Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
xxx.exe

Overview

General Information

Sample name:xxx.exe
Analysis ID:1592728
MD5:708adef6da5ac2ffee5f01f277560749
SHA1:3dedb41674634e6b53dfaea704754cee7bddfbe3
SHA256:0fec722a795adc9e313422c62e8ff0c7dac935dfef78da6560e38455a7739e4a
Tags:Backdoorexemalwareuser-Joker
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found API chain indicative of debugger detection
Machine Learning detection for sample
Uses known network protocols on non-standard ports
Contains functionality to dynamically determine API calls
Detected TCP or UDP traffic on non-standard ports
PE file contains more sections than normal
PE file contains sections with non-standard names
Program does not show much activity (idle)

Classification

  • System is w10x64
  • xxx.exe (PID: 2420 cmdline: "C:\Users\user\Desktop\xxx.exe" MD5: 708ADEF6DA5AC2FFEE5F01F277560749)
    • conhost.exe (PID: 3160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://156.245.12.57:8000/999.htmlAvira URL Cloud: Label: malware
Source: xxx.exeReversingLabs: Detection: 60%
Source: xxx.exeVirustotal: Detection: 69%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
Source: xxx.exeJoe Sandbox ML: detected

Networking

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 8000
Source: global trafficTCP traffic: 192.168.2.6:49709 -> 156.245.12.57:8000
Source: unknownTCP traffic detected without corresponding DNS query: 156.245.12.57
Source: unknownTCP traffic detected without corresponding DNS query: 156.245.12.57
Source: unknownTCP traffic detected without corresponding DNS query: 156.245.12.57
Source: unknownTCP traffic detected without corresponding DNS query: 156.245.12.57
Source: unknownTCP traffic detected without corresponding DNS query: 156.245.12.57
Source: global trafficHTTP traffic detected: GET /999.html HTTP/1.1User-Agent: Microsoft helloHost: 156.245.12.57:8000Cache-Control: no-cache
Source: xxx.exe, 00000000.00000002.2373325221.0000000000749000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://156.245.12.57/
Source: xxx.exe, 00000000.00000002.2373325221.0000000000762000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://156.245.12.57/nes
Source: xxx.exe, 00000000.00000002.2373325221.0000000000722000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://156.245.12.57:8000/999.html
Source: xxx.exe, 00000000.00000002.2373325221.0000000000762000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://156.245.12.57:8000/999.html)
Source: xxx.exe, 00000000.00000002.2373325221.0000000000762000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://156.245.12.57:8000/999.html:
Source: xxx.exeStatic PE information: Number of sections : 15 > 10
Source: classification engineClassification label: mal72.troj.evad.winEXE@2/0@0/1
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3160:120:WilError_03
Source: xxx.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\xxx.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: xxx.exeReversingLabs: Detection: 60%
Source: xxx.exeVirustotal: Detection: 69%
Source: unknownProcess created: C:\Users\user\Desktop\xxx.exe "C:\Users\user\Desktop\xxx.exe"
Source: C:\Users\user\Desktop\xxx.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\xxx.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\xxx.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\xxx.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\xxx.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\xxx.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\xxx.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\xxx.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\xxx.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\xxx.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\xxx.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\xxx.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\xxx.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\xxx.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\xxx.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\xxx.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\xxx.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\xxx.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\xxx.exeCode function: 0_2_004017A0 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,InternetOpenA,InternetConnectA,HttpOpenRequestA,malloc,InternetCloseHandle,FreeLibrary,malloc,0_2_004017A0
Source: xxx.exeStatic PE information: section name: .xdata
Source: xxx.exeStatic PE information: section name: /4
Source: xxx.exeStatic PE information: section name: /19
Source: xxx.exeStatic PE information: section name: /31
Source: xxx.exeStatic PE information: section name: /45
Source: xxx.exeStatic PE information: section name: /57
Source: xxx.exeStatic PE information: section name: /70

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 8000
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: xxx.exe, 00000000.00000002.2373325221.000000000077F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW1
Source: xxx.exe, 00000000.00000002.2373325221.000000000077F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: xxx.exe, 00000000.00000002.2373325221.0000000000722000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWPrx%SystemRoot%\system32\mswsock.dll

