Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:753428
MD5:4ae4a84eba3264c433e0c1b92594c61b
SHA1:bc8ee7fb36f3e3c03638bc5b6bf0bc9dd7cc034b
SHA256:bb531c53e5dc8fcc1fe71ef481253b9d3fa86446e7205e750dc3d6ee5c2a5636
Tags:exe
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Benign windows process drops PE files
Malicious sample detected (through community Yara rule)
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Maps a DLL or memory area into another process
Machine Learning detection for sample
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
PE file contains executable resources (Code or Archives)
IP address seen in connection with other malware
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged

Classification

  • System is w10x64
  • file.exe (PID: 5996 cmdline: C:\Users\user\Desktop\file.exe MD5: 4AE4A84EBA3264C433E0C1B92594C61B)
    • explorer.exe (PID: 3324 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • vvtsewb (PID: 5936 cmdline: C:\Users\user\AppData\Roaming\vvtsewb MD5: 4AE4A84EBA3264C433E0C1B92594C61B)
  • cleanup
{"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
SourceRuleDescriptionAuthorStrings
00000002.00000002.412766859.00000000007B0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
  • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
00000002.00000002.412803739.00000000007E1000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000002.00000002.412803739.00000000007E1000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x2f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000002.00000002.413033982.00000000009D8000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x5260:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000000.00000002.371278858.00000000022A1000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      Click to see the 11 entries
      SourceRuleDescriptionAuthorStrings
      2.2.vvtsewb.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        0.2.file.exe.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          2.3.vvtsewb.7c0000.0.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            2.2.vvtsewb.7b0e67.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              0.2.file.exe.7e0e67.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                Click to see the 1 entries
                No Sigma rule has matched
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: http://host-host-file8.com/URL Reputation: Label: malware
                Source: host-file-host6.comVirustotal: Detection: 19%Perma Link
                Source: host-host-file8.comVirustotal: Detection: 17%Perma Link
                Source: file.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\vvtsewbJoe Sandbox ML: detected
                Source: 00000002.00000002.412778372.00000000007C0000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
                Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                Source: Binary string: C:\jec-rexan\xezuwagav-lifesokip\31\wapirucokewe63.pdb source: file.exe, vvtsewb.1.dr
                Source: Binary string: cC:\jec-rexan\xezuwagav-lifesokip\31\wapirucokewe63.pdb source: file.exe, vvtsewb.1.dr

                Networking

                barindex
                Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                Source: Malware configuration extractorURLs: http://host-file-host6.com/
                Source: Malware configuration extractorURLs: http://host-host-file8.com/
                Source: Joe Sandbox ViewASN Name: COMBAHTONcombahtonGmbHDE COMBAHTONcombahtonGmbHDE
                Source: Joe Sandbox ViewIP Address: 84.21.172.159 84.21.172.159
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dkkgeh.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 302Host: host-file-host6.com
                Source: explorer.exe, 00000001.00000000.333055694.000000000091F000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.303883320.000000000091F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
                Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dkkgeh.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 302Host: host-file-host6.com
                Source: unknownDNS traffic detected: queries for: host-file-host6.com

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: Yara matchFile source: 2.2.vvtsewb.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.3.vvtsewb.7c0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.vvtsewb.7b0e67.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.7e0e67.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.file.exe.800000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.412803739.00000000007E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.371278858.00000000022A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.412778372.00000000007C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292353244.0000000000800000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000000.352581275.0000000002901000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000003.401198999.00000000007C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.371194689.0000000000800000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: vvtsewb, 00000002.00000002.412945082.00000000009CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                System Summary

                barindex
                Source: 00000002.00000002.412766859.00000000007B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                Source: 00000002.00000002.412803739.00000000007E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000002.00000002.413033982.00000000009D8000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000000.00000002.371278858.00000000022A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000002.00000002.412778372.00000000007C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000000.00000002.371129358.00000000007E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                Source: 00000001.00000000.352581275.0000000002901000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000000.00000002.371194689.0000000000800000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000000.00000002.371011318.00000000006E8000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 00000002.00000002.412766859.00000000007B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                Source: 00000002.00000002.412803739.00000000007E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000002.00000002.413033982.00000000009D8000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000000.00000002.371278858.00000000022A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000002.00000002.412778372.00000000007C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000000.00000002.371129358.00000000007E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                Source: 00000001.00000000.352581275.0000000002901000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000000.00000002.371194689.0000000000800000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000000.00000002.371011318.00000000006E8000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040F0250_2_0040F025
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004170DC0_2_004170DC
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004138E80_2_004138E8
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00413E2C0_2_00413E2C
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040C6350_2_0040C635
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004143700_2_00414370
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004157C90_2_004157C9
                Source: C:\Users\user\AppData\Roaming\vvtsewbCode function: 2_2_0040F0252_2_0040F025
                Source: C:\Users\user\AppData\Roaming\vvtsewbCode function: 2_2_004170DC2_2_004170DC
                Source: C:\Users\user\AppData\Roaming\vvtsewbCode function: 2_2_004138E82_2_004138E8
                Source: C:\Users\user\AppData\Roaming\vvtsewbCode function: 2_2_00413E2C2_2_00413E2C
                Source: C:\Users\user\AppData\Roaming\vvtsewbCode function: 2_2_0040C6352_2_0040C635
                Source: C:\Users\user\AppData\Roaming\vvtsewbCode function: 2_2_004143702_2_00414370
                Source: C:\Users\user\AppData\Roaming\vvtsewbCode function: 2_2_004157C92_2_004157C9
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040180C Sleep,NtTerminateProcess,0_2_0040180C
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401818 Sleep,NtTerminateProcess,0_2_00401818
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401822 Sleep,NtTerminateProcess,0_2_00401822
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401826 Sleep,NtTerminateProcess,0_2_00401826
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401834 Sleep,NtTerminateProcess,0_2_00401834
                Source: C:\Users\user\AppData\Roaming\vvtsewbCode function: 2_2_0040180C Sleep,NtTerminateProcess,2_2_0040180C
                Source: C:\Users\user\AppData\Roaming\vvtsewbCode function: 2_2_00401818 Sleep,NtTerminateProcess,2_2_00401818
                Source: C:\Users\user\AppData\Roaming\vvtsewbCode function: 2_2_00401822 Sleep,NtTerminateProcess,2_2_00401822
                Source: C:\Users\user\AppData\Roaming\vvtsewbCode function: 2_2_00401826 Sleep,NtTerminateProcess,2_2_00401826
                Source: C:\Users\user\AppData\Roaming\vvtsewbCode function: 2_2_00401834 Sleep,NtTerminateProcess,2_2_00401834
                Source: file.exeStatic PE information: Resource name: RT_VERSION type: x86 executable not stripped
                Source: vvtsewb.1.drStatic PE information: Resource name: RT_VERSION type: x86 executable not stripped
                Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\vvtsewb C:\Users\user\AppData\Roaming\vvtsewb
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vvtsewbJump to behavior
                Source: classification engineClassification label: mal100.troj.evad.winEXE@2/2@4/1
                Source: C:\Users\user\AppData\Roaming\vvtsewbCode function: 2_2_009DD28E CreateToolhelp32Snapshot,Module32First,2_2_009DD28E
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: C:\jec-rexan\xezuwagav-lifesokip\31\wapirucokewe63.pdb source: file.exe, vvtsewb.1.dr
                Source: Binary string: cC:\jec-rexan\xezuwagav-lifesokip\31\wapirucokewe63.pdb source: file.exe, vvtsewb.1.dr

                Data Obfuscation

                barindex
                Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:EW;
                Source: C:\Users\user\AppData\Roaming\vvtsewbUnpacked PE file: 2.2.vvtsewb.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:EW;
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004011D0 push ebx; iretd 0_2_00401217
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004011D7 push ebx; iretd 0_2_00401217
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004011EB push ebx; iretd 0_2_00401217
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040B4C1 push ecx; ret 0_2_0040B4D4
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007E1252 push ebx; iretd 0_2_007E127E
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007E123E push ebx; iretd 0_2_007E127E
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007E1237 push ebx; iretd 0_2_007E127E
                Source: C:\Users\user\AppData\Roaming\vvtsewbCode function: 2_2_004011D0 push ebx; iretd 2_2_00401217
                Source: C:\Users\user\AppData\Roaming\vvtsewbCode function: 2_2_004011D7 push ebx; iretd 2_2_00401217
                Source: C:\Users\user\AppData\Roaming\vvtsewbCode function: 2_2_004011EB push ebx; iretd 2_2_00401217
                Source: C:\Users\user\AppData\Roaming\vvtsewbCode function: 2_2_0040B4C1 push ecx; ret 2_2_0040B4D4
                Source: C:\Users\user\AppData\Roaming\vvtsewbCode function: 2_2_009E2DA3 pushad ; iretd 2_2_009E2DA9
                Source: C:\Users\user\AppData\Roaming\vvtsewbCode function: 2_2_009DDF19 push ebx; iretd 2_2_009DDF44
                Source: C:\Users\user\AppData\Roaming\vvtsewbCode function: 2_2_009DDF04 push ebx; iretd 2_2_009DDF44
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vvtsewbJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vvtsewbJump to dropped file

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\file.exeJump to behavior
                Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\vvtsewb:Zone.Identifier read attributes | deleteJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\vvtsewbKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\vvtsewbKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\vvtsewbKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\vvtsewbKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\vvtsewbKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\vvtsewbKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Windows\explorer.exe TID: 2772Thread sleep count: 663 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 5792Thread sleep count: 479 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 5792Thread sleep time: -47900s >= -30000sJump to behavior
                Source: C:\Windows\explorer.exe TID: 5820Thread sleep count: 497 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 5820Thread sleep time: -49700s >= -30000sJump to behavior
                Source: C:\Windows\explorer.exe TID: 3100Thread sleep count: 577 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 5068Thread sleep count: 413 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 5068Thread sleep time: -41300s >= -30000sJump to behavior
                Source: C:\Windows\explorer.exe TID: 2372Thread sleep count: 395 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 2372Thread sleep time: -39500s >= -30000sJump to behavior
                Source: C:\Windows\explorer.exeLast function: Thread delayed
                Source: C:\Windows\explorer.exeLast function: Thread delayed
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 663Jump to behavior
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 479Jump to behavior
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 497Jump to behavior
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 577Jump to behavior
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 413Jump to behavior
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 395Jump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformationJump to behavior
                Source: explorer.exe, 00000001.00000000.312651031.0000000008631000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
                Source: explorer.exe, 00000001.00000000.368261187.00000000086E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}i
                Source: explorer.exe, 00000001.00000000.368261187.00000000086E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                Source: explorer.exe, 00000001.00000000.304766305.00000000043B0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: explorer.exe, 00000001.00000000.368261187.00000000086E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
                Source: explorer.exe, 00000001.00000000.312651031.0000000008631000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000

