Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exe
Analysis ID:1431445
MD5:6e2ade4a332a81a6e18d1101361ac7c7
SHA1:ca050814550fab318f4bc93b5d680594951111cf
SHA256:7b6f17f1369b7e4cfab6b6c64a2ef4a9192d950d7ea1b08a9e5e6ebc9b8130c2
Tags:exe
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Contains functionality to call native functions
PE file contains an invalid checksum
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exeAvira: detected
Source: SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exeVirustotal: Detection: 12%Perma Link
Source: SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: Binary string: empty.pdb| source: SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exe
Source: Binary string: empty.pdb source: SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exe
Source: SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exeString found in binary or memory: http://img1.tbcdn.cn/tfscom/T1ouC2FdpbXXXtxVjX.swf
Source: SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exeString found in binary or memory: http://jd.sscltan.com/jd/sscjh.txt
Source: SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exeString found in binary or memory: http://jd.sscltan.com/jd/tp1.txt
Source: SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exeString found in binary or memory: http://jd.sscltan.com/jd/tp1.txthttp://jd.sscltan.com/jd/tp2.txt
Source: SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exeString found in binary or memory: http://jd.sscltan.com/jd/tp2.txt
Source: SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exeString found in binary or memory: http://jd.sscltan.com/jd/zgg.txt
Source: SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exeString found in binary or memory: http://s104.cnzz.com/stat.php?id=1935778&web_id=1935778
Source: SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exeString found in binary or memory: http://www.sscltan.com
Source: SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exeString found in binary or memory: http://www.sscltan.comhttp://jd.sscltan.com/jd/zgg.txt
Source: SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exeString found in binary or memory: https://http://=deletedUTF-8GBKAdodb.StreamTypeWritePositionCharsetReadTextCloseWriteTextRead
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exeCode function: 0_2_01001A88 VirtualAlloc,NtQuerySystemInformation,VirtualFree,RtlUnicodeStringToAnsiString,strrchr,strncpy,malloc,strncpy,strncat,strncat,0_2_01001A88
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exeCode function: 0_2_01001F7D NtSetSystemInformation,0_2_01001F7D
Source: SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exe, 00000000.00000002.1224089803.00000000012D4000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameempty.exej% vs SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exe
Source: SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exeBinary or memory string: OriginalFilenameempty.exej% vs SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exe
Source: SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@2/1@0/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exeCode function: 0_2_01001D1B GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueA,GetLastError,AdjustTokenPrivileges,GetLastError,printf,0_2_01001D1B
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5280:120:WilError_03
Source: SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exeVirustotal: Detection: 12%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exeSection loaded: apphelp.dllJump to behavior
Source: SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exeStatic file information: File size 6005077 > 1048576
Source: SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: empty.pdb| source: SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exe
Source: Binary string: empty.pdb source: SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exe
Source: SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exeStatic PE information: real checksum: 0x3e9f should be: 0x5c5790
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exeCode function: 0_2_01001A6B push ecx; ret 0_2_01001A7B
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exeCode function: 0_2_01001765 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,GetModuleHandleA,GetProcAddress,0_2_01001765
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Access Token Manipulation
1
Access Token Manipulation
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Process Injection
