Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:1310751
MD5:eeda5350767db40425db9c5f477f39f7
SHA1:93614f3e1a9484df453f29c4c658ccdf3270841d
SHA256:046edea2e16ee4e7e52c8a88294272ed2893adaf46e057e3f45d0efdef288c85
Tags:exe
Infos:

Detection

Poverty Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Detected unpacking (changes PE section rights)
Yara detected Poverty Stealer
Malicious sample detected (through community Yara rule)
Detected unpacking (overwrites its own PE header)
Snort IDS alert for network traffic
Query firmware table information (likely to detect VMs)
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Tries to harvest and steal browser information (history, passwords, etc)
Creates a DirectInput object (often for capturing keystrokes)
Uses 32bit PE files
Found decision node followed by non-executed suspicious APIs
AV process strings found (often used to terminate AV products)
Yara signature match
Sample file is different than original file name gathered from version info
One or more processes crash
Contains functionality to read the PEB
Uses code obfuscation techniques (call, push, ret)
Detected TCP or UDP traffic on non-standard ports
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to call native functions
Uses Microsoft's Enhanced Cryptographic Provider
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers

Classification

  • System is w10x64
  • file.exe (PID: 6992 cmdline: C:\Users\user\Desktop\file.exe MD5: EEDA5350767DB40425DB9C5F477F39F7)
    • WerFault.exe (PID: 7104 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6992 -s 74572 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup
{"C2 url": "69.46.15.167:2220"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.372576838.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
    00000000.00000003.350274075.00000000008C0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
      00000000.00000002.372668115.00000000008B0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
        00000000.00000002.372668115.00000000008B0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
        • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
        00000000.00000002.372688011.0000000000A00000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
        • 0x6533:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
        SourceRuleDescriptionAuthorStrings
        0.2.file.exe.8b0e67.1.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
          0.3.file.exe.8c0000.0.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
            0.2.file.exe.400000.0.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
              0.2.file.exe.400000.0.raw.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
                0.3.file.exe.8c0000.0.raw.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
                  Click to see the 1 entries
                  No Sigma rule has matched
                  Timestamp:192.168.2.369.46.15.1674971022202047066 09/19/23-14:28:00.763272
                  SID:2047066
                  Source Port:49710
                  Destination Port:2220
                  Protocol:TCP
                  Classtype:A Network Trojan was detected

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: file.exeAvira: detected
                  Source: 0.2.file.exe.8b0e67.1.unpackMalware Configuration Extractor: Poverty Stealer {"C2 url": "69.46.15.167:2220"}
                  Source: file.exeReversingLabs: Detection: 42%
                  Source: file.exeVirustotal: Detection: 45%Perma Link
                  Source: file.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004033C0 CryptUnprotectData,CryptProtectData,0_2_004033C0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008B3627 CryptProtectData,0_2_008B3627

                  Compliance

                  barindex
                  Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack
                  Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404EE0 FindFirstFileW,LoadLibraryA,0_2_00404EE0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00402F50 FindFirstFileW,FindNextFileW,FindNextFileW,0_2_00402F50
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00405D70 FindFirstFileW,FindNextFileW,FindNextFileW,0_2_00405D70
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401710 FindFirstFileW,DeleteFileW,DeleteFileW,FindNextFileW,FindNextFileW,0_2_00401710
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008B5147 FindFirstFileW,0_2_008B5147

                  Networking

                  barindex
                  Source: TrafficSnort IDS: 2047066 ET TROJAN [ANY.RUN] PovertyStealer Check-In via TCP 192.168.2.3:49710 -> 69.46.15.167:2220
                  Source: Malware configuration extractorURLs: 69.46.15.167:2220
                  Source: global trafficTCP traffic: 192.168.2.3:49710 -> 69.46.15.167:2220
                  Source: Joe Sandbox ViewASN Name: HVC-ASUS HVC-ASUS
                  Source: Joe Sandbox ViewIP Address: 69.46.15.167 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.46.15.167
                  Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
                  Source: file.exe, 00000000.00000002.386794218.000000000C689000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                  Source: file.exe, 00000000.00000002.386794218.000000000C689000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                  Source: file.exe, 00000000.00000002.386794218.000000000C689000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                  Source: file.exe, 00000000.00000002.394584693.000000000E247000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.386794218.000000000C689000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                  Source: file.exe, 00000000.00000002.386794218.000000000C689000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                  Source: file.exe, 00000000.00000002.394584693.000000000E247000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.386794218.000000000C689000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
                  Source: file.exe, 00000000.00000002.394584693.000000000E247000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.386794218.000000000C689000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=
                  Source: file.exe, 00000000.00000002.394584693.000000000E247000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.386794218.000000000C689000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://search.yahoo.com?fr=crmas_sfp
                  Source: file.exe, 00000000.00000002.394584693.000000000E247000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.386794218.000000000C689000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                  Source: file.exe, 00000000.00000002.394584693.000000000E247000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.386794218.000000000C689000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                  Source: file.exe, 00000000.00000002.372681218.00000000009E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>memstr_da062dad-f

                  System Summary

                  barindex
                  Source: 00000000.00000002.372668115.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                  Source: 00000000.00000002.372688011.0000000000A00000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                  Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 00000000.00000002.372668115.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                  Source: 00000000.00000002.372688011.0000000000A00000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                  Source: file.exe, 00000000.00000000.349585067.0000000000708000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameHungle.exe8 vs file.exe
                  Source: file.exe, 00000000.00000002.372691723.0000000000A4B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameHungle.exe8 vs file.exe
                  Source: file.exeBinary or memory string: OriginalFilenameHungle.exe8 vs file.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6992 -s 74572
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004017100_2_00401710
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004218470_2_00421847
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041F0310_2_0041F031
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004204330_2_00420433
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041FEE20_2_0041FEE2
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041F9910_2_0041F991
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008BDF860_2_008BDF86
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008BDF570_2_008BDF57
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A095180_2_00A09518
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0955B0_2_00A0955B
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00405370 VirtualAlloc,NtClose,NtClose,GetCurrentProcess,0_2_00405370
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401100 NtClose,OpenProcess,GetCurrentProcess,GetFileType,CloseHandle,GetCurrentProcess,CloseHandle,CloseHandle,CloseHandle,0_2_00401100
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00403F10 NtClose,OpenProcess,GetCurrentProcess,GetFileType,CloseHandle,GetCurrentProcess,CloseHandle,CloseHandle,CloseHandle,0_2_00403F10
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008B55D7 VirtualAlloc,NtClose,NtClose,GetCurrentProcess,0_2_008B55D7
                  Source: file.exeReversingLabs: Detection: 42%
                  Source: file.exeVirustotal: Detection: 45%
                  Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
                  Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A06561 CreateToolhelp32Snapshot,Module32First,KiUserExceptionDispatcher,0_2_00A06561
                  Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6992 -s 74572
                  Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6992
                  Source: C:\Users\user\Desktop\file.exeMutant created: \Sessions\1\BaseNamedObjects\LMR-003-
                  Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER70E0.tmpJump to behavior
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@2/5@0/1
                  Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

                  Data Obfuscation

                  barindex
                  Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
                  Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A09BC7 pushad ; iretd 0_2_00A09BC8
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\file.exeSystem information queried: FirmwareTableInformationJump to behavior
                  Source: C:\Users\user\Desktop\file.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-10406
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0955B rdtsc 0_2_00A0955B
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004044D0 FindNextFileW,RegQueryInfoKeyW,GetCurrentHwProfileA,FindNextFileW,GetSystemInfo,GetPhysicallyInstalledSystemMemory,__aulldiv,GetModuleFileNameW,GetDC,GetCurrentObject,GetObjectW,DeleteObject,ReleaseDC,GetKeyboardLayoutList,0_2_004044D0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404EE0 FindFirstFileW,LoadLibraryA,0_2_00404EE0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00402F50 FindFirstFileW,FindNextFileW,FindNextFileW,0_2_00402F50
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00405D70 FindFirstFileW,FindNextFileW,FindNextFileW,0_2_00405D70
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401710 FindFirstFileW,DeleteFileW,DeleteFileW,FindNextFileW,FindNextFileW,0_2_00401710
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008B5147 FindFirstFileW,0_2_008B5147
                  Source: Amcache.hve.3.drBinary or memory string: VMware
                  Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
                  Source: Amcache.hve.3.drBinary or memory string: @scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
                  Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
                  Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
                  Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Devicehbin
                  Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
                  Source: Amcache.hve.3.drBinary or memory string: VMware7,1
                  Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
                  Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                  Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                  Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                  Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.me
                  Source: Amcache.hve.3.drBinary or memory string: VMware-42 35 d8 20 48 cb c7 ff-aa 5e d0 37 a0 49 53 d7
                  Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
                  Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW71.00V.18227214.B64.2106252220,BiosReleaseDate:06/25/2021,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware7,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                  Source: file.exe, 00000000.00000002.374767942.0000000009934000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404EC0 mov eax, dword ptr fs:[00000030h]0_2_00404EC0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008B0D90 mov eax, dword ptr fs:[00000030h]0_2_008B0D90
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008B092B mov eax, dword ptr fs:[00000030h]0_2_008B092B
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008B5127 mov eax, dword ptr fs:[00000030h]0_2_008B5127
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A05E3E push dword ptr fs:[00000030h]0_2_00A05E3E
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00403570 GetProcessHeap,RtlFreeHeap,0_2_00403570
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0955B rdtsc 0_2_00A0955B
                  Source: Amcache.hve.3.drBinary or memory string: c:\users\user\desktop\procexp.exe
                  Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                  Source: Amcache.hve.3.drBinary or memory string: procexp.exe