                Anti Debugging

                barindex
                Source: C:\Users\user\Desktop\file.exeSystem information queried: CodeIntegrityInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\vvtsewbSystem information queried: CodeIntegrityInformationJump to behavior
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007E092B mov eax, dword ptr fs:[00000030h]0_2_007E092B
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007E0D90 mov eax, dword ptr fs:[00000030h]0_2_007E0D90
                Source: C:\Users\user\AppData\Roaming\vvtsewbCode function: 2_2_009DCB6B push dword ptr fs:[00000030h]2_2_009DCB6B
                Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\AppData\Roaming\vvtsewbProcess queried: DebugPortJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\explorer.exeFile created: vvtsewb.1.drJump to dropped file
                Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                Source: C:\Users\user\Desktop\file.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                Source: C:\Users\user\AppData\Roaming\vvtsewbSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
                Source: C:\Users\user\AppData\Roaming\vvtsewbSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                Source: C:\Users\user\Desktop\file.exeThread created: C:\Windows\explorer.exe EIP: 2901930Jump to behavior
                Source: C:\Users\user\AppData\Roaming\vvtsewbThread created: unknown EIP: 2971930Jump to behavior
                Source: explorer.exe, 00000001.00000000.333248976.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.356626269.0000000005910000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.352176966.0000000000ED0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: explorer.exe, 00000001.00000000.333248976.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.352176966.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.303967708.0000000000ED0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: uProgram Manager*r
                Source: explorer.exe, 00000001.00000000.333248976.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.352176966.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.303967708.0000000000ED0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: explorer.exe, 00000001.00000000.333248976.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.352176966.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.303967708.0000000000ED0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: explorer.exe, 00000001.00000000.332831091.0000000000878000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.351679837.0000000000878000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.303801289.0000000000878000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ProgmanLoc*U
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 2.2.vvtsewb.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.3.vvtsewb.7c0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.vvtsewb.7b0e67.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.7e0e67.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.file.exe.800000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.412803739.00000000007E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.371278858.00000000022A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.412778372.00000000007C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292353244.0000000000800000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000000.352581275.0000000002901000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000003.401198999.00000000007C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.371194689.0000000000800000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 2.2.vvtsewb.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.3.vvtsewb.7c0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.vvtsewb.7b0e67.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.7e0e67.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.file.exe.800000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.412803739.00000000007E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.371278858.00000000022A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.412778372.00000000007C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292353244.0000000000800000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000000.352581275.0000000002901000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000003.401198999.00000000007C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.371194689.0000000000800000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts1
                Exploitation for Client Execution
                1
                DLL Side-Loading
                32
                Process Injection
                11
                Masquerading
                1
                Input Capture
                211
                Security Software Discovery
                Remote Services1
                Input Capture
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                12
                Virtualization/Sandbox Evasion
                LSASS Memory12
                Virtualization/Sandbox Evasion
                Remote Desktop Protocol1
                Archive Collected Data
                Exfiltration Over Bluetooth2
                Non-Application Layer Protocol
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)32
                Process Injection
                Security Account Manager3
                Process Discovery
                SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration112
                Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                Hidden Files and Directories
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Obfuscated Files or Information
                LSA Secrets3
                System Information Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common1
                Software Packing
                Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                DLL Side-Loading
                DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                File Deletion
                Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                file.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\vvtsewb100%Joe Sandbox ML
                SourceDetectionScannerLabelLinkDownload
                2.3.vvtsewb.7c0000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                2.2.vvtsewb.7b0e67.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                2.2.vvtsewb.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                0.2.file.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                0.3.file.exe.800000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                0.2.file.exe.7e0e67.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                SourceDetectionScannerLabelLink
                host-file-host6.com20%VirustotalBrowse
                host-host-file8.com18%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://host-file-host6.com/0%URL Reputationsafe
                http://host-host-file8.com/100%URL Reputationmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                host-file-host6.com
                84.21.172.159
                truetrueunknown
                host-host-file8.com
                unknown
                unknowntrueunknown
                NameMaliciousAntivirus DetectionReputation
                http://host-file-host6.com/true
                • URL Reputation: safe
                unknown
                http://host-host-file8.com/true
                • URL Reputation: malware
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000001.00000000.333055694.000000000091F000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.303883320.000000000091F000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  84.21.172.159
                  host-file-host6.comGermany
                  30823COMBAHTONcombahtonGmbHDEtrue
                  Joe Sandbox Version:36.0.0 Rainbow Opal
                  Analysis ID:753428
                  Start date and time:2022-11-24 20:12:05 +01:00
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 6m 15s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Sample file name:file.exe
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:5
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:1
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal100.troj.evad.winEXE@2/2@4/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HDC Information:
                  • Successful, ratio: 14% (good quality ratio 11.9%)
                  • Quality average: 45.2%
                  • Quality standard deviation: 27.1%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 20
                  • Number of non-executed functions: 14
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe
                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ctldl.windowsupdate.com
                  • Not all processes where analyzed, report is missing behavior information
                  TimeTypeDescription
                  20:13:46Task SchedulerRun new task: Firefox Default Browser Agent 0A8EA222D941D8E8 path: C:\Users\user\AppData\Roaming\vvtsewb
                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  84.21.172.159file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  host-file-host6.comfile.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  qsu3KRECRS.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  COMBAHTONcombahtonGmbHDEfile.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  cIYZGVekvM.exeGet hashmaliciousBrowse
                  • 185.249.198.205
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  c20a40b230e26207a392fc196ecf818cd41c400aff19c.exeGet hashmaliciousBrowse
                  • 84.21.172.160
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  3KDH6vJpVU.exeGet hashmaliciousBrowse
                  • 45.156.84.159
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  SecuriteInfo.com.Trojan.Siggen18.59138.29444.26902.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  file.exeGet hashmaliciousBrowse
                  • 84.21.172.159
                  No context
                  No context
                  Process:C:\Windows\explorer.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):192512
                  Entropy (8bit):6.91435980932861
                  Encrypted:false
                  SSDEEP:3072:WsKq2R3GPBzO0uLLO1PtKl5JOLAtsDXi2D4VSZAwbUOrsIUwUT7:0qmLLObVAtsDXi2lrbUOrwNP
                  MD5:4AE4A84EBA3264C433E0C1B92594C61B
                  SHA1:BC8EE7FB36F3E3C03638BC5B6BF0BC9DD7CC034B
                  SHA-256:BB531C53E5DC8FCC1FE71EF481253B9D3FA86446E7205E750DC3D6EE5C2A5636
                  SHA-512:E9E1878DE9D124BD52EAE169A398C2DB91B12B5B832D5ED03B659EDA9B0B105892339ED47A8890EA5363F03D35EF8E0C59D19A36D98F321601C70FC05C144BE9
                  Malicious:true
                  Antivirus:
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......W.................................4................=................Rich...........................PE..L......a.....................>#......o............@...........................$......S......................................\...d.....$.............................p...............................P<..@............... ............................text............................... ..`.data.....".........................@....rsrc.........$..0..................@..@........................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\explorer.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:modified
                  Size (bytes):26
                  Entropy (8bit):3.95006375643621
                  Encrypted:false
                  SSDEEP:3:ggPYV:rPYV
                  MD5:187F488E27DB4AF347237FE461A079AD
                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                  Malicious:true
                  Reputation:high, very likely benign file
                  Preview:[ZoneTransfer]....ZoneId=0
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):6.91435980932861
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:file.exe
                  File size:192512
                  MD5:4ae4a84eba3264c433e0c1b92594c61b
                  SHA1:bc8ee7fb36f3e3c03638bc5b6bf0bc9dd7cc034b
                  SHA256:bb531c53e5dc8fcc1fe71ef481253b9d3fa86446e7205e750dc3d6ee5c2a5636
                  SHA512:e9e1878de9d124bd52eae169a398c2db91b12b5b832d5ed03b659eda9b0b105892339ed47a8890ea5363f03d35ef8e0c59d19a36d98f321601c70fc05c144be9
                  SSDEEP:3072:WsKq2R3GPBzO0uLLO1PtKl5JOLAtsDXi2D4VSZAwbUOrsIUwUT7:0qmLLObVAtsDXi2lrbUOrwNP
                  TLSH:3F14C03236C0C432C5AB55708D24EAA0EF7EB9315579964B7BE80B6D5F702D0A63B34B
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......W.......................................4...................=...................Rich............................PE..L......a...
                  Icon Hash:20e0c4ccccc6b214
                  Entrypoint:0x406fe6
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                  Time Stamp:0x612E2E88 [Tue Aug 31 13:28:40 2021 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:5
                  OS Version Minor:0
                  File Version Major:5
                  File Version Minor:0
                  Subsystem Version Major:5
                  Subsystem Version Minor:0
                  Import Hash:5a0f5eee1a1d8df02fd40c6cf3174a3d
                  Instruction
                  call 00007FBFFCA0D3C6h
                  jmp 00007FBFFCA05A4Eh
                  mov ecx, dword ptr [esp+04h]
                  test ecx, 00000003h
                  je 00007FBFFCA05BF6h
                  mov al, byte ptr [ecx]
                  add ecx, 01h
                  test al, al
                  je 00007FBFFCA05C20h
                  test ecx, 00000003h
                  jne 00007FBFFCA05BC1h
                  add eax, 00000000h
                  lea esp, dword ptr [esp+00000000h]
                  lea esp, dword ptr [esp+00000000h]
                  mov eax, dword ptr [ecx]
                  mov edx, 7EFEFEFFh
                  add edx, eax
                  xor eax, FFFFFFFFh
                  xor eax, edx
                  add ecx, 04h
                  test eax, 81010100h
                  je 00007FBFFCA05BBAh
                  mov eax, dword ptr [ecx-04h]
                  test al, al
                  je 00007FBFFCA05C04h
                  test ah, ah
                  je 00007FBFFCA05BF6h
                  test eax, 00FF0000h
                  je 00007FBFFCA05BE5h
                  test eax, FF000000h
                  je 00007FBFFCA05BD4h
                  jmp 00007FBFFCA05B9Fh
                  lea eax, dword ptr [ecx-01h]
                  mov ecx, dword ptr [esp+04h]
                  sub eax, ecx
                  ret
                  lea eax, dword ptr [ecx-02h]
                  mov ecx, dword ptr [esp+04h]
                  sub eax, ecx
                  ret
                  lea eax, dword ptr [ecx-03h]
                  mov ecx, dword ptr [esp+04h]
                  sub eax, ecx
                  ret
                  lea eax, dword ptr [ecx-04h]
                  mov ecx, dword ptr [esp+04h]
                  sub eax, ecx
                  ret
                  cmp ecx, dword ptr [0042B980h]
                  jne 00007FBFFCA05BD4h
                  rep ret
                  jmp 00007FBFFCA0D3BDh
                  push eax
                  push dword ptr fs:[00000000h]
                  lea eax, dword ptr [esp+0Ch]
                  sub esp, dword ptr [esp+0Ch]
                  push ebx
                  push esi
                  push edi
                  mov dword ptr [eax], ebp
                  mov ebp, eax
                  mov eax, dword ptr [0042B980h]
                  xor eax, ebp
                  push eax
                  push dword ptr [ebp-04h]
                  mov dword ptr [ebp+00h], 00000000h
                  Programming Language:
                  • [ASM] VS2008 build 21022
                  • [ C ] VS2008 build 21022
                  • [IMP] VS2005 build 50727
                  • [C++] VS2008 build 21022
                  • [RES] VS2008 build 21022
                  • [LNK] VS2008 build 21022
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x1a05c0x64.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x2490000x2ee8.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x12700x1c.text
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3c500x40.text
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x10000x220.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x19cf40x19e00False0.5225505736714976data6.34350345002809IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .data0x1b0000x22dae80x11e00unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0x2490000x2ee80x3000False0.537353515625data4.913683051285504IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountry
                  RT_ICON0x2491f00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsRaeto-RomanceSwitzerland
                  RT_ICON0x2498b80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsRaeto-RomanceSwitzerland
                  RT_ICON0x249e200x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096Raeto-RomanceSwitzerland
                  RT_ICON0x24aec80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304Raeto-RomanceSwitzerland
                  RT_ICON0x24b8500x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024Raeto-RomanceSwitzerland
                  RT_ACCELERATOR0x24bd080x98dataRaeto-RomanceSwitzerland
                  RT_GROUP_ICON0x24bcb80x4cdataRaeto-RomanceSwitzerland
                  RT_VERSION0x24bda00x148x86 executable not stripped
                  DLLImport
                  KERNEL32.dllWriteConsoleInputA, EnumDateFormatsA, OpenMutexA, GetConsoleAliasExesLengthW, CopyFileExA, ReadConsoleOutputCharacterA, GetEnvironmentStrings, FreeUserPhysicalPages, QueryDosDeviceA, EnumCalendarInfoExA, GetProcessPriorityBoost, LocalSize, AddConsoleAliasW, CreateFileW, GetMailslotInfo, GetWindowsDirectoryA, GetModuleHandleW, VirtualFree, CreateDirectoryExA, GetLogicalDriveStringsA, ReadConsoleInputA, FindNextVolumeMountPointW, OpenWaitableTimerW, GetVersionExA, SearchPathA, RequestWakeupLatency, CallNamedPipeW, GetCurrentDirectoryW, GetDriveTypeA, CreateMailslotW, BuildCommDCBAndTimeoutsA, GetProcAddress, GetModuleHandleA, LocalAlloc, FindNextFileA, TerminateThread, GetCommandLineW, FindFirstChangeNotificationA, VerifyVersionInfoA, DeleteTimerQueue, FindFirstVolumeA, GlobalFlags, GetTickCount, GetACP, GlobalWire, GetTapeParameters, HeapWalk, GetConsoleTitleA, InterlockedCompareExchange, EnumCalendarInfoA, GetNamedPipeHandleStateW, InterlockedDecrement, SetCalendarInfoA, TerminateProcess, MoveFileA, AddAtomW, FreeEnvironmentStringsW, SetConsoleTitleW, SetVolumeMountPointA, VirtualAlloc, SetConsoleActiveScreenBuffer, GetCPInfo, GetProcessIoCounters, GlobalFindAtomA, CreateFileA, CloseHandle, GetVolumeInformationA, EnumSystemCodePagesA, MoveFileWithProgressA, LoadLibraryW, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RaiseException, RtlUnwind, GetLastError, DeleteFileA, GetStartupInfoW, HeapAlloc, HeapFree, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, Sleep, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, EnterCriticalSection, LeaveCriticalSection, SetHandleCount, GetFileType, GetStartupInfoA, DeleteCriticalSection, GetModuleFileNameW, GetEnvironmentStringsW, HeapCreate, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, HeapReAlloc, GetOEMCP, IsValidCodePage, HeapSize, LoadLibraryA, InitializeCriticalSectionAndSpinCount, SetFilePointer, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, MultiByteToWideChar, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, FlushFileBuffers, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, ReadFile
                  USER32.dllGetComboBoxInfo, GetMessageExtraInfo, GetListBoxInfo
                  GDI32.dllGetBoundsRect
                  ADVAPI32.dllSetThreadToken
                  Language of compilation systemCountry where language is spokenMap
                  Raeto-RomanceSwitzerland
                  TimestampSource PortDest PortSource IPDest IP
                  Nov 24, 2022 20:13:47.187021017 CET4970780192.168.2.584.21.172.159
                  Nov 24, 2022 20:13:47.215519905 CET804970784.21.172.159192.168.2.5
                  Nov 24, 2022 20:13:47.216058016 CET4970780192.168.2.584.21.172.159
                  Nov 24, 2022 20:13:47.216236115 CET4970780192.168.2.584.21.172.159
                  Nov 24, 2022 20:13:47.216314077 CET4970780192.168.2.584.21.172.159
                  Nov 24, 2022 20:13:47.244088888 CET804970784.21.172.159192.168.2.5
                  Nov 24, 2022 20:13:47.335669041 CET804970784.21.172.159192.168.2.5
                  Nov 24, 2022 20:13:47.335818052 CET4970780192.168.2.584.21.172.159
                  Nov 24, 2022 20:13:47.337459087 CET4970780192.168.2.584.21.172.159
                  Nov 24, 2022 20:13:47.366754055 CET804970784.21.172.159192.168.2.5
                  TimestampSource PortDest PortSource IPDest IP
                  Nov 24, 2022 20:13:46.928529978 CET6145253192.168.2.58.8.8.8
                  Nov 24, 2022 20:13:47.183770895 CET53614528.8.8.8192.168.2.5
                  Nov 24, 2022 20:13:47.349159956 CET5148453192.168.2.58.8.8.8
                  Nov 24, 2022 20:13:48.338735104 CET5148453192.168.2.58.8.8.8
                  Nov 24, 2022 20:13:49.370031118 CET5148453192.168.2.58.8.8.8
                  Nov 24, 2022 20:13:51.378423929 CET53514848.8.8.8192.168.2.5
                  Nov 24, 2022 20:13:52.380325079 CET53514848.8.8.8192.168.2.5
                  Nov 24, 2022 20:13:53.396895885 CET53514848.8.8.8192.168.2.5
                  TimestampSource IPDest IPChecksumCodeType
                  Nov 24, 2022 20:13:52.380429983 CET192.168.2.58.8.8.8cff8(Port unreachable)Destination Unreachable
                  Nov 24, 2022 20:13:53.397217989 CET192.168.2.58.8.8.8cff8(Port unreachable)Destination Unreachable
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Nov 24, 2022 20:13:46.928529978 CET192.168.2.58.8.8.80xa2c5Standard query (0)host-file-host6.comA (IP address)IN (0x0001)false
                  Nov 24, 2022 20:13:47.349159956 CET192.168.2.58.8.8.80x417eStandard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                  Nov 24, 2022 20:13:48.338735104 CET192.168.2.58.8.8.80x417eStandard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                  Nov 24, 2022 20:13:49.370031118 CET192.168.2.58.8.8.80x417eStandard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Nov 24, 2022 20:13:47.183770895 CET8.8.8.8192.168.2.50xa2c5No error (0)host-file-host6.com84.21.172.159A (IP address)IN (0x0001)false
                  Nov 24, 2022 20:13:51.378423929 CET8.8.8.8192.168.2.50x417eServer failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                  Nov 24, 2022 20:13:52.380325079 CET8.8.8.8192.168.2.50x417eServer failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                  Nov 24, 2022 20:13:53.396895885 CET8.8.8.8192.168.2.50x417eServer failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                  • dkkgeh.net
                    • host-file-host6.com
                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  0192.168.2.54970784.21.172.15980C:\Windows\explorer.exe
                  TimestampkBytes transferredDirectionData
                  Nov 24, 2022 20:13:47.216236115 CET113OUTPOST / HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://dkkgeh.net/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 302
                  Host: host-file-host6.com
                  Nov 24, 2022 20:13:47.216314077 CET113OUTData Raw: 10 87 83 e0 60 85 a5 b0 c9 3d 0b 3b 7a ca 91 f3 36 1f df 3f a7 41 69 ea b9 ee dd f3 f2 a5 9a 83 6c c7 2e d2 1d 6c cd 90 9d da f3 dd d0 80 11 1f 77 e5 14 88 d5 da fe b7 dc 6d bd d2 e4 d8 43 d4 75 24 f3 c4 86 de 9e 66 5d 02 c9 a1 c1 64 33 c4 8a 7d
                  Data Ascii: `=;z6?Ail.lwmCu$f]d3}+uZIZZ>Hzpf&uMlC+aU}Q>UNUw >PRi~DSzSv+\Ucg:K6Ma}L@~ H nrP4kI>Z
                  Nov 24, 2022 20:13:47.335669041 CET114INHTTP/1.1 200 OK
                  Server: nginx/1.20.2
                  Date: Thu, 24 Nov 2022 19:13:47 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: close
                  Data Raw: 66 0d 0a 59 6f 75 72 20 49 50 20 62 6c 6f 63 6b 65 64 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: fYour IP blocked0


                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:20:12:55
                  Start date:24/11/2022
                  Path:C:\Users\user\Desktop\file.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\Desktop\file.exe
                  Imagebase:0x400000
                  File size:192512 bytes
                  MD5 hash:4AE4A84EBA3264C433E0C1B92594C61B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.371278858.00000000022A1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.371278858.00000000022A1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000003.292353244.0000000000800000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.371129358.00000000007E0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.371194689.0000000000800000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.371194689.0000000000800000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.371011318.00000000006E8000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                  Reputation:low

                  Target ID:1
                  Start time:20:13:02
                  Start date:24/11/2022
                  Path:C:\Windows\explorer.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\Explorer.EXE
                  Imagebase:0x7ff69bc80000
                  File size:3933184 bytes
                  MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000000.352581275.0000000002901000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000000.352581275.0000000002901000.00000020.80000000.00040000.00000000.sdmp, Author: unknown
                  Reputation:high

                  Target ID:2
                  Start time:20:13:46
                  Start date:24/11/2022
                  Path:C:\Users\user\AppData\Roaming\vvtsewb
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Roaming\vvtsewb
                  Imagebase:0x400000
                  File size:192512 bytes
                  MD5 hash:4AE4A84EBA3264C433E0C1B92594C61B
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000002.00000002.412766859.00000000007B0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000002.00000002.412803739.00000000007E1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000002.00000002.412803739.00000000007E1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000002.00000002.413033982.00000000009D8000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000002.00000002.412778372.00000000007C0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000002.00000002.412778372.00000000007C0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000002.00000003.401198999.00000000007C0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  Antivirus matches:
                  • Detection: 100%, Joe Sandbox ML
                  Reputation:low