1
Process Injection
LSASS Memory2
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
DLL Side-Loading
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exe13%VirustotalBrowse
SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exe100%AviraHEUR/AGEN.1355761
SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://jd.sscltan.com/jd/sscjh.txt0%Avira URL Cloudsafe
http://jd.sscltan.com/jd/tp2.txt0%Avira URL Cloudsafe
http://jd.sscltan.com/jd/tp1.txthttp://jd.sscltan.com/jd/tp2.txt0%Avira URL Cloudsafe
http://jd.sscltan.com/jd/tp1.txt0%Avira URL Cloudsafe
http://jd.sscltan.com/jd/zgg.txt0%Avira URL Cloudsafe
http://jd.sscltan.com/jd/tp2.txt0%VirustotalBrowse
http://jd.sscltan.com/jd/zgg.txt1%VirustotalBrowse
http://www.sscltan.comhttp://jd.sscltan.com/jd/zgg.txt0%Avira URL Cloudsafe
https://http://=deletedUTF-8GBKAdodb.StreamTypeWritePositionCharsetReadTextCloseWriteTextRead0%Avira URL Cloudsafe
http://jd.sscltan.com/jd/tp1.txt0%VirustotalBrowse
http://www.sscltan.com0%Avira URL Cloudsafe
http://www.sscltan.com1%VirustotalBrowse
http://jd.sscltan.com/jd/sscjh.txt0%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://jd.sscltan.com/jd/tp1.txthttp://jd.sscltan.com/jd/tp2.txtSecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exefalse
  • Avira URL Cloud: safe
unknown
http://jd.sscltan.com/jd/sscjh.txtSecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exefalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://jd.sscltan.com/jd/tp2.txtSecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exefalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://jd.sscltan.com/jd/zgg.txtSecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exefalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://jd.sscltan.com/jd/tp1.txtSecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exefalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://http://=deletedUTF-8GBKAdodb.StreamTypeWritePositionCharsetReadTextCloseWriteTextReadSecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exefalse
  • Avira URL Cloud: safe
low
http://www.sscltan.comhttp://jd.sscltan.com/jd/zgg.txtSecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exefalse
  • Avira URL Cloud: safe
unknown
http://img1.tbcdn.cn/tfscom/T1ouC2FdpbXXXtxVjX.swfSecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exefalse
    high
    http://www.sscltan.comSecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exefalse
    • 1%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://s104.cnzz.com/stat.php?id=1935778&web_id=1935778SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exefalse
      high
      No contacted IP infos
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1431445
      Start date and time:2024-04-25 05:30:23 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 3m 57s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:13
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exe
      Detection:MAL
      Classification:mal60.winEXE@2/1@0/0
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 2
      • Number of non-executed functions: 9
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, Sgrmuserer.exe, conhost.exe, svchost.exe
      • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      No simulations
      No context
      No context
      No context
      No context
      No context
      Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):26
      Entropy (8bit):3.796217602590056
      Encrypted:false
      SSDEEP:3:x3FbREJCKvn:dFbREMKv
      MD5:086C526845287751BED13107B8B7DE42
      SHA1:C2482932161156B79C00AB15B6B5DE8CE0626A45
      SHA-256:85CB94425FC238E1E88BCDEBBC46654D71288250072183352B911104BE6E8C88
      SHA-512:6C6C1340802E03E10783192252DBA723E385B689819E15DFDA455EBEA5CEE06792312CCAE1F03FB1A375D2CBF5F0F24110BF33F1DFF8300E3BEEB23952A55D4C
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview:missing pid or task name..
      File type:PE32 executable (console) Intel 80386, for MS Windows
      Entropy (8bit):7.344026093594585
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.83%
      • Windows Screen Saver (13104/52) 0.13%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exe
      File size:6'005'077 bytes
      MD5:6e2ade4a332a81a6e18d1101361ac7c7
      SHA1:ca050814550fab318f4bc93b5d680594951111cf
      SHA256:7b6f17f1369b7e4cfab6b6c64a2ef4a9192d950d7ea1b08a9e5e6ebc9b8130c2
      SHA512:35542f786770b464d5d3587245a3440ed866b7f469ac226dd8e9126814167c9451125b442321c394189e7016f35fdbaa3dca300ceeaafbcef5f77f3c0b6d5fef