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.file.exe.8b0e67.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.file.exe.8c0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.file.exe.8c0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.8b0e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.372576838.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.350274075.00000000008C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.372668115.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.file.exe.8b0e67.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.file.exe.8c0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.file.exe.8c0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.8b0e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.372576838.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.350274075.00000000008C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.372668115.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid AccountsWindows Management InstrumentationPath Interception1
                  Process Injection
                  1
                  Virtualization/Sandbox Evasion
                  1
                  OS Credential Dumping
                  131
                  Security Software Discovery
                  Remote Services1
                  Input Capture
                  Exfiltration Over Other Network Medium2
                  Encrypted Channel
                  Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                  Process Injection
                  1
                  Input Capture
                  1
                  Virtualization/Sandbox Evasion
                  Remote Desktop Protocol1
                  Archive Collected Data
                  Exfiltration Over Bluetooth1
                  Non-Standard Port
                  Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
                  Obfuscated Files or Information
                  Security Account Manager1
                  Process Discovery
                  SMB/Windows Admin Shares1
                  Data from Local System
                  Automated Exfiltration1
                  Application Layer Protocol
                  Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)2
                  Software Packing
                  NTDS1
                  Remote System Discovery
                  Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
                  File and Directory Discovery
                  SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials2
                  System Information Discovery
                  VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  file.exe42%ReversingLabsWin32.Trojan.Generic
                  file.exe100%AviraHEUR/AGEN.1312455
                  file.exe45%VirustotalBrowse
                  file.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  69.46.15.167:22200%Avira URL Cloudsafe
                  69.46.15.167:22203%VirustotalBrowse
                  No contacted domains info
                  NameMaliciousAntivirus DetectionReputation
                  69.46.15.167:2220true
                  • 3%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://ac.ecosia.org/autocomplete?q=file.exe, 00000000.00000002.386794218.000000000C689000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://search.yahoo.com?fr=crmas_sfpfile.exe, 00000000.00000002.394584693.000000000E247000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.386794218.000000000C689000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://duckduckgo.com/chrome_newtabfile.exe, 00000000.00000002.394584693.000000000E247000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.386794218.000000000C689000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=file.exe, 00000000.00000002.386794218.000000000C689000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://upx.sf.netAmcache.hve.3.drfalse
                            high
                            https://duckduckgo.com/ac/?q=file.exe, 00000000.00000002.386794218.000000000C689000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://search.yahoo.com/favicon.icohttps://search.yahoo.com/searchfile.exe, 00000000.00000002.394584693.000000000E247000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.386794218.000000000C689000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://www.google.com/images/branding/product/ico/googleg_lodp.icofile.exe, 00000000.00000002.394584693.000000000E247000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.386794218.000000000C689000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://www.ecosia.org/newtab/file.exe, 00000000.00000002.394584693.000000000E247000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.386794218.000000000C689000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=file.exe, 00000000.00000002.386794218.000000000C689000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=file.exe, 00000000.00000002.394584693.000000000E247000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.386794218.000000000C689000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        69.46.15.167
                                        unknownUnited States
                                        29802HVC-ASUStrue
                                        Joe Sandbox Version:38.0.0 Beryl
                                        Analysis ID:1310751
                                        Start date and time:2023-09-19 14:27:06 +02:00
                                        Joe Sandbox Product:CloudBasic
                                        Overall analysis duration:0h 5m 18s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                        Number of analysed new started processes analysed:21
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • HDC enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample file name:file.exe
                                        Detection:MAL
                                        Classification:mal100.troj.spyw.evad.winEXE@2/5@0/1
                                        EGA Information:
                                        • Successful, ratio: 100%
                                        HDC Information:Failed
                                        HCA Information:
                                        • Successful, ratio: 99%
                                        • Number of executed functions: 24
                                        • Number of non-executed functions: 25
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                        • Excluded IPs from analysis (whitelisted): 20.189.173.21
                                        • Excluded domains from analysis (whitelisted): www.bing.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, tse1.mm.bing.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, arc.msn.com
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                        • Report size getting too big, too many NtOpenFile calls found.
                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                        • Report size getting too big, too many NtQueryAttributesFile calls found.
                                        TimeTypeDescription
                                        14:28:03API Interceptor1x Sleep call for process: WerFault.exe modified
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        69.46.15.167Setup_Loader_v2.1.exeGet hashmaliciousPoverty StealerBrowse
                                          o3GRLOXW1Y.exeGet hashmaliciousUnknownBrowse
                                            6GL20vaVB0.exeGet hashmaliciousPoverty StealerBrowse
                                              6GL20vaVB0.exeGet hashmaliciousPoverty StealerBrowse
                                                NzS5VdbENI.exeGet hashmaliciousUnknownBrowse
                                                  SecuriteInfo.com.Win32.DropperX-gen.10510.20091.exeGet hashmaliciousUnknownBrowse
                                                    No context
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    HVC-ASUShttps://link.emlmind.com/en/us1_link_tracker?hash=6dqbek7mb64844ifhdfqn75f3t4sfjw9na6kziino8i63uum5t9mg8amooqah88azqp431tpx7xb9bkj3i4hgay63ieqf1mhhazncxuboztaes363oqhwre9zghuircfw5p7asymgfwa1m7xnwuq44sotmxj1uzwmo8weja8fcez6o3m4pbqgyht19crot7nwjkrqrpw93n57jc1k8zttmaw5ugetc9ykj3xk314ay6w9i6hx3wcrmk6i71khhkc6sjdk3rea47uxxpw3huz5smkank17kqrxhpy3cwmokufs1oyrrdhi15o8efr9gibr&url=aHR0cHM6Ly9hZTcyMmQ5Yi5jODgzODUxMTIyN2RhZmNiY2NjMmZjOGQud29ya2Vycy5kZXYv&uid=NjAxNTY2MQ~~&ucs=edb1a7c5458f06ecfc28003cdd0e2c89Get hashmaliciousHTMLPhisherBrowse
                                                    • 23.227.199.74
                                                    OC-Order-confirmation,xlm.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 23.111.168.178
                                                    PI_Galanz_MWO_-2023-9-8,pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 23.111.168.178
                                                    07.09.2023-08.09.2023PDF______________________________________.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 23.111.168.178
                                                    pcVd3eVrGG.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 23.111.168.178
                                                    Setup_Loader_v2.1.exeGet hashmaliciousPoverty StealerBrowse
                                                    • 69.46.15.167
                                                    E-DEKONT1,DOC.exeGet hashmaliciousAgentTesla, RedLineBrowse
                                                    • 23.111.168.178
                                                    https://www.bing.com/ck/a?!&&p=087b5b448f3ec50dJmltdHM9MTY5NDM5MDQwMCZpZ3VpZD0wNzEzN2I5MS0zYmJkLTZlZWYtMzUxNS02OTJkM2ExNzZmYzImaW5zaWQ9NTE5MA&ptn=3&hsh=3&fclid=07137b91-3bbd-6eef-3515-692d3a176fc2&psq=https%3a%2f%2fbluepuppy.pet&u=a1aHR0cHM6Ly9ibHVlcHVwcHkucGV0Lw#Z2F5dGFudC5zdGlqbkBkZW1lLWdyb3VwLmNvbQ==Get hashmaliciousUnknownBrowse
                                                    • 199.167.144.242
                                                    o3GRLOXW1Y.exeGet hashmaliciousUnknownBrowse
                                                    • 69.46.15.167
                                                    New_Order.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 209.133.204.178
                                                    Oj2dR65c44.elfGet hashmaliciousMiraiBrowse
                                                    • 23.227.187.95
                                                    conhost.exeGet hashmaliciousUnknownBrowse
                                                    • 66.206.0.82
                                                    WlLa7joUe4.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 209.133.204.178
                                                    SecuriteInfo.com.Win32.PWSX-gen.5315.13582.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 209.133.204.178
                                                    9AgakTYFh7.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 209.133.204.178
                                                    https://cresten.cresten.online/?GCDZ=rIGet hashmaliciousHTMLPhisherBrowse
                                                    • 37.1.211.71
                                                    https://wolterskluwer.wolterskluwercom.us/?qSkAp=4ETBcGet hashmaliciousHTMLPhisherBrowse
                                                    • 37.1.209.184
                                                    5EVPHXZeyQ.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 66.206.22.18
                                                    CGAiKMbZJS.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 209.133.204.178
                                                    rFYI.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 66.232.107.36
                                                    No context
                                                    No context
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):65536
                                                    Entropy (8bit):0.8430992069287914
                                                    Encrypted:false
                                                    SSDEEP:192:d6GQm4cWvcu3HQ0l0I3jGu/u7syS274ItmFBa:2pXQ0lTjf/u7syX4ItUa
                                                    MD5:E8C8CC321E832FDC5C14B6B44C82290A
                                                    SHA1:AEEBB1C7CB5FB5EA0FC27C404E505EDAD7C730E8
                                                    SHA-256:BE9C5E6CBEB54177B0F422BA0672A8DD3849A9FD0E62F05DA0D14356DEA19119
                                                    SHA-512:1FA1468CE51938673276351973DDC6B93477EEFDC35C3D03AA0E3FC6C8075B95A09220C9151463634B49B606D70B1093696E1F66B7E56D0B7B3C334C7599DF14
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.3.9.6.0.0.0.8.1.0.8.1.4.2.1.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.3.9.6.0.0.0.8.1.6.9.0.7.9.1.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.6.d.a.8.1.b.3.-.9.e.6.a.-.4.1.9.b.-.9.8.a.e.-.6.2.a.f.2.9.5.6.5.a.b.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.4.b.a.e.f.4.b.-.4.5.f.0.-.4.2.6.f.-.8.7.9.5.-.5.3.7.a.9.f.8.c.1.1.a.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.f.i.l.e...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.5.0.-.0.0.0.1.-.0.0.2.7.-.a.4.c.0.-.a.a.b.5.f.4.e.a.d.9.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.e.4.9.2.d.7.6.8.e.7.9.7.3.1.6.2.4.b.c.d.f.2.e.7.6.1.5.f.9.1.8.0.0.0.0.f.f.f.f.!.0.0.0.0.9.3.6.1.4.f.3.e.1.a.9.4.8.4.d.f.4.5.3.f.2.9.c.4.c.6.5.8.c.c.d.f.3.2.7.0.8.4.1.d.!.f.i.l.e...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.3././.0.9.
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:Mini DuMP crash report, 14 streams, Tue Sep 19 12:28:01 2023, 0x1205a4 type
                                                    Category:dropped
                                                    Size (bytes):1037888
                                                    Entropy (8bit):2.348483192869241
                                                    Encrypted:false
                                                    SSDEEP:3072:cNsDmNPQVXBMDT4SYTD/gFJedWhAGDzYtYCtxv2TK1NEWNYenRqb:cnKmH4TuwJGmc0NZYUM
                                                    MD5:087B930973E68C311D0B044238335EF2
                                                    SHA1:27BF916A83BF894E0193CC66003164A6DC62FC7E
                                                    SHA-256:C004CD99AC9B0D724FFCC10732DD968C468B2CDB42C0800C6E5A566166C35146
                                                    SHA-512:904C75ED982B696D44B6BB5C6579879347CEA8462F7B6082DFE166EC19267F9D0B224BFBD9641D35D5D24A05F38AA06310E3BACE97CD385C574554BF765D65C5
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:MDMP....... .........e........................4................+..........T.......8...........T............V..(............................................................................................U...........B..............GenuineIntelW...........T.......P.....e.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8340
                                                    Entropy (8bit):3.702830708695516
                                                    Encrypted:false
                                                    SSDEEP:192:Rrl7r3GLNisC56uFx66YyPSU68lOgmfBisS3+pD+89bgssf9eAm:RrlsNiN6uFx66YaSU68cgmfAsSUg/f2
                                                    MD5:D6ECC99A7F9B4B657002F3BF83848BB8
                                                    SHA1:52C56658763248D30A1C764F6638227ED01BD8AF
                                                    SHA-256:730BFE2BD08ACE48961D291AE0A35099C2A6720B08496024FA98BDA5F673E667
                                                    SHA-512:78F5B7B352CF82F82A5B8E25439A64E4D9075EE5574D1E5BFC18148B128710F85341ECCA996466F64E7EF3BEBBDC16D8AF86620DF600E1B07A48C2501C60E6E8
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.9.9.2.<./.P.i.d.>.......
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4579
                                                    Entropy (8bit):4.483077553980328
                                                    Encrypted:false
                                                    SSDEEP:48:cvIwSD8zsLrJgtWI9f/Wgc8sqYjA8fm8M4JakFVT+q8oTvaqrg76A89d:uITfLFIugrsqYxJxTJaqrg76AKd
                                                    MD5:1723FEE5390E19DA1D5D5F7B3A6167DC
                                                    SHA1:00D83451CCDDC187902A443912515812EFF7E432
                                                    SHA-256:5A60746776303B3DC6B297915AAAB145421500DB6D1A5AADA67D602E83513C7E
                                                    SHA-512:040366E21B05FC8364F484E6DE0023945B93C03CEE3D27447607D8E2E43BC9024543CE5BFD549F8974FFEDCF061022776ACB445E0C3C733E7B6223B5FA361CF9
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="2224658" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:MS Windows registry file, NT/2000 or above
                                                    Category:dropped
                                                    Size (bytes):1572864
                                                    Entropy (8bit):4.374285386966342
                                                    Encrypted:false
                                                    SSDEEP:12288:AFcTQC4Lh9c+g1Ep7yMZK8yrWzte7y/5rmZrmQ0ithr7+i+invToKdw+d:qcTQC4Lh9c+g1Eag7
                                                    MD5:A06821F27C966E105C17B8CC8096D5D3
                                                    SHA1:61F28FA80B9988E8952EBAF5DAACA4985EA2880E
                                                    SHA-256:C77E5E6A62C37D7E029A3450BFDF3DE4415D28916177619B513238D1911295E1
                                                    SHA-512:3D25FC1509D04D2BEBC2DD42C6B749E2970A01461C0B841859548D5B33620085D4CA4649E11625AC15BEE4413FFE6132878321ABB99DE8A42ADC87D749A58450
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:regf........p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtmj....................................................................................................................................................................................................................................................................................................................................................7..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Entropy (8bit):5.291629069127215
                                                    TrID:
                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                    • DOS Executable Generic (2002/1) 0.02%
                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                    File name:file.exe
                                                    File size:253'440 bytes
                                                    MD5:eeda5350767db40425db9c5f477f39f7
                                                    SHA1:93614f3e1a9484df453f29c4c658ccdf3270841d
                                                    SHA256:046edea2e16ee4e7e52c8a88294272ed2893adaf46e057e3f45d0efdef288c85
                                                    SHA512:a80eee56773bf4bd6c3352430e4b5a87c7e409e9c1157a593c8c29cf4b3973482ced805c135a5c409ce1ae1716af4c91143ab2054389b5034bb5b4a13c1235f5
                                                    SSDEEP:3072:QJxeK7W6OTYqgg85NM768yG+BFjR4U/RjUTcz3oQ9kt:A7W6OJ85q768y/BFjGU/JUcoQ
                                                    TLSH:E244C021B7F1D831E1A75A3050B1C6B22A3B7C6255B5C98B63941B3F5E307C1BFAA316
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........^...?.].?.].?.].Ic].?.].IV].?.].Ib].?.].G[].?.].?.]^?.].Ig].?.].IR].?.].IU].?.]Rich.?.]................PE..L......c...........
                                                    Icon Hash:c73601d0b0222d02
                                                    Entrypoint:0x4035ae
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                    DLL Characteristics:TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x63A50FCC [Fri Dec 23 02:17:48 2022 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:5
                                                    OS Version Minor:1
                                                    File Version Major:5
                                                    File Version Minor:1