                  Reset < >

                    Execution Graph

                    Execution Coverage:3.3%
                    Dynamic/Decrypted Code Coverage:11.6%
                    Signature Coverage:5.9%
                    Total number of Nodes:475
                    Total number of Limit Nodes:9
                    execution_graph 7372 40e280 7373 40a2a9 __getptd_noexit 2 API calls 7372->7373 7374 40e28d 7373->7374 7384 40b340 7385 40a322 __getptd 2 API calls 7384->7385 7386 40b34d 7385->7386 7387 40b391 7386->7387 7388 40b3b4 7386->7388 7391 40b3af 7386->7391 7390 40a865 ___FrameUnwindToState 2 API calls 7387->7390 7387->7391 7388->7391 7392 40afdc 7388->7392 7390->7391 7393 40affb 7392->7393 7399 40a322 __getptd 2 API calls 7393->7399 7413 40b0e0 FindHandler IsInExceptionSpec ___TypeMatch std::bad_exception::bad_exception 7393->7413 7394 40b2ef 7427 40aee8 7394->7427 7395 40a322 __getptd 2 API calls 7397 40b310 7395->7397 7397->7391 7398 40b308 7398->7395 7400 40b05c 7399->7400 7400->7397 7401 40a322 __getptd 2 API calls 7400->7401 7402 40b06e 7401->7402 7403 40a322 __getptd 2 API calls 7402->7403 7406 40b07c ___BuildCatchObjectHelper 7403->7406 7404 40a322 RtlEncodePointer RtlAllocateHeap __getptd 7404->7413 7405 40a322 __getptd 2 API calls 7407 40b0c7 7405->7407 7406->7405 7409 40a322 __getptd 2 API calls 7407->7409 7407->7413 7410 40b0d5 7409->7410 7411 40a322 __getptd 2 API calls 7410->7411 7411->7413 7412 40a865 ___FrameUnwindToState 2 API calls 7412->7413 7413->7394 7413->7398 7413->7404 7413->7412 7415 40ae7a 7413->7415 7421 40aa84 7413->7421 7416 40ae85 ___BuildCatchObject 7415->7416 7417 40a865 ___FrameUnwindToState 2 API calls 7416->7417 7418 40aeb7 7417->7418 7419 40aacd FindHandler 2 API calls 7418->7419 7420 40aed8 7419->7420 7420->7413 7422 40aa90 7421->7422 7423 40a322 __getptd 2 API calls 7422->7423 7424 40aa95 7423->7424 7425 40a322 __getptd 2 API calls 7424->7425 7426 40aaba 7425->7426 7428 40aeff 7427->7428 7435 40afd7 7427->7435 7429 40a322 __getptd 2 API calls 7428->7429 7430 40af05 7429->7430 7431 40a322 __getptd 2 API calls 7430->7431 7432 40af1e 7430->7432 7433 40af13 7431->7433 7432->7435 7436 40ae7a FindHandler 2 API calls 7432->7436 7434 40a0cd __init_pointers RtlEncodePointer 7433->7434 7434->7432 7435->7398 7436->7432 6969 7e003c 6970 7e0049 6969->6970 6982 7e0e0f SetErrorMode SetErrorMode 6970->6982 6975 7e0265 6976 7e02ce VirtualProtect 6975->6976 6978 7e030b 6976->6978 6977 7e0439 VirtualFree 6980 7e04be LoadLibraryA 6977->6980 6978->6977 6981 7e08c7 6980->6981 6983 7e0223 6982->6983 6984 7e0d90 6983->6984 6985 7e0dad 6984->6985 6986 7e0dbb GetPEB 6985->6986 6987 7e0238 VirtualAlloc 6985->6987 6986->6987 6987->6975 7532 40c183 7533 40c1a1 7532->7533 7534 40c195 __fileno 7532->7534 7534->7533 7535 40c01f __flsbuf 2 API calls 7534->7535 7536 411a36 __flush 2 API calls 7534->7536 7537 4124fe __locking 2 API calls 7534->7537 7535->7534 7536->7534 7537->7534 7243 40ba06 7246 40ba12 __lseeki64 7243->7246 7244 40a2a9 __getptd_noexit 2 API calls 7245 40ba3e _siglookup __decode_pointer 7244->7245 7247 40bae4 7245->7247 7252 40ba47 _raise __lseeki64 7245->7252 7253 40b922 7245->7253 7246->7244 7246->7245 7246->7252 7249 40eaf4 __lock RtlEncodePointer 7247->7249 7250 40baef 7247->7250 7249->7250 7251 40a0cd __init_pointers RtlEncodePointer 7250->7251 7250->7252 7251->7252 7256 40b7e0 7253->7256 7255 40b933 7255->7247 7257 40b7ec __lseeki64 7256->7257 7258 40eaf4 __lock RtlEncodePointer 7257->7258 7259 40b7f3 __decode_pointer 7258->7259 7260 40b8ac _doexit __mtinitlocknum __lseeki64 __initterm 7259->7260 7261 40a0cd RtlEncodePointer __init_pointers 7259->7261 7260->7255 7261->7259 7057 40d64b 7059 40d65c 7057->7059 7058 40d662 7059->7058 7060 40d5f2 RtlEncodePointer RtlAllocateHeap _write_multi_char 7059->7060 7060->7059 7508 40b90c 7509 40b7e0 _doexit RtlEncodePointer 7508->7509 7510 40b91d 7509->7510 7054 40a0cd 7055 40a05b __encode_pointer RtlEncodePointer 7054->7055 7056 40a0d4 7055->7056 7440 41034f 7441 41035b __lseeki64 7440->7441 7442 40a322 __getptd 2 API calls 7441->7442 7443 410360 7442->7443 7444 41038e 7443->7444 7446 410372 7443->7446 7445 40eaf4 __lock RtlEncodePointer 7444->7445 7449 410377 7445->7449 7447 40a322 __getptd 2 API calls 7446->7447 7447->7449 7448 410385 __lseeki64 7449->7448 7450 40b69c __amsg_exit RtlEncodePointer 7449->7450 7450->7448 7061 40fa50 7063 40fa77 7061->7063 7064 40faf1 setSBUpLow 7063->7064 7065 4134f2 7063->7065 7066 413505 7065->7066 7069 413338 7066->7069 7068 413522 7068->7064 7070 413359 7069->7070 7074 413371 __freea __crtGetStringTypeA_stat 7070->7074 7075 416eab 7070->7075 7074->7068 7076 416ed5 7075->7076 7077 41348f 7076->7077 7083 412f18 7076->7083 7077->7074 7079 416ef4 7077->7079 7080 416fbe __freea 7079->7080 7082 416f34 __crtGetStringTypeA_stat 7079->7082 7080->7074 7081 4111fd __calloc_crt 2 API calls 7081->7080 7082->7080 7082->7081 7086 412e64 7083->7086 7087 412e7d 7086->7087 7090 412c35 7087->7090 7092 412c4a 7090->7092 7093 412c5c 7092->7093 7094 413830 7092->7094 7093->7077 7095 413844 __isleadbyte_l 7094->7095 7096 4134f2 ___crtGetStringTypeA 2 API calls 7095->7096 7097 413851 7095->7097 7096->7097 7097->7092 6959 402ad1 6960 402ad2 6959->6960 6962 402b56 6960->6962 6963 40180c 6960->6963 6964 40181b 6963->6964 6965 40183e Sleep 6964->6965 6967 401859 6965->6967 6966 40186a NtTerminateProcess 6968 401876 6966->6968 6967->6966 6968->6962 7098 40be51 7103 411bc0 7098->7103 7101 40be64 7112 411ae6 7103->7112 7105 40be56 7105->7101 7106 411997 7105->7106 7107 4119a3 __lseeki64 7106->7107 7108 40eaf4 __lock RtlEncodePointer 7107->7108 7111 4119af 7108->7111 7109 411a18 __fcloseall __lseeki64 7109->7101 7111->7109 7124 416406 7111->7124 7113 411af2 __lseeki64 7112->7113 7114 40eaf4 __lock RtlEncodePointer 7113->7114 7115 411b01 _flsall 7114->7115 7117 411b99 _flsall __lseeki64 7115->7117 7118 411a9e RtlEncodePointer RtlAllocateHeap __fflush_nolock 7115->7118 7119 40beb2 7115->7119 7117->7105 7118->7115 7120 40bed5 7119->7120 7121 40bebf 7119->7121 7120->7115 7122 40eaf4 __lock RtlEncodePointer 7121->7122 7123 40bec8 7122->7123 7123->7115 7125 416412 __lseeki64 7124->7125 7129 416426 __fcloseall __lseeki64 7125->7129 7130 40be71 7125->7130 7129->7111 7131 40be83 7130->7131 7132 40be9b 7130->7132 7131->7132 7133 40eaf4 __lock RtlEncodePointer 7131->7133 7134 41638f 7132->7134 7133->7132 7135 4163a3 7134->7135 7136 4163bf 7134->7136 7135->7129 7136->7135 7140 411a36 7136->7140 7138 4163cb __fileno __freebuf 7144 417346 7138->7144 7141 411a4f __fileno 7140->7141 7143 411a71 7140->7143 7141->7143 7148 4124fe 7141->7148 7143->7138 7145 417352 __lseeki64 7144->7145 7146 416660 ___lock_fhandle RtlEncodePointer 7145->7146 7147 41735a __close_nolock __close __lseeki64 7145->7147 7146->7147 7147->7135 7149 41250a __lseeki64 7148->7149 7153 412512 __locking __lseeki64 7149->7153 7154 416660 7149->7154 7151 412582 7151->7153 7158 411dcb 7151->7158 7153->7143 7155 41666c __lseeki64 7154->7155 7156 40eaf4 __lock RtlEncodePointer 7155->7156 7157 416698 ___lock_fhandle __ioinit __lseeki64 7155->7157 7156->7157 7157->7151 7159 411dda __flsbuf __lseeki64_nolock 7158->7159 7161 411e01 __fassign __write_nolock __putwch_nolock 7159->7161 7162 40a322 7159->7162 7161->7153 7167 40a2a9 7162->7167 7165 40a337 7165->7161 7166 40b69c __amsg_exit RtlEncodePointer 7166->7165 7168 40a2b3 ___set_flsgetvalue 7167->7168 7169 40a2fd 7168->7169 7170 4111fd __calloc_crt 2 API calls 7168->7170 7169->7165 7169->7166 7171 40a2d4 __decode_pointer 7170->7171 7171->7169 7173 40a1c2 7171->7173 7174 40a1ce __crt_waiting_on_module_handle __lseeki64 7173->7174 7175 40eaf4 __lock RtlEncodePointer 7174->7175 7176 40a23f __mtinit 7175->7176 7177 40eaf4 __lock RtlEncodePointer 7176->7177 7178 40a260 __mtinit ___addlocaleref __lseeki64 7177->7178 7178->7169 7262 401818 7263 40181b 7262->7263 7264 40183e Sleep 7263->7264 7266 401859 7264->7266 7265 40186a NtTerminateProcess 7267 401876 7265->7267 7266->7265 7451 40b75b 7452 40b769 __initterm_e 7451->7452 7454 40b7a6 __initterm 7452->7454 7455 40a71f 7452->7455 7458 40a6e3 7455->7458 7457 40a72c 7457->7454 7459 40a6ef __lseeki64 7458->7459 7464 40b708 7459->7464 7463 40a700 __cinit __lseeki64 7463->7457 7465 40eaf4 __lock RtlEncodePointer 7464->7465 7466 40a6f4 7465->7466 7467 40a5f8 7466->7467 7468 40a60c __decode_pointer 7467->7468 7476 40a69f 7468->7476 7481 4112e9 7468->7481 7470 40a05b __encode_pointer RtlEncodePointer 7472 40a694 7470->7472 7471 40a63a 7473 40a65e 7471->7473 7480 40a686 7471->7480 7485 411249 7471->7485 7474 40a05b __encode_pointer RtlEncodePointer 7472->7474 7473->7476 7477 411249 __realloc_crt RtlEncodePointer 7473->7477 7478 40a674 7473->7478 7474->7476 7476->7463 7477->7478 7478->7476 7479 40a05b __encode_pointer RtlEncodePointer 7478->7479 7479->7480 7480->7470 7482 4112f5 __lseeki64 7481->7482 7483 40eaf4 __lock RtlEncodePointer 7482->7483 7484 411305 __msize ___sbh_find_block __lseeki64 7482->7484 7483->7484 7484->7471 7488 411252 7485->7488 7487 411291 7487->7473 7488->7487 7489 4160f9 7488->7489 7490 416105 6 library calls 7489->7490 7491 40eaf4 __lock RtlEncodePointer 7490->7491 7492 41610c __calloc_impl __lseeki64 7490->7492 7491->7490 7492->7488 7375 402a9d 7377 402ad2 7375->7377 7376 402b56 7377->7376 7378 40180c 2 API calls 7377->7378 7378->7376 7493 40ab5d 7496 40a946 7493->7496 7495 40ab65 7497 40a988 7496->7497 7498 40a950 7496->7498 7497->7495 7498->7497 7499 40a322 __getptd 2 API calls 7498->7499 7500 40a97c 7499->7500 7500->7495 7179 41065e 7180 41067c 7179->7180 7181 41066c 7179->7181 7183 410549 7180->7183 7184 41055e 7183->7184 7185 413830 __isctype_l 2 API calls 7184->7185 7186 410582 setSBUpLow __isleadbyte_l 7184->7186 7185->7186 7186->7181 7538 40bda0 7539 40bdad 7538->7539 7540 4111fd __calloc_crt 2 API calls 7539->7540 7541 40bdc7 7540->7541 7542 4111fd __calloc_crt 2 API calls 7541->7542 7543 40bde0 7541->7543 7542->7543 7520 40fbe3 7521 40fbef __lseeki64 7520->7521 7522 40a322 __getptd 2 API calls 7521->7522 7523 40fbf4 7522->7523 7524 40eaf4 __lock RtlEncodePointer 7523->7524 7527 40fc06 7523->7527 7524->7527 7525 40fc14 __lseeki64 7526 40b69c __amsg_exit RtlEncodePointer 7526->7525 7527->7525 7527->7526 7274 40d625 7275 40d62f 7274->7275 7276 40d648 7275->7276 7278 40d5f2 7275->7278 7279 40d5f8 7278->7279 7281 40d603 7279->7281 7282 40c01f 7279->7282 7281->7275 7283 40c02f __flsbuf __getbuf __fileno 7282->7283 7284 40c03a 7283->7284 7285 40c152 7283->7285 7286 40c0d2 7283->7286 7284->7281 7288 4124fe __locking 2 API calls 7285->7288 7287 40c0e9 7286->7287 7290 40c106 7286->7290 7289 4124fe __locking 2 API calls 7287->7289 7288->7284 7289->7284 7290->7284 7292 411cb2 7290->7292 7293 411cbe __lseeki64 7292->7293 7294 416660 ___lock_fhandle RtlEncodePointer 7293->7294 7295 411ccf __lseeki64_nolock __lseeki64 7293->7295 7294->7295 7295->7284 7348 40c2e5 7349 40c2f1 __lseeki64 7348->7349 7350 4111fd __calloc_crt 2 API calls 7349->7350 7351 40c312 7350->7351 7352 4111fd __calloc_crt 2 API calls 7351->7352 7353 40c3fa __ioinit __lseeki64 7351->7353 7352->7351 6988 40e426 6989 40e43e _wcslen 6988->6989 6992 40e436 6988->6992 6994 4111fd 6989->6994 6991 4111fd __calloc_crt 2 API calls 6993 40e462 _wcslen __wsetenvp 6991->6993 6993->6991 6993->6992 6997 411206 6994->6997 6996 411243 6996->6993 6997->6996 6998 415fdb 6997->6998 7002 415fe7 ___sbh_alloc_block __calloc_impl __lseeki64 6998->7002 6999 416090 RtlAllocateHeap 6999->7002 7001 415fff __lseeki64 7001->6997 7002->6999 7002->7001 7003 40eaf4 7002->7003 7004 40eb09 7003->7004 7005 40eb1b 7003->7005 7009 40ea31 7004->7009 7005->7002 7007 40eb0f 7007->7005 7017 40b69c 7007->7017 7010 40ea3d __lseeki64 7009->7010 7014 40ea59 __mtinitlocknum __malloc_crt 7010->7014 7022 40bd61 7010->7022 7015 40eaf4 __lock RtlEncodePointer 7014->7015 7016 40ea73 __mtinitlocknum __ioinit __lseeki64 7014->7016 7015->7016 7016->7007 7018 40bd61 __FF_MSGBANNER RtlEncodePointer 7017->7018 7019 40b6a6 7018->7019 7020 40bbb6 __NMSG_WRITE RtlEncodePointer 7019->7020 7021 40b6ae __decode_pointer 7020->7021 7021->7005 7026 40bd68 __set_error_mode 7022->7026 7023 40bbb6 __NMSG_WRITE RtlEncodePointer 7024 40bd8d 7023->7024 7027 40bbb6 __NMSG_WRITE RtlEncodePointer 7024->7027 7025 40bd97 7028 40bbb6 7025->7028 7026->7023 7026->7025 7027->7025 7030 40bbca __set_error_mode _strcat_s __NMSG_WRITE 7028->7030 7029 40bd25 7029->7014 7030->7029 7032 4116ba 7030->7032 7045 40a0cd 7032->7045 7035 411765 __decode_pointer 7035->7029 7038 40a05b __encode_pointer RtlEncodePointer 7039 411723 7038->7039 7040 40a05b __encode_pointer RtlEncodePointer 7039->7040 7041 411738 7040->7041 7042 40a05b __encode_pointer RtlEncodePointer 7041->7042 7043 41174d 7042->7043 7043->7035 7044 40a05b __encode_pointer RtlEncodePointer 7043->7044 7044->7035 7046 40a05b __encode_pointer RtlEncodePointer 7045->7046 7047 40a0d4 7046->7047 7047->7035 7048 40a05b 7047->7048 7049 40a06f __crt_waiting_on_module_handle 7048->7049 7050 40a0c7 7049->7050 7051 40a0bf RtlEncodePointer 7049->7051 7050->7038 7051->7050 7501 40ab66 7502 40a322 __getptd 2 API calls 7501->7502 7503 40ab6e 7502->7503 7504 40a865 ___FrameUnwindToState 2 API calls 7503->7504 7505 40abbe 7504->7505 7506 40abf3 FindHandler 2 API calls 7505->7506 7507 40abdf __lseeki64 7506->7507 7354 40a8e7 7357 40a81c 7354->7357 7358 40a82f 7357->7358 7362 40a83b 7357->7362 7360 40a322 __getptd 2 API calls 7358->7360 7364 40a85a 7358->7364 7359 40a322 __getptd 2 API calls 7361 40a84c 7359->7361 7360->7362 7363 40a322 __getptd 2 API calls 7361->7363 7361->7364 7362->7359 7363->7364 7187 40a46b 7188 40a47b __crt_waiting_on_module_handle 7187->7188 7202 40a5db __mtterm 7188->7202 7203 40b956 7188->7203 7191 40a05b __encode_pointer RtlEncodePointer 7192 40a548 7191->7192 7193 40a05b __encode_pointer RtlEncodePointer 7192->7193 7194 40a558 7193->7194 7195 40a05b __encode_pointer RtlEncodePointer 7194->7195 7196 40a568 7195->7196 7197 40a05b __encode_pointer RtlEncodePointer 7196->7197 7198 40a578 __mtinit __decode_pointer 7197->7198 7199 4111fd __calloc_crt 2 API calls 7198->7199 7198->7202 7200 40a5b2 __decode_pointer 7199->7200 7201 40a1c2 __mtinit RtlEncodePointer 7200->7201 7200->7202 7201->7202 7204 40a0cd __init_pointers RtlEncodePointer 7203->7204 7205 40b95e __init_pointers __initp_misc_winsig 7204->7205 7206 40a05b __encode_pointer RtlEncodePointer 7205->7206 7207 40a53d 7206->7207 7207->7191 7528 40bfeb 7529 40bff6 7528->7529 7530 40c009 7528->7530 7529->7530 7531 411a36 __flush 2 API calls 7529->7531 7531->7530 7052 40e7ac HeapCreate 7053 40e7d0 7052->7053 7208 40ae71 7209 40ae79 ___BuildCatchObject 7208->7209 7214 40a865 7209->7214 7211 40aeb7 7220 40aacd 7211->7220 7213 40aed8 7215 40a871 __lseeki64 7214->7215 7216 40a322 __getptd 2 API calls 7215->7216 7218 40a891 __CallSettingFrame@12 7216->7218 7232 40a92b 7218->7232 7219 40a912 __lseeki64 7219->7211 7221 40aad9 __lseeki64 7220->7221 7222 40a322 __getptd 2 API calls 7221->7222 7223 40ab04 7222->7223 7224 40a322 __getptd 2 API calls 7223->7224 7225 40ab12 7224->7225 7226 40a322 __getptd 2 API calls 7225->7226 7227 40ab20 7226->7227 7228 40a322 __getptd 2 API calls 7227->7228 7229 40ab2b 7228->7229 7237 40abf3 7229->7237 7231 40abdf __lseeki64 7231->7213 7233 40a322 __getptd 2 API calls 7232->7233 7234 40a930 7233->7234 7235 40a93e 7234->7235 7236 40a322 __getptd 2 API calls 7234->7236 7235->7219 7236->7235 7238 40ac01 7237->7238 7239 40a322 __getptd 2 API calls 7238->7239 7240 40ac07 7239->7240 7241 40a322 __getptd 2 API calls 7240->7241 7242 40ac15 FindHandler 7241->7242 7242->7231 7368 40a8f1 7370 40a89c __CallSettingFrame@12 7368->7370 7369 40a92b ___FrameUnwindToState 2 API calls 7371 40a912 __lseeki64 7369->7371 7370->7369 7379 40a6b2 7380 4111fd __calloc_crt 2 API calls 7379->7380 7381 40a6be 7380->7381 7382 40a05b __encode_pointer RtlEncodePointer 7381->7382 7383 40a6c6 7382->7383 7308 40c635 7311 40c6af __input_l __decode_pointer __fileno __write_nolock 7308->7311 7312 40c68f __input_l 7308->7312 7309 41051b RtlEncodePointer RtlAllocateHeap __whiteout 7309->7311 7310 40c60b RtlEncodePointer RtlAllocateHeap __whiteout 7310->7311 7311->7309 7311->7310 7311->7312 7313 41049a RtlEncodePointer RtlAllocateHeap __input_l 7311->7313 7314 40c5c2 RtlEncodePointer RtlAllocateHeap __hextodec 7311->7314 7315 40c5e2 RtlEncodePointer __whiteout 7311->7315 7316 410416 RtlEncodePointer RtlAllocateHeap __input_l 7311->7316 7317 40c56b RtlEncodePointer RtlAllocateHeap __input_l 7311->7317 7313->7311 7314->7311 7315->7311 7316->7311 7317->7311 7318 7e0005 7323 7e092b GetPEB 7318->7323 7320 7e0030 7325 7e003c 7320->7325 7324 7e0972 7323->7324 7324->7320 7326 7e0049 7325->7326 7327 7e0e0f 2 API calls 7326->7327 7328 7e0223 7327->7328 7329 7e0d90 GetPEB 7328->7329 7330 7e0238 VirtualAlloc 7329->7330 7331 7e0265 7330->7331 7332 7e02ce VirtualProtect 7331->7332 7334 7e030b 7332->7334 7333 7e0439 VirtualFree 7336 7e04be LoadLibraryA 7333->7336 7334->7333 7337 7e08c7 7336->7337 7514 40a33c 7515 40a348 __lseeki64 7514->7515 7516 40a406 ___freetlocinfo ___removelocaleref __lseeki64 __freefls@4 7515->7516 7517 40eaf4 __lock RtlEncodePointer 7515->7517 7518 40a3cd __freefls@4 7517->7518 7519 40eaf4 __lock RtlEncodePointer 7518->7519 7519->7516 7338 7e0001 7339 7e0005 7338->7339 7340 7e092b GetPEB 7339->7340 7341 7e0030 7340->7341 7342 7e003c 7 API calls 7341->7342 7343 7e0038 7342->7343