      SSDEEP:98304:XusiD2IRbHfi8MfpnwFP3FtkfvoOYuXspmSGc0GD9aj:XHiD2gL3+pnm3Ft4YuXspm6Jo
      TLSH:6D560185FB628422D85E0170E96A83F8B374DD94CA5D63233299FF1E3D75324CEA6943
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........8c..V0..V0..V0\.Y0..V0\..0..V0..W0..V0Q..0..V0\..0..V0\..0..V0Rich..V0........PE..L...O..>......................-............
      Icon Hash:90cececece8e8eb0
      Entrypoint:0x1001889
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x1000000
      Subsystem:windows cui
      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      DLL Characteristics:TERMINAL_SERVER_AWARE
      Time Stamp:0x3EA0A14F [Sat Apr 19 01:07:27 2003 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:5
      OS Version Minor:2
      File Version Major:5
      File Version Minor:2
      Subsystem Version Major:5
      Subsystem Version Minor:2
      Import Hash:821c455b475c3595aa1e4e6ad93e77fd
      Instruction
      push 00000028h
      push 01001210h
      call 00007F09D0B2E980h
      cmp word ptr [01000000h], 5A4Dh
      jne 00007F09D0B2E80Ah
      mov eax, dword ptr [0100003Ch]
      cmp dword ptr [eax+01000000h], 00004550h
      jne 00007F09D0B2E7F9h
      movzx ecx, word ptr [eax+01000018h]
      cmp ecx, 0000010Bh
      je 00007F09D0B2E803h
      cmp ecx, 0000020Bh
      je 00007F09D0B2E7E8h
      and dword ptr [ebp-1Ch], 00000000h
      jmp 00007F09D0B2E80Ch
      cmp dword ptr [eax+01000084h], 0Eh
      jbe 00007F09D0B2E7D3h
      xor ecx, ecx
      cmp dword ptr [eax+010000F8h], ecx
      jmp 00007F09D0B2E7F3h
      cmp dword ptr [eax+01000074h], 0Eh
      jbe 00007F09D0B2E7C0h
      xor ecx, ecx
      cmp dword ptr [eax+010000E8h], ecx
      setne cl
      mov dword ptr [ebp-1Ch], ecx
      and dword ptr [ebp-04h], 00000000h
      push 00000001h
      call dword ptr [010010FCh]
      pop ecx
      or dword ptr [012D318Ch], FFFFFFFFh
      or dword ptr [012D3190h], FFFFFFFFh
      call dword ptr [01001108h]
      mov ecx, dword ptr [0100304Ch]
      mov dword ptr [eax], ecx
      call dword ptr [010010F4h]
      mov ecx, dword ptr [01003048h]
      mov dword ptr [eax], ecx
      mov eax, dword ptr [010010F0h]
      mov eax, dword ptr [eax]
      mov dword ptr [012D3194h], eax
      call 00007F09D0B2E8D1h
      cmp dword ptr [01003020h], 00000000h
      jne 00007F09D0B2E7EEh
      push 01001A2Ch
      call dword ptr [000000ECh]
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x21c40x78.text
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x2d40000x408.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x11200x1c.text
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x14280x40.text
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x10000x120.text
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x183c0x1a003543ee8bdb2ac84a01d2d2e5c2fc7790False0.5713641826923077data6.034102541370818IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .data0x30000x2d019c0x2006dfc3192dabf750a57ab508e05f262a0unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rsrc0x2d40000x4080x6005dfd2036e06f01cd0c70049a1978decdFalse0.3111979166666667data2.4882655178081543IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_VERSION0x2d40600x3a4dataEnglishUnited States0.47317596566523606
      DLLImport
      KERNEL32.dllGetCurrentProcessId, GetSystemTimeAsFileTime, GetCurrentThreadId, GetCurrentProcess, SetUnhandledExceptionFilter, GetTickCount, QueryPerformanceCounter, GetModuleHandleA, GetProcAddress, TerminateProcess, GetCommandLineA, GetProcessWorkingSetSize, SetProcessWorkingSetSize, OpenProcess, CloseHandle, VirtualAlloc, VirtualFree, GetLastError
      msvcrt.dllstrncpy, strrchr, toupper, strstr, _strdup, strncat, printf, strchr, isspace, isdigit, _strupr, malloc, _exit, _XcptFilter, _cexit, exit, __initenv, __getmainargs, _initterm, __setusermatherr, _adjust_fdiv, __p__commode, _controlfp, __set_app_type, _except_handler3, _c_exit, __p__fmode
      ADVAPI32.dllAdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken
      USER32.dllEnumDesktopsA, EnumWindows, GetWindowThreadProcessId, GetWindow, GetWindowLongA, GetWindowTextA, FindWindowExA, GetProcessWindowStation, GetThreadDesktop, OpenWindowStationA, SetProcessWindowStation, OpenDesktopA, SetThreadDesktop, CloseDesktop, CloseWindowStation, EnumWindowStationsA
      ntdll.dllNtSetSystemInformation, RtlUnicodeStringToAnsiString, NtQuerySystemInformation
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      No network behavior found

      Click to jump to process