Anti Debugging

barindex
Source: C:\Users\user\Desktop\xxx.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_0-850
Source: C:\Users\user\Desktop\xxx.exeCode function: 0_2_004017A0 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,InternetOpenA,InternetConnectA,HttpOpenRequestA,malloc,InternetCloseHandle,FreeLibrary,malloc,0_2_004017A0
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\xxx.exeCode function: 0_2_00401180 Sleep,Sleep,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit,_initterm,GetStartupInfoA,0_2_00401180
Source: C:\Users\user\Desktop\xxx.exeCode function: 0_2_00401F50 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort,0_2_00401F50
Source: C:\Users\user\Desktop\xxx.exeCode function: 0_2_004092D0 SetUnhandledExceptionFilter,VirtualAlloc,0_2_004092D0
Source: C:\Users\user\Desktop\xxx.exeCode function: 0_2_004033A2 SetUnhandledExceptionFilter,0_2_004033A2
Source: C:\Users\user\Desktop\xxx.exeCode function: 0_2_00401E70 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00401E70
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local System11
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory11
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS2
System Information Discovery
Distributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
xxx.exe61%ReversingLabsWin64.Hacktool.Vigorf
xxx.exe69%VirustotalBrowse
xxx.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://156.245.12.57/0%Avira URL Cloudsafe
http://156.245.12.57:8000/999.html:0%Avira URL Cloudsafe
http://156.245.12.57:8000/999.html100%Avira URL Cloudmalware
http://156.245.12.57:8000/999.html)0%Avira URL Cloudsafe
http://156.245.12.57/nes0%Avira URL Cloudsafe
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://156.245.12.57:8000/999.htmlfalse
  • Avira URL Cloud: malware
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://156.245.12.57/xxx.exe, 00000000.00000002.2373325221.0000000000749000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://156.245.12.57:8000/999.html:xxx.exe, 00000000.00000002.2373325221.0000000000762000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://156.245.12.57:8000/999.html)xxx.exe, 00000000.00000002.2373325221.0000000000762000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://156.245.12.57/nesxxx.exe, 00000000.00000002.2373325221.0000000000762000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
156.245.12.57
unknownSeychelles
133199SONDERCLOUDLIMITED-AS-APSonderCloudLimitedHKfalse
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1592728
Start date and time:2025-01-16 13:26:09 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 3s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:xxx.exe
Detection:MAL
Classification:mal72.troj.evad.winEXE@2/0@0/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 4
  • Number of non-executed functions: 15
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
  • Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.109.210.53
  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
No simulations
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
156.245.12.5764tq7bFbX2.exeGet hashmaliciousReverse SSHBrowse
  • 156.245.12.57:8000/1222.txt
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
SONDERCLOUDLIMITED-AS-APSonderCloudLimitedHKhttp://m.yanhaiegou.com/Get hashmaliciousUnknownBrowse
  • 156.224.2.38
http://www.qingdaokelun.com/Get hashmaliciousUnknownBrowse
  • 156.224.2.38
sparc.nn.elfGet hashmaliciousMirai, OkiruBrowse
  • 43.225.47.36
b3astmode.m68k.elfGet hashmaliciousMiraiBrowse
  • 43.255.28.156
Payment Receipt.exeGet hashmaliciousFormBookBrowse
  • 154.197.26.133
PAYMENT CONFIRMATION.exeGet hashmaliciousFormBookBrowse
  • 154.197.26.133
PURCHASE ORDER085.exeGet hashmaliciousFormBookBrowse
  • 154.197.26.133
la.bot.mipsel.elfGet hashmaliciousUnknownBrowse
  • 154.204.52.180
Invoice Packing list For Sea Shipment.exeGet hashmaliciousFormBookBrowse
  • 154.197.26.133
64tq7bFbX2.exeGet hashmaliciousReverse SSHBrowse
  • 156.245.12.57
No context
No context
No created / dropped files found
File type:PE32+ executable (console) x86-64, for MS Windows
Entropy (8bit):4.842029604090498
TrID:
  • Win64 Executable Console (202006/5) 92.64%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • VXD Driver (31/22) 0.01%
File name:xxx.exe
File size:59'192 bytes
MD5:708adef6da5ac2ffee5f01f277560749
SHA1:3dedb41674634e6b53dfaea704754cee7bddfbe3
SHA256:0fec722a795adc9e313422c62e8ff0c7dac935dfef78da6560e38455a7739e4a
SHA512:463927da961a3a52199d2a70dbf51aed7b600e45da5e71c73c9ea9b9971c32fc77b3f1d442400a4a4fe4d0a5bc024893f633a5d898dd9e955b9ed3a8d0d3ce28
SSDEEP:768:yowvHWwPfEqTIYv4gKNwFPgxh8Imgu8e9+T:qffEqTIm4gKN2PgxWIIvu
TLSH:C54373E57AD88C9AEA14423C41FAD331657DB9E0C6534B136630B7320B12FE17ED726A
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...U}=g.t........'......&...D................@..............................0................ ............................
Icon Hash:00928e8e8686b000
Entrypoint:0x4014e0
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows cui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LARGE_ADDRESS_AWARE
DLL Characteristics:
Time Stamp:0x673D7D55 [Wed Nov 20 06:10:29 2024 UTC]
TLS Callbacks:0x402080
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:191cc1a92e1042e0db31434b9572a063
Instruction
dec eax
sub esp, 28h
dec eax
mov eax, dword ptr [00003FF5h]
mov dword ptr [eax], 00000000h
call 00007F0E444CE0EFh
call 00007F0E444CD3FAh
nop
nop
dec eax
add esp, 28h
ret
nop dword ptr [eax+00h]
nop word ptr [eax+eax+00000000h]
dec eax
sub esp, 28h
call 00007F0E444CF4FCh
dec eax
test eax, eax
sete al
movzx eax, al
neg eax
dec eax
add esp, 28h
ret
nop
nop
nop
nop
nop
nop
nop
dec eax
lea ecx, dword ptr [00000009h]
jmp 00007F0E444CD749h
nop dword ptr [eax+00h]
ret
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
push ebp
dec eax
mov ebp, esp
dec eax
sub esp, 30h
dec eax
mov eax, dword ptr [00007CE9h]
call eax
dec eax
mov dword ptr [ebp-08h], eax
dec eax
cmp dword ptr [ebp-08h], 00000000h
je 00007F0E444CD787h
dec eax
mov eax, dword ptr [ebp-08h]
mov edx, 00000000h
dec eax
mov ecx, eax
dec eax
mov eax, dword ptr [00007E71h]
call eax
nop
dec eax
add esp, 30h
pop ebp
ret
push ebp
dec eax
mov ebp, esp
dec eax
sub esp, 20h
call 00007F0E444CE010h
call 00007F0E444CD72Bh
call 00007F0E444CD780h
mov eax, 00000000h
dec eax
add esp, 20h
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x90000x8a8.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x60000x2a0.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x50e00x28.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x92280x1d8.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x25080x26001d9970466fd8d565c60b0e4d28480fe1False0.5469777960526315data5.945678227723015IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0x40000xd00x2003344b29373afadabaf1288f3f0bfdd63False0.1328125data0.7932223352655274IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rdata0x50000x5700x600b8b1ad051a4553710e4b98fd9076e25eFalse0.4322916666666667data4.077661661711834IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
.pdata0x60000x2a00x4004961940ddc1127255c55ca3bdfe37d72False0.3720703125data2.846351214959863IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
.xdata0x70000x2240x4000165fc2d877ec9ed67173770a6c9a3adFalse0.2529296875data2.525997155080107IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
.bss0x80000x9800x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata0x90000x8a80xa0097191976758225b6a2ff8d25e5fc25a3False0.323828125data3.6635182750716546IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.CRT0xa0000x680x200951504b937f19488ea79e71601f2b361False0.0703125data0.2709192282599745IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.tls0xb0000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
/40xc0000x500x2000565fd82c175c622e81779bd1036e068False0.068359375data0.19196315608732903IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/190xd0000x1f080x2000577ae72cfce1164b2c8046a167911222False0.4591064453125data5.8205017772126615IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/310xf0000x1490x2005d291f74219487bffd06356d36f3a0e4False0.375data3.2872917906726884IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/450x100000x2220x4009bc7f7e368c3d3fba5906447de5da0a1False0.28515625data3.21548751686096IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/570x110000x480x2001846a56214fe898f4ca8711598b4ec09False0.115234375data0.6690565813693202IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/700x120000x9b0x200406b70665a5983d1f1682455c669f732False0.259765625data2.320780444544343IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
DLLImport
KERNEL32.dllCreateThread, DeleteCriticalSection, EnterCriticalSection, FreeLibrary, GetConsoleWindow, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetLastError, GetProcAddress, GetStartupInfoA, GetSystemTimeAsFileTime, GetTickCount, InitializeCriticalSection, LeaveCriticalSection, LoadLibraryA, QueryPerformanceCounter, RtlAddFunctionTable, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, SetUnhandledExceptionFilter, Sleep, TerminateProcess, TlsGetValue, UnhandledExceptionFilter, VirtualAlloc, VirtualProtect, VirtualQuery, WaitForSingleObject
msvcrt.dll__C_specific_handler, __getmainargs, __initenv, __iob_func, __lconv_init, __set_app_type, __setusermatherr, _acmdln, _amsg_exit, _cexit, _fmode, _initterm, _onexit, abort, calloc, exit, fprintf, free, fwrite, malloc, memcpy, signal, strlen, strncmp, vfprintf
USER32.dllShowWindow
TimestampSource PortDest PortSource IPDest IP
Jan 16, 2025 13:27:04.183404922 CET497098000192.168.2.6156.245.12.57
Jan 16, 2025 13:27:04.188178062 CET800049709156.245.12.57192.168.2.6
Jan 16, 2025 13:27:04.189193964 CET497098000192.168.2.6156.245.12.57
Jan 16, 2025 13:27:04.189356089 CET497098000192.168.2.6156.245.12.57
Jan 16, 2025 13:27:04.194132090 CET800049709156.245.12.57192.168.2.6
Jan 16, 2025 13:27:25.544517040 CET800049709156.245.12.57192.168.2.6
Jan 16, 2025 13:27:25.547454119 CET497098000192.168.2.6156.245.12.57
Jan 16, 2025 13:27:25.585431099 CET497098000192.168.2.6156.245.12.57
Jan 16, 2025 13:27:25.590342045 CET800049709156.245.12.57192.168.2.6
  • 156.245.12.57:8000
Session IDSource IPSource PortDestination IPDestination PortPIDProcess
0192.168.2.649709156.245.12.5780002420C:\Users\user\Desktop\xxx.exe
TimestampBytes transferredDirectionData
Jan 16, 2025 13:27:04.189356089 CET106OUTGET /999.html HTTP/1.1
User-Agent: Microsoft hello
Host: 156.245.12.57:8000
Cache-Control: no-cache


Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:07:27:02
Start date:16/01/2025
Path:C:\Users\user\Desktop\xxx.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\xxx.exe"
Imagebase:0x400000
File size:59'192 bytes
MD5 hash:708ADEF6DA5AC2FFEE5F01F277560749
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:1
Start time:07:27:02
Start date:16/01/2025
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff66e660000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:15.5%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:22.3%
    Total number of Nodes:179
    Total number of Limit Nodes:3
    execution_graph 844 4014e0 849 401e70 844->849 846 4014f6 853 401180 846->853 848 4014fb 850 401eb0 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 849->850 851 401e99 849->851 852 401f0b 850->852 851->846 852->846 854 401470 GetStartupInfoA 853->854 855 4011b4 853->855 860 401480 854->860 856 4011dc Sleep 855->856 857 4011f1 855->857 856->855 858 401224 857->858 859 40143c _initterm 857->859 857->860 879 402470 858->879 859->858 863 401e70 5 API calls 860->863 862 40124c SetUnhandledExceptionFilter 909 4028d0 862->909 865 4014c6 863->865 866 401180 35 API calls 865->866 867 4014cb 866->867 867->848 868 401315 malloc 870 401387 868->870 871 40133c 868->871 869 401268 869->868 915 401588 870->915 872 401350 strlen malloc memcpy 871->872 872->872 873 401382 872->873 873->870 876 4013db 877 4013f0 876->877 878 4013e5 _cexit 876->878 877->848 878->877 880 402492 879->880 881 4024a3 879->881 880->862 881->880 882 402510 881->882 886 4025e3 881->886 882->880 885 402519 882->885 883 40270a 889 4027a0 883->889 890 40273d 883->890 888 402567 885->888 921 4022a0 885->921 886->880 886->883 887 40262a 886->887 886->888 887->886 895 4022a0 11 API calls 887->895 902 4022a0 11 API calls 887->902 888->880 899 402592 VirtualProtect 888->899 891 402860 889->891 892 4027ab 889->892 893 402744 890->893 894 4027bf signal 890->894 898 4027d1 891->898 904 402876 signal 891->904 896 4027ad 892->896 900 4027e4 892->900 893->898 893->900 901 402755 893->901 897 402840 signal 894->897 894->898 895->887 896->894 896->898 897->898 898->862 899->888 900->898 903 4027f2 signal 900->903 901->898 906 40276b signal 901->906 902->886 905 402890 signal 903->905 908 402781 903->908 904->908 905->908 907 4028b0 signal 906->907 906->908 907->908 908->862 910 4028df 909->910 911 40290c 910->911 950 402eb0 910->950 911->869 913 402907 913->911 914 4029a0 RtlAddFunctionTable 913->914 914->911 916 401595 915->916 955 401550 GetConsoleWindow 916->955 920 4013c7 920->860 920->876 922 40236e 921->922 923 4022c2 921->923 922->885 922->922 923->922 924 40232c VirtualQuery 923->924 933 402440 923->933 925 40235a 924->925 924->933 925->922 927 4023d0 VirtualProtect 925->927 926 402492 926->885 927->922 928 402400 GetLastError 927->928 928->922 929 40270a 931 4027a0 929->931 932 40273d 929->932 930 402510 930->926 941 402592 VirtualProtect 930->941 934 402860 931->934 935 4027ab 931->935 936 402744 932->936 937 4027bf signal 932->937 933->926 933->929 933->930 940 4027d1 934->940 945 402876 signal 934->945 938 4027ad 935->938 942 4027e4 935->942 936->940 936->942 943 402755 936->943 939 402840 signal 937->939 937->940 938->937 938->940 939->940 940->885 941->930 942->940 944 4027f2 signal 942->944 943->940 947 40276b signal 943->947 946 402890 signal 944->946 949 402781 944->949 945->949 946->949 948 4028b0 signal 947->948 947->949 948->949 949->885 951 402ebf 950->951 952 402f30 951->952 953 402f0e strncmp 951->953 952->913 953->951 954 402f23 953->954 954->913 956 40156c 955->956 957 4015aa 956->957 961 4017a0 957->961 960 4015ec 960->920 962 4017bc LoadLibraryA 961->962 964 401877 962->964 965 4015b7 VirtualAlloc 964->965 966 401abd InternetOpenA InternetConnectA HttpOpenRequestA 964->966 965->960 967 401b95 malloc 966->967 969 401c85 InternetCloseHandle 967->969 970 401c9f malloc 969->970 970->965 972 4029c0 977 4029e1 972->977 973 402b10 signal 976 402b26 signal 973->976 978 402a28 973->978 974 402a6b signal 975 402b60 signal 974->975 974->978 983 402a86 975->983 976->983 977->974 977->978 980 402a12 signal 977->980 977->983 978->973 978->974 979 402ac7 signal 978->979 978->983 979->978 981 402b90 signal 979->981 980->978 982 402b79 signal 980->982 981->983 982->983 987 402080 989 402092 987->989 988 4020a2 989->988 992 402d40 989->992 991 4020e7 993 402de0 992->993 994 402d4e 992->994 995 402e00 InitializeCriticalSection 993->995 996 402dea 993->996 997 402d80 994->997 1001 402d50 994->1001 995->996 996->991 999 402d8e 997->999 1000 402bb0 4 API calls 997->1000 998 402d69 998->991 999->998 1002 402da5 free 999->1002 1003 402db6 DeleteCriticalSection 999->1003 1000->999 1001->998 1005 402bb0 EnterCriticalSection 1001->1005 1002->1002 1002->1003 1003->998 1006 402c04 LeaveCriticalSection 1005->1006 1008 402bd1 1005->1008 1007 402be0 TlsGetValue GetLastError 1007->1008 1008->1006 1008->1007 1034 402c20 1035 402c44 1034->1035 1036 402c39 1034->1036 1035->1036 1037 402c5b EnterCriticalSection LeaveCriticalSection 1035->1037 1038 402ca0 1039 402cc0 EnterCriticalSection 1038->1039 1040 402cb1 1038->1040 1041 402cf3 LeaveCriticalSection 1039->1041 1044 402cd9 1039->1044 1042 402d00 1041->1042 1043 402cdf free LeaveCriticalSection 1043->1042 1044->1041 1044->1043 1009 403441 EnterCriticalSection 1046 4033e1 LeaveCriticalSection 1050 403362 VirtualQuery 1051 403422 GetCurrentProcess 1052 4033a2 SetUnhandledExceptionFilter 1010 4033c9 RtlAddFunctionTable 1017 401f50 RtlCaptureContext RtlLookupFunctionEntry 1018 401f8a RtlVirtualUnwind 1017->1018 1019 40202d 1017->1019 1020 401fc3 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess abort 1018->1020 1019->1020 1020->1019 1021 401010 1022 401058 1021->1022 1023 401075 1022->1023 1024 40106b __set_app_type 1022->1024 1024->1023 1025 402050 1026 402059 1025->1026 1027 40205d 1026->1027 1028 402d40 7 API calls 1026->1028 1029 402075 1028->1029 1053 402170 1054 40218f 1053->1054 1055 4021c6 fprintf 1054->1055 1030 403411 GetLastError 1059 4033b9 RtlLookupFunctionEntry