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 85 40180c-40185b call 401140 Sleep call 401381 96 40186a-401870 NtTerminateProcess 85->96 97 40185d-401865 call 401455 85->97 99 40187f 96->99 97->96 100 401882-4018a2 call 401140 99->100 101 401876-40187b 99->101 101->100
                    C-Code - Quality: 23%
                    			E0040180C(void* __eflags, void* __fp0, intOrPtr* _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
                    				char _v8;
                    				void* __ebx;
                    				void* __edi;
                    				void* __esi;
                    				void* __ebp;
                    				void* _t11;
                    				void* _t16;
                    				intOrPtr* _t17;
                    				void* _t19;
                    				void* _t20;
                    				void* _t21;
                    
                    				_t22 = __eflags;
                    				L00401140(0x183e, _t16, _t20, _t21, __eflags, __fp0);
                    				_t17 = _a4;
                    				Sleep(0x1388);
                    				_t11 = E00401381(_t19, _t22, _t17, _a8, _a12,  &_v8); // executed
                    				if(_t11 != 0) {
                    					_push(_a16);
                    					_push(_v8);
                    					_push(_t11);
                    					_push(_t17); // executed
                    					L00401455(0x60, _t19, _t20); // executed
                    				}
                    				 *_t17(0xffffffff, 0); // executed
                    				_t17 = _t17 + 0x60;
                    				_push(0x60);
                    				asm("pushad");
                    				__ecx =  *__esp;
                    				__esp = __esp + 4;
                    				return __eax;
                    			}














                    0x0040180c
                    0x00401839
                    0x0040183e
                    0x00401846
                    0x00401854
                    0x0040185b
                    0x0040185d
                    0x00401860
                    0x00401863
                    0x00401864
                    0x00401865
                    0x00401865
                    0x0040186e
                    0x0040187a
                    0x0040188a
                    0x0040188b
                    0x0040188c
                    0x0040188f
                    0x004018a2

                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401846
                    • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                    Memory Dump Source
                    • Source File: 00000000.00000002.370678599.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Similarity
                    • API ID: ProcessSleepTerminate
                    • String ID:
                    • API String ID: 417527130-0
                    • Opcode ID: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                    • Instruction ID: 439418bc6b8cc85bb90c3f715c5c8777bd26b3ffbf7cafd5698f886abb68661d
                    • Opcode Fuzzy Hash: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                    • Instruction Fuzzy Hash: DA014F73608208E7DB057A968C41ABA36299B04754F24C137BA13791F1D63DCB12A76B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 107 401818-40185b call 401140 Sleep call 401381 117 40186a-40187f NtTerminateProcess 107->117 118 40185d-401865 call 401455 107->118 121 401882-4018a2 call 401140 117->121 122 401876-40187b 117->122 118->117 122->121
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401846
                    • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                    Memory Dump Source
                    • Source File: 00000000.00000002.370678599.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Similarity
                    • API ID: ProcessSleepTerminate
                    • String ID:
                    • API String ID: 417527130-0
                    • Opcode ID: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                    • Instruction ID: 3ccd72cbf6c862e7ac88a574d3d4d63140f03618044998c1cc11cf15f2003e8a
                    • Opcode Fuzzy Hash: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                    • Instruction Fuzzy Hash: F5F03133604204E7DB047E96CC41ABA36199B04754F24C537BA13791F1D63DCB12A76B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 128 401822-40185b call 401140 Sleep call 401381 139 40186a-40187f NtTerminateProcess 128->139 140 40185d-401865 call 401455 128->140 143 401882-4018a2 call 401140 139->143 144 401876-40187b 139->144 140->139 144->143
                    C-Code - Quality: 17%
                    			E00401822(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                    				void* _t11;
                    				intOrPtr* _t17;
                    				void* _t19;
                    				void* _t22;
                    
                    				_t23 = __eflags;
                    				asm("out 0x95, eax");
                    				L00401140(0x183e, __ebx, __edi, __esi, __eflags, __fp0);
                    				_t17 =  *((intOrPtr*)(_t22 + 8));
                    				Sleep(0x1388);
                    				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                    				if(_t11 != 0) {
                    					_push( *((intOrPtr*)(_t22 + 0x14)));
                    					_push( *((intOrPtr*)(_t22 - 4)));
                    					_push(_t11);
                    					_push(_t17); // executed
                    					L00401455(0x60, _t19, __edi); // executed
                    				}
                    				 *_t17(0xffffffff, 0); // executed
                    				_t17 = _t17 + 0x60;
                    				_push(0x60);
                    				asm("pushad");
                    				__ecx =  *__esp;
                    				__esp = __esp + 4;
                    				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                    				_pop(__edi);
                    				_pop(__esi);
                    				_pop(__ebx);
                    				__esp = __ebp;
                    				_pop(__ebp);
                    				return __eax;
                    			}







                    0x00401822
                    0x00401822
                    0x00401839
                    0x0040183e
                    0x00401846
                    0x00401854
                    0x0040185b
                    0x0040185d
                    0x00401860
                    0x00401863
                    0x00401864
                    0x00401865
                    0x00401865
                    0x0040186e
                    0x0040187a
                    0x0040188a
                    0x0040188b
                    0x0040188c
                    0x0040188f
                    0x00401899
                    0x0040189e
                    0x0040189f
                    0x004018a0
                    0x004018a1
                    0x004018a1
                    0x004018a2

                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401846
                    • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                    Memory Dump Source
                    • Source File: 00000000.00000002.370678599.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Similarity
                    • API ID: ProcessSleepTerminate
                    • String ID:
                    • API String ID: 417527130-0
                    • Opcode ID: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                    • Instruction ID: 86529ff08739d4d45ab2b2fe3aa627bb4dd9aa569924de5dc1b0fc6937d585b1
                    • Opcode Fuzzy Hash: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                    • Instruction Fuzzy Hash: FEF03133604204EBDB047E96C841ABA36299B44754F24C537BA13B91F1D63DCB12A76B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 150 401826-40185b call 401140 Sleep call 401381 157 40186a-40187f NtTerminateProcess 150->157 158 40185d-401865 call 401455 150->158 161 401882-4018a2 call 401140 157->161 162 401876-40187b 157->162 158->157 162->161
                    C-Code - Quality: 17%
                    			E00401826(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                    				void* _t8;
                    				void* _t11;
                    				intOrPtr* _t17;
                    				void* _t19;
                    				void* _t22;
                    
                    				_t23 = __eflags;
                    				asm("sbb ebx, ebp");
                    				L00401140(_t8, __ebx, __edi, __esi, __eflags, __fp0);
                    				_t17 =  *((intOrPtr*)(_t22 + 8));
                    				Sleep(0x1388);
                    				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                    				if(_t11 != 0) {
                    					_push( *((intOrPtr*)(_t22 + 0x14)));
                    					_push( *((intOrPtr*)(_t22 - 4)));
                    					_push(_t11);
                    					_push(_t17); // executed
                    					L00401455(0x60, _t19, __edi); // executed
                    				}
                    				 *_t17(0xffffffff, 0); // executed
                    				_t17 = _t17 + 0x60;
                    				_push(0x60);
                    				asm("pushad");
                    				__ecx =  *__esp;
                    				__esp = __esp + 4;
                    				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                    				_pop(__edi);
                    				_pop(__esi);
                    				_pop(__ebx);
                    				__esp = __ebp;
                    				_pop(__ebp);
                    				return __eax;
                    			}








                    0x00401826
                    0x00401826
                    0x00401839
                    0x0040183e
                    0x00401846
                    0x00401854
                    0x0040185b
                    0x0040185d
                    0x00401860
                    0x00401863
                    0x00401864
                    0x00401865
                    0x00401865
                    0x0040186e
                    0x0040187a
                    0x0040188a
                    0x0040188b
                    0x0040188c
                    0x0040188f
                    0x00401899
                    0x0040189e
                    0x0040189f
                    0x004018a0
                    0x004018a1
                    0x004018a1
                    0x004018a2