      Click to jump to process

      Click to jump to process

      Target ID:0
      Start time:05:31:08
      Start date:25/04/2024
      Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Krypt.14164.25813.exe"
      Imagebase:0x1000000
      File size:6'005'077 bytes
      MD5 hash:6E2ADE4A332A81A6E18D1101361AC7C7
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:1
      Start time:05:31:08
      Start date:25/04/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff620390000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Reset < >

        Execution Graph

        Execution Coverage:14%
        Dynamic/Decrypted Code Coverage:100%
        Signature Coverage:24.4%
        Total number of Nodes:119
        Total number of Limit Nodes:4
        execution_graph 386 1002151 OpenWindowStationA 387 1002169 GetProcessWindowStation SetProcessWindowStation _strdup EnumDesktopsA 386->387 388 10021a9 386->388 387->388 389 100219f SetProcessWindowStation CloseWindowStation 387->389 389->388 390 10020a1 391 10020a4 390->391 394 10017eb 391->394 395 10017f4 GetCurrentProcess TerminateProcess 394->395 397 10017eb 395->397 398 1001fa4 408 1001a30 398->408 400 1001fb3 GetWindowThreadProcessId 401 1002079 400->401 402 1001fec GetWindow 400->402 404 10017eb 2 API calls 401->404 402->401 403 1001fff GetWindowLongA 402->403 406 1002011 403->406 405 10020b3 404->405 406->401 407 100204d GetWindowTextA 406->407 407->401 408->400 409 10019d5 _XcptFilter 410 1001765 411 1001774 410->411 412 100177b GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 410->412 411->412 413 10017e9 411->413 414 10017c8 GetModuleHandleA 412->414 415 10017be 412->415 414->413 416 10017d8 GetProcAddress 414->416 415->414 416->413 289 1001889 292 1001895 289->292 290 10018f8 __set_app_type __p__fmode __p__commode 291 1001940 290->291 293 1001955 291->293 294 1001949 __setusermatherr 291->294 292->290 302 1001a1a _controlfp 293->302 294->293 296 100195a _initterm __getmainargs _initterm 303 1001592 296->303 298 10019b8 299 10019c6 exit 298->299 300 10019cd _cexit 298->300 299->300 301 1001a02 300->301 302->296 334 10014ef GetCommandLineA 303->334 306 1001603 343 1001d1b GetCurrentProcess OpenProcessToken 306->343 308 10015c1 printf 310 100162d 308->310 309 1001608 311 1001611 309->311 312 100163d 309->312 351 1001f2c OpenProcess 311->351 356 1001d06 312->356 313 10015ce 313->306 319 10015f7 printf 313->319 319->306 320 1001636 320->310 321 100161b printf 321->310 322 1001720 360 1001e1c 322->360 323 1001664 324 10016e0 323->324 326 1001684 strchr 323->326 333 1001e1c 6 API calls 323->333 324->322 327 1001f2c 4 API calls 324->327 329 1001702 printf 324->329 326->323 327->324 329->324 331 100173b 331->320 332 100173f printf 331->332 332->320 333->323 337 1001512 isspace 334->337 336 1001539 isdigit 338 100154a isdigit 336->338 339 100156d _strupr 336->339 337->336 342 100156b 338->342 339->342 342->306 342->308 342->313 344 1001d46 LookupPrivilegeValueA 343->344 345 1001d38 GetLastError 343->345 347 1001d69 AdjustTokenPrivileges 344->347 348 1001d5b GetLastError 344->348 346 1001da8 printf 345->346 346->309 349 1001db4 347->349 350 1001d9c GetLastError 347->350 348->346 349->309 350->346 352 1001617 351->352 353 1001f4d GetProcessWorkingSetSize 351->353 352->320 352->321 354 1001f60 SetProcessWorkingSetSize 353->354 355 1001f6e CloseHandle 353->355 354->355 355->352 369 1001a88 356->369 359 10021b2 EnumWindowStationsA 359->323 367 1001e27 360->367 362 1001732 362->320 368 1001f7d NtSetSystemInformation 362->368 363 1001e38 strstr 363->367 364 1001e1c 3 API calls 364->367 365 1001e8d toupper 365->362 365->367 366 1001ea4 toupper 366->367 367->362 367->363 367->364 367->365 367->366 382 1001de3 strchr 367->382 368->331 370 1001a99 369->370 371 1001aba NtQuerySystemInformation 370->371 372 1001a9d VirtualAlloc 370->372 374 1001ad1 VirtualFree 371->374 379 1001afd 371->379 372->371 373 1001650 372->373 373->359 374->370 375 1001b13 RtlUnicodeStringToAnsiString 377 1001b28 strrchr 375->377 375->379 376 1001b4d strncpy 378 1001bbc malloc 376->378 376->379 377->379 378->379 379->373 379->375 379->376 380 1001c6a strncpy 379->380 381 1001c8b strncat strncat 379->381 380->379 381->379 383 1001dfa 382->383 384 1001dff strchr 382->384 383->367 384->383 385 1001e0a strchr 384->385 385->383 417 10019e9 418 10019f5 _exit 417->418 419 10019fc _c_exit 417->419 418->419 420 1001a02 419->420 421 10020bb OpenDesktopA 422 10020d6 GetCurrentThreadId GetThreadDesktop SetThreadDesktop _strdup EnumWindows 421->422 423 1002149 421->423 429 1001db9 422->429 426 1001db9 FindWindowExA 427 100212f 426->427 427->423 428 1002138 SetThreadDesktop CloseDesktop 427->428 428->423 430 1001dbc FindWindowExA 429->430 431 1001ddc EnumWindows 430->431 432 1001dcf 430->432 431->426 432->430 432->431