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_00402F40 55 Function_00402E20 0->55 1 Function_004029C0 32 Function_00402270 1->32 2 Function_00403340 3 Function_00402D40 3->32 72 Function_00402BB0 3->72 4 Function_00402240 36 Function_004032F0 4->36 5 Function_00402FC0 5->55 6 Function_004092C0 7 Function_00403441 8 Function_004032C1 9 Function_00402E42 10 Function_00405248 11 Function_004033C9 12 Function_00402250 12->36 13 Function_00403150 13->55 14 Function_00401550 15 Function_00409250 16 Function_00401F50 17 Function_00402050 17->3 18 Function_004092D0 19 Function_004028D0 33 Function_00403070 19->33 37 Function_00403000 19->37 70 Function_00402EB0 19->70 20 Function_00405258 21 Function_00403459 22 Function_0040165C 22->22 23 Function_00403460 23->36 24 Function_00401E60 25 Function_00402E60 26 Function_004014E0 34 Function_00401E70 26->34 41 Function_00401180 26->41 27 Function_004033E1 28 Function_00403362 29 Function_00409268 30 Function_00402170 30->36 31 Function_00402470 31->5 31->23 31->32 38 Function_00403200 31->38 59 Function_004022A0 31->59 33->55 35 Function_004092F0 37->55 39 Function_00402100 40 Function_00402080 40->3 41->19 41->31 41->32 41->34 41->41 45 Function_00401588 41->45 54 Function_00403320 41->54 66 Function_00403330 41->66 67 Function_00401E30 41->67 42 Function_00401D80 43 Function_00402280 44 Function_00409308 45->14 64 Function_004015AA 45->64 45->67 46 Function_00401010 46->2 46->24 47 Function_00402210 47->36 48 Function_00403310 49 Function_00402110 50 Function_00401510 51 Function_00402290 52 Function_00403411 53 Function_00409298 56 Function_00402220 56->36 57 Function_00402C20 58 Function_004017A0 59->0 59->5 59->23 59->32 59->33 59->38 59->59 60 Function_00402CA0 61 Function_004021A1 61->36 62 Function_00403422 63 Function_004033A2 64->58 65 Function_00402230 65->36 68 Function_00401130 69 Function_00401530 70->55 71 Function_004092B0 73 Function_004030B0 73->55 74 Function_00409238 75 Function_004033B9

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2370239006.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2370214895.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370267326.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370383192.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_xxx.jbxd
    Similarity
    • API ID: Internet$Openmalloc$CloseConnectHandleHttpLibraryLoadRequest
    • String ID: /999.html$156.245.12.57$CopyRigh$CopyRigh$GET$HttpOpenRequestA$HttpQueryInfoA$HttpSendRequestA$IT CopyR$IT CopyR$IT CopyR$InternetCloseHandle$InternetConnectA$InternetOpenA$InternetReadFile$MEM_COMM$MEM_COMM$MEM_COMM$Microsoft hello$Tencent $Tencent $XXXX$XXXXXXXX$XXXXXXXX$cent Cop$cent Cop$cent Cop$encent C$encent C$encent C$ent XXXX$ent XXXX$ght Tenc$ght Tenc$ight Ten$ight Ten$ight Ten$opyRight$opyRight$opyRight$t CopyRi$t CopyRi$t Tencen$t Tencen$wininet.dll$yRight T$yRight T$yRight T
    • API String ID: 3960302653-128515283
    • Opcode ID: b2fd95e36666364703eaf851509934c6ea6cea117421421dc962a3e4ba1a12af
    • Instruction ID: 3c36c2c077fc438c6c1a4d6e509bfeac211268eb7f4e3b4fbf769b21ae011445
    • Opcode Fuzzy Hash: b2fd95e36666364703eaf851509934c6ea6cea117421421dc962a3e4ba1a12af
    • Instruction Fuzzy Hash: 8CE1E772711B858DDB60CF6AE89079937B4F348B88F10412ADB4D9BB58DF78C648C781