                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401846
                    • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                    Memory Dump Source
                    • Source File: 00000000.00000002.370678599.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Similarity
                    • API ID: ProcessSleepTerminate
                    • String ID:
                    • API String ID: 417527130-0
                    • Opcode ID: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                    • Instruction ID: 61297dcd7f948f961e89af5f5716b1062d194a974c17104e1ab0fce138cf61ec
                    • Opcode Fuzzy Hash: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                    • Instruction Fuzzy Hash: C4F04F33604208A7DB04BE96CC41AAA3719AB04754F248537BB13791E1DA3DCB12A72B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 168 401834-40185b call 401140 Sleep call 401381 174 40186a-40187f NtTerminateProcess 168->174 175 40185d-401865 call 401455 168->175 178 401882-4018a2 call 401140 174->178 179 401876-40187b 174->179 175->174 179->178
                    C-Code - Quality: 20%
                    			E00401834(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                    				void* _t10;
                    				void* _t13;
                    				intOrPtr* _t19;
                    				void* _t22;
                    				void* _t25;
                    
                    				_t26 = __eflags;
                    				L00401140(_t10, __ebx, __edi, __esi, __eflags, __fp0);
                    				_t19 =  *((intOrPtr*)(_t25 + 8));
                    				Sleep(0x1388);
                    				_t13 = E00401381(_t22, _t26, _t19,  *((intOrPtr*)(_t25 + 0xc)),  *((intOrPtr*)(_t25 + 0x10)), _t25 - 4); // executed
                    				if(_t13 != 0) {
                    					_push( *((intOrPtr*)(_t25 + 0x14)));
                    					_push( *((intOrPtr*)(_t25 - 4)));
                    					_push(_t13);
                    					_push(_t19); // executed
                    					L00401455(0x60, _t22, __edi); // executed
                    				}
                    				 *_t19(0xffffffff, 0); // executed
                    				_t19 = _t19 + 0x60;
                    				_push(0x60);
                    				asm("pushad");
                    				__ecx =  *__esp;
                    				__esp = __esp + 4;
                    				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                    				_pop(__edi);
                    				_pop(__esi);
                    				_pop(__ebx);
                    				__esp = __ebp;
                    				_pop(__ebp);
                    				return __eax;
                    			}








                    0x00401834
                    0x00401839
                    0x0040183e
                    0x00401846
                    0x00401854
                    0x0040185b
                    0x0040185d
                    0x00401860
                    0x00401863
                    0x00401864
                    0x00401865
                    0x00401865
                    0x0040186e
                    0x0040187a
                    0x0040188a
                    0x0040188b
                    0x0040188c
                    0x0040188f
                    0x00401899
                    0x0040189e
                    0x0040189f
                    0x004018a0
                    0x004018a1
                    0x004018a1
                    0x004018a2

                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401846
                    • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                    Memory Dump Source
                    • Source File: 00000000.00000002.370678599.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Similarity
                    • API ID: ProcessSleepTerminate
                    • String ID:
                    • API String ID: 417527130-0
                    • Opcode ID: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                    • Instruction ID: 4e4f5f6328981cf1385f7e82c295c95f43d6d852bc8dfc3b1875bfb827a549ac
                    • Opcode Fuzzy Hash: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                    • Instruction Fuzzy Hash: BDF04932604208ABDB04BF92CC81ABA3329AB04754F248537BA12790F1D639C612A72B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 7e003c-7e0047 1 7e004c-7e0263 call 7e0a3f call 7e0e0f call 7e0d90 VirtualAlloc 0->1 2 7e0049 0->2 17 7e028b-7e0292 1->17 18 7e0265-7e0289 call 7e0a69 1->18 2->1 19 7e02a1-7e02b0 17->19 21 7e02ce-7e03c2 VirtualProtect call 7e0cce call 7e0ce7 18->21 19->21 22 7e02b2-7e02cc 19->22 29 7e03d1-7e03e0 21->29 22->19 30 7e0439-7e04b8 VirtualFree 29->30 31 7e03e2-7e0437 call 7e0ce7 29->31 33 7e04be-7e04cd 30->33 34 7e05f4-7e05fe 30->34 31->29 38 7e04d3-7e04dd 33->38 35 7e077f-7e0789 34->35 36 7e0604-7e060d 34->36 40 7e078b-7e07a3 35->40 41 7e07a6-7e07b0 35->41 36->35 42 7e0613-7e0637 36->42 38->34 39 7e04e3-7e0505 38->39 51 7e0517-7e0520 39->51 52 7e0507-7e0515 39->52 40->41 44 7e086e-7e08be LoadLibraryA 41->44 45 7e07b6-7e07cb 41->45 46 7e063e-7e0648 42->46 50 7e08c7-7e08f9 44->50 48 7e07d2-7e07d5 45->48 46->35 49 7e064e-7e065a 46->49 53 7e07d7-7e07e0 48->53 54 7e0824-7e0833 48->54 49->35 55 7e0660-7e066a 49->55 56 7e08fb-7e0901 50->56 57 7e0902-7e091d 50->57 58 7e0526-7e0547 51->58 52->58 59 7e07e4-7e0822 53->59 60 7e07e2 53->60 62 7e0839-7e083c 54->62 61 7e067a-7e0689 55->61 56->57 63 7e054d-7e0550 58->63 59->48 60->54 64 7e068f-7e06b2 61->64 65 7e0750-7e077a 61->65 62->44 66 7e083e-7e0847 62->66 68 7e0556-7e056b 63->68 69 7e05e0-7e05ef 63->69 70 7e06ef-7e06fc 64->70 71 7e06b4-7e06ed 64->71 65->46 72 7e084b-7e086c 66->72 73 7e0849 66->73 74 7e056f-7e057a 68->74 75 7e056d 68->75 69->38 76 7e06fe-7e0748 70->76 77 7e074b 70->77 71->70 72->62 73->44 78 7e057c-7e0599 74->78 79 7e059b-7e05bb 74->79 75->69 76->77 77->61 84 7e05bd-7e05db 78->84 79->84 84->63
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 007E024D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.371129358.00000000007E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 007E0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7e0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID: cess$kernel32.dll
                    • API String ID: 4275171209-1230238691
                    • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction ID: 16dd53b31e236c2b8353203991b07fb74fcb2fe72e53336b0df64afbb24c18c3
                    • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction Fuzzy Hash: 87528874A01269DFDB64CF69C984BA8BBB1BF09304F1480D9E90DAB351DB74AE94DF10
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 185 7e0e0f-7e0e24 SetErrorMode * 2 186 7e0e2b-7e0e2c 185->186 187 7e0e26 185->187 187->186
                    APIs
                    • SetErrorMode.KERNELBASE(00000400,?,?,007E0223,?,?), ref: 007E0E19
                    • SetErrorMode.KERNELBASE(00000000,?,?,007E0223,?,?), ref: 007E0E1E
                    Memory Dump Source
                    • Source File: 00000000.00000002.371129358.00000000007E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 007E0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7e0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorMode
                    • String ID:
                    • API String ID: 2340568224-0
                    • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction ID: 7a55b1bb0ad5a630dcb172cb140b2a30c45defdff20bc49bbe57137cadadddd3
                    • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction Fuzzy Hash: 4CD0123114512877D7003A95DC09BCD7B1CDF09B62F008421FB0DD9080C7B4994046E5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 188 40e703-40e712 190 40e714-40e717 188->190 191 40e718-40e71b 188->191 192 40e72b-40e734 call 4111b8 191->192 193 40e71d-40e722 191->193 196 40e739-40e73e 192->196 193->193 194 40e724-40e729 193->194 194->192 194->193 197 40e740-40e74c 196->197 198 40e74d-40e758 196->198 198->197
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.370708829.0000000000409000.00000020.00000001.01000000.00000003.sdmp, Offset: 00409000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_409000_file.jbxd
                    Similarity
                    • API ID: __malloc_crt
                    • String ID:
                    • API String ID: 3464615804-0
                    • Opcode ID: 501dda1f62610471c31aec79cd889d8af2f544a4fc306c4e666a9dbeabe91d77
                    • Instruction ID: fc55ce3b648994ae0669cb83a6c03f413a82d86dd79d98679187b4526597e74b
                    • Opcode Fuzzy Hash: 501dda1f62610471c31aec79cd889d8af2f544a4fc306c4e666a9dbeabe91d77
                    • Instruction Fuzzy Hash: 92F09E339001205DD720773A3C048770629DAC63693150C3BF692E3281F6380C8342E9
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 201 40e7ac-40e7ce HeapCreate 202 40e7d0-40e7d1 201->202 203 40e7d2-40e7db 201->203
                    APIs
                    • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 0040E7C1
                    Memory Dump Source
                    • Source File: 00000000.00000002.370708829.0000000000409000.00000020.00000001.01000000.00000003.sdmp, Offset: 00409000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_409000_file.jbxd
                    Similarity
                    • API ID: CreateHeap
                    • String ID:
                    • API String ID: 10892065-0
                    • Opcode ID: f265a19bc9afaa3439f176b812c951df2e96731d5939ae12d3d0726b769ea69c
                    • Instruction ID: d74e06b4aecc299efa316623dfedc8e40289bf0d4652f15902354497f1d10087
                    • Opcode Fuzzy Hash: f265a19bc9afaa3439f176b812c951df2e96731d5939ae12d3d0726b769ea69c
                    • Instruction Fuzzy Hash: 2BD05E369583445EEB105F756D087623BDCDB84795F048436B90CCA6A0E674D550DA44
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 204 40a0cd-40a0cf call 40a05b 206 40a0d4-40a0d5 204->206
                    APIs
                    • __encode_pointer.LIBCMT ref: 0040A0CF
                      • Part of subcall function 0040A05B: RtlEncodePointer.NTDLL(?), ref: 0040A0C2
                    Memory Dump Source
                    • Source File: 00000000.00000002.370708829.0000000000409000.00000020.00000001.01000000.00000003.sdmp, Offset: 00409000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_409000_file.jbxd
                    Similarity
                    • API ID: EncodePointer__encode_pointer
                    • String ID:
                    • API String ID: 4150071819-0
                    • Opcode ID: 626ded885c0b6a47c33717e93208713095e5c780cda27b978e7e12efcbcc7c99
                    • Instruction ID: 50ed121f21e01714d4d4106e0456cc313bcbcd0e045e12985174d0a2d6778b00
                    • Opcode Fuzzy Hash: 626ded885c0b6a47c33717e93208713095e5c780cda27b978e7e12efcbcc7c99
                    • Instruction Fuzzy Hash:
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.371129358.00000000007E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 007E0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7e0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: .$GetProcAddress.$l
                    • API String ID: 0-2784972518
                    • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                    • Instruction ID: 5062e456d27f64fb0c2b7c4c47ed8835d89c5def674100625dd355965f16ba66
                    • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                    • Instruction Fuzzy Hash: 1E316DB6901649DFDB10CF99C884AADBBF9FF48324F14404AD441A7312D7B5EA85CBA4
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.371129358.00000000007E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 007E0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7e0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                    • Instruction ID: d93ee4a9c41b00e95463f46dc11b6633117ab7b47c475030811e4bf0a63aae05
                    • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                    • Instruction Fuzzy Hash: 9A01F7727026408FDF21DF61CC04BAA33E5FB89305F0544B4D506D7242E3B8A8818FC0
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __getptd.LIBCMT ref: 0040A836
                      • Part of subcall function 0040A322: __getptd_noexit.LIBCMT ref: 0040A325
                      • Part of subcall function 0040A322: __amsg_exit.LIBCMT ref: 0040A332
                    • __getptd.LIBCMT ref: 0040A847
                    • __getptd.LIBCMT ref: 0040A855
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.370708829.0000000000409000.00000020.00000001.01000000.00000003.sdmp, Offset: 00409000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_409000_file.jbxd
                    Similarity
                    • API ID: __getptd$__amsg_exit__getptd_noexit
                    • String ID: MOC$csm
                    • API String ID: 803148776-1389381023
                    • Opcode ID: 671699303d6b60e28057f17e5ec861d0093e6d5f61e45ced52332932ffd97aae
                    • Instruction ID: db0c76aa7c4e0e0626e6bed2eef3fec0a3783135ff2f5cf4364eea1cffeb3cee
                    • Opcode Fuzzy Hash: 671699303d6b60e28057f17e5ec861d0093e6d5f61e45ced52332932ffd97aae
                    • Instruction Fuzzy Hash: 6EE012325103048FD710AAA5C4457563394FB54318F6945B6A808D7393C73CEC615687
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.370708829.0000000000409000.00000020.00000001.01000000.00000003.sdmp, Offset: 00409000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_409000_file.jbxd
                    Similarity
                    • API ID: __fileno__flsbuf__flush__locking
                    • String ID:
                    • API String ID: 2259706978-0
                    • Opcode ID: 15180966515bcd9a64484e0174daa60dbe67719289ee5ef70f2a1fc3c6d11957
                    • Instruction ID: 7db9d4361589b3ed1bd66184b58abc72e1ff8a651a3b30b1fe564f823639e331
                    • Opcode Fuzzy Hash: 15180966515bcd9a64484e0174daa60dbe67719289ee5ef70f2a1fc3c6d11957
                    • Instruction Fuzzy Hash: D5419031E00604DBDB249FE988C059FB7B6AF80320F24877FE815A66D1D778DE419B48
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.370708829.0000000000409000.00000020.00000001.01000000.00000003.sdmp, Offset: 00409000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_409000_file.jbxd
                    Similarity
                    • API ID: __lock$___addlocaleref__crt_waiting_on_module_handle
                    • String ID:
                    • API String ID: 1628550938-0
                    • Opcode ID: 0b1a66759e3dbdfb38007f7b2675f70faaabeaac69ea961cef2d3d547ab8e7c0
                    • Instruction ID: 797694f881aa37ca8b5f9937b89b2f666af65c02d801f38d0aadbc9304a935bf
                    • Opcode Fuzzy Hash: 0b1a66759e3dbdfb38007f7b2675f70faaabeaac69ea961cef2d3d547ab8e7c0
                    • Instruction Fuzzy Hash: 931151715007019FD710AF7A9905B9ABBE0AF04314F10457FE499B62E1CBB89A40CB5D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __getptd.LIBCMT ref: 0040AAFF
                      • Part of subcall function 0040A322: __getptd_noexit.LIBCMT ref: 0040A325
                      • Part of subcall function 0040A322: __amsg_exit.LIBCMT ref: 0040A332
                    • __getptd.LIBCMT ref: 0040AB0D
                    • __getptd.LIBCMT ref: 0040AB1B
                    • __getptd.LIBCMT ref: 0040AB26
                      • Part of subcall function 0040ABF3: __getptd.LIBCMT ref: 0040AC02
                      • Part of subcall function 0040ABF3: __getptd.LIBCMT ref: 0040AC10
                    Memory Dump Source
                    • Source File: 00000000.00000002.370708829.0000000000409000.00000020.00000001.01000000.00000003.sdmp, Offset: 00409000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_409000_file.jbxd
                    Similarity
                    • API ID: __getptd$__amsg_exit__getptd_noexit
                    • String ID:
                    • API String ID: 803148776-0
                    • Opcode ID: 5acad694606c70bc299f6e3d03924e6ad357319d4721c8e7a9f3fb00c0938d84
                    • Instruction ID: 4ceb4badccefb88abe74292121835467509f31c118642c149aaa2b759065458d
                    • Opcode Fuzzy Hash: 5acad694606c70bc299f6e3d03924e6ad357319d4721c8e7a9f3fb00c0938d84
                    • Instruction Fuzzy Hash: 9911DAB1C00309DFDB00EFA5D845ADE7BB1FF04318F10856AF854A7292DB789A519F59
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __getptd.LIBCMT ref: 0041035B
                      • Part of subcall function 0040A322: __getptd_noexit.LIBCMT ref: 0040A325
                      • Part of subcall function 0040A322: __amsg_exit.LIBCMT ref: 0040A332
                    • __getptd.LIBCMT ref: 00410372
                    • __amsg_exit.LIBCMT ref: 00410380
                    • __lock.LIBCMT ref: 00410390
                    Memory Dump Source
                    • Source File: 00000000.00000002.370708829.0000000000409000.00000020.00000001.01000000.00000003.sdmp, Offset: 00409000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_409000_file.jbxd
                    Similarity
                    • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                    • String ID:
                    • API String ID: 3521780317-0
                    • Opcode ID: 4f339604d7ea507d8e8249c909f4e1cfd13c0e888386bb6d698b67c5e920e38f
                    • Instruction ID: a01389393d08da145e3135b42ac0a08f5c1767df72bea2870acacd80411a7853
                    • Opcode Fuzzy Hash: 4f339604d7ea507d8e8249c909f4e1cfd13c0e888386bb6d698b67c5e920e38f
                    • Instruction Fuzzy Hash: 13F0FF31A407189BD730FBA6980279E73A0AF04718F50466FAC54A72D2CBBC59C1DA5E
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __getptd.LIBCMT ref: 0040AC02
                      • Part of subcall function 0040A322: __getptd_noexit.LIBCMT ref: 0040A325
                      • Part of subcall function 0040A322: __amsg_exit.LIBCMT ref: 0040A332
                    • __getptd.LIBCMT ref: 0040AC10
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.370708829.0000000000409000.00000020.00000001.01000000.00000003.sdmp, Offset: 00409000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_409000_file.jbxd
                    Similarity
                    • API ID: __getptd$__amsg_exit__getptd_noexit
                    • String ID: csm
                    • API String ID: 803148776-1018135373
                    • Opcode ID: 54e44990dd07edcd91bd3197dc50da7e23270eee58c40dad30b91b83af6c0ef9
                    • Instruction ID: bffc41321c1a3a0fb5d007abf3a1080087ced7d40673d35ab145433e29951c07
                    • Opcode Fuzzy Hash: 54e44990dd07edcd91bd3197dc50da7e23270eee58c40dad30b91b83af6c0ef9
                    • Instruction Fuzzy Hash: B90128348043058BEF38DF65D4886AEB3B5AF10315FAA453FE481766D1CB3889A1CB0B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Execution Graph

