236ed64
          • Instruction Fuzzy Hash: B001C074B0068097FB30362A491276B96854FD2788F18402FF485A73C2CABD8C86932E

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 21 63500e-63501c 22 63502b-635064 21->22 23 63501e-63502a 21->23 24 635082-63508f 22->24 25 635066-635081 22->25 23->22 26 635091-63509c 24->26 25->24 26->26 27 63509e-63511b 26->27 28 635120 27->28 28->28 29 635122-635155 28->29 30 635157-63515d 29->30 31 6351b6-63520d 29->31 32 635271-635272 31->32 33 63520f-635211 31->33 35 635275-63528c SetWindowLongA 32->35 34 635213-635244 33->34 33->35 36 635291-6352bf call 4d49e8 call 4d4814 34->36 37 635246-63526b 34->37 35->36 43 6352c4-6352cc 36->43 37->32
          Memory Dump Source
          • Source File: 00000000.00000002.3418565811.0000000000635000.00000040.00000001.01000000.00000003.sdmp, Offset: 00635000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_635000_SecuriteInfo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: bf27df87212f1d796ae8b13519e6c3f47ca1167b6ab5ae672f7d92eeed529614
          • Instruction ID: 9f4c783fe546209459ede827a88f71ca8723fa201bb263d8b1b86fc03625cfb9
          • Opcode Fuzzy Hash: bf27df87212f1d796ae8b13519e6c3f47ca1167b6ab5ae672f7d92eeed529614
          • Instruction Fuzzy Hash: 2D91EE6264E2D19FC303DB7CECBA5DA7F60AE1322430A45EFD0C10F6A3E255945AC782

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 47 4042c5-404423 49 404429-404435 47->49 50 40453c-404541 47->50 51 4044a5-4044ac 49->51 52 404437-404445 49->52 53 4044cc-4044f0 RtlUnwind 51->53 54 4044ae-4044b5 51->54 52->50 57 40444b-40444f 52->57 58 4044f9-404515 call 404380 53->58 54->53 56 4044b7-4044ca 54->56 56->50 56->53 57->50 63 404455-404463 57->63 61 40451a 58->61 61->61 64 404465-404471 call 404330 63->64 65 40449c-4044a2 63->65 64->65 68 404473-40447a 64->68 65->51 68->65 69 40447c-40448b 68->69 69->50 71 404491-40449a 69->71 71->53
          APIs
          • RtlUnwind.KERNEL32(?,?,?,00000000,?,?,?,?), ref: 004044EA
          Memory Dump Source
          • Source File: 00000000.00000002.3418475369.0000000000404000.00000020.00000001.01000000.00000003.sdmp, Offset: 00404000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_404000_SecuriteInfo.jbxd
          Similarity
          • API ID: Unwind
          • String ID:
          • API String ID: 3419175465-0
          • Opcode ID: 0616b56ada8abbf3fb36af33f330dbaefe2e6fa04c6db87408b9f5ba271d88cb
          • Instruction ID: 25e6b2dab825942e371b28a1ed72f583e86be26ce86791b6e6fe299a523e0463
          • Opcode Fuzzy Hash: 0616b56ada8abbf3fb36af33f330dbaefe2e6fa04c6db87408b9f5ba271d88cb
          • Instruction Fuzzy Hash: 2E319CB5604200BFE324DB50D885F27BBA9EBC4714F19C56AFA48A7291C739EC40CB69

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 72 404416-404423 74 404429-404435 72->74 75 40453c-404541 72->75 76 4044a5-4044ac 74->76 77 404437-404445 74->77 78 4044cc-4044f0 RtlUnwind 76->78 79 4044ae-4044b5 76->79 77->75 82 40444b-40444f 77->82 83 4044f9-404515 call 404380 78->83 79->78 81 4044b7-4044ca 79->81 81->75 81->78 82->75 88 404455-404463 82->88 86 40451a 83->86 86->86 89 404465-404471 call 404330 88->89 90 40449c-4044a2 88->90 89->90 93 404473-40447a 89->93 90->76 93->90 94 40447c-40448b 93->94 94->75 96 404491-40449a 94->96 96->78
          APIs
          • RtlUnwind.KERNEL32(?,?,?,00000000,?,?,?,?), ref: 004044EA
          Memory Dump Source
          • Source File: 00000000.00000002.3418475369.0000000000404000.00000020.00000001.01000000.00000003.sdmp, Offset: 00404000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_404000_SecuriteInfo.jbxd
          Similarity
          • API ID: Unwind
          • String ID:
          • API String ID: 3419175465-0
          • Opcode ID: 8ba179296c88b0e7060bcab11527a3adf9359b36e5863dcaac974040493dcc59
          • Instruction ID: 0a2d89465c82b8c1eb7ec0554f7c693fad634bf74d01047a2e23c32c4ee80fe9
          • Opcode Fuzzy Hash: 8ba179296c88b0e7060bcab11527a3adf9359b36e5863dcaac974040493dcc59
          • Instruction Fuzzy Hash: 43216AB4204200AFD324DB51DC85F27BBA9EBC4714F19C56AFA48672A1C738EC40CA6A