                                                    Subsystem Version Major:5
                                                    Subsystem Version Minor:1
                                                    Import Hash:82fc6aa150be346f557bda3dbcb8fac7
                                                    Instruction
                                                    call 00007F380D0410F3h
                                                    jmp 00007F380D03E13Eh
                                                    mov edi, edi
                                                    push ebp
                                                    mov ebp, esp
                                                    mov eax, dword ptr [ebp+08h]
                                                    xor ecx, ecx
                                                    cmp eax, dword ptr [00437008h+ecx*8]
                                                    je 00007F380D03E2C5h
                                                    inc ecx
                                                    cmp ecx, 2Dh
                                                    jc 00007F380D03E2A3h
                                                    lea ecx, dword ptr [eax-13h]
                                                    cmp ecx, 11h
                                                    jnbe 00007F380D03E2C0h
                                                    push 0000000Dh
                                                    pop eax
                                                    pop ebp
                                                    ret
                                                    mov eax, dword ptr [0043700Ch+ecx*8]
                                                    pop ebp
                                                    ret
                                                    add eax, FFFFFF44h
                                                    push 0000000Eh
                                                    pop ecx
                                                    cmp ecx, eax
                                                    sbb eax, eax
                                                    and eax, ecx
                                                    add eax, 08h
                                                    pop ebp
                                                    ret
                                                    call 00007F380D040D6Ah
                                                    test eax, eax
                                                    jne 00007F380D03E2B8h
                                                    mov eax, 00437170h
                                                    ret
                                                    add eax, 08h
                                                    ret
                                                    call 00007F380D040D57h
                                                    test eax, eax
                                                    jne 00007F380D03E2B8h
                                                    mov eax, 00437174h
                                                    ret
                                                    add eax, 0Ch
                                                    ret
                                                    mov edi, edi
                                                    push ebp
                                                    mov ebp, esp
                                                    push esi
                                                    call 00007F380D03E297h
                                                    mov ecx, dword ptr [ebp+08h]
                                                    push ecx
                                                    mov dword ptr [eax], ecx
                                                    call 00007F380D03E237h
                                                    pop ecx
                                                    mov esi, eax
                                                    call 00007F380D03E271h
                                                    mov dword ptr [eax], esi
                                                    pop esi
                                                    pop ebp
                                                    ret
                                                    mov edi, edi
                                                    push ebp
                                                    mov ebp, esp
                                                    mov ecx, dword ptr [ebp+08h]
                                                    test ecx, ecx
                                                    je 00007F380D03E2CDh
                                                    push FFFFFFE0h
                                                    xor edx, edx
                                                    pop eax
                                                    div ecx
                                                    cmp eax, dword ptr [ebp+0Ch]
                                                    jnc 00007F380D03E2C1h
                                                    call 00007F380D03E24Fh
                                                    mov dword ptr [eax], 0000000Ch
                                                    xor eax, eax
                                                    pop ebp
                                                    ret
                                                    imul ecx, dword ptr [ebp+0Ch]
                                                    push esi
                                                    mov esi, ecx
                                                    test esi, esi
                                                    jne 00007F380D03E2B3h
                                                    Programming Language:
                                                    • [C++] VS2010 build 30319
                                                    • [ASM] VS2010 build 30319
                                                    • [ C ] VS2010 build 30319
                                                    • [IMP] VS2008 SP1 build 30729
                                                    • [RES] VS2010 build 30319
                                                    • [LNK] VS2010 build 30319
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x3598c0x64.text
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x3080000x3f40.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2d880x40.text
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x10000x1ec.text
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000x354d00x35600False0.5114991949648712data5.520650305414998IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .data0x370000x2d09e40x4400unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .rsrc0x3080000x3f400x4000False0.45892333984375data4.046779794577083IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    RT_ICON0x3081c00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.44398340248962653
                                                    RT_ICON0x30a7680x988Device independent bitmap graphic, 24 x 48 x 32, image size 00.47827868852459016
                                                    RT_STRING0x30b3200x28edata0.4954128440366973
                                                    RT_STRING0x30b5b00x284data0.47360248447204967
                                                    RT_STRING0x30b8380x706data0.42102335928809786
                                                    RT_GROUP_ICON0x30b0f00x22data0.9705882352941176
                                                    RT_VERSION0x30b1180x208data0.5346153846153846
                                                    DLLImport
                                                    KERNEL32.dllMoveFileExA, ReadConsoleA, InterlockedDecrement, SetDefaultCommConfigW, GetEnvironmentStringsW, SetConsoleScreenBufferSize, AddConsoleAliasW, SetVolumeMountPointW, GetComputerNameW, GetSystemDefaultLCID, GetModuleHandleW, GetCommConfig, GetConsoleAliasesLengthA, GetConsoleAliasExesW, GetDriveTypeA, GetEnvironmentStrings, GlobalAlloc, GetPrivateProfileIntA, LoadLibraryW, TerminateThread, ReadConsoleInputA, CopyFileW, SetConsoleCP, DeleteVolumeMountPointW, EnumSystemCodePagesA, LocalReAlloc, GetACP, GetVolumePathNameA, FindFirstFileW, DisconnectNamedPipe, CreateJobObjectA, GetNamedPipeHandleStateW, GetStartupInfoA, FindFirstFileA, GetLastError, GetCurrentDirectoryW, GetProcessVersion, LoadLibraryA, GetFileType, RemoveDirectoryW, FindAtomA, FindNextFileA, EnumDateFormatsA, SetLocaleInfoW, FreeEnvironmentStringsW, FindNextFileW, VirtualProtect, PurgeComm, FatalAppExitA, GetShortPathNameW, ReadConsoleInputW, FindAtomW, GetWindowsDirectoryW, FindFirstVolumeW, EnumSystemLocalesW, CreateFileW, CloseHandle, SetInformationJobObject, GetPrivateProfileSectionNamesW, CreateMailslotW, GetCommandLineW, WriteConsoleW, MoveFileA, HeapAlloc, EncodePointer, DecodePointer, HeapReAlloc, HeapSetInformation, GetStartupInfoW, GetProcAddress, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameW, HeapCreate, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TerminateProcess, GetCurrentProcess, Sleep, HeapSize, EnterCriticalSection, LeaveCriticalSection, HeapFree, SetFilePointer, SetHandleCount, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, RtlUnwind, GetCPInfo, GetOEMCP, IsValidCodePage, WideCharToMultiByte, SetStdHandle, GetConsoleCP, GetConsoleMode, FlushFileBuffers, IsProcessorFeaturePresent, LCMapStringW, MultiByteToWideChar, GetStringTypeW, RaiseException
                                                    USER32.dllCharUpperW
                                                    GDI32.dllSelectPalette, GetTextFaceW, GetCharWidthA
                                                    SHELL32.dllDragFinish
                                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                    192.168.2.369.46.15.1674971022202047066 09/19/23-14:28:00.763272TCP2047066ET TROJAN [ANY.RUN] PovertyStealer Check-In via TCP497102220192.168.2.369.46.15.167
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Sep 19, 2023 14:28:00.629488945 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:00.762746096 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:00.762911081 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:00.763272047 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:00.763272047 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:00.895087004 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:00.895128965 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:00.895210981 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:00.895222902 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:00.895325899 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:00.895433903 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:00.895503998 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:00.895546913 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:00.895606995 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:00.896277905 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:00.896311045 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:00.896342993 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:00.896372080 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:00.896455050 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:00.896480083 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:00.896480083 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:00.896480083 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:00.896480083 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:00.896653891 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.027100086 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.027192116 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.027240038 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.027251959 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.027283907 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.027359009 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.027390957 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.027396917 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.027429104 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.027442932 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.027631044 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.027693987 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.028332949 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.028366089 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.028424025 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.028424025 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.028570890 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.028644085 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.028824091 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.028884888 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.028973103 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.029030085 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.069616079 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.069796085 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.159173012 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.159285069 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.159287930 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.159399986 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.159404993 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.159455061 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.159605026 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.159773111 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.159833908 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.159912109 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.160044909 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.160099983 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.160309076 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.160366058 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.160455942 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.160523891 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.160706043 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.160758972 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.160954952 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.161014080 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.161272049 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.161304951 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.161341906 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.161355019 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.161355019 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.161413908 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.161465883 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.161523104 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.161616087 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.161669016 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.161686897 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.161736965 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.161796093 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.161839008 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.161906958 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.161962986 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.162017107 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.162079096 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.162204981 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.162262917 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.162277937 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.162308931 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.162333012 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.162364960 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.162420034 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.162477970 CEST497102220192.168.2.369.46.15.167
                                                    Sep 19, 2023 14:28:01.162529945 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.162640095 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.201411963 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.201466084 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.291055918 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.291114092 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.291147947 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.291256905 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.291517973 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.292227030 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.292548895 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.292582989 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.292615891 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.292674065 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.292705059 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.292737961 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.292768955 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.292798042 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.292830944 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.292864084 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.292895079 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.292931080 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.292962074 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.292994022 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.293024063 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.293173075 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.293287992 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.293370962 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.293466091 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.293560982 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.293656111 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.293759108 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.293859959 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.293967962 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.294101000 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.294200897 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.294298887 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.294414043 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.294518948 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.294636965 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.294737101 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.294853926 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.294981956 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.295089006 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.295187950 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.295295000 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.295464993 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.295568943 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.295641899 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.295720100 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.295844078 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.295958996 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.296057940 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.296178102 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.296257973 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.296402931 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.296508074 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.296626091 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.296715021 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.296845913 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.296951056 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.337519884 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.391109943 CEST22204971069.46.15.167192.168.2.3
                                                    Sep 19, 2023 14:28:01.391288996 CEST497102220192.168.2.369.46.15.167

