Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
XMx8r7SLZr.exe

Overview

General Information

Sample name:XMx8r7SLZr.exe
renamed because original name is a hash value
Original sample name:win_graphical_proton_c7b01242d2e15c3da0f45b8adec4e6913e534849cde16a2a6c480045e03fbee4.exe
Analysis ID:1431550
MD5:484617c0e2a1d6f7e95f121717e11768
SHA1:2127cb774c3516840db15de1304e1ed498fece36
SHA256:c7b01242d2e15c3da0f45b8adec4e6913e534849cde16a2a6c480045e03fbee4
Tags:apt29exegraphicalprotonunpacked
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Found direct / indirect Syscall (likely to bypass EDR)
Contains functionality to dynamically determine API calls
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)

Classification

  • System is w10x64
  • XMx8r7SLZr.exe (PID: 7272 cmdline: "C:\Users\user\Desktop\XMx8r7SLZr.exe" MD5: 484617C0E2A1D6F7E95F121717E11768)
    • conhost.exe (PID: 7280 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: XMx8r7SLZr.exeAvira: detected
Source: XMx8r7SLZr.exeReversingLabs: Detection: 70%
Source: XMx8r7SLZr.exeVirustotal: Detection: 70%Perma Link
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: login.microsoftonline.com
Source: XMx8r7SLZr.exe, 00000000.00000002.2991811213.0000000000462000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/
Source: XMx8r7SLZr.exe, 00000000.00000003.2289385182.00000000004D8000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2991980394.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2992006351.00000000004F2000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.1751063055.00000000004F1000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2991811213.0000000000462000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809452523.00000000004F1000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809477689.0000000000444000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2991811213.0000000000445000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/token
Source: XMx8r7SLZr.exe, 00000000.00000003.2289385182.00000000004D8000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2992006351.00000000004F2000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809452523.00000000004F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/token.dllk
Source: XMx8r7SLZr.exe, 00000000.00000002.2991720563.000000000040C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/token0
Source: XMx8r7SLZr.exe, 00000000.00000002.2991720563.000000000040C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokenI
Source: XMx8r7SLZr.exe, 00000000.00000002.2991980394.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokenK
Source: XMx8r7SLZr.exe, 00000000.00000002.2991980394.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokenl
Source: XMx8r7SLZr.exe, 00000000.00000002.2991980394.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokenll
Source: XMx8r7SLZr.exe, 00000000.00000002.2991980394.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokenlll
Source: XMx8r7SLZr.exe, 00000000.00000002.2991980394.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokenllljbin(
Source: XMx8r7SLZr.exe, 00000000.00000003.2289385182.00000000004D8000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2992006351.00000000004F2000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809452523.00000000004F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokenllmL
Source: XMx8r7SLZr.exe, 00000000.00000003.1750823565.00000000004D6000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.1751063055.00000000004F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokenmL
Source: XMx8r7SLZr.exe, 00000000.00000002.2991980394.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokeny
Source: XMx8r7SLZr.exe, 00000000.00000003.2809477689.0000000000462000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2991811213.0000000000462000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/token~
Source: XMx8r7SLZr.exe, 00000000.00000003.1750823565.000000000049B000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.000000000049B000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2289385182.000000000049B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/error?code=70000
Source: XMx8r7SLZr.exe, 00000000.00000003.2809477689.0000000000462000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2991811213.0000000000462000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/icates
Source: classification engineClassification label: mal60.evad.winEXE@2/0@1/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7280:120:WilError_03
Source: XMx8r7SLZr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: XMx8r7SLZr.exeReversingLabs: Detection: 70%
Source: XMx8r7SLZr.exeVirustotal: Detection: 70%
Source: unknownProcess created: C:\Users\user\Desktop\XMx8r7SLZr.exe "C:\Users\user\Desktop\XMx8r7SLZr.exe"
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
Source: XMx8r7SLZr.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: XMx8r7SLZr.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: XMx8r7SLZr.exeStatic file information: File size 1371136 > 1048576
Source: XMx8r7SLZr.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x10e800
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeCode function: 0_2_00000001400EE11C LoadLibraryW,GetProcAddressForCaller,0_2_00000001400EE11C