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 41 401180-4011ae 42 401470-401473 GetStartupInfoA 41->42 43 4011b4-4011d1 41->43 47 401480-401499 call 4032a8 42->47 44 4011e4-4011ef 43->44 45 4011f1-4011ff 44->45 46 4011d3-4011d6 44->46 51 401205-401209 45->51 52 401427-401436 call 4032b8 45->52 49 401410-401421 46->49 50 4011dc-4011e1 Sleep 46->50 59 40149e-4014a0 call 403288 47->59 49->51 49->52 50->44 51->47 55 40120f-40121e 51->55 57 401224-401226 52->57 58 40143c-401457 _initterm 52->58 55->57 55->58 60 40122c-401239 57->60 61 40145d-401462 57->61 58->60 58->61 66 4014a5-4014d1 call 401e70 call 401180 59->66 63 401247-401294 call 402470 SetUnhandledExceptionFilter call 4028d0 call 403320 call 402270 call 403330 60->63 64 40123b-401243 60->64 61->60 80 4012b2-4012b8 63->80 81 401296 63->81 64->63 82 4012a0-4012a2 80->82 83 4012ba-4012c8 80->83 84 4012f7-4012fd 81->84 88 4012d0-4012d2 82->88 89 4012a4-4012a7 82->89 85 4012ae 83->85 86 401315-40133a malloc 84->86 87 4012ff-401309 84->87 85->80 94 401387-4013c2 call 401e30 call 401588 86->94 95 40133c-401349 86->95 92 401400-401405 87->92 93 40130f 87->93 90 4012d4 88->90 91 4012e5-4012ee 88->91 89->88 96 4012a9 89->96 97 4012f0 90->97 91->97 98 4012e0-4012e3 91->98 92->93 93->86 104 4013c7-4013d5 94->104 99 401350-401380 strlen malloc memcpy 95->99 96->85 97->84 98->91 98->97 99->99 102 401382 99->102 102->94 104->59 105 4013db-4013e3 104->105 106 4013f0-4013ff 105->106 107 4013e5-4013ea _cexit 105->107 107->106
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2370239006.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2370214895.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370267326.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370383192.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_xxx.jbxd
    Similarity
    • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandled_cexitmemcpystrlen
    • String ID:
    • API String ID: 1640792405-0
    • Opcode ID: 0954b3694baacaf48436a9a8ee44d7ac150c5adbe548537c8d1895e4a10b6682
    • Instruction ID: ea2f29701c89ca8dfbee96cc60a3a68199d30d9076494749b550177da3f66ef6
    • Opcode Fuzzy Hash: 0954b3694baacaf48436a9a8ee44d7ac150c5adbe548537c8d1895e4a10b6682
    • Instruction Fuzzy Hash: EE818AB1601A4486EB249F66E99476A37A1F745B89F84803FDF49B73A1DF3CC844CB08

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 108 401550-40156a GetConsoleWindow 109 401581-401587 108->109 110 40156c-401578 108->110 110->109
    APIs
    • GetConsoleWindow.KERNELBASE(?,?,?,?,?,0040159A,?,?,00000000,004013C7), ref: 0040155F
    Memory Dump Source
    • Source File: 00000000.00000002.2370239006.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2370214895.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370267326.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370383192.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_xxx.jbxd
    Similarity
    • API ID: ConsoleWindow
    • String ID:
    • API String ID: 2863861424-0
    • Opcode ID: ac3a97e1634f0332591932c13c106f9a5b7eace5186cc33a1fb14bfda8fbcc11
    • Instruction ID: e24cf67216d1ab02ccd18ab40ba9f1eb7f84ff5ca993fd911345df1f03c0be25
    • Opcode Fuzzy Hash: ac3a97e1634f0332591932c13c106f9a5b7eace5186cc33a1fb14bfda8fbcc11
    • Instruction Fuzzy Hash: 03D01725B20A04A8FB00AB65E8853992364A394B84F1844658E1C2B7B5CE38CA928744

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 111 4015aa-4015ea call 4017a0 VirtualAlloc 114 401655-40165b 111->114 115 4015ec-40164c call 403260 111->115 115->114
    APIs
      • Part of subcall function 004017A0: LoadLibraryA.KERNELBASE ref: 00401862
    • VirtualAlloc.KERNELBASE(?,?,?,?,?,?,?,?,?,0040159F,?,?,00000000,004013C7), ref: 004015DF
    Memory Dump Source
    • Source File: 00000000.00000002.2370239006.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2370214895.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370267326.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370383192.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_xxx.jbxd
    Similarity
    • API ID: AllocLibraryLoadVirtual
    • String ID:
    • API String ID: 3550616410-0
    • Opcode ID: eafd87b135870c3277d1ccb590904b627431a5bc32bd014144406af69be3b908
    • Instruction ID: 4d6643ed699146b276a85ed69641cd72d8d7df6af8af531d979a5cbfa9694d85
    • Opcode Fuzzy Hash: eafd87b135870c3277d1ccb590904b627431a5bc32bd014144406af69be3b908
    • Instruction Fuzzy Hash: F0112D76700B0489EB009BAAE85435E3BB1E388BD8F044929DF5D67BA4DF39CA818744

    Control-flow Graph

    APIs
    • RtlCaptureContext.KERNEL32 ref: 00401F64
    • RtlLookupFunctionEntry.KERNEL32 ref: 00401F7B
    • RtlVirtualUnwind.KERNEL32 ref: 00401FBD
    • SetUnhandledExceptionFilter.KERNEL32 ref: 00402001
    • UnhandledExceptionFilter.KERNEL32 ref: 0040200E
    • GetCurrentProcess.KERNEL32 ref: 00402014
    • TerminateProcess.KERNEL32 ref: 00402022
    • abort.MSVCRT ref: 00402028
    Memory Dump Source
    • Source File: 00000000.00000002.2370239006.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2370214895.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370267326.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370383192.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_xxx.jbxd
    Similarity
    • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentEntryFunctionLookupTerminateUnwindVirtualabort
    • String ID:
    • API String ID: 4278921479-0
    • Opcode ID: 9474b6d637d2d7a1735b837779f0a1567275c65c6a34296a95fcf03fa00a03f2
    • Instruction ID: 25590cd0e67d04b1e19e5fc1bcb133da58d7b8fb258ee1e17525615f4a9cbbee
    • Opcode Fuzzy Hash: 9474b6d637d2d7a1735b837779f0a1567275c65c6a34296a95fcf03fa00a03f2
    • Instruction Fuzzy Hash: 6021E2B5211F40E5EB009B65FC8439937B4F748B88F54452ADB8E67765EF38C559C308