                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:14:27:52
                                                    Start date:19/09/2023
                                                    Path:C:\Users\user\Desktop\file.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Users\user\Desktop\file.exe
                                                    Imagebase:0x400000
                                                    File size:253'440 bytes
                                                    MD5 hash:EEDA5350767DB40425DB9C5F477F39F7
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_PovertyStealer, Description: Yara detected Poverty Stealer, Source: 00000000.00000002.372576838.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_PovertyStealer, Description: Yara detected Poverty Stealer, Source: 00000000.00000003.350274075.00000000008C0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_PovertyStealer, Description: Yara detected Poverty Stealer, Source: 00000000.00000002.372668115.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.372668115.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                    • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.372688011.0000000000A00000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:3
                                                    Start time:14:28:00
                                                    Start date:19/09/2023
                                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6992 -s 74572
                                                    Imagebase:0x1080000
                                                    File size:434'592 bytes
                                                    MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:8.2%
                                                      Dynamic/Decrypted Code Coverage:81.3%
                                                      Signature Coverage:19.4%
                                                      Total number of Nodes:680
                                                      Total number of Limit Nodes:7
                                                      execution_graph 10479 8b674d 10482 8b6755 10479->10482 10480 8b67c9 10481 8b679c IsDBCSLeadByte 10481->10482 10482->10480 10482->10481 10483 8b4540 10485 8b4549 10483->10485 10484 8b4721 10485->10484 10486 8b4573 RtlEnterCriticalSection 10485->10486 10487 8b45b2 RtlLeaveCriticalSection 10486->10487 10488 8b46ea RtlEnterCriticalSection 10487->10488 10489 8b45ca 10487->10489 10491 8b4716 RtlLeaveCriticalSection 10488->10491 10498 8b3797 RtlEnterCriticalSection GetProcessHeap RtlAllocateHeap RtlLeaveCriticalSection 10489->10498 10491->10484 10492 8b45d6 10492->10488 10493 8b45fb RtlEnterCriticalSection 10492->10493 10494 8b4642 RtlLeaveCriticalSection 10493->10494 10494->10488 10496 8b465a 10494->10496 10495 8b37d7 2 API calls 10497 8b46e7 10495->10497 10496->10488 10496->10495 10497->10488 10498->10492 10233 8b4f87 CreateMutexA 10234 8b4fae GetLastError 10233->10234 10249 8b510f 10233->10249 10235 8b4fbf InitializeCriticalSectionAndSpinCount 10234->10235 10234->10249 10236 8b4fd7 10235->10236 10235->10249 10258 8b5327 10236->10258 10238 8b4fdc 10239 8b50db RtlDeleteCriticalSection 10238->10239 10279 8b4a77 10238->10279 10240 8b37d7 2 API calls 10239->10240 10242 8b50f2 10240->10242 10244 8b37d7 2 API calls 10242->10244 10243 8b4ff0 10243->10239 10282 8b55d7 10243->10282 10245 8b5101 10244->10245 10247 8b37d7 2 API calls 10245->10247 10247->10249 10252 8b5058 CreateThread CreateThread CreateThread WaitForMultipleObjects 10253 8b50bf 10252->10253 10311 402f50 40 API calls 10252->10311 10312 402a90 55 API calls 10252->10312 10313 405fd0 40 API calls 10252->10313 10292 8b4ca7 10253->10292 10256 8b37d7 2 API calls 10257 8b50d8 10256->10257 10257->10239 10296 8b5147 10258->10296 10260 8b5339 10261 8b5147 GetPEB 10260->10261 10278 8b5344 10260->10278 10262 8b537d 10261->10262 10263 8b5147 GetPEB 10262->10263 10262->10278 10264 8b53b5 10263->10264 10265 8b5147 GetPEB 10264->10265 10264->10278 10266 8b5401 10265->10266 10267 8b5147 GetPEB 10266->10267 10266->10278 10268 8b5441 10267->10268 10269 8b5147 GetPEB 10268->10269 10268->10278 10270 8b547d 10269->10270 10271 8b5147 GetPEB 10270->10271 10270->10278 10272 8b54bd 10271->10272 10272->10278 10300 8b3797 RtlEnterCriticalSection GetProcessHeap RtlAllocateHeap RtlLeaveCriticalSection 10272->10300 10274 8b54d9 10301 8b3797 RtlEnterCriticalSection GetProcessHeap RtlAllocateHeap RtlLeaveCriticalSection 10274->10301 10276 8b54eb 10302 8b3797 RtlEnterCriticalSection GetProcessHeap RtlAllocateHeap RtlLeaveCriticalSection 10276->10302 10278->10238 10304 8b4737 10279->10304 10281 8b4a80 10281->10243 10283 8b55ea VirtualAlloc 10282->10283 10286 8b5015 10282->10286 10284 8b560d 10283->10284 10283->10286 10285 8b562a GetCurrentProcess 10284->10285 10285->10286 10286->10239 10287 8bbf17 10286->10287 10288 8b4337 15 API calls 10287->10288 10289 8bbf32 10288->10289 10310 8b3797 RtlEnterCriticalSection GetProcessHeap RtlAllocateHeap RtlLeaveCriticalSection 10289->10310 10291 8b502e 10291->10239 10291->10252 10295 8b4ccc 10292->10295 10293 8b4f3d 10293->10256 10294 8b4f3f Sleep 10294->10295 10295->10293 10295->10294 10297 8b515e 10296->10297 10299 8b5186 10297->10299 10303 8b5127 GetPEB 10297->10303 10299->10260 10300->10274 10301->10276 10302->10278 10303->10299 10306 8b4752 __aulldiv 10304->10306 10305 8b498b GetModuleFileNameW GetDC GetCurrentObject GetObjectW 10307 8b49cb DeleteObject 10305->10307 10308 8b49e6 ReleaseDC 10305->10308 10306->10305 10307->10308 10309 8b4a09 10308->10309 10309->10281 10310->10291 10337 8b6d84 10340 8b6d93 10337->10340 10338 8b6da4 IsDBCSLeadByte 10338->10340 10339 8b6dc5 MultiByteToWideChar 10339->10340 10340->10338 10340->10339 10341 8b6b13 10340->10341 10342 a05db1 10343 a05dc1 10342->10343 10344 a06561 3 API calls 10343->10344 10345 a05dd9 10344->10345 10499 41cb90 10500 41cbb0 10499->10500 10503 41c6a0 10500->10503 10505 41c6b0 GlobalAlloc 10503->10505 10507 41c830 10505->10507 10506 41ca17 VirtualProtect 10508 41ca3d 10506->10508 10507->10506 10509 41ca7d LoadLibraryA 10508->10509 10510 41cabe 10509->10510 10083 41c799 10084 41c7a0 GlobalAlloc 10083->10084 10088 41c830 10084->10088 10086 41ca17 VirtualProtect 10087 41ca3d 10086->10087 10089 41ca7d LoadLibraryA 10087->10089 10088->10086 10090 41cabe 10089->10090 10096 4042d9 10098 4042e2 10096->10098 10097 4044ba 10098->10097 10099 40430c EnterCriticalSection 10098->10099 10100 40434b LeaveCriticalSection 10099->10100 10101 404483 EnterCriticalSection 10100->10101 10102 404363 10100->10102 10105 4044af LeaveCriticalSection 10101->10105 10111 403530 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 10102->10111 10104 40436f 10104->10101 10106 404394 EnterCriticalSection 10104->10106 10105->10097 10107 4043db LeaveCriticalSection 10106->10107 10107->10101 10109 4043f3 10107->10109 10108 403570 2 API calls 10110 404480 10108->10110 10109->10101 10109->10108 10110->10101 10111->10104 10426 8b6712 10427 8b6718 10426->10427 10428 8b6721 WideCharToMultiByte 10426->10428 10428->10427 10346 8b2d97 10347 8b2da6 10346->10347 10349 8b2dab 10346->10349 10352 8b2d47 10347->10352 10351 8b2dbb 10349->10351 10355 8b3797 RtlEnterCriticalSection GetProcessHeap RtlAllocateHeap RtlLeaveCriticalSection 10349->10355 10356 8b3797 RtlEnterCriticalSection GetProcessHeap RtlAllocateHeap RtlLeaveCriticalSection 10352->10356 10354 8b2d55 10354->10349 10355->10351 10356->10354 10370 8b17d7 10371 8b4067 GetFileAttributesW 10370->10371 10372 8b17f0 10371->10372 10373 8b195f 10372->10373 10379 8b3797 RtlEnterCriticalSection GetProcessHeap RtlAllocateHeap RtlLeaveCriticalSection 10372->10379 10375 8b1956 10376 8b37d7 2 API calls 10375->10376 10376->10373 10377 8b1805 10377->10373 10377->10375 10378 8b1924 DeleteFileW 10377->10378 10378->10375 10379->10377 10429 8b1717 10442 8b3ef7 10429->10442 10431 8b17a7 10433 8b37d7 2 API calls 10431->10433 10432 8b172c 10432->10431 10450 8bc467 10432->10450 10434 8b17cf 10433->10434 10438 8b1786 10438->10431 10439 8b1796 DeleteFileW 10438->10439 10439->10431 10440 8b17a9 10439->10440 10440->10431 10441 8b17bc DeleteFileW 10440->10441 10441->10431 10467 8b3797 RtlEnterCriticalSection GetProcessHeap RtlAllocateHeap RtlLeaveCriticalSection 10442->10467 10444 8b3fe3 10444->10432 10446 8b3fda 10447 8b37d7 2 API calls 10446->10447 10447->10444 10448 8b37d7 2 API calls 10449 8b3f07 10448->10449 10449->10444 10449->10446 10449->10448 10468 8b3db7 10449->10468 10451 8b4067 GetFileAttributesW 10450->10451 10452 8bc479 10451->10452 10458 8b176e 10452->10458 10472 8b3797 RtlEnterCriticalSection GetProcessHeap RtlAllocateHeap RtlLeaveCriticalSection 10452->10472 10454 8bc48e 10454->10458 10473 8b3797 RtlEnterCriticalSection GetProcessHeap RtlAllocateHeap RtlLeaveCriticalSection 10454->10473 10456 8bc652 10457 8b37d7 2 API calls 10456->10457 10457->10458 10458->10431 10464 8b1537 10458->10464 10459 8bc649 10460 8b37d7 2 API calls 10459->10460 10460->10456 10461 8bc4a8 10461->10456 10461->10459 10462 8bc407 21 API calls 10461->10462 10463 8bc467 21 API calls 10461->10463 10462->10461 10463->10461 10465 8b4067 GetFileAttributesW 10464->10465 10466 8b1550 10465->10466 10466->10438 10467->10449 10471 8b3797 RtlEnterCriticalSection GetProcessHeap RtlAllocateHeap RtlLeaveCriticalSection 10468->10471 10470 8b3dca 10470->10449 10471->10470 10472->10454 10473->10461 9669 404d20 CreateMutexA 9670 404d47 GetLastError 9669->9670 9671 404ea8 9669->9671 9670->9671 9672 404d58 InitializeCriticalSectionAndSpinCount 9670->9672 9672->9671 9673 404d70 9672->9673 9694 4050c0 9673->9694 