                    Execution Coverage:2.3%
                    Dynamic/Decrypted Code Coverage:7.1%
                    Signature Coverage:1.3%
                    Total number of Nodes:452
                    Total number of Limit Nodes:8
                    execution_graph 7560 40e280 7561 40a2a9 __getptd_noexit 2 API calls 7560->7561 7562 40e28d 7561->7562 7572 40b340 7573 40a322 __getptd 2 API calls 7572->7573 7574 40b34d 7573->7574 7575 40b391 7574->7575 7576 40b3b4 7574->7576 7579 40b3af 7574->7579 7578 40a865 ___FrameUnwindToState 2 API calls 7575->7578 7575->7579 7576->7579 7580 40afdc 7576->7580 7578->7579 7583 40affb 7580->7583 7581 40b308 7582 40a322 __getptd 2 API calls 7581->7582 7585 40b310 7582->7585 7587 40a322 __getptd 2 API calls 7583->7587 7600 40b0e0 FindHandler IsInExceptionSpec ___TypeMatch std::bad_exception::bad_exception 7583->7600 7584 40b2ef 7615 40aee8 7584->7615 7585->7579 7588 40b05c 7587->7588 7588->7585 7589 40a322 __getptd 2 API calls 7588->7589 7590 40b06e 7589->7590 7591 40a322 __getptd 2 API calls 7590->7591 7593 40b07c ___BuildCatchObjectHelper 7591->7593 7592 40a322 __getptd 2 API calls 7594 40b0c7 7592->7594 7593->7592 7597 40a322 __getptd 2 API calls 7594->7597 7594->7600 7596 40a322 RtlEncodePointer RtlAllocateHeap __getptd 7596->7600 7598 40b0d5 7597->7598 7599 40a322 __getptd 2 API calls 7598->7599 7599->7600 7600->7581 7600->7584 7600->7596 7601 40a865 ___FrameUnwindToState 2 API calls 7600->7601 7603 40ae7a 7600->7603 7609 40aa84 7600->7609 7601->7600 7604 40ae85 ___BuildCatchObject 7603->7604 7605 40a865 ___FrameUnwindToState 2 API calls 7604->7605 7606 40aeb7 7605->7606 7607 40aacd FindHandler 2 API calls 7606->7607 7608 40aed8 7607->7608 7608->7600 7610 40aa90 7609->7610 7611 40a322 __getptd 2 API calls 7610->7611 7612 40aa95 7611->7612 7613 40a322 __getptd 2 API calls 7612->7613 7614 40aaba 7613->7614 7616 40aeff 7615->7616 7622 40afd7 7615->7622 7617 40a322 __getptd 2 API calls 7616->7617 7618 40af05 7617->7618 7619 40a322 __getptd 2 API calls 7618->7619 7623 40af1e 7618->7623 7620 40af13 7619->7620 7621 40a0cd _raise RtlEncodePointer 7620->7621 7621->7623 7622->7581 7623->7622 7624 40ae7a FindHandler 2 API calls 7623->7624 7624->7623 7720 40c183 7723 40c195 __fileno 7720->7723 7725 40c1a1 7720->7725 7721 40c01f __flsbuf 2 API calls 7721->7723 7722 411a36 __flush 2 API calls 7722->7723 7723->7721 7723->7722 7724 4124fe __locking 2 API calls 7723->7724 7723->7725 7724->7723 7457 40ba06 7459 40ba12 __freefls@4 7457->7459 7458 40a2a9 __getptd_noexit 2 API calls 7460 40ba3e _siglookup __decode_pointer 7458->7460 7459->7458 7459->7460 7466 40ba47 _raise __freefls@4 7459->7466 7461 40bae4 7460->7461 7460->7466 7467 40b922 7460->7467 7463 40eaf4 __lock RtlEncodePointer 7461->7463 7464 40baef 7461->7464 7463->7464 7465 40a0cd _raise RtlEncodePointer 7464->7465 7464->7466 7465->7466 7470 40b7e0 7467->7470 7469 40b933 7469->7461 7471 40b7ec __freefls@4 7470->7471 7472 40eaf4 __lock RtlEncodePointer 7471->7472 7475 40b7f3 __decode_pointer 7472->7475 7473 40b8ac _doexit __mtinitlocknum __freefls@4 __initterm 7473->7469 7474 40a0cd RtlEncodePointer _raise 7474->7475 7475->7473 7475->7474 7271 40d64b 7273 40d65c 7271->7273 7272 40d662 7273->7272 7274 40d5f2 RtlEncodePointer RtlAllocateHeap _write_string 7273->7274 7274->7273 7696 40b90c 7697 40b7e0 _doexit RtlEncodePointer 7696->7697 7698 40b91d 7697->7698 7268 40a0cd 7269 40a05b __encode_pointer RtlEncodePointer 7268->7269 7270 40a0d4 7269->7270 7628 41034f 7629 41035b __freefls@4 7628->7629 7630 40a322 __getptd 2 API calls 7629->7630 7631 410360 7630->7631 7632 41038e 7631->7632 7634 410372 7631->7634 7633 40eaf4 __lock RtlEncodePointer 7632->7633 7636 410377 7633->7636 7635 40a322 __getptd 2 API calls 7634->7635 7635->7636 7637 410385 __freefls@4 7636->7637 7638 40b69c __amsg_exit RtlEncodePointer 7636->7638 7638->7637 7275 40fa50 7277 40fa77 7275->7277 7278 40faf1 setSBUpLow 7277->7278 7279 4134f2 7277->7279 7280 413505 7279->7280 7283 413338 7280->7283 7282 413522 7282->7278 7284 413359 7283->7284 7288 413371 __freea __crtGetStringTypeA_stat 7284->7288 7289 416eab 7284->7289 7288->7282 7290 416ed5 7289->7290 7292 41348f 7290->7292 7297 412f18 7290->7297 7292->7288 7293 416ef4 7292->7293 7294 416fbe __freea 7293->7294 7295 416f34 __crtGetStringTypeA_stat 7293->7295 7294->7288 7295->7294 7296 4111fd __calloc_crt 2 API calls 7295->7296 7296->7294 7300 412e64 7297->7300 7301 412e7d 7300->7301 7304 412c35 7301->7304 7305 412c4a 7304->7305 7307 412c5c 7305->7307 7308 413830 7305->7308 7307->7292 7310 413844 __isleadbyte_l 7308->7310 7309 413851 7309->7305 7310->7309 7311 4134f2 ___crtGetStringTypeA 2 API calls 7310->7311 7311->7309 7174 402ad1 7175 402ad2 7174->7175 7177 402b56 7175->7177 7178 40180c 7175->7178 7179 40181b 7178->7179 7180 40183e Sleep 7179->7180 7182 401859 7180->7182 7181 40186a NtTerminateProcess 7183 401876 7181->7183 7182->7181 7183->7177 7312 40be51 7317 411bc0 7312->7317 7315 40be64 7326 411ae6 7317->7326 7319 40be56 7319->7315 7320 411997 7319->7320 7321 4119a3 __freefls@4 7320->7321 7322 40eaf4 __lock RtlEncodePointer 7321->7322 7324 4119af 7322->7324 7323 411a18 __fcloseall __freefls@4 7323->7315 7324->7323 7338 416406 7324->7338 7327 411af2 __freefls@4 7326->7327 7328 40eaf4 __lock RtlEncodePointer 7327->7328 7332 411b01 _flsall 7328->7332 7330 411b99 _flsall __freefls@4 7330->7319 7331 411a9e RtlEncodePointer RtlAllocateHeap __fflush_nolock 7331->7332 7332->7330 7332->7331 7333 40beb2 7332->7333 7334 40bebf 7333->7334 7337 40bed5 7333->7337 7335 40eaf4 __lock RtlEncodePointer 7334->7335 7336 40bec8 7335->7336 7336->7332 7337->7332 7339 416412 __freefls@4 7338->7339 7343 416426 __fcloseall __freefls@4 7339->7343 7344 40be71 7339->7344 7343->7324 7345 40be83 7344->7345 7347 40be9b 7344->7347 7346 40eaf4 __lock RtlEncodePointer 7345->7346 7345->7347 7346->7347 7348 41638f 7347->7348 7349 4163a3 7348->7349 7350 4163bf 7348->7350 7349->7343 7350->7349 7354 411a36 7350->7354 7352 4163cb __fileno __freebuf 7358 417346 7352->7358 7355 411a4f __fileno 7354->7355 7357 411a71 7354->7357 7355->7357 7362 4124fe 7355->7362 7357->7352 7359 417352 __freefls@4 7358->7359 7360 416660 ___lock_fhandle RtlEncodePointer 7359->7360 7361 41735a __close_nolock __close __freefls@4 7359->7361 7360->7361 7361->7349 7363 41250a __freefls@4 7362->7363 7367 412512 __locking __freefls@4 7363->7367 7368 416660 7363->7368 7365 412582 7365->7367 7372 411dcb 7365->7372 7367->7357 7369 41666c __freefls@4 7368->7369 7370 40eaf4 __lock RtlEncodePointer 7369->7370 7371 416698 ___lock_fhandle __ioinit __freefls@4 7369->7371 7370->7371 7371->7365 7373 411dda __flsbuf __lseeki64_nolock 7372->7373 7375 411e01 __input_l __fassign __putwch_nolock 7373->7375 7376 40a322 7373->7376 7375->7367 7381 40a2a9 7376->7381 7379 40a337 7379->7375 7380 40b69c __amsg_exit RtlEncodePointer 7380->7379 7382 40a2b3 ___set_flsgetvalue 7381->7382 7383 40a2fd 7382->7383 7384 4111fd __calloc_crt 2 API calls 7382->7384 7383->7379 7383->7380 7385 40a2d4 __decode_pointer 7384->7385 7385->7383 7387 40a1c2 7385->7387 7388 40a1ce __crt_waiting_on_module_handle __freefls@4 7387->7388 7389 40eaf4 __lock RtlEncodePointer 7388->7389 7390 40a23f __getptd_noexit 7389->7390 7391 40eaf4 __lock RtlEncodePointer 7390->7391 7392 40a260 __getptd_noexit ___addlocaleref __freefls@4 7391->7392 7392->7383 7476 401818 7477 40181b 7476->7477 7478 40183e Sleep 7477->7478 7480 401859 7478->7480 7479 40186a NtTerminateProcess 7481 401876 7479->7481 7480->7479 7639 40b75b 7640 40b769 __initterm_e 7639->7640 7642 40b7a6 __initterm 7640->7642 7643 40a71f 7640->7643 7646 40a6e3 7643->7646 7645 40a72c 7645->7642 7647 40a6ef __freefls@4 7646->7647 7652 40b708 7647->7652 7651 40a700 __cinit __freefls@4 7651->7645 7653 40eaf4 __lock RtlEncodePointer 7652->7653 7654 40a6f4 7653->7654 7655 40a5f8 7654->7655 7656 40a60c __decode_pointer 7655->7656 7664 40a69f 7656->7664 7669 4112e9 7656->7669 7658 40a05b __encode_pointer RtlEncodePointer 7659 40a694 7658->7659 7661 40a05b __encode_pointer RtlEncodePointer 7659->7661 7660 40a63a 7663 40a65e 7660->7663 7668 40a686 7660->7668 7673 411249 7660->7673 7661->7664 7663->7664 7665 411249 __realloc_crt RtlEncodePointer 7663->7665 7666 40a674 7663->7666 7664->7651 7665->7666 7666->7664 7667 40a05b __encode_pointer RtlEncodePointer 7666->7667 7667->7668 7668->7658 7670 4112f5 __freefls@4 7669->7670 7671 40eaf4 __lock RtlEncodePointer 7670->7671 7672 411305 __msize ___sbh_find_block __freefls@4 7670->7672 7671->7672 7672->7660 7675 411252 7673->7675 7676 411291 7675->7676 7677 4160f9 7675->7677 7676->7663 7680 416105 ___sbh_alloc_block _realloc ___sbh_resize_block ___sbh_find_block __freefls@4 7677->7680 7678 40eaf4 __lock RtlEncodePointer 7678->7680 7679 41610c _realloc __freefls@4 7679->7675 7680->7678 7680->7679 7563 402a9d 7564 402ad2 7563->7564 7565 40180c 2 API calls 7564->7565 7566 402b56 7564->7566 7565->7566 7681 40ab5d 7684 40a946 7681->7684 7683 40ab65 7685 40a988 7684->7685 7686 40a950 7684->7686 7685->7683 7686->7685 7687 40a322 __getptd 2 API calls 7686->7687 7688 40a97c 7687->7688 7688->7683 7393 41065e 7394 41067c 7393->7394 7395 41066c 7393->7395 7397 410549 7394->7397 7398 41055e 7397->7398 7399 413830 __isctype_l 2 API calls 7398->7399 7400 410582 setSBUpLow __isleadbyte_l 7398->7400 7399->7400 7400->7395 7726 40bda0 7727 40bdad 7726->7727 7728 4111fd __calloc_crt 2 API calls 7727->7728 7729 40bdc7 7728->7729 7730 40bde0 7729->7730 7731 4111fd __calloc_crt 2 API calls 7729->7731 7731->7730 7708 40fbe3 7709 40fbef __freefls@4 7708->7709 7710 40a322 __getptd 2 API calls 7709->7710 7711 40fbf4 7710->7711 7712 40eaf4 __lock RtlEncodePointer 7711->7712 7715 40fc06 7711->7715 7712->7715 7713 40fc14 __freefls@4 7714 40b69c __amsg_exit RtlEncodePointer 7714->7713 7715->7713 7715->7714 7488 40d625 7490 40d62f 7488->7490 7489 40d648 7490->7489 7492 40d5f2 7490->7492 7493 40d5f8 7492->7493 7495 40d603 7493->7495 7496 40c01f 7493->7496 7495->7490 7499 40c02f __flsbuf __getbuf __fileno 7496->7499 7497 40c152 7500 4124fe __locking 2 API calls 7497->7500 7498 40c0d2 7501 40c0e9 7498->7501 7504 40c106 7498->7504 7499->7497 7499->7498 7503 40c03a 7499->7503 7500->7503 7502 4124fe __locking 2 API calls 7501->7502 7502->7503 7503->7495 7504->7503 7506 411cb2 7504->7506 7507 411cbe __freefls@4 7506->7507 7508 416660 ___lock_fhandle RtlEncodePointer 7507->7508 7509 411ccf __lseeki64_nolock __lseeki64 __freefls@4 7507->7509 7508->7509 7509->7503 7536 40c2e5 7537 40c2f1 __freefls@4 7536->7537 7538 4111fd __calloc_crt 2 API calls 7537->7538 7539 40c312 7538->7539 7540 4111fd __calloc_crt 2 API calls 7539->7540 7541 40c3fa __ioinit __freefls@4 7539->7541 7540->7539 7184 40e426 7185 40e43e _wcslen 7184->7185 7187 40e436 7184->7187 7190 4111fd 7185->7190 7188 40e462 _wcslen __wsetenvp 7188->7187 7189 4111fd __calloc_crt 2 API calls 7188->7189 7189->7188 7193 411206 7190->7193 7192 411243 7192->7188 7193->7192 7194 415fdb 7193->7194 7198 415fe7 ___sbh_alloc_block _realloc __calloc_impl __freefls@4 7194->7198 7195 416090 RtlAllocateHeap 7195->7198 7197 415fff __freefls@4 7197->7193 7198->7195 7198->7197 7199 40eaf4 7198->7199 7200 40eb09 7199->7200 7203 40eb1b 7199->7203 7205 40ea31 7200->7205 7202 40eb0f 7202->7203 7213 40b69c 7202->7213 7203->7198 7206 40ea3d __freefls@4 7205->7206 7210 40ea59 __mtinitlocknum __malloc_crt 7206->7210 7218 40bd61 7206->7218 7211 40ea73 __mtinitlocknum __ioinit __freefls@4 7210->7211 7212 40eaf4 __lock RtlEncodePointer 7210->7212 7211->7202 7212->7211 7214 40bd61 __FF_MSGBANNER RtlEncodePointer 7213->7214 7215 40b6a6 7214->7215 7216 40bbb6 __NMSG_WRITE RtlEncodePointer 7215->7216 7217 40b6ae __decode_pointer 7216->7217 7217->7203 7220 40bd68 __set_error_mode 7218->7220 7219 40bbb6 __NMSG_WRITE RtlEncodePointer 7221 40bd8d 7219->7221 7220->7219 7223 40bd97 7220->7223 7222 40bbb6 __NMSG_WRITE RtlEncodePointer 7221->7222 7222->7223 7224 40bbb6 7223->7224 7227 40bbca __set_error_mode _strcat_s __NMSG_WRITE 7224->7227 7225 40bd25 7225->7210 7227->7225 7228 4116ba 7227->7228 7241 40a0cd 7228->7241 7231 411765 __decode_pointer 7231->7225 7234 40a05b __encode_pointer RtlEncodePointer 7235 411723 7234->7235 7236 40a05b __encode_pointer RtlEncodePointer 7235->7236 7237 411738 7236->7237 7238 40a05b __encode_pointer RtlEncodePointer 7237->7238 7239 41174d 7238->7239 7239->7231 7240 40a05b __encode_pointer RtlEncodePointer 7239->7240 7240->7231 7242 40a05b __encode_pointer RtlEncodePointer 7241->7242 7243 40a0d4 7242->7243 7243->7231 7244 40a05b 7243->7244 7245 40a06f __crt_waiting_on_module_handle 7244->7245 7246 40a0c7 7245->7246 7247 40a0bf RtlEncodePointer 7245->7247 7246->7234 7247->7246 7689 40ab66 7690 40a322 __getptd 2 API calls 7689->7690 7691 40ab6e 7690->7691 7692 40a865 ___FrameUnwindToState 2 API calls 7691->7692 7693 40abbe 7692->7693 7694 40abf3 FindHandler 2 API calls 7693->7694 7695 40abdf __freefls@4 7694->7695 7542 40a8e7 7545 40a81c 7542->7545 7546 40a83b 7545->7546 7547 40a82f 7545->7547 7549 40a322 __getptd 2 API calls 7546->7549 7548 40a85a 7547->7548 7550 40a322 __getptd 2 API calls 7547->7550 7551 40a84c 7549->7551 7550->7546 7551->7548 7552 40a322 __getptd 2 API calls 7551->7552 7552->7548 7401 40a46b 7402 40a47b __crt_waiting_on_module_handle 7401->7402 7416 40a5db __mtterm 7402->7416 7417 40b956 7402->7417 7405 40a05b __encode_pointer RtlEncodePointer 7406 40a548 7405->7406 7407 40a05b __encode_pointer RtlEncodePointer 7406->7407 7408 40a558 7407->7408 7409 40a05b __encode_pointer RtlEncodePointer 7408->7409 7410 40a568 7409->7410 7411 40a05b __encode_pointer RtlEncodePointer 7410->7411 7412 40a578 __mtinit __decode_pointer 7411->7412 7413 4111fd __calloc_crt 2 API calls 7412->7413 7412->7416 7414 40a5b2 __decode_pointer 7413->7414 7415 40a1c2 __getptd_noexit RtlEncodePointer 7414->7415 7414->7416 7415->7416 7418 40a0cd _raise RtlEncodePointer 7417->7418 7419 40b95e __init_pointers __initp_misc_winsig 7418->7419 7420 40a05b __encode_pointer RtlEncodePointer 7419->7420 7421 40a53d 7420->7421 7421->7405 7716 40bfeb 7717 40bff6 7716->7717 7718 40c009 7716->7718 7717->7718 7719 411a36 __flush 2 API calls 7717->7719 7719->7718 7248 40e7ac HeapCreate 7249 40e7d0 7248->7249 7422 40ae71 7423 40ae79 ___BuildCatchObject 7422->7423 7428 40a865 7423->7428 7425 40aeb7 7434 40aacd 7425->7434 7427 40aed8 7429 40a871 __freefls@4 7428->7429 7430 40a322 __getptd 2 API calls 7429->7430 7431 40a891 __CallSettingFrame@12 7430->7431 7446 40a92b 7431->7446 7433 40a912 __freefls@4 7433->7425 7435 40aad9 __freefls@4 7434->7435 7436 40a322 __getptd 2 API calls 7435->7436 7437 40ab04 7436->7437 7438 40a322 __getptd 2 API calls 7437->7438 7439 40ab12 7438->7439 7440 40a322 __getptd 2 API calls 7439->7440 7441 40ab20 7440->7441 7442 40a322 __getptd 2 API calls 7441->7442 7443 40ab2b 7442->7443 7451 40abf3 7443->7451 7445 40abdf __freefls@4 7445->7427 7447 40a322 __getptd 2 API calls 7446->7447 7448 40a930 7447->7448 7449 40a93e 7448->7449 7450 40a322 __getptd 2 API calls 7448->7450 7449->7433 7450->7449 7452 40ac01 7451->7452 7453 40a322 __getptd 2 API calls 7452->7453 7454 40ac07 7453->7454 7455 40a322 __getptd 2 API calls 7454->7455 7456 40ac15 FindHandler 7455->7456 7456->7445 7556 40a8f1 7558 40a89c __CallSettingFrame@12 7556->7558 7557 40a92b ___FrameUnwindToState 2 API calls 7559 40a912 __freefls@4 7557->7559 7558->7557 7567 40a6b2 7568 4111fd __calloc_crt 2 API calls 7567->7568 7569 40a6be 7568->7569 7570 40a05b __encode_pointer RtlEncodePointer 7569->7570 7571 40a6c6 7570->7571 7522 40c635 7524 40c68f __input_l 7522->7524 7525 40c6af __input_l __decode_pointer __fileno 7522->7525 7523 41051b RtlEncodePointer RtlAllocateHeap __input_l 7523->7525 7525->7523 7525->7524 7526 40c60b RtlEncodePointer RtlAllocateHeap __whiteout 7525->7526 7527 41049a RtlEncodePointer RtlAllocateHeap __input_l 7525->7527 7528 40c5e2 RtlEncodePointer __input_l 7525->7528 7529 410416 RtlEncodePointer RtlAllocateHeap __input_l 7525->7529 7530 40c5c2 RtlEncodePointer RtlAllocateHeap __hextodec 7525->7530 7531 40c56b RtlEncodePointer RtlAllocateHeap __input_l 7525->7531 7526->7525 7527->7525 7528->7525 7529->7525 7530->7525 7531->7525 7702 40a33c 7704 40a348 __freefls@4 7702->7704 7703 40a406 ___freetlocinfo ___removelocaleref __freefls@4 7704->7703 7705 40eaf4 __lock RtlEncodePointer 7704->7705 7706 40a3cd __freefls@4 7705->7706 7707 40eaf4 __lock RtlEncodePointer 7706->7707 7707->7703 7250 9dcae0 7253 9dcaee 7250->7253 7254 9dcafd 7253->7254 7257 9dd28e 7254->7257 7260 9dd2a9 7257->7260 7258 9dd2b2 CreateToolhelp32Snapshot 7259 9dd2ce Module32First 7258->7259 7258->7260 7261 9dd2dd 7259->7261 7262 9dcaed 7259->7262 7260->7258 7260->7259 7264 9dcf4d 7261->7264 7265 9dcf78 7264->7265 7266 9dcf89 VirtualAlloc 7265->7266 7267 9dcfc1 7265->7267 7266->7267 7267->7267