Source: XMx8r7SLZr.exeStatic PE information: section name: .00cfg
Source: XMx8r7SLZr.exeStatic PE information: section name: .gehcont
Source: XMx8r7SLZr.exeStatic PE information: section name: _RDATA
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: XMx8r7SLZr.exe, 00000000.00000002.2991811213.0000000000492000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809477689.0000000000492000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809477689.0000000000444000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2991811213.0000000000445000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: XMx8r7SLZr.exe, 00000000.00000002.2991811213.0000000000492000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809477689.0000000000492000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeCode function: 0_2_00000001400EE11C LoadLibraryW,GetProcAddressForCaller,0_2_00000001400EE11C

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeNtAllocateVirtualMemory: Direct from: 0x5D034FJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeNtAllocateVirtualMemory: Direct from: 0x5D03A3Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeNtAllocateVirtualMemory: Direct from: 0x2260379Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeNtDeviceIoControlFile: Direct from: 0x14005BC41Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeNtProtectVirtualMemory: Direct from: 0x2240265Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeNtProtectVirtualMemory: Direct from: 0x2260AE3Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeNtProtectVirtualMemory: Direct from: 0x1400162C1Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeNtProtectVirtualMemory: Direct from: 0x1400023FCJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeNtMapViewOfSection: Direct from: 0x1400160C6Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeNtAllocateVirtualMemory: Direct from: 0x7FFE221E4B5EJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeNtAllocateVirtualMemory: Direct from: 0x5D0379Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeNtAllocateVirtualMemory: Direct from: 0x226034FJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeNtAllocateVirtualMemory: Direct from: 0x22603A3Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeNtProtectVirtualMemory: Direct from: 0x14005931AJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeNtAllocateVirtualMemory: Direct from: 0x1400013D1Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeNtProtectVirtualMemory: Direct from: 0x1400597AAJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeNtAllocateVirtualMemory: Direct from: 0x2240379Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeNtSetSecurityObject: Direct from: 0x7FFE221C26A1Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeNtAllocateVirtualMemory: Direct from: 0x1400023A4Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeNtProtectVirtualMemory: Direct from: 0x140058D8AJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeNtQueryInformationToken: Direct from: 0x140058A8CJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeNtAllocateVirtualMemory: Direct from: 0x140059085Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeNtAllocateVirtualMemory: Direct from: 0x14005852DJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeNtProtectVirtualMemory: Direct from: 0x2240AE3Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeNtProtectVirtualMemory: Direct from: 0x14001621AJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeNtAllocateVirtualMemory: Direct from: 0x224034FJump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeNtAllocateVirtualMemory: Direct from: 0x22403A3Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeNtProtectVirtualMemory: Direct from: 0x5D0265Jump to behavior
Source: C:\Users\user\Desktop\XMx8r7SLZr.exeNtCreateFile: Direct from: 0x140016055Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
1
Process Injection
1
Process Injection
OS Credential Dumping1
Query Registry
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Abuse Elevation Control Mechanism
1
Abuse Elevation Control Mechanism
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
XMx8r7SLZr.exe70%ReversingLabsWin64.Trojan.VaporRage
XMx8r7SLZr.exe70%VirustotalBrowse
XMx8r7SLZr.exe100%AviraTR/Agent.ddaym
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
login.microsoftonline.com
unknown
unknownfalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    https://login.microsoftonline.com/common/oauth2/v2.0/tokenIXMx8r7SLZr.exe, 00000000.00000002.2991720563.000000000040C000.00000004.00000020.00020000.00000000.sdmpfalse
      high