9675 404d75 9676 404e74 DeleteCriticalSection 9675->9676 9715 404810 9675->9715 9677 403570 2 API calls 9676->9677 9679 404e8b 9677->9679 9681 403570 2 API calls 9679->9681 9680 404d89 9680->9676 9718 405370 9680->9718 9682 404e9a 9681->9682 9684 403570 2 API calls 9682->9684 9684->9671 9688 404df1 CreateThread CreateThread CreateThread WaitForMultipleObjects 9689 404e58 9688->9689 9846 402f50 9688->9846 9858 402a90 9688->9858 9863 405fd0 9688->9863 9728 404a40 WSAStartup 9689->9728 9744 404ee0 9694->9744 9696 4050d2 9697 404ee0 2 API calls 9696->9697 9714 4050dd 9696->9714 9698 405116 9697->9698 9699 404ee0 2 API calls 9698->9699 9698->9714 9700 40514e 9699->9700 9701 404ee0 2 API calls 9700->9701 9700->9714 9702 40519a 9701->9702 9703 404ee0 2 API calls 9702->9703 9702->9714 9704 4051da 9703->9704 9705 404ee0 2 API calls 9704->9705 9704->9714 9706 405216 9705->9706 9707 404ee0 2 API calls 9706->9707 9706->9714 9708 405256 9707->9708 9708->9714 9750 403530 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 9708->9750 9710 405272 9751 403530 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 9710->9751 9712 405284 9752 403530 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 9712->9752 9714->9675 9754 4044d0 9715->9754 9717 404819 9717->9680 9719 405383 VirtualAlloc 9718->9719 9722 404dae 9718->9722 9720 4053a6 9719->9720 9719->9722 9721 4053c3 GetCurrentProcess 9720->9721 9721->9722 9722->9676 9723 40bcb0 9722->9723 9766 4040d0 9723->9766 9727 404dc7 9727->9676 9727->9688 9729 404a6d 9728->9729 9738 404d0c 9728->9738 9730 404a80 socket 9729->9730 9731 404aad 9730->9731 9730->9738 9732 406d90 7 API calls 9731->9732 9733 404afd 9732->9733 9734 404ce8 closesocket 9733->9734 9735 404c6d connect 9733->9735 9734->9738 9736 404cd8 Sleep 9735->9736 9737 404c8b send 9735->9737 9736->9733 9737->9736 9739 404cb0 send 9737->9739 9741 403570 9738->9741 9739->9736 9740 404cd6 9739->9740 9740->9734 9742 403579 GetProcessHeap RtlFreeHeap 9741->9742 9743 40358c 9741->9743 9742->9743 9743->9676 9745 404ef7 9744->9745 9746 404f24 LoadLibraryA 9745->9746 9747 404f1a 9745->9747 9749 404f1f 9745->9749 9746->9749 9753 404ec0 GetPEB 9747->9753 9749->9696 9750->9710 9751->9712 9752->9714 9753->9749 9756 4044eb 9754->9756 9755 404650 GetCurrentHwProfileA 9757 404675 9755->9757 9758 40468b GetSystemInfo 9755->9758 9756->9755 9757->9758 9759 4046d0 9758->9759 9760 4046ed GetPhysicallyInstalledSystemMemory 9759->9760 9761 404724 GetModuleFileNameW GetDC GetCurrentObject GetObjectW 9760->9761 9762 404705 __aulldiv 9760->9762 9763 404764 DeleteObject 9761->9763 9764 40477f ReleaseDC 9761->9764 9762->9761 9763->9764 9765 4047a2 9764->9765 9765->9717 9795 403e00 GetFileAttributesW 9766->9795 9769 4044ba 9794 403530 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 9769->9794 9771 404115 9772 40413d EnterCriticalSection 9771->9772 9773 4041b3 LeaveCriticalSection 9772->9773 9774 4042db 9773->9774 9775 4041d0 9773->9775 9774->9769 9776 40430c EnterCriticalSection 9774->9776 9775->9774 9778 4042ab 9775->9778 9777 40434b LeaveCriticalSection 9776->9777 9779 404483 EnterCriticalSection 9777->9779 9780 404363 9777->9780 9801 403f10 9778->9801 9786 4044af LeaveCriticalSection 9779->9786 9800 403530 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 9780->9800 9784 40436f 9784->9779 9789 404394 EnterCriticalSection 9784->9789 9785 4042b4 9787 4040d0 24 API calls 9785->9787 9786->9769 9788 4042d1 9787->9788 9788->9769 9790 4043db LeaveCriticalSection 9789->9790 9790->9779 9792 4043f3 9790->9792 9791 403570 2 API calls 9793 404480 9791->9793 9792->9779 9792->9791 9793->9779 9794->9727 9796 403e13 9795->9796 9796->9769 9797 406d90 9796->9797 9818 4068a0 9797->9818 9800->9784 9835 403530 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 9801->9835 9803 403f2e 9809 403f7c 9803->9809 9836 403590 9803->9836 9805 4040b8 9807 403570 2 API calls 9805->9807 9806 403fbb OpenProcess 9806->9809 9810 403fdd GetCurrentProcess 9806->9810 9808 4040c6 9807->9808 9808->9774 9808->9785 9809->9805 9809->9806 9811 404018 9810->9811 9812 4040ae CloseHandle 9811->9812 9813 40402a GetFileType 9811->9813 9812->9805 9813->9812 9814 404039 9813->9814 9814->9812 9815 404049 CloseHandle GetCurrentProcess 9814->9815 9816 404087 9815->9816 9816->9812 9817 404091 CloseHandle CloseHandle 9816->9817 9817->9805 9823 4068ac 9818->9823 9819 406d1f 9819->9771 9820 406ac9 IsDBCSLeadByte 9822 406ad8 MultiByteToWideChar 9820->9822 9820->9823 9822->9823 9823->9819 9823->9820 9824 406b3d IsDBCSLeadByte 9823->9824 9825 406b5e MultiByteToWideChar 9823->9825 9826 406440 9823->9826 9824->9823 9825->9823 9827 406450 9826->9827 9828 4064ab 9827->9828 9830 4065c1 9827->9830 9833 4064e6 9827->9833 9834 406497 __aulldiv __aullrem 9827->9834 9829 4064ba WideCharToMultiByte 9828->9829 9828->9834 9829->9834 9831 40664c WideCharToMultiByte 9830->9831 9830->9834 9831->9830 9832 406535 IsDBCSLeadByte 9832->9833 9833->9832 9833->9834 9834->9823 9835->9803 9837 4035a8 9836->9837 9838 40359a 9836->9838 9840 4035be GetProcessHeap HeapReAlloc 9837->9840 9841 4035ae 9837->9841 9845 403530 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 9838->9845 9843 4035e3 9840->9843 9844 4035a3 9840->9844 9842 403570 2 API calls 9841->9842 9842->9844 9843->9840 9844->9803 9845->9844 9847 402f66 9846->9847 9848 4033b5 9846->9848 9849 402f76 FindFirstFileW 9847->9849 9850 402fa5 9849->9850 9850->9848 9870 403530 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 9850->9870 9852 403389 FindNextFileW 9854 4033ac 9852->9854 9857 402fc9 9852->9857 9853 406d90 7 API calls 9853->9857 9855 403570 2 API calls 9854->9855 9855->9848 9857->9852 9857->9853 9871 40c1a0 9857->9871 9920 401710 9858->9920 9861 402acf 9862 401710 55 API calls 9862->9861 10030 403530 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 9863->10030 9865 405fe0 9866 406066 9865->9866 10031 405d70 9865->10031 9868 403570 2 API calls 9866->9868 9869 40606f 9868->9869 9870->9857 9872 4040d0 32 API calls 9871->9872 9875 40c1ba 9872->9875 9873 40c1e7 9874 403570 2 API calls 9873->9874 9876 40c1f3 9874->9876 9875->9873 9878 40bf60 EnterCriticalSection 9875->9878 9876->9857 9879 40bf77 9878->9879 9880 40bf8c LeaveCriticalSection 9878->9880 9879->9880 9882 40bf9c 9879->9882 9881 40c06b 9880->9881 9881->9873 9897 40bee0 WideCharToMultiByte 9882->9897 9885 40bfc7 LeaveCriticalSection 9885->9881 9886 40bfd7 9903 403530 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 9886->9903 9888 40c00a 9904 40afb0 9888->9904 9890 40c017 9892 40c045 9890->9892 9908 40b370 9890->9908 9892->9881 9893 403570 2 API calls 9892->9893 9894 40c0f9 9893->9894 9895 403570 2 API calls 9894->9895 9896 40c178 LeaveCriticalSection 9895->9896 9896->9881 9898 40bf55 9897->9898 9899 40bf18 9897->9899 9898->9885 9898->9886 9911 403530 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 9899->9911 9901 40bf26 9901->9898 9902 40bf32 WideCharToMultiByte 9901->9902 9902->9898 9903->9888 9905 40afc9 9904->9905 9906 40afc3 9904->9906 9905->9890 9906->9905 9912 40c430 9906->9912 9916 40c400 9908->9916 9911->9901 9915 403530 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 9912->9915 9914 40c446 9914->9905 9915->9914 9917 40c409 9916->9917 9919 40b37c 9916->9919 9918 403570 2 API calls 9917->9918 9918->9919 9919->9892 9921 403e00 GetFileAttributesW 9920->9921 9922 401722 9921->9922 9923 402a87 9922->9923 9951 403530 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 9922->9951 9923->9861 9923->9862 9925 401737 9926 40175b FindFirstFileW 9925->9926 9927 401785 9926->9927 9927->9923 9952 403530 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 9927->9952 9929 402a64 FindNextFileW 9929->9923 9931 4017a6 9929->9931 9930 4040d0 32 API calls 9930->9931 9931->9929 9931->9930 9932 403570 GetProcessHeap RtlFreeHeap 9931->9932 9934 40c200 38 API calls 9931->9934 9935 406d90 7 API calls 9931->9935 9938 40c1a0 38 API calls 9931->9938 9939 403c90 13 API calls 9931->9939 9941 401710 51 API calls 9931->9941 9946 40bf60 12 API calls 9931->9946 9948 40191c 9931->9948 9953 403a50 9931->9953 9957 402b30 9931->9957 9963 4033c0 CryptUnprotectData 9931->9963 9967 402d90 9931->9967 9982 4012d0 9931->9982 10004 405ae0 9931->10004 9932->9931 9934->9931 9935->9931 9936 4014b0 48 API calls 9936->9948 9938->9931 9939->9931 9941->9931 9946->9931 9947 4022ca DeleteFileW 9947->9948 9948->9931 9948->9936 9948->9947 9950 4022f0 DeleteFileW 9948->9950 9970 401570 9948->9970 9987 401100 9948->9987 9950->9931 9951->9925 9952->9931 9954 403a66 9953->9954 9956 403a6d 9954->9956 10019 403530 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 9954->10019 9956->9931 9958 402b3f 9957->9958 9960 402b44 9957->9960 10020 402ae0 9958->10020 9962 402b54 9960->9962 10023 403530 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 9960->10023 9962->9931 9964 403405 9963->9964 9965 4033fa 9963->9965 9964->9965 9966 40340f CryptProtectData 9964->9966 9965->9931 9966->9965 10025 403530 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 9967->10025 9969 402db8 9969->9931 9971 403e00 GetFileAttributesW 9970->9971 9972 401589 9971->9972 9973 4016f8 9972->9973 10026 403530 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 9972->10026 9973->9948 9975 40159e 9975->9973 9976 406d90 7 API calls 9975->9976 9980 4015c0 9976->9980 9977 4016ef 9978 403570 2 API calls 9977->9978 9978->9973 9979 406d90 7 API calls 9979->9980 9980->9977 9980->9979 9981 4016bd DeleteFileW 9980->9981 9981->9977 9983 403e00 GetFileAttributesW 9982->9983 9986 4012e9 9983->9986 9984 401463 9984->9931 9985 406d90 7 API calls 9985->9986 9986->9984 9986->9985 10027 403530 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 9987->10027 9989 40111e 9990 