Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ySJ1HwLs9k

Overview

General Information

Sample Name:ySJ1HwLs9k (renamed file extension from none to exe)
Analysis ID:682138
MD5:cd76badf66246e0424954805222e4f58
SHA1:e8c6d68e67d853180d36116e3ba27e4f12346dc2
SHA256:8cfefc291d9088ef0b3ab7dd59d8ff672e73d333c8d18bd1dff4c7695ae8af83
Tags:32exe
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Generic Downloader
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
May check the online IP address of the machine
.NET source code contains potential unpacker
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Antivirus or Machine Learning detection for unpacked file
Sample file is different than original file name gathered from version info
May sleep (evasive loops) to hinder dynamic analysis
Checks if the current process is being debugged
Detected potential crypto function
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Contains long sleeps (>= 3 min)
Enables debug privileges

Classification

  • System is w10x64
  • ySJ1HwLs9k.exe (PID: 4624 cmdline: "C:\Users\user\Desktop\ySJ1HwLs9k.exe" MD5: CD76BADF66246E0424954805222E4F58)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
ySJ1HwLs9k.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
    SourceRuleDescriptionAuthorStrings
    0.0.ySJ1HwLs9k.exe.440000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: ySJ1HwLs9k.exeAvira: detected
      Source: ySJ1HwLs9k.exeVirustotal: Detection: 53%Perma Link
      Source: ySJ1HwLs9k.exeReversingLabs: Detection: 80%
      Source: ySJ1HwLs9k.exeJoe Sandbox ML: detected
      Source: 0.0.ySJ1HwLs9k.exe.440000.0.unpackAvira: Label: LNK/Runner.VPGD
      Source: ySJ1HwLs9k.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: ySJ1HwLs9k.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

      Networking

      barindex
      Source: Yara matchFile source: ySJ1HwLs9k.exe, type: SAMPLE
      Source: Yara matchFile source: 0.0.ySJ1HwLs9k.exe.440000.0.unpack, type: UNPACKEDPE
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeDNS query: name: ip-api.com
      Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
      Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
      Source: ySJ1HwLs9k.exeString found in binary or memory: http://exmple.com/Uploader.php
      Source: ySJ1HwLs9k.exe, 00000000.00000002.246400285.0000000002758000.00000004.00000800.00020000.00000000.sdmp, ySJ1HwLs9k.exe, 00000000.00000002.246418693.000000000276F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
      Source: ySJ1HwLs9k.exeString found in binary or memory: http://ip-api.com/line/?fields=hosting
      Source: ySJ1HwLs9k.exe, 00000000.00000002.246400285.0000000002758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.comx
      Source: ySJ1HwLs9k.exe, 00000000.00000002.246400285.0000000002758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: unknownDNS traffic detected: queries for: ip-api.com
      Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
      Source: ySJ1HwLs9k.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: ySJ1HwLs9k.exe, 00000000.00000002.245886288.00000000008B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs ySJ1HwLs9k.exe
      Source: ySJ1HwLs9k.exe, 00000000.00000000.237922513.000000000044E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameXWorm.exe4 vs ySJ1HwLs9k.exe
      Source: ySJ1HwLs9k.exeBinary or memory string: OriginalFilenameXWorm.exe4 vs ySJ1HwLs9k.exe
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeCode function: 0_2_00007FFC017C54120_2_00007FFC017C5412
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeCode function: 0_2_00007FFC017C46660_2_00007FFC017C4666
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeCode function: 0_2_00007FFC017C0DCB0_2_00007FFC017C0DCB
      Source: ySJ1HwLs9k.exeVirustotal: Detection: 53%
      Source: ySJ1HwLs9k.exeReversingLabs: Detection: 80%
      Source: ySJ1HwLs9k.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: ySJ1HwLs9k.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeMutant created: \Sessions\1\BaseNamedObjects\DfPMuDiGLmV7f2GT
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ySJ1HwLs9k.exe.logJump to behavior
      Source: classification engineClassification label: mal80.troj.evad.winEXE@1/1@1/1
      Source: ySJ1HwLs9k.exe, Stub/Helper.csCryptographic APIs: 'TransformFinalBlock'
      Source: ySJ1HwLs9k.exe, Stub/Helper.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
      Source: 0.0.ySJ1HwLs9k.exe.440000.0.unpack, Stub/Helper.csCryptographic APIs: 'TransformFinalBlock'
      Source: 0.0.ySJ1HwLs9k.exe.440000.0.unpack, Stub/Helper.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: ySJ1HwLs9k.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: ySJ1HwLs9k.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