      https://login.microsoftonline.com/XMx8r7SLZr.exe, 00000000.00000002.2991811213.0000000000462000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        https://login.microsoftonline.com/error?code=70000XMx8r7SLZr.exe, 00000000.00000003.1750823565.000000000049B000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.000000000049B000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2289385182.000000000049B000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          https://login.microsoftonline.com/common/oauth2/v2.0/token.dllkXMx8r7SLZr.exe, 00000000.00000003.2289385182.00000000004D8000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2992006351.00000000004F2000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809452523.00000000004F1000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            https://login.microsoftonline.com/common/oauth2/v2.0/tokenlllXMx8r7SLZr.exe, 00000000.00000002.2991980394.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              https://login.microsoftonline.com/common/oauth2/v2.0/tokenKXMx8r7SLZr.exe, 00000000.00000002.2991980394.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://login.microsoftonline.com/common/oauth2/v2.0/tokenllmLXMx8r7SLZr.exe, 00000000.00000003.2289385182.00000000004D8000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2992006351.00000000004F2000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809452523.00000000004F1000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://login.microsoftonline.com/common/oauth2/v2.0/tokenlXMx8r7SLZr.exe, 00000000.00000002.2991980394.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://login.microsoftonline.com/common/oauth2/v2.0/token0XMx8r7SLZr.exe, 00000000.00000002.2991720563.000000000040C000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://login.microsoftonline.com/common/oauth2/v2.0/tokenyXMx8r7SLZr.exe, 00000000.00000002.2991980394.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://login.microsoftonline.com/common/oauth2/v2.0/token~XMx8r7SLZr.exe, 00000000.00000003.2809477689.0000000000462000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2991811213.0000000000462000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://login.microsoftonline.com/common/oauth2/v2.0/tokenllljbin(XMx8r7SLZr.exe, 00000000.00000002.2991980394.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://login.microsoftonline.com/icatesXMx8r7SLZr.exe, 00000000.00000003.2809477689.0000000000462000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2991811213.0000000000462000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://login.microsoftonline.com/common/oauth2/v2.0/tokenXMx8r7SLZr.exe, 00000000.00000003.2289385182.00000000004D8000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2991980394.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2992006351.00000000004F2000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.1751063055.00000000004F1000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2991811213.0000000000462000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809452523.00000000004F1000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809477689.0000000000444000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000002.2991811213.0000000000445000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://login.microsoftonline.com/common/oauth2/v2.0/tokenmLXMx8r7SLZr.exe, 00000000.00000003.1750823565.00000000004D6000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.1751063055.00000000004F1000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://login.microsoftonline.com/common/oauth2/v2.0/tokenllXMx8r7SLZr.exe, 00000000.00000002.2991980394.00000000004D9000.00000004.00000020.00020000.00000000.sdmp, XMx8r7SLZr.exe, 00000000.00000003.2809327447.00000000004D9000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    No contacted IP infos
                                    Joe Sandbox version:40.0.0 Tourmaline
                                    Analysis ID:1431550
                                    Start date and time:2024-04-25 12:29:10 +02:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 4m 55s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:6
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:XMx8r7SLZr.exe
                                    renamed because original name is a hash value
                                    Original Sample Name:win_graphical_proton_c7b01242d2e15c3da0f45b8adec4e6913e534849cde16a2a6c480045e03fbee4.exe
                                    Detection:MAL
                                    Classification:mal60.evad.winEXE@2/0@1/0
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:Failed
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                    • Excluded IPs from analysis (whitelisted): 40.126.29.15, 20.190.157.11, 40.126.29.9, 40.126.29.5, 40.126.29.12, 40.126.29.10, 40.126.29.7, 40.126.29.6
                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, www.tm.ak.prd.aadg.akadns.net, ctldl.windowsupdate.com, login.mso.msidentity.com, ak.privatelink.msidentity.com, fe3cr.delivery.mp.microsoft.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    No simulations
                                    No context
                                    No context
                                    No context
                                    No context
                                    No context
                                    No created / dropped files found
                                    File type:PE32+ executable (console) x86-64, for MS Windows
                                    Entropy (8bit):6.351460299194259
                                    TrID:
                                    • Win64 Executable Console (202006/5) 92.65%
                                    • Win64 Executable (generic) (12005/4) 5.51%
                                    • Generic Win/DOS Executable (2004/3) 0.92%
                                    • DOS Executable Generic (2002/1) 0.92%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:XMx8r7SLZr.exe