403590 8 API calls 9989->9990 9994 40116c 9989->9994 9990->9989 9991 4012ac 9993 403570 2 API calls 9991->9993 9992 4011ab OpenProcess 9992->9994 9995 4011cd GetCurrentProcess 9992->9995 9996 4012ba 9993->9996 9994->9991 9994->9992 9997 401208 9995->9997 9996->9948 9998 4012a2 CloseHandle 9997->9998 9999 40121a GetFileType 9997->9999 9998->9991 9999->9998 10000 401229 9999->10000 10000->9998 10001 40123d CloseHandle GetCurrentProcess 10000->10001 10002 40127b 10001->10002 10002->9998 10003 401285 CloseHandle CloseHandle 10002->10003 10003->9991 10005 403e00 GetFileAttributesW 10004->10005 10006 405af6 10005->10006 10007 405d64 10006->10007 10028 403530 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 10006->10028 10007->9931 10009 405b0b 10015 405d58 10009->10015 10029 403530 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 10009->10029 10011 403570 2 API calls 10011->10007 10012 406d90 7 API calls 10016 405b7a 10012->10016 10013 405d4f 10014 403570 2 API calls 10013->10014 10014->10015 10015->10011 10016->10012 10016->10013 10017 405ae0 38 API calls 10016->10017 10018 40c1a0 38 API calls 10016->10018 10017->10016 10018->10016 10019->9956 10024 403530 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 10020->10024 10022 402aee 10022->9960 10023->9962 10024->10022 10025->9969 10026->9975 10027->9989 10028->10009 10029->10016 10030->9865 10032 403e00 GetFileAttributesW 10031->10032 10033 405d82 10032->10033 10039 405fbc 10033->10039 10046 403530 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 10033->10046 10035 405d97 10036 405dbb FindFirstFileW 10035->10036 10043 405de5 10036->10043 10037 405f6f 10038 403570 2 API calls 10037->10038 10038->10039 10039->9865 10040 405f90 FindNextFileW 10040->10037 10040->10043 10041 406d90 7 API calls 10041->10043 10042 405f04 10044 405ae0 38 API calls 10042->10044 10043->10037 10043->10040 10043->10041 10043->10042 10045 405d70 38 API calls 10043->10045 10044->10037 10045->10043 10046->10035 10474 8b092b GetPEB 10475 8b0972 10474->10475 10047 a05dc1 10048 a05dd0 10047->10048 10051 a06561 10048->10051 10052 a0657c 10051->10052 10053 a06585 CreateToolhelp32Snapshot 10052->10053 10054 a065a1 Module32First 10052->10054 10053->10052 10053->10054 10055 a065b0 10054->10055 10056 a05dd9 10054->10056 10058 a06220 10055->10058 10059 a0624b 10058->10059 10060 a0625c VirtualAlloc 10059->10060 10061 a06294 10059->10061 10060->10061 10380 402122 10401 4017ba 10380->10401 10381 401710 55 API calls 10381->10401 10382 402a64 FindNextFileW 10383 402a87 10382->10383 10382->10401 10384 40c200 38 API calls 10384->10401 10385 4012d0 8 API calls 10385->10401 10386 4022ca DeleteFileW 10386->10401 10387 401100 16 API calls 10387->10401 10388 4040d0 32 API calls 10388->10401 10389 4022f0 DeleteFileW 10389->10401 10390 405ae0 38 API calls 10390->10401 10391 401570 15 API calls 10391->10401 10392 40c1a0 38 API calls 10392->10401 10393 403c90 13 API calls 10393->10401 10394 4014b0 48 API calls 10394->10401 10395 403a50 4 API calls 10395->10401 10396 406d90 7 API calls 10396->10401 10397 402b30 4 API calls 10397->10401 10398 4033c0 2 API calls 10398->10401 10399 403570 GetProcessHeap RtlFreeHeap 10399->10401 10400 402d90 4 API calls 10400->10401 10401->10381 10401->10382 10401->10384 10401->10385 10401->10386 10401->10387 10401->10388 10401->10389 10401->10390 10401->10391 10401->10392 10401->10393 10401->10394 10401->10395 10401->10396 10401->10397 10401->10398 10401->10399 10401->10400 10402 40bf60 12 API calls 10401->10402 10402->10401 10112 8b6828 10113 8b6830 10112->10113 10114 8b68b3 WideCharToMultiByte 10113->10114 10115 8b683f 10113->10115 10114->10113 10357 8b4da1 10359 8b4d70 10357->10359 10358 8b4f3f Sleep 10358->10359 10359->10358 10360 8b4f3d 10359->10360 10116 8b3627 10117 8b365d 10116->10117 10118 8b3661 10117->10118 10119 8b3676 CryptProtectData 10117->10119 10119->10118 10062 8b003c 10063 8b0049 10062->10063 10077 8b0e0f SetErrorMode SetErrorMode 10063->10077 10068 8b0265 10069 8b02ce VirtualProtect 10068->10069 10072 8b030b 10069->10072 10070 8b0439 VirtualFree 10075 8b04be 10070->10075 10076 8b05f4 LoadLibraryA 10070->10076 10071 8b04e3 LoadLibraryA 10071->10075 10072->10070 10074 8b08c7 10075->10071 10075->10076 10076->10074 10078 8b0223 10077->10078 10079 8b0d90 10078->10079 10080 8b0dad 10079->10080 10081 8b0dbb GetPEB 10080->10081 10082 8b0238 VirtualAlloc 10080->10082 10081->10082 10082->10068 10403 404b3a 10404 404b09 10403->10404 10405 404ce8 closesocket 10404->10405 10406 404c6d connect 10404->10406 10409 404d0c 10405->10409 10407 404cd8 Sleep 10406->10407 10408 404c8b send 10406->10408 10407->10404 10408->10407 10410 404cb0 send 10408->10410 10410->10407 10411 404cd6 10410->10411 10411->10405 10476 8b6d30 IsDBCSLeadByte 10477 8b6d3f MultiByteToWideChar 10476->10477 10478 8b6b13 10476->10478 10477->10478 10091 8b3cb7 10092 8b3ccd 10091->10092 10094 8b3cd4 10092->10094 10095 8b3797 RtlEnterCriticalSection GetProcessHeap RtlAllocateHeap RtlLeaveCriticalSection 10092->10095 10095->10094 10120 8b6237 10127 8b3797 RtlEnterCriticalSection GetProcessHeap RtlAllocateHeap RtlLeaveCriticalSection 10120->10127 10122 8b62cd 10139 8b37d7 10122->10139 10125 8b6247 10125->10122 10128 8b5fd7 10125->10128 10127->10125 10142 8b4067 GetFileAttributesW 10128->10142 10132 8b5ffe 10135 8b616b 10132->10135 10137 8b5fd7 21 API calls 10132->10137 10138 8b61d6 10132->10138 10133 8b37d7 2 API calls 10134 8b6223 10133->10134 10134->10125 10145 8b5d47 10135->10145 10137->10132 10138->10133 10140 8b37f3 10139->10140 10141 8b37e0 GetProcessHeap HeapFree 10139->10141 10141->10140 10143 8b407a 10142->10143 10143->10134 10144 8b3797 RtlEnterCriticalSection GetProcessHeap RtlAllocateHeap RtlLeaveCriticalSection 10143->10144 10144->10132 10146 8b4067 GetFileAttributesW 10145->10146 10147 8b5d5d 10146->10147 10148 8b5fcb 10147->10148 10159 8b3797 RtlEnterCriticalSection GetProcessHeap RtlAllocateHeap RtlLeaveCriticalSection 10147->10159 10148->10138 10150 8b5d72 10155 8b5fbf 10150->10155 10160 8b3797 RtlEnterCriticalSection GetProcessHeap RtlAllocateHeap RtlLeaveCriticalSection 10150->10160 10151 8b37d7 2 API calls 10151->10148 10153 8b5fb6 10154 8b37d7 2 API calls 10153->10154 10154->10155 10155->10151 10156 8b5de1 10156->10153 10157 8b5d47 21 API calls 10156->10157 10161 8bc407 10156->10161 10157->10156 10159->10150 10160->10156 10168 8b4337 10161->10168 10163 8b37d7 2 API calls 10165 8bc45a 10163->10165 10165->10156 10167 8bc44e 10167->10163 10169 8b4067 GetFileAttributesW 10168->10169 10170 8b4350 10169->10170 10171 8b43a4 RtlEnterCriticalSection 10170->10171 10184 8b4538 10170->10184 10172 8b441a RtlLeaveCriticalSection 10171->10172 10174 8b4437 10172->10174 10175 8b4542 10172->10175 10173 8b4573 RtlEnterCriticalSection 10176 8b45b2 RtlLeaveCriticalSection 10173->10176 10174->10175 10180 8b451b 10174->10180 10175->10173 10175->10184 10177 8b46ea RtlEnterCriticalSection 10176->10177 10178 8b45ca 10176->10178 10181 8b4716 RtlLeaveCriticalSection 10177->10181 10209 8b3797 RtlEnterCriticalSection GetProcessHeap RtlAllocateHeap RtlLeaveCriticalSection 10178->10209 10183 8b4337 7 API calls 10180->10183 10181->10184 10182 8b45d6 10182->10177 10185 8b45fb RtlEnterCriticalSection 10182->10185 10183->10184 10184->10167 10190 8bc1c7 RtlEnterCriticalSection 10184->10190 10186 8b4642 RtlLeaveCriticalSection 10185->10186 10186->10177 10188 8b465a 10186->10188 10187 8b37d7 2 API calls 10189 8b46e7 10187->10189 10188->10177 10188->10187 10189->10177 10191 8bc1de 10190->10191 10192 8bc1f3 RtlLeaveCriticalSection 10190->10192 10191->10192 10194 8bc203 10191->10194 10193 8bc2d2 10192->10193 10193->10167 10210 8bc147 WideCharToMultiByte 10194->10210 10197 8bc22e RtlLeaveCriticalSection 10197->10193 10198 8bc23e 10216 8b3797 RtlEnterCriticalSection GetProcessHeap RtlAllocateHeap RtlLeaveCriticalSection 10198->10216 10200 8bc271 10217 8bb217 10200->10217 10202 8bc27e 10204 8bc2ac 10202->10204 10221 8bb5d7 10202->10221 10204->10193 10205 8b37d7 2 API calls 10204->10205 10206 8bc360 10205->10206 10207 8b37d7 2 API calls 10206->10207 10208 8bc3df RtlLeaveCriticalSection 10207->10208 10208->10193 10209->10182 10211 8bc17f 10210->10211 10212 8bc1bc 10210->10212 10224 8b3797 RtlEnterCriticalSection GetProcessHeap RtlAllocateHeap RtlLeaveCriticalSection 10211->10224 10212->10197 10212->10198 10214 8bc18d 10214->10212 10215 8bc199 WideCharToMultiByte 10214->10215 10215->10212 10216->10200 10218 8bb22a 10217->10218 10220 8bb230 10217->10220 10218->10220 10225 8bc697 10218->10225 10220->10202 10229 8bc667 10221->10229 10224->10214 10228 8b3797 RtlEnterCriticalSection GetProcessHeap RtlAllocateHeap RtlLeaveCriticalSection 10225->10228 10227 8bc6ad 10227->10220 10228->10227 10230 8bc670 10229->10230 10231 8bb5e3 10229->10231 10232 8b37d7 2 API calls 10230->10232 10231->10204 10232->10231 10361 8b31b7 10362 8b361c 10361->10362 10363 8b31cd 10361->10363 10363->10362 10369 8b3797 RtlEnterCriticalSection GetProcessHeap RtlAllocateHeap RtlLeaveCriticalSection 10363->10369 10365 8b3613 10366 8b37d7 2 API calls 10365->10366 10366->10362 10367 8b3230 10367->10365 10368 8bc407 21 API calls 10367->10368 10368->10367 10369->10367 10412 8b37f7 10413 8b380f 10412->10413 10414 8b3801 10412->10414 10415 8b3825 GetProcessHeap RtlReAllocateHeap 10413->10415 10416 8b3815 10413->10416 10421 8b3797 RtlEnterCriticalSection GetProcessHeap RtlAllocateHeap RtlLeaveCriticalSection 10414->10421 10419 8b384a 10415->10419 10420 8b380a 10415->10420 10418 8b37d7 2 API calls 10416->10418 10418->10420 10419->10415 10421->10420 10422 8b2ff7 10425 8b3797 RtlEnterCriticalSection GetProcessHeap RtlAllocateHeap RtlLeaveCriticalSection 10422->10425 10424 8b301f 10425->10424