        Callgraph

        Control-flow Graph

        APIs
          • Part of subcall function 010014EF: GetCommandLineA.KERNEL32 ref: 0100150A
          • Part of subcall function 010014EF: isspace.MSVCRT ref: 01001532
          • Part of subcall function 010014EF: isdigit.MSVCRT ref: 01001543
          • Part of subcall function 010014EF: isdigit.MSVCRT ref: 01001564
        • printf.MSVCRT ref: 010015C6
          • Part of subcall function 010021B2: EnumWindowStationsA.USER32(01002151,?), ref: 010021BB
        • printf.MSVCRT ref: 010015FC
        • printf.MSVCRT ref: 01001626
        • strchr.MSVCRT ref: 0100168B
        • printf.MSVCRT ref: 01001706
        • printf.MSVCRT ref: 01001742
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1224000823.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
        • Associated: 00000000.00000002.1223986613.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1224089803.00000000012D4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1000000_SecuriteInfo.jbxd
        Similarity
        • API ID: printf$isdigit$CommandEnumLineStationsWindowisspacestrchr
        • String ID: USAGE: empty.exe {pid | task-name}$could not empty working set for process #%d$could not empty working set for process #%d [%s]$missing pid or task name
        • API String ID: 1354646753-1684680011
        • Opcode ID: 6a4a46aea4c65747fa3fd7d42c912066f3b0f1f627bdd2b954d95753f581ac3c
        • Instruction ID: 7f5fd6e0b5ed4496388ac76e03c1bec8723b05ae8ded05a71d6ba1a844e95ec8
        • Opcode Fuzzy Hash: 6a4a46aea4c65747fa3fd7d42c912066f3b0f1f627bdd2b954d95753f581ac3c
        • Instruction Fuzzy Hash: 2341C431A04306BFF773AB69DC44BAB7AE9BF09345F080469F9C5961C2EB75C5048762
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.1224000823.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
        • Associated: 00000000.00000002.1223986613.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1224089803.00000000012D4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1000000_SecuriteInfo.jbxd
        Similarity
        • API ID: _initterm$__getmainargs__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
        • String ID:
        • API String ID: 1729372338-0
        • Opcode ID: 6475bd4c6ed8833a0989c9d558f407950949184a80d82e2bc5251f1b681a44ac
        • Instruction ID: 48c59f8d14c5f71abf4ac56d5ce7d23acfaaf1853e7d6aca13d4dc6d32785dda
        • Opcode Fuzzy Hash: 6475bd4c6ed8833a0989c9d558f407950949184a80d82e2bc5251f1b681a44ac
        • Instruction Fuzzy Hash: 03312670901205DFEB27DFA4E449AEC7BF0BB09311F10416AF1D6AA2D4DB79C684CB61
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        APIs
        • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,?,?,01001608), ref: 01001D27
        • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,01001608), ref: 01001D2E
        • GetLastError.KERNEL32(?,?,?,?,?,01001608), ref: 01001D38
        • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 01001D51
        • GetLastError.KERNEL32(?,?,?,?,?,01001608), ref: 01001D5B
        • printf.MSVCRT ref: 01001DA8
        Strings
        • OpenProcessToken failed with %d, xrefs: 01001D3F
        • AdjustTokenPrivileges failed with %d, xrefs: 01001DA3
        • SeDebugPrivilege, xrefs: 01001D4A
        • LookupPrivilegeValue failed with %d, xrefs: 01001D62
        Memory Dump Source
        • Source File: 00000000.00000002.1224000823.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
        • Associated: 00000000.00000002.1223986613.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1224089803.00000000012D4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1000000_SecuriteInfo.jbxd
        Similarity
        • API ID: ErrorLastProcess$CurrentLookupOpenPrivilegeTokenValueprintf
        • String ID: AdjustTokenPrivileges failed with %d$LookupPrivilegeValue failed with %d$OpenProcessToken failed with %d$SeDebugPrivilege
        • API String ID: 3917496471-4288129742
        • Opcode ID: e2fb129cfde9ce2d03cf6dead91c46a9d671c55d3b3f46d1ffadbb510200a34e
        • Instruction ID: d91b34e568323ca93b4a009b128a30ebf8ff8c43a7b08257e90444c258f86ed1
        • Opcode Fuzzy Hash: e2fb129cfde9ce2d03cf6dead91c46a9d671c55d3b3f46d1ffadbb510200a34e