                                    File size:1'371'136 bytes
                                    MD5:484617c0e2a1d6f7e95f121717e11768
                                    SHA1:2127cb774c3516840db15de1304e1ed498fece36
                                    SHA256:c7b01242d2e15c3da0f45b8adec4e6913e534849cde16a2a6c480045e03fbee4
                                    SHA512:e6bfb4ac5774bd2ebc468869e69aeda594ff62a736097a89924e0758927e3dd435d48a3414aa677e0190f27f52c6e210ef9d1599e2cc96a608b7f365ddc8de15
                                    SSDEEP:12288:d/RJ3Yb/zNRjv4D6yS4ADPKjr3bzdORy77ejNfHss+Cf+jRlAWJHLvXDG9Bacxny:Kbb3vpxfMs+CmAWJH7XDQBacxnjl
                                    TLSH:63555B13A36551E5C1BBC13DC6972727F9B138594339A3DB4B944AA72F23BE0A93E310
                                    File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d.....wd..........".................p..........@.......................................... ........................................
                                    Icon Hash:90cececece8e8eb0
                                    Entrypoint:0x14009e170
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x140000000
                                    Subsystem:windows cui
                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                    DLL Characteristics:HIGH_ENTROPY_VA, NO_ISOLATION, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x64771E15 [Wed May 31 10:14:45 2023 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:6
                                    OS Version Minor:0
                                    File Version Major:6
                                    File Version Minor:0
                                    Subsystem Version Major:6
                                    Subsystem Version Minor:0
                                    Import Hash:4af58f90bf89d80e9b252aae09d25711
                                    Instruction
                                    dec eax
                                    sub esp, 28h
                                    call 00007FA6F49F5400h
                                    dec eax
                                    add esp, 28h
                                    jmp 00007FA6F49F5253h
                                    int3
                                    int3
                                    dec eax
                                    mov dword ptr [esp+20h], ebx
                                    push ebp
                                    dec eax
                                    mov ebp, esp
                                    dec eax
                                    sub esp, 20h
                                    dec eax
                                    mov eax, dword ptr [000A1120h]
                                    dec eax
                                    mov ebx, 2DDFA232h
                                    cdq
                                    sub eax, dword ptr [eax]
                                    add byte ptr [eax+3Bh], cl
                                    ret
                                    jne 00007FA6F49F5466h
                                    dec eax
                                    and dword ptr [ebp+18h], 00000000h
                                    dec eax
                                    lea ecx, dword ptr [ebp+18h]
                                    call dword ptr [0008F20Ah]
                                    dec eax
                                    mov eax, dword ptr [ebp+18h]
                                    dec eax
                                    mov dword ptr [ebp+10h], eax
                                    call dword ptr [0008F144h]
                                    mov eax, eax
                                    dec eax
                                    xor dword ptr [ebp+10h], eax
                                    call dword ptr [0008F120h]
                                    mov eax, eax
                                    dec eax
                                    lea ecx, dword ptr [ebp+20h]
                                    dec eax
                                    xor dword ptr [ebp+10h], eax
                                    call dword ptr [0008F2F0h]
                                    mov eax, dword ptr [ebp+20h]
                                    dec eax
                                    lea ecx, dword ptr [ebp+10h]
                                    dec eax
                                    shl eax, 20h
                                    dec eax
                                    xor eax, dword ptr [ebp+20h]
                                    dec eax
                                    xor eax, dword ptr [ebp+10h]
                                    dec eax
                                    xor eax, ecx
                                    dec eax
                                    mov ecx, FFFFFFFFh
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x12cb480x8c.rdata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x15c0000xe07c.pdata
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x16f0000xfd8.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x129d900x28.rdata
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x11ba900x138.rdata
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x12d1700x598.rdata