                                                      Control-flow Graph

                                                      APIs
                                                      • GetCurrentHwProfileA.ADVAPI32(?), ref: 0040466F
                                                      • GetSystemInfo.KERNELBASE(?), ref: 0040469F
                                                      • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 004046FF
                                                      • __aulldiv.LIBCMT ref: 00404714
                                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000208), ref: 00404730
                                                      • GetDC.USER32(00000000), ref: 00404738
                                                      • GetCurrentObject.GDI32(?,00000007), ref: 00404747
                                                      • GetObjectW.GDI32(?,00000018,?), ref: 0040475A
                                                      • DeleteObject.GDI32(?), ref: 00404779
                                                      • ReleaseDC.USER32 ref: 00404785
                                                      Strings
                                                      • {e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}, xrefs: 0040467E
                                                      • Microsoft Basic Display Adapter, xrefs: 004046E0
                                                      • Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz, xrefs: 004045FB, 00404646
                                                      • C:\Users\user\Desktop\file.exe, xrefs: 00404729
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372576838.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.372576838.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Object$CurrentSystem$DeleteFileInfoInstalledMemoryModuleNamePhysicallyProfileRelease__aulldiv
                                                      • String ID: C:\Users\user\Desktop\file.exe$Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz$Microsoft Basic Display Adapter${e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}
                                                      • API String ID: 2273077324-3386605023
                                                      • Opcode ID: 0407204a2e67d83a7e96f79ef5b5304d4161a3dc4db49db4a002a0ba96b8ec8a
                                                      • Instruction ID: f95703c44cdd768557f20c2002d8bf7661732abb907082ca4a8db72876e69e67
                                                      • Opcode Fuzzy Hash: 0407204a2e67d83a7e96f79ef5b5304d4161a3dc4db49db4a002a0ba96b8ec8a
                                                      • Instruction Fuzzy Hash: 86A1BEB0E00209EBDB04DFA5D841BADBBB4EF98304F10887EE605B72D0E7795951CB59
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 220 401710-401727 call 403e00 223 402a87-402a8a 220->223 224 40172d-401796 call 403530 call 4039b0 call 4037f0 FindFirstFileW call 4037b0 220->224 224->223 233 40179c-4017b3 call 403530 224->233 236 4017ba-4017e6 call 4037b0 * 2 233->236 241 4017e8 236->241 242 4017ed-401845 call 406d90 call 403960 call 4037b0 call 403450 236->242 243 402a64-402a81 FindNextFileW 241->243 252 402389-402394 242->252 253 40184b-401861 call 403850 242->253 243->223 243->236 255 402a57-402a60 252->255 256 40239a-4023a1 252->256 253->252 260 401867-40187d call 403850 253->260 255->243 258 402566-40256d 256->258 259 4023a7-4023c5 call 4040d0 256->259 261 402573-4025e7 call 4037f0 call 405ae0 258->261 262 4025fa-402601 258->262 274 402555-402561 call 403570 259->274 275 4023cb-4023cf 259->275 260->252 279 401883-40188a 260->279 298 4025f5 261->298 299 4025e9-4025f0 261->299 264 402607-4026d3 call 406d90 call 40c1a0 262->264 265 4026d8-4026df 262->265 264->255 271 4026e5-402703 call 4040d0 265->271 272 402938-402942 265->272 296 402927-402933 call 403570 271->296 297 402709-40270d 271->297 272->255 277 402948-40295e 272->277 274->255 275->274 282 4023d5-4023e7 275->282 277->255 291 402964-402972 277->291 286 401890-401916 call 40c200 279->286 287 401a63-401a6a 279->287 282->274 290 4023ed-4023ff 282->290 314 40191c-401a5b call 4014b0 * 2 286->314 315 401a5e 286->315 292 401a70-401b05 call 40c200 287->292 293 401b1d-401b24 287->293 290->274 300 402405-402417 290->300 301 402a52 291->301 302 402978-402a48 call 406d90 call 40c1a0 291->302 323 401b07-401b15 call 401570 292->323 324 401b18 292->324 305 401bba-401bc1 293->305 306 401b2a-401bb5 call 40c200 293->306 296->255 297->296 308 402713-402731 call 4039f0 297->308 298->255 299->298 300->274 309 40241d-40242f 300->309 301->255 344 402a4d-402a50 302->344 317 401bd0-401c78 call 4014b0 305->317 318 401bc3-401bca 305->318 320 402342-402346 306->320 308->296 339 402737-40275c call 4039f0 308->339 309->274 319 402435-402552 call 406d90 call 40c1a0 309->319 314->315 315->320 317->320 318->317 328 401c7d-401c84 318->328 319->274 335 402357-40235b 320->335 336 402348-402351 320->336 323->324 324->320 332 401c8a-401cb0 call 403c90 328->332 333 401dae-401db5 328->333 359 401cb6-401cc8 call 403850 332->359 360 401d9d-401da9 call 403570 332->360 340 401dbb-401e59 call 4014b0 333->340 341 401e5e-401e65 333->341 346 40236c-402384 335->346 347 40235d-402366 335->347 336->335 339->296 357 402762-402780 call 403a50 339->357 340->320 353 401e6b-401f09 call 4014b0 341->353 354 401f0e-401f15 341->354 344->255 346->255 347->346 353->320 362 401f1b-401f41 call 403c90 354->362 363 40203c-402043 354->363 357->296 377 402786-402799 call 4038c0 357->377 359->360 380 401cce-401d97 call 406d90 call 40c1a0 359->380 360->320 382 401f47-401f59 call 403850 362->382 383 40202b-402037 call 403570 362->383 367 402049-402109 call 4014b0 363->367 368 40210e-402132 363->368 367->320 378 402314-402318 368->378 379 402138-402147 368->379 400 40291b-402924 call 403570 377->400 401 40279f-4027ba call 402b30 377->401 378->320 390 40231a-402321 378->390 385 402150-40215e 379->385 386 402149 379->386 380->360 382->383 404 401f5f-402026 call 406d90 call 40c1a0 382->404 383->320 395 402164-40218a call 403c90 385->395 396 40230f 385->396 386->385 391 402323 390->391 392 40232d-40233a call 401710 390->392 391->392 406 40233f 392->406 414 402190-4021a2 call 403850 395->414 415 4022fa-40230d call 403570 395->415 396->378 400->296 401->400 417 4027c0-4027c4 401->417 404->383 406->320 414->415 425 4021a8-40225d 414->425 415->378 417->400 421 4027ca-4027ea call 4033c0 417->421 430 4027f0-4027f4 421->430 431 40290f-402918 call 403570 421->431 427 402267-40226a 425->427 428 40225f-402265 425->428 429 40226d-4022af call 40c200 call 4037b0 427->429 428->429 429->415 444 4022b1-4022bf call 4012d0 429->444 430->431 434 4027fa-402815 call 402d90 430->434 431->400 440 402903-40290c call 403570 434->440 441 40281b-4028ef call 406d90 call 40bf60 434->441 440->431 451 4028f4-402900 call 403570 441->451 444->415 452 4022c1-4022d9 call 403960 DeleteFileW 444->452 451->440 457 4022db 452->457 458 4022dd-4022ee call 401100 452->458 457->415 458->415 461 4022f0-4022f4 DeleteFileW 458->461 461->415
                                                      APIs
                                                        • Part of subcall function 00403E00: GetFileAttributesW.KERNELBASE(@@,?,?,004040E9,?), ref: 00403E08
                                                        • Part of subcall function 00403530: EnterCriticalSection.KERNEL32(0040E180,?,?,00405272,00000208), ref: 00403539
                                                        • Part of subcall function 00403530: GetProcessHeap.KERNEL32(00000008,00405272,?,?,00405272,00000208), ref: 00403545
                                                        • Part of subcall function 00403530: RtlAllocateHeap.NTDLL(00000000,?,?,00405272,00000208), ref: 0040354C
                                                        • Part of subcall function 00403530: LeaveCriticalSection.KERNEL32(0040E180,?,?,00405272,00000208), ref: 0040355A
                                                      • FindFirstFileW.KERNELBASE(?,?), ref: 00401777
                                                      • FindNextFileW.KERNELBASE(000000FF,?), ref: 00402A7D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372576838.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.372576838.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$CriticalFindHeapSection$AllocateAttributesEnterFirstLeaveNextProcess
                                                      • String ID: %ws\%ws$',r$x0I
                                                      • API String ID: 674214967-835861565
                                                      • Opcode ID: f4dce2c9328b5233167f3361de0ce32c4e30747dd64a3b8f7fc060b2459a89c9
                                                      • Instruction ID: 391ef23385abac8a4148d01b1526362d678f2bb4c14d673990be2d9f219d9000
                                                      • Opcode Fuzzy Hash: f4dce2c9328b5233167f3361de0ce32c4e30747dd64a3b8f7fc060b2459a89c9
                                                      • Instruction Fuzzy Hash: F5B26E71E14218DAEB14DFA4DC41BEEB375EF58304F1084A9E10CBB391E67A9E80CB59
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 705 402f50-402f60 706 402f66-402fb9 call 4037f0 FindFirstFileW call 4037b0 705->706 707 4033b8-4033bb 705->707 706->707 712 402fbf-402fcc call 403530 706->712 715 402fcf-402ffd call 4037b0 * 2 712->715 720 403004-40302e call 406d90 715->720 721 402fff 715->721 727 403030-403046 call 403850 720->727 728 403065-403071 720->728 722 403389-4033a6 FindNextFileW 721->722 722->715 724 4033ac-4033b5 call 403570 722->724 724->707 727->728 735 403048-40305e call 403850 727->735 730 403077-40321e call 403ac0 728->730 731 403379-403385 728->731 738 403224-403239 call 403ac0 730->738 739 4032eb-403302 730->739 731->722 735->728 745 403060 735->745 738->739 750 40323f-403257 call 403ac0 738->750 740 403353-403362 call 40c1a0 739->740 741 403304-403350 call 406d90 739->741 749 403367-403373 740->749 741->740 745->731 749->731 750->739 753 40325d-403272 call 403ac0 750->753 753->739 756 403274-403289 call 403ac0 753->756 756->739 759 40328b-4032a0 call 403ac0 756->759 759->739 762 4032a2-4032b7 call 403ac0 759->762 762->739 765 4032b9-4032ce call 403ac0 762->765 765->739 768 4032d0-4032e5 call 403ac0 765->768 768->731 768->739
                                                      APIs
                                                      • FindFirstFileW.KERNELBASE(00A14B90,?), ref: 00402F95
                                                        • Part of subcall function 00403530: EnterCriticalSection.KERNEL32(0040E180,?,?,00405272,00000208), ref: 00403539
                                                        • Part of subcall function 00403530: GetProcessHeap.KERNEL32(00000008,00405272,?,?,00405272,00000208), ref: 00403545
                                                        • Part of subcall function 00403530: RtlAllocateHeap.NTDLL(00000000,?,?,00405272,00000208), ref: 0040354C
                                                        • Part of subcall function 00403530: LeaveCriticalSection.KERNEL32(0040E180,?,?,00405272,00000208), ref: 0040355A
                                                      • FindNextFileW.KERNELBASE(000000FF,?), ref: 004033A2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372576838.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.372576838.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalFileFindHeapSection$AllocateEnterFirstLeaveNextProcess
                                                      • String ID: %ws%ws$%ws\%ws
                                                      • API String ID: 3555643018-2023498393