                    Control-flow Graph

                    C-Code - Quality: 23%
                    			E0040180C(void* __eflags, void* __fp0, intOrPtr* _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
                    				char _v8;
                    				void* __ebx;
                    				void* __edi;
                    				void* __esi;
                    				void* __ebp;
                    				void* _t11;
                    				void* _t16;
                    				intOrPtr* _t17;
                    				void* _t19;
                    				void* _t20;
                    				void* _t21;
                    
                    				_t22 = __eflags;
                    				L00401140(0x183e, _t16, _t20, _t21, __eflags, __fp0);
                    				_t17 = _a4;
                    				Sleep(0x1388);
                    				_t11 = E00401381(_t19, _t22, _t17, _a8, _a12,  &_v8); // executed
                    				if(_t11 != 0) {
                    					_push(_a16);
                    					_push(_v8);
                    					_push(_t11);
                    					_push(_t17); // executed
                    					L00401455(0x60, _t19, _t20); // executed
                    				}
                    				 *_t17(0xffffffff, 0); // executed
                    				_t17 = _t17 + 0x60;
                    				_push(0x60);
                    				asm("pushad");
                    				__ecx =  *__esp;
                    				__esp = __esp + 4;
                    				return __eax;
                    			}














                    0x0040180c
                    0x00401839
                    0x0040183e
                    0x00401846
                    0x00401854
                    0x0040185b
                    0x0040185d
                    0x00401860
                    0x00401863
                    0x00401864
                    0x00401865
                    0x00401865
                    0x0040186e
                    0x0040187a
                    0x0040188a
                    0x0040188b
                    0x0040188c
                    0x0040188f
                    0x004018a2

                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401846
                    • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                    Memory Dump Source
                    • Source File: 00000002.00000002.412513805.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_vvtsewb.jbxd
                    Similarity
                    • API ID: ProcessSleepTerminate
                    • String ID:
                    • API String ID: 417527130-0
                    • Opcode ID: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                    • Instruction ID: 439418bc6b8cc85bb90c3f715c5c8777bd26b3ffbf7cafd5698f886abb68661d
                    • Opcode Fuzzy Hash: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                    • Instruction Fuzzy Hash: DA014F73608208E7DB057A968C41ABA36299B04754F24C137BA13791F1D63DCB12A76B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401846
                    • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                    Memory Dump Source
                    • Source File: 00000002.00000002.412513805.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_vvtsewb.jbxd
                    Similarity
                    • API ID: ProcessSleepTerminate
                    • String ID:
                    • API String ID: 417527130-0
                    • Opcode ID: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                    • Instruction ID: 3ccd72cbf6c862e7ac88a574d3d4d63140f03618044998c1cc11cf15f2003e8a
                    • Opcode Fuzzy Hash: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                    • Instruction Fuzzy Hash: F5F03133604204E7DB047E96CC41ABA36199B04754F24C537BA13791F1D63DCB12A76B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    C-Code - Quality: 17%
                    			E00401822(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                    				void* _t11;
                    				intOrPtr* _t17;
                    				void* _t19;
                    				void* _t22;
                    
                    				_t23 = __eflags;
                    				asm("out 0x95, eax");
                    				L00401140(0x183e, __ebx, __edi, __esi, __eflags, __fp0);
                    				_t17 =  *((intOrPtr*)(_t22 + 8));
                    				Sleep(0x1388);
                    				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                    				if(_t11 != 0) {
                    					_push( *((intOrPtr*)(_t22 + 0x14)));
                    					_push( *((intOrPtr*)(_t22 - 4)));
                    					_push(_t11);
                    					_push(_t17); // executed
                    					L00401455(0x60, _t19, __edi); // executed
                    				}
                    				 *_t17(0xffffffff, 0); // executed
                    				_t17 = _t17 + 0x60;
                    				_push(0x60);
                    				asm("pushad");
                    				__ecx =  *__esp;
                    				__esp = __esp + 4;
                    				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                    				_pop(__edi);
                    				_pop(__esi);
                    				_pop(__ebx);
                    				__esp = __ebp;
                    				_pop(__ebp);
                    				return __eax;
                    			}







                    0x00401822
                    0x00401822
                    0x00401839
                    0x0040183e
                    0x00401846
                    0x00401854
                    0x0040185b
                    0x0040185d
                    0x00401860
                    0x00401863
                    0x00401864
                    0x00401865
                    0x00401865
                    0x0040186e
                    0x0040187a
                    0x0040188a
                    0x0040188b
                    0x0040188c
                    0x0040188f
                    0x00401899
                    0x0040189e
                    0x0040189f
                    0x004018a0
                    0x004018a1
                    0x004018a1
                    0x004018a2

                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401846
                    • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                    Memory Dump Source
                    • Source File: 00000002.00000002.412513805.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_vvtsewb.jbxd
                    Similarity
                    • API ID: ProcessSleepTerminate
                    • String ID:
                    • API String ID: 417527130-0
                    • Opcode ID: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                    • Instruction ID: 86529ff08739d4d45ab2b2fe3aa627bb4dd9aa569924de5dc1b0fc6937d585b1
                    • Opcode Fuzzy Hash: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                    • Instruction Fuzzy Hash: FEF03133604204EBDB047E96C841ABA36299B44754F24C537BA13B91F1D63DCB12A76B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 65 9dd28e-9dd2a7 66 9dd2a9-9dd2ab 65->66 67 9dd2ad 66->67 68 9dd2b2-9dd2be CreateToolhelp32Snapshot 66->68 67->68 69 9dd2ce-9dd2db Module32First 68->69 70 9dd2c0-9dd2c6 68->70 71 9dd2dd-9dd2de call 9dcf4d 69->71 72 9dd2e4-9dd2ec 69->72 70->69 75 9dd2c8-9dd2cc 70->75 76 9dd2e3 71->76 75->66 75->69 76->72
                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 009DD2B6
                    • Module32First.KERNEL32(00000000,00000224), ref: 009DD2D6
                    Memory Dump Source
                    • Source File: 00000002.00000002.413033982.00000000009D8000.00000040.00000020.00020000.00000000.sdmp, Offset: 009D8000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_9d8000_vvtsewb.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateFirstModule32SnapshotToolhelp32
                    • String ID:
                    • API String ID: 3833638111-0
                    • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction ID: 7c034ba5132c2b90d41c09e8ebcf12a29b417f26f66d3a2987cb58802e543c5d
                    • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction Fuzzy Hash: ADF096311417117FE7203BF99C8DBAE76ECAF49724F10452AF762911C0DB70EC458A61
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    C-Code - Quality: 17%
                    			E00401826(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                    				void* _t8;
                    				void* _t11;
                    				intOrPtr* _t17;
                    				void* _t19;
                    				void* _t22;
                    