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x10e7f60x10e8005b0d5c177480f3d22c2a4498a956a4b4False0.4200003971233826data6.259031437362809IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rdata0x1100000x2e4cc0x2e600041da531efbac42dbf48a974e6e36ad2False0.43745788409703507data5.785780179604796IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .data0x13f0000x1c0300x20003a9c6535ff7f46f450c70406786437a6False0.158447265625data3.6959195059658843IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .pdata0x15c0000xe07c0xe2008aa46076caf4b1bfaba62293dfb57258False0.4928097345132743data6.06255920888618IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .00cfg0x16b0000x280x2004ff111042ecb00851747119715408c5bFalse0.05859375data0.4285997588138649IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .gehcont0x16c0000x600x200618ff9533c5cbb4568d02ea353b96ba2False0.1484375big endian ispell hash file (?), 8-bit, no capitalization, 26 flags0.6316126284867231IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .tls0x16d0000x90x2001f354d76203061bfdd5a53dae48d5435False0.033203125data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    _RDATA0x16e0000xf40x2002848b97249455e08bc67ec701f0fec54False0.318359375data2.404519457035002IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x16f0000xfd80x10001dc7e5498b1dfa36f021b92d38f7823fFalse0.460693359375data5.439536828401387IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    DLLImport
                                    KERNEL32.dllAcquireSRWLockExclusive, CloseHandle, CloseThreadpoolTimer, CloseThreadpoolWait, CloseThreadpoolWork, CompareStringEx, CompareStringW, CreateEventExW, CreateEventW, CreateFileA, CreateFileMappingA, CreateFileW, CreatePipe, CreateProcessW, CreateSemaphoreExW, CreateSymbolicLinkW, CreateThread, CreateThreadpoolTimer, CreateThreadpoolWait, CreateThreadpoolWork, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, ExitThread, FindClose, FindFirstFileExW, FindNextFileW, FlsAlloc, FlsFree, FlsGetValue, FlsSetValue, FlushFileBuffers, FlushProcessWriteBuffers, FormatMessageA, FreeEnvironmentStringsW, FreeLibrary, FreeLibraryAndExitThread, FreeLibraryWhenCallbackReturns, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentProcessorNumber, GetCurrentThread, GetCurrentThreadId, GetDateFormatW, GetEnvironmentStringsW, GetExitCodeProcess, GetExitCodeThread, GetFileInformationByHandleEx, GetFileSize, GetFileSizeEx, GetFileType, GetLastError, GetLocaleInfoEx, GetLocaleInfoW, GetModuleFileNameW, GetModuleHandleExW, GetModuleHandleW, GetNativeSystemInfo, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemDirectoryA, GetSystemTimeAsFileTime, GetTickCount64, GetTimeFormatW, GetTimeZoneInformation, GetUserDefaultLCID, HeapAlloc, HeapCreate, HeapDestroy, HeapFree, HeapReAlloc, HeapSize, InitOnceExecuteOnce, InitializeConditionVariable, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, InitializeSRWLock, InterlockedFlushSList, InterlockedPushEntrySList, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, K32GetModuleBaseNameW, LCMapStringEx, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, LocalAlloc, LocalFree, MapViewOfFile, MultiByteToWideChar, OutputDebugStringW, PeekNamedPipe, QueryPerformanceCounter, QueryPerformanceFrequency, RaiseException, ReadConsoleW, ReadFile, ReleaseSRWLockExclusive, ResetEvent, ResumeThread, RtlCaptureContext, RtlLookupFunctionEntry, RtlPcToFileHeader, RtlUnwind, RtlUnwindEx, RtlVirtualUnwind, SetConsoleCtrlHandler, SetEndOfFile, SetEnvironmentVariableW, SetEvent, SetFileInformationByHandle, SetFilePointerEx, SetLastError, SetStdHandle, SetThreadpoolTimer, SetThreadpoolWait, SetUnhandledExceptionFilter, Sleep, SleepConditionVariableCS, SleepConditionVariableSRW, SubmitThreadpoolWork, SwitchToThread, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, TryEnterCriticalSection, UnhandledExceptionFilter, UnmapViewOfFile, VirtualProtect, WaitForSingleObject, WaitForSingleObjectEx, WaitForThreadpoolTimerCallbacks, WakeAllConditionVariable, WakeConditionVariable, WideCharToMultiByte, WriteConsoleW, WriteFile
                                    USER32.dllwsprintfW
                                    ADVAPI32.dllRegCloseKey, RegCreateKeyExA, RegOpenKeyExA, RegQueryValueExA, RegSetValueExA
                                    ole32.dllCoTaskMemFree
                                    urlmon.dllFindMimeFromData
                                    WININET.dllHttpOpenRequestA, HttpQueryInfoA, HttpSendRequestA, InternetCloseHandle, InternetConnectA, InternetOpenA, InternetQueryOptionA, InternetReadFile, InternetSetCookieA, InternetSetOptionA
                                    TimestampSource PortDest PortSource IPDest IP
                                    Apr 25, 2024 12:30:08.877717972 CEST5375453192.168.2.41.1.1.1
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Apr 25, 2024 12:30:08.877717972 CEST192.168.2.41.1.1.10x2ac0Standard query (0)login.microsoftonline.comA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Apr 25, 2024 12:30:08.987731934 CEST1.1.1.1192.168.2.40x2ac0No error (0)login.microsoftonline.comlogin.mso.msidentity.comCNAME (Canonical name)IN (0x0001)false

                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:12:30:07
                                    Start date:25/04/2024