      Data Obfuscation

      barindex
      Source: ySJ1HwLs9k.exe, Stub/Helper.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 0.0.ySJ1HwLs9k.exe.440000.0.unpack, Stub/Helper.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: ySJ1HwLs9k.exeBinary or memory string: SBIEDLL.DLLMHTTP://IP-API.COM/LINE/?FIELDS=HOSTING
      Source: ySJ1HwLs9k.exe, 00000000.00000002.246279336.00000000026DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exe TID: 5440Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exe TID: 4012Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: ySJ1HwLs9k.exeBinary or memory string: vmware
      Source: ySJ1HwLs9k.exeBinary or memory string: DetectVirtualMachine
      Source: ySJ1HwLs9k.exe, 00000000.00000002.246553755.000000001B4E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll

      Anti Debugging

      barindex
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeCode function: 0_2_00007FFC017C649D CheckRemoteDebuggerPresent,0_2_00007FFC017C649D
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeMemory allocated: page read and write | page guardJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeQueries volume information: C:\Users\user\Desktop\ySJ1HwLs9k.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\ySJ1HwLs9k.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid Accounts1
      Windows Management Instrumentation
      Path InterceptionPath Interception1
      Masquerading
      OS Credential Dumping221
      Security Software Discovery
      Remote Services11
      Archive Collected Data
      Exfiltration Over Other Network Medium1
      Encrypted Channel
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
      Disable or Modify Tools
      LSASS Memory41
      Virtualization/Sandbox Evasion
      Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
      Ingress Tool Transfer
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)41
      Virtualization/Sandbox Evasion
      Security Account Manager1
      Remote System Discovery
      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
      Non-Application Layer Protocol
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
      Deobfuscate/Decode Files or Information
      NTDS1
      System Network Configuration Discovery
      Distributed Component Object ModelInput CaptureScheduled Transfer2
      Application Layer Protocol
      SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script11
      Software Packing
      LSA Secrets22
      System Information Discovery
      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      SourceDetectionScannerLabelLink
      ySJ1HwLs9k.exe54%VirustotalBrowse
      ySJ1HwLs9k.exe81%ReversingLabsByteCode-MSIL.Hacktool.AntiVm
      ySJ1HwLs9k.exe100%AviraLNK/Runner.VPGD
      ySJ1HwLs9k.exe100%Joe Sandbox ML
      No Antivirus matches
      SourceDetectionScannerLabelLinkDownload
      0.0.ySJ1HwLs9k.exe.440000.0.unpack100%AviraLNK/Runner.VPGDDownload File
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://exmple.com/Uploader.php0%VirustotalBrowse
      http://exmple.com/Uploader.php0%Avira URL Cloudsafe
      http://ip-api.comx0%URL Reputationsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      ip-api.com
      208.95.112.1
      truefalse
        high
        NameMaliciousAntivirus DetectionReputation
        http://ip-api.com/line/?fields=hostingfalse
          high
          NameSourceMaliciousAntivirus DetectionReputation
          http://exmple.com/Uploader.phpySJ1HwLs9k.exefalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameySJ1HwLs9k.exe, 00000000.00000002.246400285.0000000002758000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://ip-api.comxySJ1HwLs9k.exe, 00000000.00000002.246400285.0000000002758000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://ip-api.comySJ1HwLs9k.exe, 00000000.00000002.246400285.0000000002758000.00000004.00000800.00020000.00000000.sdmp, ySJ1HwLs9k.exe, 00000000.00000002.246418693.000000000276F000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              208.95.112.1
              ip-api.comUnited States
              53334TUT-ASUSfalse
              Joe Sandbox Version:35.0.0 Citrine