                    				_t23 = __eflags;
                    				asm("sbb ebx, ebp");
                    				L00401140(_t8, __ebx, __edi, __esi, __eflags, __fp0);
                    				_t17 =  *((intOrPtr*)(_t22 + 8));
                    				Sleep(0x1388);
                    				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                    				if(_t11 != 0) {
                    					_push( *((intOrPtr*)(_t22 + 0x14)));
                    					_push( *((intOrPtr*)(_t22 - 4)));
                    					_push(_t11);
                    					_push(_t17); // executed
                    					L00401455(0x60, _t19, __edi); // executed
                    				}
                    				 *_t17(0xffffffff, 0); // executed
                    				_t17 = _t17 + 0x60;
                    				_push(0x60);
                    				asm("pushad");
                    				__ecx =  *__esp;
                    				__esp = __esp + 4;
                    				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                    				_pop(__edi);
                    				_pop(__esi);
                    				_pop(__ebx);
                    				__esp = __ebp;
                    				_pop(__ebp);
                    				return __eax;
                    			}








                    0x00401826
                    0x00401826
                    0x00401839
                    0x0040183e
                    0x00401846
                    0x00401854
                    0x0040185b
                    0x0040185d
                    0x00401860
                    0x00401863
                    0x00401864
                    0x00401865
                    0x00401865
                    0x0040186e
                    0x0040187a
                    0x0040188a
                    0x0040188b
                    0x0040188c
                    0x0040188f
                    0x00401899
                    0x0040189e
                    0x0040189f
                    0x004018a0
                    0x004018a1
                    0x004018a1
                    0x004018a2

                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401846
                    • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                    Memory Dump Source
                    • Source File: 00000002.00000002.412513805.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_vvtsewb.jbxd
                    Similarity
                    • API ID: ProcessSleepTerminate
                    • String ID:
                    • API String ID: 417527130-0
                    • Opcode ID: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                    • Instruction ID: 61297dcd7f948f961e89af5f5716b1062d194a974c17104e1ab0fce138cf61ec
                    • Opcode Fuzzy Hash: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                    • Instruction Fuzzy Hash: C4F04F33604208A7DB04BE96CC41AAA3719AB04754F248537BB13791E1DA3DCB12A72B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 96 401834-40185b call 401140 Sleep call 401381 102 40186a-40187f NtTerminateProcess 96->102 103 40185d-401865 call 401455 96->103 106 401882-4018a2 call 401140 102->106 107 401876-40187b 102->107 103->102 107->106
                    C-Code - Quality: 20%
                    			E00401834(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                    				void* _t10;
                    				void* _t13;
                    				intOrPtr* _t19;
                    				void* _t22;
                    				void* _t25;
                    
                    				_t26 = __eflags;
                    				L00401140(_t10, __ebx, __edi, __esi, __eflags, __fp0);
                    				_t19 =  *((intOrPtr*)(_t25 + 8));
                    				Sleep(0x1388);
                    				_t13 = E00401381(_t22, _t26, _t19,  *((intOrPtr*)(_t25 + 0xc)),  *((intOrPtr*)(_t25 + 0x10)), _t25 - 4); // executed
                    				if(_t13 != 0) {
                    					_push( *((intOrPtr*)(_t25 + 0x14)));
                    					_push( *((intOrPtr*)(_t25 - 4)));
                    					_push(_t13);
                    					_push(_t19); // executed
                    					L00401455(0x60, _t22, __edi); // executed
                    				}
                    				 *_t19(0xffffffff, 0); // executed
                    				_t19 = _t19 + 0x60;
                    				_push(0x60);
                    				asm("pushad");
                    				__ecx =  *__esp;
                    				__esp = __esp + 4;
                    				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                    				_pop(__edi);
                    				_pop(__esi);
                    				_pop(__ebx);
                    				__esp = __ebp;
                    				_pop(__ebp);
                    				return __eax;
                    			}








                    0x00401834
                    0x00401839
                    0x0040183e
                    0x00401846
                    0x00401854
                    0x0040185b
                    0x0040185d
                    0x00401860
                    0x00401863
                    0x00401864
                    0x00401865
                    0x00401865
                    0x0040186e
                    0x0040187a
                    0x0040188a
                    0x0040188b
                    0x0040188c
                    0x0040188f
                    0x00401899
                    0x0040189e
                    0x0040189f
                    0x004018a0
                    0x004018a1
                    0x004018a1
                    0x004018a2

                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401846
                    • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                    Memory Dump Source
                    • Source File: 00000002.00000002.412513805.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_vvtsewb.jbxd
                    Similarity
                    • API ID: ProcessSleepTerminate
                    • String ID:
                    • API String ID: 417527130-0
                    • Opcode ID: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                    • Instruction ID: 4e4f5f6328981cf1385f7e82c295c95f43d6d852bc8dfc3b1875bfb827a549ac
                    • Opcode Fuzzy Hash: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                    • Instruction Fuzzy Hash: BDF04932604208ABDB04BF92CC81ABA3329AB04754F248537BA12790F1D639C612A72B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 113 40e703-40e712 115 40e714-40e717 113->115 116 40e718-40e71b 113->116 117 40e72b-40e734 call 4111b8 116->117 118 40e71d-40e722 116->118 121 40e739-40e73e 117->121 118->118 119 40e724-40e729 118->119 119->117 119->118 122 40e740-40e74c 121->122 123 40e74d-40e758 121->123 123->122
                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.412541528.0000000000409000.00000020.00000001.01000000.00000006.sdmp, Offset: 00409000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_409000_vvtsewb.jbxd
                    Similarity
                    • API ID: __malloc_crt
                    • String ID:
                    • API String ID: 3464615804-0
                    • Opcode ID: 501dda1f62610471c31aec79cd889d8af2f544a4fc306c4e666a9dbeabe91d77
                    • Instruction ID: fc55ce3b648994ae0669cb83a6c03f413a82d86dd79d98679187b4526597e74b
                    • Opcode Fuzzy Hash: 501dda1f62610471c31aec79cd889d8af2f544a4fc306c4e666a9dbeabe91d77
                    • Instruction Fuzzy Hash: 92F09E339001205DD720773A3C048770629DAC63693150C3BF692E3281F6380C8342E9
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 126 40e7ac-40e7ce HeapCreate 127 40e7d0-40e7d1 126->127 128 40e7d2-40e7db 126->128
                    APIs
                    • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 0040E7C1
                    Memory Dump Source
                    • Source File: 00000002.00000002.412541528.0000000000409000.00000020.00000001.01000000.00000006.sdmp, Offset: 00409000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_409000_vvtsewb.jbxd
                    Similarity
                    • API ID: CreateHeap
                    • String ID:
                    • API String ID: 10892065-0
                    • Opcode ID: f265a19bc9afaa3439f176b812c951df2e96731d5939ae12d3d0726b769ea69c
                    • Instruction ID: d74e06b4aecc299efa316623dfedc8e40289bf0d4652f15902354497f1d10087
                    • Opcode Fuzzy Hash: f265a19bc9afaa3439f176b812c951df2e96731d5939ae12d3d0726b769ea69c
                    • Instruction Fuzzy Hash: 2BD05E369583445EEB105F756D087623BDCDB84795F048436B90CCA6A0E674D550DA44
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 129 40a0cd-40a0cf call 40a05b 131 40a0d4-40a0d5 129->131
                    APIs
                    • __encode_pointer.LIBCMT ref: 0040A0CF
                      • Part of subcall function 0040A05B: RtlEncodePointer.NTDLL(?), ref: 0040A0C2
                    Memory Dump Source
                    • Source File: 00000002.00000002.412541528.0000000000409000.00000020.00000001.01000000.00000006.sdmp, Offset: 00409000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_409000_vvtsewb.jbxd
                    Similarity
                    • API ID: EncodePointer__encode_pointer
                    • String ID:
                    • API String ID: 4150071819-0
                    • Opcode ID: 626ded885c0b6a47c33717e93208713095e5c780cda27b978e7e12efcbcc7c99
                    • Instruction ID: 50ed121f21e01714d4d4106e0456cc313bcbcd0e045e12985174d0a2d6778b00
                    • Opcode Fuzzy Hash: 626ded885c0b6a47c33717e93208713095e5c780cda27b978e7e12efcbcc7c99
                    • Instruction Fuzzy Hash:
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 132 9dcf4d-9dcf87 call 9dd260 135 9dcf89-9dcfbc VirtualAlloc call 9dcfda 132->135 136 9dcfd5 132->136 138 9dcfc1-9dcfd3 135->138 136->136 138->136
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 009DCF9E
                    Memory Dump Source
                    • Source File: 00000002.00000002.413033982.00000000009D8000.00000040.00000020.00020000.00000000.sdmp, Offset: 009D8000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_9d8000_vvtsewb.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction ID: 245b6c56a23b0766eb25d1bf28d14aaafec08dffd395c8742077fe37a54e7ca3
                    • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction Fuzzy Hash: B7112B79A40208EFDB01DF98C985E98BBF5AF08350F158095F9489B362D371EA50DB80
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __getptd.LIBCMT ref: 0040A836
                      • Part of subcall function 0040A322: __getptd_noexit.LIBCMT ref: 0040A325
                      • Part of subcall function 0040A322: __amsg_exit.LIBCMT ref: 0040A332
                    • __getptd.LIBCMT ref: 0040A847
                    • __getptd.LIBCMT ref: 0040A855
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.412541528.0000000000409000.00000020.00000001.01000000.00000006.sdmp, Offset: 00409000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_409000_vvtsewb.jbxd
                    Similarity
                    • API ID: __getptd$__amsg_exit__getptd_noexit
                    • String ID: MOC$csm
                    • API String ID: 803148776-1389381023
                    • Opcode ID: 671699303d6b60e28057f17e5ec861d0093e6d5f61e45ced52332932ffd97aae
                    • Instruction ID: db0c76aa7c4e0e0626e6bed2eef3fec0a3783135ff2f5cf4364eea1cffeb3cee
                    • Opcode Fuzzy Hash: 671699303d6b60e28057f17e5ec861d0093e6d5f61e45ced52332932ffd97aae
                    • Instruction Fuzzy Hash: 6EE012325103048FD710AAA5C4457563394FB54318F6945B6A808D7393C73CEC615687
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.412541528.0000000000409000.00000020.00000001.01000000.00000006.sdmp, Offset: 00409000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_409000_vvtsewb.jbxd
                    Similarity
                    • API ID: __fileno__flsbuf__flush__locking
                    • String ID:
                    • API String ID: 2259706978-0
                    • Opcode ID: 15180966515bcd9a64484e0174daa60dbe67719289ee5ef70f2a1fc3c6d11957
                    • Instruction ID: 7db9d4361589b3ed1bd66184b58abc72e1ff8a651a3b30b1fe564f823639e331
                    • Opcode Fuzzy Hash: 15180966515bcd9a64484e0174daa60dbe67719289ee5ef70f2a1fc3c6d11957
                    • Instruction Fuzzy Hash: D5419031E00604DBDB249FE988C059FB7B6AF80320F24877FE815A66D1D778DE419B48
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.412541528.0000000000409000.00000020.00000001.01000000.00000006.sdmp, Offset: 00409000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_409000_vvtsewb.jbxd
                    Similarity
                    • API ID: __lock$___addlocaleref__crt_waiting_on_module_handle
                    • String ID:
                    • API String ID: 1628550938-0
                    • Opcode ID: 0b1a66759e3dbdfb38007f7b2675f70faaabeaac69ea961cef2d3d547ab8e7c0
                    • Instruction ID: 797694f881aa37ca8b5f9937b89b2f666af65c02d801f38d0aadbc9304a935bf
                    • Opcode Fuzzy Hash: 0b1a66759e3dbdfb38007f7b2675f70faaabeaac69ea961cef2d3d547ab8e7c0
                    • Instruction Fuzzy Hash: 931151715007019FD710AF7A9905B9ABBE0AF04314F10457FE499B62E1CBB89A40CB5D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __getptd.LIBCMT ref: 0040AAFF
                      • Part of subcall function 0040A322: __getptd_noexit.LIBCMT ref: 0040A325
                      • Part of subcall function 0040A322: __amsg_exit.LIBCMT ref: 0040A332
                    • __getptd.LIBCMT ref: 0040AB0D
                    • __getptd.LIBCMT ref: 0040AB1B
                    • __getptd.LIBCMT ref: 0040AB26
                      • Part of subcall function 0040ABF3: __getptd.LIBCMT ref: 0040AC02
                      • Part of subcall function 0040ABF3: __getptd.LIBCMT ref: 0040AC10
                    Memory Dump Source
                    • Source File: 00000002.00000002.412541528.0000000000409000.00000020.00000001.01000000.00000006.sdmp, Offset: 00409000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_409000_vvtsewb.jbxd
                    Similarity
                    • API ID: __getptd$__amsg_exit__getptd_noexit
                    • String ID:
                    • API String ID: 803148776-0
                    • Opcode ID: 5acad694606c70bc299f6e3d03924e6ad357319d4721c8e7a9f3fb00c0938d84
                    • Instruction ID: 4ceb4badccefb88abe74292121835467509f31c118642c149aaa2b759065458d
                    • Opcode Fuzzy Hash: 5acad694606c70bc299f6e3d03924e6ad357319d4721c8e7a9f3fb00c0938d84
                    • Instruction Fuzzy Hash: 9911DAB1C00309DFDB00EFA5D845ADE7BB1FF04318F10856AF854A7292DB789A519F59
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __getptd.LIBCMT ref: 0041035B
                      • Part of subcall function 0040A322: __getptd_noexit.LIBCMT ref: 0040A325
                      • Part of subcall function 0040A322: __amsg_exit.LIBCMT ref: 0040A332
                    • __getptd.LIBCMT ref: 00410372
                    • __amsg_exit.LIBCMT ref: 00410380
                    • __lock.LIBCMT ref: 00410390
                    Memory Dump Source
                    • Source File: 00000002.00000002.412541528.0000000000409000.00000020.00000001.01000000.00000006.sdmp, Offset: 00409000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_409000_vvtsewb.jbxd
                    Similarity
                    • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                    • String ID:
                    • API String ID: 3521780317-0
                    • Opcode ID: 4f339604d7ea507d8e8249c909f4e1cfd13c0e888386bb6d698b67c5e920e38f
                    • Instruction ID: a01389393d08da145e3135b42ac0a08f5c1767df72bea2870acacd80411a7853
                    • Opcode Fuzzy Hash: 4f339604d7ea507d8e8249c909f4e1cfd13c0e888386bb6d698b67c5e920e38f
                    • Instruction Fuzzy Hash: 13F0FF31A407189BD730FBA6980279E73A0AF04718F50466FAC54A72D2CBBC59C1DA5E
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __getptd.LIBCMT ref: 0040AC02
                      • Part of subcall function 0040A322: __getptd_noexit.LIBCMT ref: 0040A325
                      • Part of subcall function 0040A322: __amsg_exit.LIBCMT ref: 0040A332
                    • __getptd.LIBCMT ref: 0040AC10
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.412541528.0000000000409000.00000020.00000001.01000000.00000006.sdmp, Offset: 00409000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_409000_vvtsewb.jbxd
                    Similarity
                    • API ID: __getptd$__amsg_exit__getptd_noexit
                    • String ID: csm
                    • API String ID: 803148776-1018135373
                    • Opcode ID: 54e44990dd07edcd91bd3197dc50da7e23270eee58c40dad30b91b83af6c0ef9
                    • Instruction ID: bffc41321c1a3a0fb5d007abf3a1080087ced7d40673d35ab145433e29951c07
                    • Opcode Fuzzy Hash: 54e44990dd07edcd91bd3197dc50da7e23270eee58c40dad30b91b83af6c0ef9
                    • Instruction Fuzzy Hash: B90128348043058BEF38DF65D4886AEB3B5AF10315FAA453FE481766D1CB3889A1CB0B
                    Uniqueness

                    Uniqueness Score: -1.00%