        • Instruction Fuzzy Hash: 64113971B40244ABEB12EBE4994ABEE77B8AB04705F004156F6C2E5080E7B9D5048B61
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 93 1001a88-1001a96 94 1001a99-1001a9b 93->94 95 1001aba-1001acf NtQuerySystemInformation 94->95 96 1001a9d-1001ab8 VirtualAlloc 94->96 98 1001ad1-1001af4 VirtualFree 95->98 99 1001afd-1001b08 95->99 96->95 97 1001af6-1001af8 96->97 100 1001d01-1001d03 97->100 98->94 101 1001b0b-1001b11 99->101 102 1001b13-1001b26 RtlUnicodeStringToAnsiString 101->102 103 1001b48 101->103 105 1001b41-1001b46 102->105 106 1001b28-1001b37 strrchr 102->106 104 1001b4d-1001bba strncpy 103->104 107 1001bf8 104->107 108 1001bbc-1001bcf malloc 104->108 105->104 109 1001b39-1001b3a 106->109 110 1001b3c-1001b3f 106->110 112 1001bfe-1001c23 107->112 111 1001bd1-1001bdb 108->111 108->112 109->104 110->104 111->112 113 1001bdd 111->113 114 1001cd2-1001ce2 112->114 115 1001c29-1001c3a 112->115 116 1001be3-1001bf4 113->116 117 1001ce4-1001ce8 114->117 118 1001cff-1001d00 114->118 115->114 119 1001c40-1001c43 115->119 116->116 120 1001bf6 116->120 117->118 121 1001cea-1001cfa 117->121 118->100 122 1001c46-1001c4b 119->122 120->112 121->101 123 1001cbd-1001ccc 122->123 124 1001c4d-1001c54 122->124 123->114 123->122 125 1001c57-1001c5c 124->125 125->125 126 1001c5e-1001c68 125->126 127 1001c85-1001c89 126->127 128 1001c6a-1001c83 strncpy 126->128 129 1001caf-1001cb5 127->129 130 1001c8b-1001cac strncat * 2 127->130 128->129 129->114 131 1001cb7-1001cba 129->131 130->129 131->123
        APIs
        • VirtualAlloc.KERNEL32(00000000,00001000,00000004,?,00000000,01001650,01003180,00000400), ref: 01001AAB
        • NtQuerySystemInformation.NTDLL ref: 01001AC4
        • VirtualFree.KERNEL32(00000000,00008000,?,00000000,01001650,01003180,00000400), ref: 01001AE7
        • RtlUnicodeStringToAnsiString.NTDLL ref: 01001B1D
        • strrchr.MSVCRT ref: 01001B2D
        • strncpy.MSVCRT ref: 01001B57
        • malloc.MSVCRT ref: 01001BC0
        • strncpy.MSVCRT ref: 01001C73
        • strncat.MSVCRT ref: 01001C94
        • strncat.MSVCRT ref: 01001CA6
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1224000823.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
        • Associated: 00000000.00000002.1223986613.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1224089803.00000000012D4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1000000_SecuriteInfo.jbxd
        Similarity
        • API ID: StringVirtualstrncatstrncpy$AllocAnsiFreeInformationQuerySystemUnicodemallocstrrchr
        • String ID: System Process
        • API String ID: 2616596419-499623549
        • Opcode ID: 22922ab224ab9272da6d9b979fc19e9493de17a8228f71efb056a6835651b191
        • Instruction ID: 155eff1ad740cd19f7491e524e5fb2a217c342ecd7a7a4f5c5707f47dc159c31
        • Opcode Fuzzy Hash: 22922ab224ab9272da6d9b979fc19e9493de17a8228f71efb056a6835651b191
        • Instruction Fuzzy Hash: C6813C74A0070AEFEB22CF68D884A9ABBF5FF08304F104469E69AD7281D775E550CF90
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        APIs
        • GetSystemTimeAsFileTime.KERNEL32(?), ref: 01001780
        • GetCurrentProcessId.KERNEL32 ref: 0100178C
        • GetCurrentThreadId.KERNEL32 ref: 01001794
        • GetTickCount.KERNEL32 ref: 0100179C
        • QueryPerformanceCounter.KERNEL32(?), ref: 010017A8
        • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 010017CD
        • GetProcAddress.KERNEL32(00000000,UnhandledExceptionFilter), ref: 010017DE
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1224000823.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
        • Associated: 00000000.00000002.1223986613.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1224089803.00000000012D4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1000000_SecuriteInfo.jbxd
        Similarity
        • API ID: CurrentTime$AddressCountCounterFileHandleModulePerformanceProcProcessQuerySystemThreadTick
        • String ID: UnhandledExceptionFilter$kernel32.dll
        • API String ID: 2672014633-2428948374
        • Opcode ID: c78f97b6d19b08e38b69e259f6903e2bd2be64486a87993152d120711a86c496
        • Instruction ID: 8fb40e13c9998fe3057cd634cfeac8cb381f6fa519e78833bf518b7abc47d89c
        • Opcode Fuzzy Hash: c78f97b6d19b08e38b69e259f6903e2bd2be64486a87993152d120711a86c496
        • Instruction Fuzzy Hash: 6E011A75E01214ABEB33DBF5E84C98ABBF8BB08340F410955F9C1EB148DA79D6009B90
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 243 1001f7d-1001fa3 NtSetSystemInformation