              Analysis ID:682138
              Start date and time:2022-08-11 05:07:06 +02:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 3m 2s
              Hypervisor based Inspection enabled:false
              Report type:full
              Sample file name:ySJ1HwLs9k (renamed file extension from none to exe)
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:5
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal80.troj.evad.winEXE@1/1@1/1
              EGA Information:
              • Successful, ratio: 100%
              HDC Information:Failed
              HCA Information:
              • Successful, ratio: 96%
              • Number of executed functions: 4
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              • Stop behavior analysis, all processes terminated
              • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 20.82.210.154
              • Excluded domains from analysis (whitelisted): store-images.s-microsoft.com, arc.trafficmanager.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, arc.msn.com
              • Report size getting too big, too many NtQueryValueKey calls found.
              TimeTypeDescription
              05:08:08API Interceptor1x Sleep call for process: ySJ1HwLs9k.exe modified
              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              208.95.112.1V7ay0aTe3O.exeGet hashmaliciousBrowse
              • ip-api.com/json/102.129.143.3
              V7ay0aTe3O.exeGet hashmaliciousBrowse
              • ip-api.com/json/102.129.143.3
              fA2xMsllZK.apkGet hashmaliciousBrowse
              • www.ip-api.com/json
              M61ridRaIr.exeGet hashmaliciousBrowse
              • ip-api.com/json/
              CHEATBEAR.exeGet hashmaliciousBrowse
              • ip-api.com/line/?fields=hosting
              HackLoader.exeGet hashmaliciousBrowse
              • ip-api.com/line/?fields=hosting
              HackLoader.exeGet hashmaliciousBrowse
              • ip-api.com/line/?fields=hosting
              Ikd3EuXME8.exeGet hashmaliciousBrowse
              • ip-api.com/json/
              i27fjSqiwh.exeGet hashmaliciousBrowse
              • ip-api.com/line?fields=query,country,city
              Ola.Tv.ver.18.0.build.18.apkGet hashmaliciousBrowse
              • ip-api.com/json?fields=countryCode
              A9F400B739DB381FA4D0EE9DBDA0829407400033B2D5A.exeGet hashmaliciousBrowse
              • ip-api.com/json/
              HackLoader.exeGet hashmaliciousBrowse
              • ip-api.com/line/?fields=hosting
              CHEATBEAR.exeGet hashmaliciousBrowse
              • ip-api.com/line/?fields=hosting
              HackLoader.exeGet hashmaliciousBrowse
              • ip-api.com/line/?fields=hosting
              CHEATBEAR.exeGet hashmaliciousBrowse
              • ip-api.com/line/?fields=hosting
              rust-stealer-xss.exeGet hashmaliciousBrowse
              • ip-api.com/json/102.129.143.3
              6A42F7E5290BF7E40E1AA0C0E9CEDA098A612D6DDA9B7.exeGet hashmaliciousBrowse
              • ip-api.com/json/
              CB7D7FE72BDC9B5C0DA00A175AD4354037473B71F8A9F.exeGet hashmaliciousBrowse
              • ip-api.com/json/
              0xOTqBLwqS.exeGet hashmaliciousBrowse
              • ip-api.com/json/
              Y1VipMk6vh.exeGet hashmaliciousBrowse
              • ip-api.com/json/
              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              ip-api.comHackLoader.exeGet hashmaliciousBrowse
              • 208.95.112.1
              V7ay0aTe3O.exeGet hashmaliciousBrowse
              • 208.95.112.1
              V7ay0aTe3O.exeGet hashmaliciousBrowse
              • 208.95.112.1
              M61ridRaIr.exeGet hashmaliciousBrowse
              • 208.95.112.1
              CHEATBEAR.exeGet hashmaliciousBrowse
              • 208.95.112.1
              HackLoader.exeGet hashmaliciousBrowse
              • 208.95.112.1
              HackLoader.exeGet hashmaliciousBrowse
              • 208.95.112.1
              Ikd3EuXME8.exeGet hashmaliciousBrowse
              • 208.95.112.1
              VtDTPnS1nU.exeGet hashmaliciousBrowse
              • 208.95.112.1