    Control-flow Graph

    APIs
    • GetSystemTimeAsFileTime.KERNEL32 ref: 00401EB5
    • GetCurrentProcessId.KERNEL32 ref: 00401EC0
    • GetCurrentThreadId.KERNEL32 ref: 00401EC9
    • GetTickCount.KERNEL32 ref: 00401ED1
    • QueryPerformanceCounter.KERNEL32 ref: 00401EDE
    Memory Dump Source
    • Source File: 00000000.00000002.2370239006.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2370214895.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370267326.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370383192.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_xxx.jbxd
    Similarity
    • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
    • String ID:
    • API String ID: 1445889803-0
    • Opcode ID: 2456c897c62cbc58719bd7a6c4698752e8cca155e7f1a7114fe4868682ca05a5
    • Instruction ID: adfdb1e8f61912ef08abcb7e4b2a66cfdf938e31af663a5420e4cc81110beb83
    • Opcode Fuzzy Hash: 2456c897c62cbc58719bd7a6c4698752e8cca155e7f1a7114fe4868682ca05a5
    • Instruction Fuzzy Hash: B0114CA6666A5096FB514B25FC0435A73A0B7887B4F081B759F9C63BB4EA3CC885C308
    Memory Dump Source
    • Source File: 00000000.00000002.2370383192.0000000000409000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2370214895.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370239006.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370267326.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_xxx.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 6abe578a5aea196964e5cdf3f5bb485af5d2d31395725cb81f48671ea75b4910
    • Instruction ID: 58e5ecbea247effba85de43e6ad4148bbd663c4c32f591b95d6ba4a48949005a
    • Opcode Fuzzy Hash: 6abe578a5aea196964e5cdf3f5bb485af5d2d31395725cb81f48671ea75b4910
    • Instruction Fuzzy Hash: 15D04C4B54E6C55AD3224F6849B748D3FA5A47352434D949F8741977C3DA1D4C09831A
    Memory Dump Source
    • Source File: 00000000.00000002.2370239006.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2370214895.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370267326.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370383192.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_xxx.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c1dea916ac6609828f7ed1e9cf68ee35b638575fa28bfcf384e33bea4e0a6556
    • Instruction ID: 62ce8bfdcad9cfd8380e5864bf5f7c059ad3affd64876bb8c22f983b5634fcf7
    • Opcode Fuzzy Hash: c1dea916ac6609828f7ed1e9cf68ee35b638575fa28bfcf384e33bea4e0a6556
    • Instruction Fuzzy Hash: 5BB0929768E6D05AE31B4B386A223AC7F34F783A04F4D569697C4139D7C2248468C319

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 131 402470-402490 132 402492-4024a2 131->132 133 4024a3-4024fa call 402fc0 call 403200 131->133 133->132 138 4024fc-402502 133->138 139 4025d0-4025d2 138->139 140 402508-40250a 138->140 141 402510-402513 139->141 142 4025d8-4025dd 139->142 140->141 143 4025b4-4025b9 140->143 141->132 144 402519-402538 141->144 142->141 145 4025e3-4025e9 142->145 143->141 146 4025bf-4025c4 143->146 148 402544-402565 call 4022a0 144->148 149 40271e-40273b call 403460 145->149 150 4025ef-40260b 145->150 146->145 147 4025c6-4025cd 146->147 147->139 161 402540 148->161 162 402567-402578 148->162 163 4027a0-4027a5 149->163 164 40273d-402742 149->164 151 402655-40266a 150->151 152 40260d 150->152 157 402612 151->157 158 40266c-40269d call 4022a0 151->158 152->132 159 4026d0-4026d3 157->159 160 402618-40261b 157->160 176 402648-40264f 158->176 166 4026d5-402705 call 4022a0 159->166 167 40270a-402719 call 403460 159->167 168 4026a0-4026ca call 4022a0 160->168 169 402621-402624 160->169 161->148 162->132 172 40257e 162->172 170 402860-402870 call 403258 163->170 171 4027ab 163->171 173 402744-402749 164->173 174 4027bf-4027cf signal 164->174 166->176 167->149 168->176 169->167 180 40262a-402643 call 4022a0 169->180 185 4027d1-4027d4 170->185 205 402876-402887 signal 170->205 181 4027e4-4027e9 171->181 182 4027ad-4027b2 171->182 183 402580-402590 172->183 187 402854-40285a 173->187 188 40274f 173->188 184 402840-40284f signal call 402270 174->184 174->185 176->151 176->162 180->176 181->187 189 4027eb-4027f0 181->189 182->187 199 4027b8-4027bd 182->199 192 4025a0-4025ad 183->192 193 402592-40259d VirtualProtect 183->193 184->187 200 4027d6-4027e3 185->200 201 40282e-402837 185->201 196 402820-402825 188->196 197 402755-40275a 188->197 189->201 202 4027f2-402802 signal 189->202 192->183 204 4025af 192->204 193->192 196->202 203 402827-40282c 196->203 197->187 206 402760-402765 197->206 199->174 199->201 207 402890-4028a1 signal 202->207 208 402808-40280b 202->208 203->187 203->201 204->132 209 402793-402797 205->209 206->201 210 40276b-40277b signal 206->210 207->209 212 402811-40281e 208->212 213 4028c6-4028cb 208->213 214 4028b0-4028c1 signal 210->214 215 402781-402784 210->215 213->209 214->209 215->213 216 40278a-402791 215->216 216->209
    APIs
    • VirtualProtect.KERNEL32(00408610,00007FFDB240ADA0,?,?,?,00000001,0040124C), ref: 0040259D
    Strings
    • pU@, xrefs: 004024C9
    • Unknown pseudo relocation bit size %d., xrefs: 0040270A
    • pU@, xrefs: 004024DA
    • Unknown pseudo relocation protocol version %d., xrefs: 0040271E
    Memory Dump Source
    • Source File: 00000000.00000002.2370239006.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2370214895.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370267326.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370383192.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_xxx.jbxd
    Similarity
    • API ID: ProtectVirtual
    • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.$pU@$pU@
    • API String ID: 544645111-2893283971
    • Opcode ID: 767fd6d0b4d2a02477aa7ec368c021c23978f4f96e2b5fd5f9b04f1d1f99b736
    • Instruction ID: afb65e7e837822a32bc7afbf5d61c16894896f3568a5e5339a79abaa955d43a4
    • Opcode Fuzzy Hash: 767fd6d0b4d2a02477aa7ec368c021c23978f4f96e2b5fd5f9b04f1d1f99b736
    • Instruction Fuzzy Hash: 02917772B0065056EB28AB66CA4831F6352B7943A8F64C53BCF08737D4DABDC986830D