        APIs
        • NtSetSystemInformation.NTDLL ref: 01001F93
        Strings
        • could not empty working set for process #%d [%s], xrefs: 01001F7D
        Memory Dump Source
        • Source File: 00000000.00000002.1224000823.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
        • Associated: 00000000.00000002.1223986613.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1224089803.00000000012D4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1000000_SecuriteInfo.jbxd
        Similarity
        • API ID: InformationSystem
        • String ID: could not empty working set for process #%d [%s]
        • API String ID: 157093387-630290577
        • Opcode ID: 2dd638f03d983fee136b463f16d61f7ad8ae3d47a0922db5f1e64022572ae77b
        • Instruction ID: 94f7c2926b4aca0748fea48e0687e5489894991ddce34d27313f45928fbb4fa1
        • Opcode Fuzzy Hash: 2dd638f03d983fee136b463f16d61f7ad8ae3d47a0922db5f1e64022572ae77b
        • Instruction Fuzzy Hash: 77D05E3060070A5BDB0896A98C4B6AA7AAC5B08330F500328A672E50D0D660DB454691
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        APIs
        • OpenWindowStationA.USER32(?,00000000,02000000), ref: 0100215D
        • GetProcessWindowStation.USER32 ref: 0100216B
        • SetProcessWindowStation.USER32(00000000), ref: 0100217A
        • _strdup.MSVCRT(?), ref: 01002180
        • EnumDesktopsA.USER32(00000000,QUh,?), ref: 01002195
        • SetProcessWindowStation.USER32(00000000), ref: 010021A0
        • CloseWindowStation.USER32(00000000), ref: 010021A3
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1224000823.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
        • Associated: 00000000.00000002.1223986613.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1224089803.00000000012D4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1000000_SecuriteInfo.jbxd
        Similarity
        • API ID: StationWindow$Process$CloseDesktopsEnumOpen_strdup
        • String ID: QUh
        • API String ID: 2491530623-379248110
        • Opcode ID: a6aa625d72dc241017096f1f3bf6a75bd876148a4a9743482af85f5019327217
        • Instruction ID: f94d7c1546836bf3e8310750d478ae221b94bd31ed1f0e8113160d9c0f86c060
        • Opcode Fuzzy Hash: a6aa625d72dc241017096f1f3bf6a75bd876148a4a9743482af85f5019327217
        • Instruction Fuzzy Hash: D9F03036608341ABF7229B64EC4CE5B7BAAEB94710F100419F2C5D2144DBB6D8018B11
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        APIs
        • OpenDesktopA.USER32(?,00000000,00000000,02000000), ref: 010020CA
        • GetCurrentThreadId.KERNEL32 ref: 010020D9
        • GetThreadDesktop.USER32(00000000), ref: 010020E0
        • SetThreadDesktop.USER32(00000000), ref: 010020EB
        • _strdup.MSVCRT(?), ref: 010020F5
        • EnumWindows.USER32(Function_00001FA4,?), ref: 01002117
          • Part of subcall function 01001DB9: FindWindowExA.USER32(000000FD,00000000,00000000,00000000), ref: 01001DC3
        • EnumWindows.USER32(Function_00001FA4,?), ref: 01002126
        • SetThreadDesktop.USER32(?), ref: 0100213C
        • CloseDesktop.USER32(?), ref: 01002143
        Memory Dump Source
        • Source File: 00000000.00000002.1224000823.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
        • Associated: 00000000.00000002.1223986613.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1224089803.00000000012D4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1000000_SecuriteInfo.jbxd
        Similarity
        • API ID: Desktop$Thread$EnumWindows$CloseCurrentFindOpenWindow_strdup
        • String ID:
        • API String ID: 675152996-0
        • Opcode ID: 749aad4e4096d3c3829c9b80b1c966c22e2da4baa2e3a86c4bea5838e5b860f0
        • Instruction ID: dc13d4766630820bc506023bb796d524830332ac52da066e69976a2c0ff8b51f
        • Opcode Fuzzy Hash: 749aad4e4096d3c3829c9b80b1c966c22e2da4baa2e3a86c4bea5838e5b860f0
        • Instruction Fuzzy Hash: 56016135208344AFE322AF60DC4CBAB7FBCEF55755F004519F1C591054CBBAE8049BA1
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 153 10014ef-1001510 GetCommandLineA 154 1001512-1001518 153->154 155 1001523-1001529 154->155 156 100151a-100151d 154->156 158 100152e-1001537 isspace 155->158 156->155 157 100151f-1001521 156->157 157->154 157->155 159 1001539-1001548 isdigit 158->159 160 100152b-100152d 158->160 161 1001576-100157c 159->161 162 100154a 159->162 160->158 163 100156d-1001575 161->163 164 100157e-100158b _strupr 161->164 165 1001563-1001569 isdigit 162->165 163->161 166 100158c-1001591 164->166 167 100156b 165->167 168 100154c-1001560 165->168 167->166 168->165