              i27fjSqiwh.exeGet hashmaliciousBrowse
              • 208.95.112.1
              a507d9b7459be7da333d8b2ca288c600bf7497fbb860b.exeGet hashmaliciousBrowse
              • 208.95.112.1
              sTflTHfzzl.exeGet hashmaliciousBrowse
              • 208.95.112.1
              i2MHQ9Kirq.exeGet hashmaliciousBrowse
              • 208.95.112.1
              A9F400B739DB381FA4D0EE9DBDA0829407400033B2D5A.exeGet hashmaliciousBrowse
              • 208.95.112.1
              3F95733711B8F39FF7BC3458FF49EF57CD4411F3A813D.exeGet hashmaliciousBrowse
              • 208.95.112.1
              HackLoader.exeGet hashmaliciousBrowse
              • 208.95.112.1
              CHEATBEAR.exeGet hashmaliciousBrowse
              • 208.95.112.1
              HackLoader.exeGet hashmaliciousBrowse
              • 208.95.112.1
              CHEATBEAR.exeGet hashmaliciousBrowse
              • 208.95.112.1
              FC45728DCDF75985369C218C0386D8B5E3E49FCBCE67B.exeGet hashmaliciousBrowse
              • 208.95.112.1
              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              TUT-ASUSV7ay0aTe3O.exeGet hashmaliciousBrowse
              • 208.95.112.1
              V7ay0aTe3O.exeGet hashmaliciousBrowse
              • 208.95.112.1
              fA2xMsllZK.apkGet hashmaliciousBrowse
              • 208.95.112.1
              M61ridRaIr.exeGet hashmaliciousBrowse
              • 208.95.112.1
              CHEATBEAR.exeGet hashmaliciousBrowse
              • 208.95.112.1
              HackLoader.exeGet hashmaliciousBrowse
              • 208.95.112.1
              HackLoader.exeGet hashmaliciousBrowse
              • 208.95.112.1
              Ikd3EuXME8.exeGet hashmaliciousBrowse
              • 208.95.112.1
              i27fjSqiwh.exeGet hashmaliciousBrowse
              • 208.95.112.1
              Ola.Tv.ver.18.0.build.18.apkGet hashmaliciousBrowse
              • 208.95.112.1
              A9F400B739DB381FA4D0EE9DBDA0829407400033B2D5A.exeGet hashmaliciousBrowse
              • 208.95.112.1
              3F95733711B8F39FF7BC3458FF49EF57CD4411F3A813D.exeGet hashmaliciousBrowse
              • 208.95.112.1
              HackLoader.exeGet hashmaliciousBrowse
              • 208.95.112.1
              CHEATBEAR.exeGet hashmaliciousBrowse
              • 208.95.112.1
              HackLoader.exeGet hashmaliciousBrowse
              • 208.95.112.1
              CHEATBEAR.exeGet hashmaliciousBrowse
              • 208.95.112.1
              FC45728DCDF75985369C218C0386D8B5E3E49FCBCE67B.exeGet hashmaliciousBrowse
              • 208.95.112.1
              rust-stealer-xss.exeGet hashmaliciousBrowse
              • 208.95.112.1
              6A42F7E5290BF7E40E1AA0C0E9CEDA098A612D6DDA9B7.exeGet hashmaliciousBrowse
              • 208.95.112.1
              CB7D7FE72BDC9B5C0DA00A175AD4354037473B71F8A9F.exeGet hashmaliciousBrowse
              • 208.95.112.1
              No context
              No context
              Process:C:\Users\user\Desktop\ySJ1HwLs9k.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1727
              Entropy (8bit):5.3694638062396685
              Encrypted:false
              SSDEEP:48:MxHKEYHKGD8Ao6+vxpNl1qHGiD0HKeGpH+jtHTG1hAHKKPz:iqEYqGgAo9ZPlwmI0qeoAtzG1eqKPz
              MD5:69067D181AEA162FFB2C656E1E49A6FC
              SHA1:7D5ADD0D2602B8C7E3F9133552DCE0978301A811
              SHA-256:2E3687BF17D5BA1FB36B488AE1BA517180B116D4B4B61D8C4EC7681293DE24A1
              SHA-512:B3BE69E73EBFD5ED933BCB161803D08E4B0E54AD0382178E967127DA82A5737B79AEFB96055509497ECC0805A3A4BD8297B5DDC7B2ADBB6B2B4FAEC7D5CCEDC5
              Malicious:true
              Reputation:low
              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\10a17139182a9efd561f01fada9688a5\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\4e05e2e48b8a6dd267a8c9e25ef129a7\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\f2e0589ed6d670f264a5f65dd0ad000f\Microsoft.VisualBasic.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\49e5c0579db170be9741dccc34c1998e\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_6
              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Entropy (8bit):5.579947716799985