                                    Path:C:\Users\user\Desktop\XMx8r7SLZr.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Users\user\Desktop\XMx8r7SLZr.exe"
                                    Imagebase:0x140000000
                                    File size:1'371'136 bytes
                                    MD5 hash:484617C0E2A1D6F7E95F121717E11768
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:false

                                    Target ID:1
                                    Start time:12:30:07
                                    Start date:25/04/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:false

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:4.8%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:3.3%
                                      Total number of Nodes:360
                                      Total number of Limit Nodes:22
                                      execution_graph 1559 1400cdbb0 1560 1400cde18 1559->1560 1566 1400ce008 1560->1566 1562 1400cdebb 1563 1400cdec1 1562->1563 1570 1400cdd98 1562->1570 1565 1400cded3 1567 1400ce024 _invalid_parameter_noinfo 1566->1567 1573 1400cded4 1567->1573 1569 1400ce02d _invalid_parameter_noinfo 1569->1562 1641 1400f3bb8 1570->1641 1572 1400cdda5 1572->1565 1574 1400cdf43 1573->1574 1575 1400cdeea 1573->1575 1574->1569 1575->1574 1577 1400d0f68 1575->1577 1580 1400d1460 1577->1580 1579 1400d0f9d 1579->1574 1581 1400d147c _invalid_parameter_noinfo 1580->1581 1584 1400d125c 1581->1584 1583 1400d1485 _invalid_parameter_noinfo 1583->1579 1585 1400d1282 1584->1585 1586 1400d128a 1584->1586 1585->1583 1586->1585 1588 1400ebb90 1586->1588 1589 1400ebbb5 __free_lconv_mon 1588->1589 1590 1400ebb95 1588->1590 1589->1585 1590->1589 1592 1400d149c 1590->1592 1595 1400ebfcc 1592->1595 1596 1400ebfe1 1595->1596 1597 1400ebff3 1596->1597 1617 1400ed024 1596->1617 1601 1400d14a5 1597->1601 1620 1400ed06c 1597->1620 1601->1589 1604 1400ec047 1607 1400ed06c _invalid_parameter_noinfo 2 API calls 1604->1607 1605 1400ec037 1606 1400ed06c _invalid_parameter_noinfo 2 API calls 1605->1606 1614 1400ec03e 1606->1614 1608 1400ec04f 1607->1608 1609 1400ec065 1608->1609 1610 1400ec053 1608->1610 1627 1400ec2ec 1609->1627 1612 1400ed06c _invalid_parameter_noinfo 2 API calls 1610->1612 1611 1400ebb90 __free_lconv_mon 2 API calls 1611->1601 1612->1614 1614->1611 1616 1400ebb90 __free_lconv_mon 2 API calls 1616->1601 1631 1400ee11c 1617->1631 1621 1400ee11c try_get_function 2 API calls 1620->1621 1622 1400ec016 1621->1622 1622->1601 1623 1400ef8d8 1622->1623 1626 1400ef8e9 _invalid_parameter_noinfo 1623->1626 1624 1400d149c __free_lconv_mon 2 API calls 1625 1400ec029 1624->1625 1625->1604 1625->1605 1626->1624 1626->1625 1628 1400ec39e _invalid_parameter_noinfo 1627->1628 1637 1400ec8c0 1628->1637 1630 1400ec06d 1630->1616 1635 1400ed04b 1631->1635 1636 1400ee178 try_get_function 1631->1636 1632 1400ee1ac LoadLibraryW 1632->1636 1633 1400ee26e GetProcAddressForCaller 1633->1635 1634 1400ee260 1634->1633 1634->1635 1636->1632 1636->1634 1636->1635 1638 1400ec8dc _invalid_parameter_noinfo 1637->1638 1639 1400ec128 _invalid_parameter_noinfo LoadLibraryW GetProcAddressForCaller 1638->1639 1640 1400ec8f2 _invalid_parameter_noinfo 1639->1640 1640->1630 1642 1400f3bd6 1641->1642 1644 1400f3be0 1641->1644 1645 1400ed848 1642->1645 1644->1572 1646 1400ee11c try_get_function 2 API calls 1645->1646 1647 1400ed870 1646->1647 1647->1644 1648 1400ee11c 1652 1400ee17d 1648->1652 1653 1400ee178 try_get_function 1648->1653 1649 1400ee1ac LoadLibraryW 1649->1653 1650 1400ee26e GetProcAddressForCaller 1650->1652 1651 1400ee260 1651->1650 1651->1652 1653->1649 1653->1651 1653->1652 1693 1400d15cc 1694 1400ebfcc _invalid_parameter_noinfo 2 API calls 1693->1694 1695 1400d15dd 1694->1695 1696 1400ebfcc _invalid_parameter_noinfo 2 API calls 1695->1696 1697 1400d15f6 __free_lconv_mon 1696->1697 1654 1400f1b88 1661 1400f1c50 1654->1661 1656 1400f1b9a 1660 1400f1c04 1656->1660 1667 1400ebbd8 1656->1667 1659 1400ebb90 __free_lconv_mon 2 API calls 1659->1660 1662 1400f1c63 1661->1662 1663 1400f1c86 1662->1663 1673 1400f33c0 1662->1673 1663->1656 1668 1400ebc23 1667->1668 1672 1400ebbe7 _invalid_parameter_noinfo 1667->1672 1670 1400d149c __free_lconv_mon 2 API calls 1668->1670 1669 1400ebc0a RtlAllocateHeap 1671 1400ebc21 1669->1671 1669->1672 1670->1671 1671->1659 1672->1668 1672->1669 1674 1400f33c9 1673->1674 1676 1400f1c7f 1673->1676 1675 1400d149c __free_lconv_mon 2 API calls 1674->1675 1677 1400f33ce 1675->1677 1679 140102c6c 1676->1679 1687 1400d27a0 1677->1687 1680 140102c82 1679->1680 1681 140102c75 1679->1681 1683 140102c7a 1680->1683 1684 1400d149c __free_lconv_mon 2 API calls 1680->1684 1682 1400d149c __free_lconv_mon 2 API calls 1681->1682 1682->1683 1683->1663 1685 140102cb9 1684->1685 1686 1400d27a0 _invalid_parameter_noinfo 2 API calls 1685->1686 1686->1683 1690 1400d2aac 1687->1690 1689 1400d27b9 1689->1676 1691 1400ebfcc _invalid_parameter_noinfo 2 API calls 1690->1691 1692 1400d2ad1 _invalid_parameter_noinfo_noreturn 1691->1692 1692->1689 1698 1400ec9e8 1699 1400eca10 1698->1699 1700 1400ec9fd 1698->1700 1700->1699 1702 1400f57f0 1700->1702 1710 1400ebe50 1702->1710 1704 1400f584a 1704->1699 1705 1400f57ff _invalid_parameter_noinfo 1705->1704 1758 1400f5860 1705->1758 1707 1400f5838 _invalid_parameter_noinfo 