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 219 4029c0-4029db 220 402aa0-402aa4 219->220 221 4029e1-4029e6 219->221 220->221 222 402aaa-402ab4 220->222 223 402a50-402a55 221->223 224 4029e8-4029ed 221->224 225 402b10-402b20 signal 223->225 226 402a5b 223->226 227 402a6b-402a7b signal 224->227 228 4029ef-4029f4 224->228 232 402a81-402a84 225->232 233 402b26-402b3a signal 225->233 229 402ab5-402aba 226->229 230 402a5d-402a62 226->230 231 402b60-402b74 signal call 402270 227->231 227->232 228->222 234 4029fa 228->234 229->222 237 402abc-402ac1 229->237 230->222 239 402a64-402a69 230->239 231->222 240 402a31-402a3b 232->240 241 402a86-402a8d 232->241 242 402a92-402a97 233->242 235 402a00-402a05 234->235 236 402af4-402af9 234->236 235->222 243 402a0b-402a10 235->243 244 402ac7-402ad7 signal 236->244 248 402afb-402b00 236->248 237->240 237->244 239->227 239->240 246 402b51-402b53 240->246 247 402a41-402a48 240->247 241->242 243->240 249 402a12-402a22 signal 243->249 250 402b90-402ba2 signal 244->250 251 402add-402ae0 244->251 246->242 247->223 248->240 252 402b06 248->252 254 402a28-402a2b 249->254 255 402b79-402b8b signal 249->255 250->242 251->240 256 402ae6-402af2 251->256 252->222 254->240 257 402b40-402b4c 254->257 255->242 256->242 257->242
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2370239006.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2370214895.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370267326.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370383192.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_xxx.jbxd
    Similarity
    • API ID: signal
    • String ID: CCG
    • API String ID: 1946981877-1584390748
    • Opcode ID: 29911268020bb597e0b8514571365ee87cd46d08841e64603e415505ec3442d0
    • Instruction ID: 5fb07f66a556ee689f3838c1c380e0e50e032e8bd04b8e9b82989a8055084e7a
    • Opcode Fuzzy Hash: 29911268020bb597e0b8514571365ee87cd46d08841e64603e415505ec3442d0
    • Instruction Fuzzy Hash: B231722070050156EE7865BA465D33B12519BC9338F288B3B9E2DA73D6DDFC8DC54A1E

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 264 4022a0-4022bc 265 4022c2-4022cf 264->265 266 402428 264->266 267 4022d0-4022d6 265->267 268 40242f-40243b 266->268 269 4022d8-4022e6 267->269 270 4022ec-4022f5 267->270 273 402398-4023a2 268->273 269->270 271 402375-402378 269->271 270->267 272 4022f7-402305 call 402f40 270->272 275 4023a3-4023b5 271->275 276 40237a-40237e 271->276 282 40230b-402354 call 403070 VirtualQuery 272->282 283 40245d-402490 call 403460 272->283 275->273 277 4023b7-4023ba 275->277 279 402414-402423 276->279 280 402384-402386 276->280 281 4023bc-4023cc 277->281 279->273 280->273 284 402388-402392 280->284 281->281 285 4023ce 281->285 290 402440-402458 call 403460 282->290 291 40235a-402364 282->291 295 402492-4024a2 283->295 296 4024a3-4024fa call 402fc0 call 403200 283->296 284->268 284->273 285->273 290->283 293 402366-40236c 291->293 294 40236e 291->294 293->294 298 4023d0-4023fa VirtualProtect 293->298 294->271 296->295 305 4024fc-402502 296->305 298->294 300 402400-40240f GetLastError call 403460 298->300 300->279 306 4025d0-4025d2 305->306 307 402508-40250a 305->307 308 402510-402513 306->308 309 4025d8-4025dd 306->309 307->308 310 4025b4-4025b9 307->310 308->295 311 402519-402538 308->311 309->308 312 4025e3-4025e9 309->312 310->308 313 4025bf-4025c4 310->313 315 402544-402565 call 4022a0 311->315 316 40271e-40273b call 403460 312->316 317 4025ef-40260b 312->317 313->312 314 4025c6-4025cd 313->314 314->306 328 402540 315->328 329 402567-402578 315->329 330 4027a0-4027a5 316->330 331 40273d-402742 316->331 318 402655-40266a 317->318 319 40260d 317->319 324 402612 318->324 325 40266c-40269d call 4022a0 318->325 319->295 326 4026d0-4026d3 324->326 327 402618-40261b 324->327 343 402648-40264f 325->343 333 4026d5-402705 call 4022a0 326->333 334 40270a-402719 call 403460 326->334 335 4026a0-4026ca call 4022a0 327->335 336 402621-402624 327->336 328->315 329->295 339 40257e 329->339 337 402860-402870 call 403258 330->337 338 4027ab 330->338 340 402744-402749 331->340 341 4027bf-4027cf signal 331->341 333->343 334->316 335->343 336->334 347 40262a-402643 call 4022a0 336->347 352 4027d1-4027d4 337->352 372 402876-402887 signal 337->372 348 4027e4-4027e9 338->348 349 4027ad-4027b2 338->349 350 402580-402590 339->350 354 402854-40285a 340->354 355 40274f 340->355 351 402840-40284f signal call 402270 341->351 341->352 343->318 343->329 347->343 348->354 356 4027eb-4027f0 348->356 349->354 366 4027b8-4027bd 349->366 359 4025a0-4025ad 350->359 360 402592-40259d VirtualProtect 350->360 351->354 367 4027d6-4027e3 352->367 368 40282e-402837 352->368 363 402820-402825 355->363 364 402755-40275a 355->364 356->368 369 4027f2-402802 signal 356->369 359->350 371 4025af 359->371 360->359 363->369 370 402827-40282c 363->370 364->354 373 402760-402765 364->373 366->341 366->368 374 402890-4028a1 signal 369->374 375 402808-40280b 369->375 370->354 370->368 371->295 376 402793-402797 372->376 373->368 377 40276b-40277b signal 373->377 374->376 379 402811-40281e 375->379 380 4028c6-4028cb 375->380 381 4028b0-4028c1 signal 377->381 382 402781-402784 377->382 380->376 381->376 382->380 383 40278a-402791 382->383 383->376
    APIs
    Strings
    • Address %p has no image-section, xrefs: 0040245D
    • VirtualQuery failed for %d bytes at address %p, xrefs: 00402447
    • VirtualProtect failed with code 0x%x, xrefs: 00402406
    Memory Dump Source
    • Source File: 00000000.00000002.2370239006.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2370214895.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370267326.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370383192.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_xxx.jbxd
    Similarity
    • API ID: Virtual$ErrorLastProtectQuery
    • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section
    • API String ID: 637304234-2123141913
    • Opcode ID: 8bdda79e6ba61ad4cb12dd9ff82670264fb198e95138789142b9f3fd19f94e88
    • Instruction ID: baf10d0ae329835526f7ee2695b2a14063346a779cac995f20aedbf5fdf9dac7
    • Opcode Fuzzy Hash: 8bdda79e6ba61ad4cb12dd9ff82670264fb198e95138789142b9f3fd19f94e88
    • Instruction Fuzzy Hash: 465100B3701A5086DB118F26EA0475E77A4BB89BA8F44813ADF49673D4DA7CC981C708