              TrID:
              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
              • Win32 Executable (generic) a (10002005/4) 49.75%
              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
              • Windows Screen Saver (13104/52) 0.07%
              • Generic Win/DOS Executable (2004/3) 0.01%
              File name:ySJ1HwLs9k.exe
              File size:46592
              MD5:cd76badf66246e0424954805222e4f58
              SHA1:e8c6d68e67d853180d36116e3ba27e4f12346dc2
              SHA256:8cfefc291d9088ef0b3ab7dd59d8ff672e73d333c8d18bd1dff4c7695ae8af83
              SHA512:f0d55c19c5bcde275292031930276420cfc6bab0539172c468461b42fa627e793586663b1ffefe44dc3aa70fbf3cffee78ad024d43020dce0e1518ef0ba1a13f
              SSDEEP:768:QhHhHjpsflPuxMtKHkvD+77x+Bbq19qpRGMdHren3:QWlOHk7Ucm190Gys3
              TLSH:5323298A37944001CBFD67F16DB2BA2242B2957B092BDB8E1CC944D76B57BC54D80EE3
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....i.b................................. ........@.. ....................... ............@................................
              Icon Hash:00828e8e8686b000
              Entrypoint:0x40cabe
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Time Stamp:0x62F369AB [Wed Aug 10 08:17:47 2022 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
              Instruction
              jmp dword ptr [00402000h]
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0xca6c0x4f.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000x4d0.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x100000xc.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x20000xaac40xac00False0.42787063953488375data5.6803435183448645IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rsrc0xe0000x4d00x600False0.3723958333333333data3.6891997992770373IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x100000xc0x200False0.044921875data0.07763316234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountry
              RT_VERSION0xe0a00x23cdata
              RT_MANIFEST0xe2e00x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
              DLLImport
              mscoree.dll_CorExeMain
              TimestampSource PortDest PortSource IPDest IP
              Aug 11, 2022 05:08:08.867799044 CEST4973480192.168.2.3208.95.112.1
              Aug 11, 2022 05:08:08.897326946 CEST8049734208.95.112.1192.168.2.3
              Aug 11, 2022 05:08:08.897458076 CEST4973480192.168.2.3208.95.112.1
              Aug 11, 2022 05:08:08.912626028 CEST4973480192.168.2.3208.95.112.1
              Aug 11, 2022 05:08:08.944850922 CEST8049734208.95.112.1192.168.2.3
              Aug 11, 2022 05:08:09.003226042 CEST4973480192.168.2.3208.95.112.1
              Aug 11, 2022 05:08:09.147562027 CEST4973480192.168.2.3208.95.112.1
              TimestampSource PortDest PortSource IPDest IP
              Aug 11, 2022 05:08:08.829556942 CEST4931653192.168.2.38.8.8.8
              Aug 11, 2022 05:08:08.847392082 CEST53493168.8.8.8192.168.2.3
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
              Aug 11, 2022 05:08:08.829556942 CEST192.168.2.38.8.8.80x7bcdStandard query (0)ip-api.comA (IP address)IN (0x0001)
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
              Aug 11, 2022 05:08:08.847392082 CEST8.8.8.8192.168.2.30x7bcdNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)
              • ip-api.com
              Session IDSource IPSource PortDestination IPDestination PortProcess
              0192.168.2.349734208.95.112.180C:\Users\user\Desktop\ySJ1HwLs9k.exe
              TimestampkBytes transferredDirectionData
              Aug 11, 2022 05:08:08.912626028 CEST750OUTGET /line/?fields=hosting HTTP/1.1
              Host: ip-api.com
              Connection: Keep-Alive
              Aug 11, 2022 05:08:08.944850922 CEST750INHTTP/1.1 200 OK
              Date: Thu, 11 Aug 2022 03:08:08 GMT
              Content-Type: text/plain; charset=utf-8
              Content-Length: 5
              Access-Control-Allow-Origin: *
              X-Ttl: 60
              X-Rl: 44
              Data Raw: 74 72 75 65 0a
              Data Ascii: true