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1224000823.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
        • Associated: 00000000.00000002.1223986613.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1224089803.00000000012D4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1000000_SecuriteInfo.jbxd
        Similarity
        • API ID: isdigit$CommandLine_struprisspace
        • String ID: $`0
        • API String ID: 3306339058-4246127893
        • Opcode ID: c7f4505af63a00a1bd53791b6937e89d486bba802a2f250bb1b3bfe2fd32206a
        • Instruction ID: f2f2181aac8318358d0cb9141b348a0eaad237632353fd334fb04d8e933b88d3
        • Opcode Fuzzy Hash: c7f4505af63a00a1bd53791b6937e89d486bba802a2f250bb1b3bfe2fd32206a
        • Instruction Fuzzy Hash: EA118E7228A286EFF767CB28E8547B57BE4FB42316F18018AE8C28B185C736C0058765
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 169 1001f2c-1001f47 OpenProcess 170 1001f49-1001f4b 169->170 171 1001f4d-1001f5e GetProcessWorkingSetSize 169->171 174 1001f77-1001f7a 170->174 172 1001f60-1001f6d SetProcessWorkingSetSize 171->172 173 1001f6e-1001f75 CloseHandle 171->173 172->173 173->174
        APIs
        • OpenProcess.KERNEL32(001F0FFF,00000000,?,010031A0,01003180,?,could not empty working set for process #%d [%s],010016FE,01003180,01003180,01003180,00000400), ref: 01001F3D
        • GetProcessWorkingSetSize.KERNEL32(00000000,?,?), ref: 01001F56
        • SetProcessWorkingSetSize.KERNEL32(00000000,000000FF,000000FF), ref: 01001F65
        • CloseHandle.KERNEL32(00000000,?,could not empty working set for process #%d [%s],010016FE,01003180,01003180,01003180,00000400), ref: 01001F6F
        Strings
        • could not empty working set for process #%d [%s], xrefs: 01001F2C
        Memory Dump Source
        • Source File: 00000000.00000002.1224000823.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
        • Associated: 00000000.00000002.1223986613.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1224089803.00000000012D4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1000000_SecuriteInfo.jbxd
        Similarity
        • API ID: Process$SizeWorking$CloseHandleOpen
        • String ID: could not empty working set for process #%d [%s]
        • API String ID: 1564249169-630290577
        • Opcode ID: f220a81c96058be8085741b607c882058e935c89eac33378b06e9b9520850ff4
        • Instruction ID: 17a8a6ae7a837a3a535b03d9b8580639ec7a5410a5d9c505bdca255b0a69dd93
        • Opcode Fuzzy Hash: f220a81c96058be8085741b607c882058e935c89eac33378b06e9b9520850ff4
        • Instruction Fuzzy Hash: 52F08276304054BB972397669C4CCEF3AACDADA3B1B000325F6B6D11C4DB78C601C6B0
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 175 1001fa4-1001fe6 call 1001a30 GetWindowThreadProcessId 178 10020a4-10020ab 175->178 179 1001fec-1001ff9 GetWindow 175->179 181 10020ae call 10017eb 178->181 179->178 180 1001fff-100200f GetWindowLongA 179->180 182 1002011-1002014 180->182 183 100201a 180->183 184 10020b3-10020b8 call 1001a6b 181->184 182->178 182->183 185 1002020-100202c 183->185 185->178 188 100202e-100203f 185->188 189 1002041-1002045 188->189 190 1002095-100209b 188->190 191 1002047-100204b 189->191 192 100204d-1002077 GetWindowTextA 189->192 190->178 190->185 191->190 191->192 192->178 193 1002079-1002093 call 10014b4 192->193 193->178
        APIs
        • GetWindowThreadProcessId.USER32(?,?), ref: 01001FDE
        • GetWindow.USER32(?,00000004), ref: 01001FF1
        • GetWindowLongA.USER32(?,000000F0), ref: 01002004
        • GetWindowTextA.USER32(?,?,00000080), ref: 0100206F
        Memory Dump Source
        • Source File: 00000000.00000002.1224000823.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
        • Associated: 00000000.00000002.1223986613.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1224089803.00000000012D4000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1000000_SecuriteInfo.jbxd
        Similarity
        • API ID: Window$LongProcessTextThread
        • String ID:
        • API String ID: 4064226584-0
        • Opcode ID: 6ed2e5abf12169728c1d0f67032fbb0a1b470cdb1d93ab4e16fe0895d4b13440
        • Instruction ID: 63ea032996a7d5d77ce760acf1aaa287d23cfa1d020b824599bd7f9e6fc22501
        • Opcode Fuzzy Hash: 6ed2e5abf12169728c1d0f67032fbb0a1b470cdb1d93ab4e16fe0895d4b13440
        • Instruction Fuzzy Hash: F331E574A00319DFEB62DF28C844B99BBF5BF05710F408295B9D9D6292C770EA85CF91
        Uniqueness

        Uniqueness Score: -1.00%