1707->1704 1762 1400d3b90 1707->1762 1711 1400ebe65 1710->1711 1712 1400ebe77 1711->1712 1713 1400ed024 _invalid_parameter_noinfo 2 API calls 1711->1713 1714 1400ed06c _invalid_parameter_noinfo 2 API calls 1712->1714 1720 1400ebe7f 1712->1720 1713->1712 1715 1400ebe9a 1714->1715 1716 1400ef8d8 _invalid_parameter_noinfo 2 API calls 1715->1716 1715->1720 1717 1400ebead 1716->1717 1718 1400ebecb 1717->1718 1719 1400ebebb 1717->1719 1722 1400ed06c _invalid_parameter_noinfo 2 API calls 1718->1722 1723 1400ed06c _invalid_parameter_noinfo 2 API calls 1719->1723 1721 1400ebf0e 1720->1721 1724 1400d3b90 2 API calls 1720->1724 1721->1705 1725 1400ebed3 1722->1725 1726 1400ebec2 1723->1726 1727 1400ebf23 1724->1727 1728 1400ebee9 1725->1728 1729 1400ebed7 1725->1729 1730 1400ebb90 __free_lconv_mon 2 API calls 1726->1730 1733 1400ed024 _invalid_parameter_noinfo 2 API calls 1727->1733 1736 1400ebf3a 1727->1736 1732 1400ec2ec _invalid_parameter_noinfo 2 API calls 1728->1732 1731 1400ed06c _invalid_parameter_noinfo 2 API calls 1729->1731 1730->1720 1731->1726 1734 1400ebef1 1732->1734 1733->1736 1737 1400ebb90 __free_lconv_mon 2 API calls 1734->1737 1735 1400ed06c _invalid_parameter_noinfo 2 API calls 1738 1400ebf59 1735->1738 1736->1735 1739 1400ebf42 1736->1739 1737->1720 1738->1739 1741 1400ef8d8 _invalid_parameter_noinfo 2 API calls 1738->1741 1740 1400d3b90 2 API calls 1739->1740 1746 1400ebfbc 1739->1746 1742 1400ebfca 1740->1742 1743 1400ebf6c 1741->1743 1744 1400ebf8a 1743->1744 1745 1400ebf7a 1743->1745 1748 1400ed06c _invalid_parameter_noinfo 2 API calls 1744->1748 1747 1400ed06c _invalid_parameter_noinfo 2 API calls 1745->1747 1746->1705 1749 1400ebf81 1747->1749 1750 1400ebf92 1748->1750 1753 1400ebb90 __free_lconv_mon 2 API calls 1749->1753 1751 1400ebfa8 1750->1751 1752 1400ebf96 1750->1752 1755 1400ec2ec _invalid_parameter_noinfo 2 API calls 1751->1755 1754 1400ed06c _invalid_parameter_noinfo 2 API calls 1752->1754 1753->1739 1754->1749 1756 1400ebfb0 1755->1756 1757 1400ebb90 __free_lconv_mon 2 API calls 1756->1757 1757->1739 1759 1400f5872 _invalid_parameter_noinfo 1758->1759 1761 1400f587f 1758->1761 1759->1761 1768 1400f55f0 1759->1768 1761->1707 1763 1400d3b99 1762->1763 1765 1400d3ba8 _invalid_parameter_noinfo_noreturn 1763->1765 1856 1400f16b8 1763->1856 1875 1400cdbb0 1765->1875 1769 1400f568c 1768->1769 1772 1400f5613 1768->1772 1770 1400f56df 1769->1770 1773 1400ebb90 __free_lconv_mon 2 API calls 1769->1773 1834 1400f57b8 1770->1834 1772->1769 1774 1400f5652 1772->1774 1779 1400ebb90 __free_lconv_mon 2 API calls 1772->1779 1775 1400f56b0 1773->1775 1777 1400f5674 1774->1777 1784 1400ebb90 __free_lconv_mon 2 API calls 1774->1784 1776 1400ebb90 __free_lconv_mon 2 API calls 1775->1776 1780 1400f56c4 1776->1780 1778 1400ebb90 __free_lconv_mon 2 API calls 1777->1778 1781 1400f5680 1778->1781 1782 1400f5646 1779->1782 1783 1400ebb90 __free_lconv_mon 2 API calls 1780->1783 1786 1400ebb90 __free_lconv_mon 2 API calls 1781->1786 1794 1400f43e4 1782->1794 1789 1400f56d3 1783->1789 1790 1400f5668 1784->1790 1785 1400f574a 1786->1769 1787 1400ebb90 LoadLibraryW GetProcAddressForCaller __free_lconv_mon 1791 1400f56eb 1787->1791 1792 1400ebb90 __free_lconv_mon 2 API calls 1789->1792 1822 1400f485c 1790->1822 1791->1785 1791->1787 1792->1770 1795 1400f44e8 1794->1795 1796 1400f43ed 1794->1796 1795->1774 1797 1400f4407 1796->1797 1798 1400ebb90 __free_lconv_mon 2 API calls 1796->1798 1799 1400f4419 1797->1799 1800 1400ebb90 __free_lconv_mon 2 API calls 1797->1800 1798->1797 1801 1400f442b 1799->1801 1802 1400ebb90 __free_lconv_mon 2 API calls 1799->1802 1800->1799 1803 1400f443d 1801->1803 1804 1400ebb90 __free_lconv_mon 2 API calls 1801->1804 1802->1801 1805 1400f444f 1803->1805 1807 1400ebb90 __free_lconv_mon 2 API calls 1803->1807 1804->1803 1806 1400f4461 1805->1806 1808 1400ebb90 __free_lconv_mon 2 API calls 1805->1808 1809 1400f4473 1806->1809 1810 1400ebb90 __free_lconv_mon 2 API calls 1806->1810 1807->1805 1808->1806 1811 1400f4485 1809->1811 1812 1400ebb90 __free_lconv_mon 2 API calls 1809->1812 1810->1809 1813 1400f4497 1811->1813 1814 1400ebb90 __free_lconv_mon 2 API calls 1811->1814 1812->1811 1815 1400f44a9 1813->1815 1816 1400ebb90 __free_lconv_mon 2 API calls 1813->1816 1814->1813 1817 1400f44be 1815->1817 1818 1400ebb90 __free_lconv_mon 2 API calls 1815->1818 1816->1815 1819 1400f44d3 1817->1819 1820 1400ebb90 __free_lconv_mon 2 API calls 1817->1820 1818->1817 1819->1795 1821 1400ebb90 __free_lconv_mon 2 API calls 1819->1821 1820->1819 1821->1795 1823 1400f4861 1822->1823 1832 1400f48c2 1822->1832 1824 1400ebb90 __free_lconv_mon 2 API calls 1823->1824 1826 1400f487a 1823->1826 1824->1826 1825 1400f488c 1828 1400f489e 1825->1828 1829 1400ebb90 __free_lconv_mon 2 API calls 1825->1829 1826->1825 1827 1400ebb90 __free_lconv_mon 2 API calls 1826->1827 1827->1825 1830 1400f48b0 1828->1830 1831 1400ebb90 __free_lconv_mon 2 API calls 1828->1831 1829->1828 1830->1832 1833 1400ebb90 __free_lconv_mon 2 API calls 1830->1833 1831->1830 1832->1777 1833->1832 1835 1400f57e8 1834->1835 1836 1400f57bd 1834->1836 1835->1791 1836->1835 1840 1400f4998 1836->1840 1839 1400ebb90 __free_lconv_mon 2 API calls 1839->1835 1841 1400f4a90 1840->1841 1842 1400f49a1 1840->1842 1841->1839 1843 1400ebb90 __free_lconv_mon 2 API calls 1842->1843 1844 