              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Target ID:0
              Start time:05:08:04
              Start date:11/08/2022
              Path:C:\Users\user\Desktop\ySJ1HwLs9k.exe
              Wow64 process (32bit):false
              Commandline:"C:\Users\user\Desktop\ySJ1HwLs9k.exe"
              Imagebase:0x440000
              File size:46592 bytes
              MD5 hash:CD76BADF66246E0424954805222E4F58
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Reputation:low

              Reset < >

                Execution Graph

                Execution Coverage:11.9%
                Dynamic/Decrypted Code Coverage:100%
                Signature Coverage:100%
                Total number of Nodes:3
                Total number of Limit Nodes:0
                execution_graph 1492 7ffc017c649d 1493 7ffc017c64af CheckRemoteDebuggerPresent 1492->1493 1495 7ffc017c654f 1493->1495

                Callgraph

                • Executed
                • Not Executed
                • Opacity -> Relevance
                • Disassembly available
                callgraph 0 Function_00007FFC017C3C05 1 Function_00007FFC017C5A08 2 Function_00007FFC017C4108 3 Function_00007FFC017C6401 4 Function_00007FFC017C271A 5 Function_00007FFC017C2319 6 Function_00007FFC017C0C0F 7 Function_00007FFC017C3A0D 7->0 8 Function_00007FFC017C1713 9 Function_00007FFC017C2A13 10 Function_00007FFC017C3E12 11 Function_00007FFC017C5412 74 Function_00007FFC017C58A0 11->74 12 Function_00007FFC017C5026 39 Function_00007FFC017C5365 12->39 13 Function_00007FFC017C3625 96 Function_00007FFC017C37F8 13->96 14 Function_00007FFC017C4B24 15 Function_00007FFC017C051C 16 Function_00007FFC017C1222 17 Function_00007FFC017C0B3A 18 Function_00007FFC017C1338 19 Function_00007FFC017C2E2D 20 Function_00007FFC017C282C 20->9 21 Function_00007FFC017C6431 91 Function_00007FFC017C59E8 21->91 22 Function_00007FFC017C0D46 23 Function_00007FFC017C3345 24 Function_00007FFC017C113E 25 Function_00007FFC017C213E 26 Function_00007FFC017C4C3E 53 Function_00007FFC017C4F7C 26->53 27 Function_00007FFC017C383D 82 Function_00007FFC017C39C9 27->82 28 Function_00007FFC017C3040 59 Function_00007FFC017C319B 28->59 29 Function_00007FFC017C0C56 30 Function_00007FFC017C3C56 30->10 31 Function_00007FFC017C1C59 32 Function_00007FFC017C1458 32->8 33 Function_00007FFC017C0A51 34 Function_00007FFC017C0150 35 Function_00007FFC017C2F50 36 Function_00007FFC017C4666 36->14 37 Function_00007FFC017C2A65 38 Function_00007FFC017C3E65 40 Function_00007FFC017C4169 55 Function_00007FFC017C4581 40->55 41 Function_00007FFC017C235D 42 Function_00007FFC017C1F5C 42->25 43 Function_00007FFC017C2B74 44 Function_00007FFC017C1A6E 45 Function_00007FFC017C346D 94 Function_00007FFC017C35E2 45->94 46 Function_00007FFC017C5F70 47 Function_00007FFC017C5986 48 Function_00007FFC017C1E84 49 Function_00007FFC017C3F84 49->2 50 Function_00007FFC017C5E84 51 Function_00007FFC017C118A 52 Function_00007FFC017C0288 54 Function_00007FFC017C0082 56 Function_00007FFC017C2181 56->5 57 Function_00007FFC017C0B81 58 Function_00007FFC017C2480 75 Function_00007FFC017C26B6 58->75 60 Function_00007FFC017C2C98 90 Function_00007FFC017C2DE8 60->90 61 Function_00007FFC017C1D8D 62 Function_00007FFC017C0092 63 Function_00007FFC017C0190 64 Function_00007FFC017C67A5 65 Function_00007FFC017C68A5 66 Function_00007FFC017C5FAB 67 Function_00007FFC017C05A8 67->34 67->63 68 Function_00007FFC017C00A8 67->68 76 Function_00007FFC017C01B8 67->76 77 Function_00007FFC017C00B8 67->77 80 Function_00007FFC017C00B0 67->80 83 Function_00007FFC017C00C8 67->83 87 Function_00007FFC017C00C0 67->87 69 Function_00007FFC017C009F 70 Function_00007FFC017C019F 71 Function_00007FFC017C179E 71->44 72 Function_00007FFC017C649D 73 Function_00007FFC017C03A1 78 Function_00007FFC017C68AE 79 Function_00007FFC017C0AAC 81 Function_00007FFC017C0DCB 81->24 81->51 88 Function_00007FFC017C11D8 81->88 84 Function_00007FFC017C0BC8 85 Function_00007FFC017C63BD 86 Function_00007FFC017C65C0 86->1 86->64 89 Function_00007FFC017C10E7 89->24 89->51 89->88 92 Function_00007FFC017C31DD 93 Function_00007FFC017C63DC 95 Function_00007FFC017C1AF6 97 Function_00007FFC017C0AF3 98 Function_00007FFC017C67F2