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 392 402170-402189 393 402260-402267 392->393 394 40218f-40219c 392->394 395 4021a8-402207 call 4032f0 fprintf 393->395 394->395
    APIs
    Strings
    • Unknown error, xrefs: 00402260
    • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 004021D9
    Memory Dump Source
    • Source File: 00000000.00000002.2370239006.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2370214895.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370267326.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370383192.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_xxx.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-3474627141
    • Opcode ID: 815495cc06a669c11f7df09f4818bfb55627af6126bd4e7bda4086a7cfc6ebf9
    • Instruction ID: 0ecc8f07ef23696e6b77e6791d1d031f4a1428b2dd59512c4aa1310c33ba51a6
    • Opcode Fuzzy Hash: 815495cc06a669c11f7df09f4818bfb55627af6126bd4e7bda4086a7cfc6ebf9
    • Instruction Fuzzy Hash: 9F018462904E88C6D6168F5CD8413EA7374FF9975AF24531AEF883A260DB39D653CB04
    APIs
    Strings
    • Total loss of significance (TLOSS), xrefs: 00402240
    • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 004021D9
    Memory Dump Source
    • Source File: 00000000.00000002.2370239006.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2370214895.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370267326.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370383192.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_xxx.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-4273532761
    • Opcode ID: 0d8a152475ba6b39ba2e50f73e6c82ad82122dfc362ef67b0340b5d7aaa2c495
    • Instruction ID: 159f28f85f34b88c94cab90bceff089bfadd26e80cc4720fa028cd8df1c9122a
    • Opcode Fuzzy Hash: 0d8a152475ba6b39ba2e50f73e6c82ad82122dfc362ef67b0340b5d7aaa2c495
    • Instruction Fuzzy Hash: 05F09662804E8485D2028F1CA4003ABB374FF9D789F18531AEF893A564DB38C6438704
    APIs
    Strings
    • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 004021D9
    • Partial loss of significance (PLOSS), xrefs: 00402250
    Memory Dump Source
    • Source File: 00000000.00000002.2370239006.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2370214895.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370267326.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370383192.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_xxx.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-4283191376
    • Opcode ID: b5f6c215bcffa1346815a4a596f697511ddd50dcf93ac61e13fd41b48a855d5f
    • Instruction ID: 886e5dfa040ba4b94c4076f6b7e3ab43a6257d540f2971375d074bf13730864f
    • Opcode Fuzzy Hash: b5f6c215bcffa1346815a4a596f697511ddd50dcf93ac61e13fd41b48a855d5f
    • Instruction Fuzzy Hash: C4F09662804E8485D2018F1CA4003ABB374FF9D789F18531AEF893A164DB38C6478704

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 398 402210-402217 call 4032f0 fprintf
    APIs
    Strings
    • Argument singularity (SIGN), xrefs: 00402210
    • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 004021D9
    Memory Dump Source
    • Source File: 00000000.00000002.2370239006.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2370214895.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370267326.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370383192.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_xxx.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-2468659920
    • Opcode ID: f2b95ac2e3bbf30aacec077ee1d03aa10a6335291fcaa89b0dfbebe26c356ade
    • Instruction ID: e8e84fa61fffc8fe8fce6851db4ee6aa3b9609a81311b1e95b538913ca09ae8a
    • Opcode Fuzzy Hash: f2b95ac2e3bbf30aacec077ee1d03aa10a6335291fcaa89b0dfbebe26c356ade
    • Instruction Fuzzy Hash: FEF09062804E8482D2028F1CA8003ABB374FF9E789F28531AEF893A164DB38C6478704

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 402 402220-402227 call 4032f0 fprintf
    APIs
    Strings
    • Overflow range error (OVERFLOW), xrefs: 00402220
    • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 004021D9
    Memory Dump Source
    • Source File: 00000000.00000002.2370239006.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2370214895.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370267326.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370383192.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_xxx.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-4064033741
    • Opcode ID: 7d951daa4ff57d630aebd49a2f7fad10b3c79d1ea1de0c31444e1624c60ebb3a
    • Instruction ID: cac4ea28ccfeaa8642976d1119164a518ba96263969e67eac16651abee439338
    • Opcode Fuzzy Hash: 7d951daa4ff57d630aebd49a2f7fad10b3c79d1ea1de0c31444e1624c60ebb3a
    • Instruction Fuzzy Hash: D3F09662804E8481D2018F1CA4003ABB374FF9D789F18531AEF893A164DB38C6438704

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 406 402230-402237 call 4032f0 fprintf
    APIs
    Strings
    • The result is too small to be represented (UNDERFLOW), xrefs: 00402230
    • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 004021D9
    Memory Dump Source
    • Source File: 00000000.00000002.2370239006.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2370214895.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370267326.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370383192.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_xxx.jbxd
    Similarity
    • API ID: fprintf
    • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-2187435201
    • Opcode ID: 4e0dee6086b4afd15aafa5af03324ff2c77326b32a907f024217e96a79bf41c4
    • Instruction ID: 2cfbbe4a6ee732bfd0bd21a1b3c17089a390089ff56a43040340a512bbb3e76b
    • Opcode Fuzzy Hash: 4e0dee6086b4afd15aafa5af03324ff2c77326b32a907f024217e96a79bf41c4
    • Instruction Fuzzy Hash: 47F09062804E8482D2028F1CA8003ABB374FF9E789F28531AEF893A164DB38C6438704
    APIs
    Strings
    • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 004021D9
    • Argument domain error (DOMAIN), xrefs: 004021A1
    Memory Dump Source
    • Source File: 00000000.00000002.2370239006.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2370214895.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370267326.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370383192.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_xxx.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-2713391170
    • Opcode ID: 65b1a75ff62779ea885516d5648b562b15a1310304c9c6257b1541e63d385820
    • Instruction ID: 683080fa03ca09585ab4c8deeeb86514487a582436e01e827d1a7338dae3eddb
    • Opcode Fuzzy Hash: 65b1a75ff62779ea885516d5648b562b15a1310304c9c6257b1541e63d385820
    • Instruction Fuzzy Hash: A9F05B66914F8485D201DF1DA40039BB374FF5D799F54531AEF893A525DB38C643C704
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2370239006.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2370214895.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370267326.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2370383192.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2371475803.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_xxx.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeavefree
    • String ID:
    • API String ID: 4020351045-0
    • Opcode ID: 9098aa0dc806bcf1f5c63ba432f6fd4bd59aed2620ea17ca8393637b50cf7412
    • Instruction ID: aa580be9640d9d5be08535393c3a1415d6d1d86b601a11bc958fde33e8efb4e3
    • Opcode Fuzzy Hash: 9098aa0dc806bcf1f5c63ba432f6fd4bd59aed2620ea17ca8393637b50cf7412
    • Instruction Fuzzy Hash: 870171A1301A00D6EF08DB55EA8436A23A0FB94B41F54887ACB0DA73A0DFBCCD819348