1400f4a01 1843->1844 1845 1400ebb90 __free_lconv_mon 2 API calls 1844->1845 1846 1400f4a0d 1845->1846 1847 1400ebb90 __free_lconv_mon 2 API calls 1846->1847 1848 1400f4a19 1847->1848 1849 1400ebb90 __free_lconv_mon 2 API calls 1848->1849 1850 1400f4a6c 1849->1850 1851 1400ebb90 __free_lconv_mon 2 API calls 1850->1851 1852 1400f4a78 1851->1852 1853 1400ebb90 __free_lconv_mon 2 API calls 1852->1853 1854 1400f4a84 1853->1854 1855 1400ebb90 __free_lconv_mon 2 API calls 1854->1855 1855->1841 1857 1400f16e0 1856->1857 1859 1400f1701 _invalid_parameter_noinfo 1856->1859 1858 1400ebfcc _invalid_parameter_noinfo 2 API calls 1857->1858 1857->1859 1863 1400f16f4 1857->1863 1858->1863 1862 1400f1909 _invalid_parameter_noinfo 1859->1862 1868 1400f1806 1859->1868 1874 1400f1847 _invalid_parameter_noinfo 1859->1874 1860 1400f173e 1860->1765 1861 1400f177e 1864 1400d149c __free_lconv_mon 2 API calls 1861->1864 1866 1400cdbb0 2 API calls 1862->1866 1863->1859 1863->1860 1863->1861 1865 1400f1783 1864->1865 1867 1400d27a0 _invalid_parameter_noinfo 2 API calls 1865->1867 1869 1400f1920 1866->1869 1867->1860 1870 1400ebe50 2 API calls 1868->1870 1868->1874 1869->1765 1872 1400f1837 1870->1872 1871 1400ebe50 LoadLibraryW GetProcAddressForCaller 1871->1874 1873 1400ebe50 2 API calls 1872->1873 1873->1874 1874->1871 1876 1400cde18 1875->1876 1877 1400ce008 2 API calls 1876->1877 1878 1400cdebb 1877->1878 1879 1400cdec1 1878->1879 1880 1400cdd98 2 API calls 1878->1880 1881 1400cded3 1880->1881 1882 1400587b0 1885 140058810 1882->1885 1886 140058823 1885->1886 1889 140058840 1886->1889 1890 140058853 1889->1890 1891 1400587d8 1889->1891 1893 140074348 1890->1893 1895 140074351 1893->1895 1901 140074378 1893->1901 1894 140074384 2 API calls 1896 140074383 1894->1896 1897 140074365 1895->1897 1899 1400d3b90 2 API calls 1895->1899 1895->1901 1902 140074370 1895->1902 1903 140074384 1897->1903 1898 140074384 2 API calls 1898->1901 1899->1897 1901->1894 1902->1898 1904 14007439d 1903->1904 1907 1400743d4 1904->1907 1906 1400743b9 std::_Xinvalid_argument 1908 14007441e 1907->1908 1914 140024b60 1908->1914 1910 14007447a _invalid_parameter_noinfo_noreturn 1910->1906 1915 140024ba9 1914->1915 1925 140024c90 1915->1925 1921 140024bf6 1921->1910 1922 1400d27c0 1921->1922 1923 1400d2aac _invalid_parameter_noinfo 2 API calls 1922->1923 1924 1400d27d9 _invalid_parameter_noinfo_noreturn 1923->1924 1926 140024cbb 1925->1926 1928 140024cd4 1926->1928 1942 140024df0 1926->1942 1946 14001bcf0 1928->1946 1931 1400037e0 2 API calls 1932 140024d01 1931->1932 1933 1400037e0 2 API calls 1932->1933 1934 140024bd8 1933->1934 1935 140024d30 1934->1935 1936 140024d5d 1935->1936 1960 140024eb0 1936->1960 1939 1400037e0 1977 140005fa0 1939->1977 1941 1400037fb 1941->1921 1943 140024e15 1942->1943 1950 14001bd40 1943->1950 1945 140024e2f 1945->1928 1947 14001bd23 1946->1947 1948 14001bd40 2 API calls 1947->1948 1949 14001bd35 1948->1949 1949->1931 1951 14001bdeb 1950->1951 1953 14001bd7d 1950->1953 1954 14001be20 1951->1954 1953->1945 1955 14001be82 1954->1955 1956 140006ae0 LoadLibraryW GetProcAddressForCaller 1955->1956 1958 14001be9d 1955->1958 1956->1958 1957 14001c00d 1957->1953 1958->1957 1959 1400060b0 LoadLibraryW GetProcAddressForCaller 1958->1959 1959->1957 1961 140024eee _invalid_parameter_noinfo_noreturn 1960->1961 1964 14009f934 1961->1964 1963 140024be7 1963->1939 1965 14009f955 1964->1965 1966 14009f98a 1964->1966 1965->1966 1968 1400d98f8 1965->1968 1966->1963 1969 1400d9905 1968->1969 1970 1400d990f 1968->1970 1969->1970 1974 1400d992a 1969->1974 1971 1400d149c __free_lconv_mon LoadLibraryW GetProcAddressForCaller 1970->1971 1972 1400d9916 1971->1972 1973 1400d27a0 _invalid_parameter_noinfo LoadLibraryW GetProcAddressForCaller 1972->1973 1975 1400d9922 1973->1975 1974->1975 1976 1400d149c __free_lconv_mon LoadLibraryW GetProcAddressForCaller 1974->1976 1975->1966 1976->1972 1978 140005fbb 1977->1978 1979 140005fcd 1978->1979 1981 1400060b0 1978->1981 1979->1941 1984 140005280 1981->1984 1983 1400060d9 1983->1979 1985 1400052ac 1984->1985 1986 14000529d 1984->1986 1985->1983 1987 1400052d0 LoadLibraryW GetProcAddressForCaller 1986->1987 1987->1985 1988 1400d1534 1989 1400ebfcc _invalid_parameter_noinfo 2 API calls 1988->1989 1990 1400d153d 1989->1990

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2992327036.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140001000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_140001000_XMx8r7SLZr.jbxd
                                      Similarity
                                      • API ID: AllocateHeap
                                      • String ID:
                                      • API String ID: 1279760036-0
                                      • Opcode ID: 74ebb505a7fbf2c379a17fa2c279ca551ddba194da03229561383b0bae5a41fc
                                      • Instruction ID: 5d71bd2d8b3c796612e9963d57d31357f691fc92d3e0e99003e0cf116a65a780
                                      • Opcode Fuzzy Hash: 74ebb505a7fbf2c379a17fa2c279ca551ddba194da03229561383b0bae5a41fc
                                      • Instruction Fuzzy Hash: EBF05E30318E0A4AF766777B5DA93FB21C0EB9C3A0F5004247A02D31F2EE74CC4182A1
                                      Uniqueness

                                      Uniqueness Score: -1.00%