                Control-flow Graph

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.246928096.00007FFC017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFC017C0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffc017c0000_ySJ1HwLs9k.jbxd
                Similarity
                • API ID: CheckDebuggerPresentRemote
                • String ID:
                • API String ID: 3662101638-0
                • Opcode ID: 7bad488778c70de8b49b06ad611eca538c078dcf76630142195e9c6710a1fb8f
                • Instruction ID: 0683a6ef113b673e26860423c83de76d359f5fde3c3677eefa380ec430626d47
                • Opcode Fuzzy Hash: 7bad488778c70de8b49b06ad611eca538c078dcf76630142195e9c6710a1fb8f
                • Instruction Fuzzy Hash: A431E13190866C8FCB58DF5CD8856E9BBE0EF65311F05426AD489D7286CA34A846CBA1
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 15 7ffc017c4666-7ffc017c4673 16 7ffc017c4675-7ffc017c467d 15->16 17 7ffc017c467e-7ffc017c46aa 15->17 16->17 18 7ffc017c46ad-7ffc017c4747 17->18 19 7ffc017c46ac 17->19 23 7ffc017c4749-7ffc017c4752 18->23 24 7ffc017c47b3 18->24 19->18 23->24 25 7ffc017c4754-7ffc017c4760 23->25 26 7ffc017c47b5-7ffc017c47da 24->26 27 7ffc017c4799-7ffc017c47b1 25->27 28 7ffc017c4762-7ffc017c4774 25->28 32 7ffc017c4846 26->32 33 7ffc017c47dc-7ffc017c47e5 26->33 27->26 30 7ffc017c4776 28->30 31 7ffc017c4778-7ffc017c478b 28->31 30->31 31->31 34 7ffc017c478d-7ffc017c4795 31->34 36 7ffc017c4848-7ffc017c48f0 32->36 33->32 35 7ffc017c47e7-7ffc017c47f3 33->35 34->27 37 7ffc017c47f5-7ffc017c4807 35->37 38 7ffc017c482c-7ffc017c4844 35->38 47 7ffc017c495e 36->47 48 7ffc017c48f2-7ffc017c48fc 36->48 39 7ffc017c480b-7ffc017c481e 37->39 40 7ffc017c4809 37->40 38->36 39->39 42 7ffc017c4820-7ffc017c4828 39->42 40->39 42->38 50 7ffc017c4960-7ffc017c4989 47->50 48->47 49 7ffc017c48fe-7ffc017c490b 48->49 51 7ffc017c4944-7ffc017c495c 49->51 52 7ffc017c490d-7ffc017c491f 49->52 57 7ffc017c498b-7ffc017c4996 50->57 58 7ffc017c49f3 50->58 51->50 53 7ffc017c4923-7ffc017c4936 52->53 54 7ffc017c4921 52->54 53->53 56 7ffc017c4938-7ffc017c4940 53->56 54->53 56->51 57->58 60 7ffc017c4998-7ffc017c49a6 57->60 59 7ffc017c49f5-7ffc017c4a86 58->59 68 7ffc017c4a8c-7ffc017c4a9b 59->68 61 7ffc017c49a8-7ffc017c49ba 60->61 62 7ffc017c49df-7ffc017c49f1 60->62 63 7ffc017c49be-7ffc017c49d1 61->63 64 7ffc017c49bc 61->64 62->59 63->63 66 7ffc017c49d3-7ffc017c49db 63->66 64->63 66->62 69 7ffc017c4a9d 68->69 70 7ffc017c4aa3-7ffc017c4b08 call 7ffc017c4b24 68->70 69->70 77 7ffc017c4b0a 70->77 78 7ffc017c4b0f-7ffc017c4b23 70->78 77->78
                Memory Dump Source
                • Source File: 00000000.00000002.246928096.00007FFC017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFC017C0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffc017c0000_ySJ1HwLs9k.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 76c9d2ebf9ab75988a52669f0aa301232ae9ff0f4ad95bd268c2ba59b48169bd
                • Instruction ID: aa5d6913875a30662559996da188c54823dd8756750be140479ee9b750fe2383
                • Opcode Fuzzy Hash: 76c9d2ebf9ab75988a52669f0aa301232ae9ff0f4ad95bd268c2ba59b48169bd
                • Instruction Fuzzy Hash: DDF1B330908A9D8FEBA8DF28C8557E977D1FF54310F04426EE84EC7296DB34A841CB92
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 79 7ffc017c5412-7ffc017c541f 80 7ffc017c542a-7ffc017c545a 79->80 81 7ffc017c5421-7ffc017c5429 79->81 82 7ffc017c545d-7ffc017c54f7 80->82 83 7ffc017c545c 80->83 81->80 87 7ffc017c54f9-7ffc017c5502 82->87 88 7ffc017c5563 82->88 83->82 87->88 89 7ffc017c5504-7ffc017c5510 87->89 90 7ffc017c5565-7ffc017c558a 88->90 91 7ffc017c5549-7ffc017c5561 89->91 92 7ffc017c5512-7ffc017c5524 89->92 96 7ffc017c55f6 90->96 97 7ffc017c558c-7ffc017c5595 90->97 91->90 93 7ffc017c5526 92->93 94 7ffc017c5528-7ffc017c553b 92->94 93->94 94->94 98 7ffc017c553d-7ffc017c5545 94->98 100 7ffc017c55f8-7ffc017c561d 96->100 97->96 99 7ffc017c5597-7ffc017c55a3 97->99 98->91 101 7ffc017c55a5-7ffc017c55b7 99->101 102 7ffc017c55dc-7ffc017c55f4 99->102 107 7ffc017c568b 100->107 108 7ffc017c561f-7ffc017c5629 100->108 103 7ffc017c55bb-7ffc017c55ce 101->103 104 7ffc017c55b9 101->104 102->100 103->103 106 7ffc017c55d0-7ffc017c55d8 103->106 104->103 106->102 109 7ffc017c568d-7ffc017c56bb 107->109 108->107 110 7ffc017c562b-7ffc017c5638 108->110 117 7ffc017c572b 109->117 118 7ffc017c56bd-7ffc017c56c8 109->118 111 7ffc017c563a-7ffc017c564c 110->111 112 7ffc017c5671-7ffc017c5689 110->112 114 7ffc017c564e 111->114 115 7ffc017c5650-7ffc017c5663 111->115 112->109 114->115 115->115 116 7ffc017c5665-7ffc017c566d 115->116 116->112 120 7ffc017c572d-7ffc017c5805 117->120 118->117 119 7ffc017c56ca-7ffc017c56d8 118->119 121 7ffc017c56da-7ffc017c56ec 119->121 122 7ffc017c5711-7ffc017c5729 119->122 130 7ffc017c580b-7ffc017c581a 120->130 124 7ffc017c56ee 121->124 125 7ffc017c56f0-7ffc017c5703 121->125 122->120 124->125 125->125 127 7ffc017c5705-7ffc017c570d 125->127 127->122 131 7ffc017c581c 130->131 132 7ffc017c5822-7ffc017c5884 call 7ffc017c58a0 130->132 131->132 139 7ffc017c5886 132->139 140 7ffc017c588b-7ffc017c589f 132->140 139->140
                Memory Dump Source
                • Source File: 00000000.00000002.246928096.00007FFC017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFC017C0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffc017c0000_ySJ1HwLs9k.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 542ac26d9775392f74d8f0b547249ddbd922b8e566f74f5980dfbb7c4511309b
                • Instruction ID: 04a2637a1da012bd56e21e233d6f68d878f939c77251215909393ebed590d022
                • Opcode Fuzzy Hash: 542ac26d9775392f74d8f0b547249ddbd922b8e566f74f5980dfbb7c4511309b
                • Instruction Fuzzy Hash: 5CE1E330A08A8E8FEBA8DF2CD8557E977D2EF54710F15422ED84DC7292DE75A841CB81
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                Memory Dump Source
                • Source File: 00000000.00000002.246928096.00007FFC017C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFC017C0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffc017c0000_ySJ1HwLs9k.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 36b751943aa79611885a4be3aca883c48305dce26ab8117317d9246098395b83
                • Instruction ID: 2c4152db370ba7bb9fdc6b308f29ded1fc9bda97c9f0a9aade195c22cf83b4f1
                • Opcode Fuzzy Hash: 36b751943aa79611885a4be3aca883c48305dce26ab8117317d9246098395b83
                • Instruction Fuzzy Hash: D5A19170B1C95E8FEB88EB2C8455679B6D2EF98700F55417DE48EC32D3DE28A842CB51
                Uniqueness

                Uniqueness Score: -1.00%