                                                      • Opcode ID: cb8740596861bbb1564a735129fa3bd479aa1a827e59d9f44eae97eef24e1154
                                                      • Instruction ID: f7da82c17ef2bf09f0cc3b7df4c00458ec30bb3023b3a8a00e10236260fc77ac
                                                      • Opcode Fuzzy Hash: cb8740596861bbb1564a735129fa3bd479aa1a827e59d9f44eae97eef24e1154
                                                      • Instruction Fuzzy Hash: 56C1B061E1020896EB14DBA5E841BEE7379EF58304F00857EE508FB3A1FB3A9A54C759
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 858 405370-40537d 859 405383-4053a0 VirtualAlloc 858->859 860 405aaf-405ac0 858->860 859->860 861 4053a6-4053f5 call 4035f0 GetCurrentProcess 859->861 862 405ac2-405ac9 860->862 863 405acb 860->863 868 4055d8-4055dc 861->868 869 4053fb-4053ff 861->869 864 405ad2-405ad8 862->864 863->864 870 405638-40563c 868->870 871 4055de-4055e2 868->871 872 405401-405450 869->872 873 405455-405459 869->873 878 405698-40569c 870->878 879 40563e-405642 870->879 871->870 874 4055e4-405633 871->874 875 4055d3 872->875 876 4054bb-4054bf 873->876 877 40545b-40545f 873->877 874->860 875->860 883 4054c1-4054c5 876->883 884 40551b-40551f 876->884 880 405461-405465 877->880 881 405467-4054b6 877->881 885 4056f8-4056fc 878->885 886 40569e-4056a2 878->886 879->878 882 405644-405693 879->882 880->876 880->881 881->875 882->860 883->884 887 4054c7-405516 883->887 889 405521-405525 884->889 890 405578-40557c 884->890 891 405758-40575c 885->891 892 4056fe-405702 885->892 886->885 888 4056a4-4056f3 886->888 887->875 888->860 889->890 893 405527-405576 889->893 895 405584-4055cc 890->895 896 40557e-405582 890->896 897 4057b8-4057bc 891->897 898 40575e-405762 891->898 892->891 894 405704-405753 892->894 893->875 894->860 895->875 896->875 896->895 900 405818-40581c 897->900 901 4057be-4057c2 897->901 898->897 899 405764-4057b3 898->899 899->860 903 40587b-40587f 900->903 904 40581e-405825 900->904 901->900 902 4057c4-405813 901->902 902->860 906 405881-405888 903->906 907 4058de-4058e2 903->907 904->903 905 405827-405876 904->905 905->860 906->907 908 40588a-4058d9 906->908 909 405941-405945 907->909 910 4058e4-4058eb 907->910 908->860 912 4059a4-4059a8 909->912 913 405947-40594e 909->913 910->909 911 4058ed-40593c 910->911 911->860 914 4059b4-405a0a 912->914 915 4059aa-4059ae 912->915 913->912 916 405950-40599f 913->916 917 405a24-405a2b 914->917 918 405a0c-405a1f 914->918 915->860 915->914 916->860 919 405a42-405a49 917->919 920 405a2d-405a40 917->920 918->860 921 405a60-405a67 919->921 922 405a4b-405a5e 919->922 920->860 923 405a69-405a7c 921->923 924 405a7e-405a85 921->924 922->860 923->860 925 405a87-405a9a 924->925 926 405a9c-405aa8 924->926 925->860 926->860
                                                      APIs
                                                      • VirtualAlloc.KERNELBASE(00000000,00000020,00003000,00000040,?,00404DAE), ref: 0040538E
                                                      • GetCurrentProcess.KERNEL32(00000000), ref: 004053D1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372576838.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.372576838.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocCurrentProcessVirtual
                                                      • String ID: cE
                                                      • API String ID: 1355094253-163553156
                                                      • Opcode ID: d18c9acba386cd91f9e98f90d1d9feffd6c4d9877cde36b0e887f70e5be8399d
                                                      • Instruction ID: 6c779c1105b918cdaa462d111dde94121fdb9daa6e18740b44916a1253f0f40a
                                                      • Opcode Fuzzy Hash: d18c9acba386cd91f9e98f90d1d9feffd6c4d9877cde36b0e887f70e5be8399d
                                                      • Instruction Fuzzy Hash: 8F02D2307016008AF7188B25C5297676222EF90B04F5096BED169AF7E6D77DCD22CB8F
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 927 405d70-405d87 call 403e00 930 405d8d-405df6 call 403530 call 4039b0 call 4037f0 FindFirstFileW call 4037b0 927->930 931 405fbf-405fc2 927->931 940 405fb3-405fbc call 403570 930->940 941 405dfc-405e28 call 4037b0 * 2 930->941 940->931 948 405e2a 941->948 949 405e2f-405e54 call 406d90 941->949 950 405f90-405fad FindNextFileW 948->950 953 405e56-405e6c call 403850 949->953 954 405eca-405ed6 949->954 950->940 950->941 953->954 961 405e6e-405e84 call 403850 953->961 955 405f83-405f8c 954->955 956 405edc-405f02 call 4037b0 call 403450 954->956 955->950 956->955 966 405f04-405f81 call 4037f0 call 405ae0 956->966 961->954 967 405e86-405e8c 961->967 966->940 967->954 969 405e8e-405e98 967->969 971 405ec5 969->971 972 405e9a-405eb5 call 405d70 969->972 971->955 976 405eba-405ec2 972->976 976->971
                                                      APIs
                                                        • Part of subcall function 00403E00: GetFileAttributesW.KERNELBASE(@@,?,?,004040E9,?), ref: 00403E08
                                                        • Part of subcall function 00403530: EnterCriticalSection.KERNEL32(0040E180,?,?,00405272,00000208), ref: 00403539
                                                        • Part of subcall function 00403530: GetProcessHeap.KERNEL32(00000008,00405272,?,?,00405272,00000208), ref: 00403545
                                                        • Part of subcall function 00403530: RtlAllocateHeap.NTDLL(00000000,?,?,00405272,00000208), ref: 0040354C
                                                        • Part of subcall function 00403530: LeaveCriticalSection.KERNEL32(0040E180,?,?,00405272,00000208), ref: 0040355A
                                                      • FindFirstFileW.KERNELBASE(00000000,?), ref: 00405DD7
                                                      • FindNextFileW.KERNELBASE(000000FF,?), ref: 00405FA9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372576838.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.372576838.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$CriticalFindHeapSection$AllocateAttributesEnterFirstLeaveNextProcess
                                                      • String ID: %ws\%ws
                                                      • API String ID: 674214967-3197343109
                                                      • Opcode ID: 0e847981d9539d29dab535b6e7bf93a129ad9c27c2364c30b5f2f155dac372ca
                                                      • Instruction ID: 23d4d1715e34f215830b39906fe81c0077f27e4625ee614edcb56dca3be27f20
                                                      • Opcode Fuzzy Hash: 0e847981d9539d29dab535b6e7bf93a129ad9c27c2364c30b5f2f155dac372ca
                                                      • Instruction Fuzzy Hash: 5E61F3B5D04208A7DB00DFA5DC41AAF77B8EF44305F1484BEF548A72C2E6399B158BA9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 977 4033c0-4033f8 CryptUnprotectData 978 403405-40340d 977->978 979 4033fa-403403 977->979 980 403438-403443 978->980 981 40340f-403432 CryptProtectData 978->981 979->980 981->980
                                                      APIs
                                                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,-00000005), ref: 004033F4
                                                      • CryptProtectData.CRYPT32(?,?,00000000,00000000,00000000,00000000,-00000005), ref: 00403432
                                                      Strings
                                                      • Poverty is the parent of crime., xrefs: 00403414
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372576838.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.372576838.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CryptData$ProtectUnprotect
                                                      • String ID: Poverty is the parent of crime.
                                                      • API String ID: 3358631343-459368448
                                                      • Opcode ID: d4143964ca4384b1c13305824362e6d05fb34c821f536e753f076ceb60ab8675
                                                      • Instruction ID: 6e5abc115a5e9d136f9da075d7246080ecdc0d8531dc0069451ba7c9591d53ce
                                                      • Opcode Fuzzy Hash: d4143964ca4384b1c13305824362e6d05fb34c821f536e753f076ceb60ab8675
                                                      • Instruction Fuzzy Hash: AD112135A00218BBDB04CF98CC41FEEBB79FB85310F50856AEA15BB2C0D774AA05CB95
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 00A06589
                                                      • Module32First.KERNEL32(00000000,00000224), ref: 00A065A9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372688011.0000000000A00000.00000040.00000020.00020000.00000000.sdmp, Offset: 00A00000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_a00000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateFirstModule32SnapshotToolhelp32
                                                      • String ID:
                                                      • API String ID: 3833638111-0
                                                      • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                      • Instruction ID: d53e48a617da55571e3be121a2d97d2c605b202245196c0099fb9041d7bbc3d0
                                                      • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                      • Instruction Fuzzy Hash: BFF096315007196FD7203BF9BC8DBAE76ECAF49728F100528E642914C0DB70FC554A61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000000,00000000,?,00404E8B,009F3250), ref: 0040357F
                                                      • RtlFreeHeap.NTDLL(00000000,?,00404E8B,009F3250), ref: 00403586
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372576838.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.372576838.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$FreeProcess
                                                      • String ID:
                                                      • API String ID: 3859560861-0
                                                      • Opcode ID: 30e6b73eaab0a2952156bf055a34b3ae76f272313430007368f5ba6a1d788146
                                                      • Instruction ID: d7b11d41ac067d1c2742b3bdfba4256e401789511bebdcde65a4697e1a1844fe
                                                      • Opcode Fuzzy Hash: 30e6b73eaab0a2952156bf055a34b3ae76f272313430007368f5ba6a1d788146
                                                      • Instruction Fuzzy Hash: E4C01231400208EBD7005FD4DD0CBA57B6C9704346F008020FA0CA61A0C674D584CBA8
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • LoadLibraryA.KERNELBASE(00000000,?,?,?,?,?,?,?,004050D2), ref: 00404F36
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372576838.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.372576838.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: LibraryLoad
                                                      • String ID:
                                                      • API String ID: 1029625771-0
                                                      • Opcode ID: ced5de2966c16d9e3dba5c2597b097740b47aa5a489c41392578e8e11f4eaeed
                                                      • Instruction ID: ee5d22ec325391a361f41379e54844ebaa4da1900d84c89b746596d4027696f1
                                                      • Opcode Fuzzy Hash: ced5de2966c16d9e3dba5c2597b097740b47aa5a489c41392578e8e11f4eaeed
                                                      • Instruction Fuzzy Hash: 19512CB4D04119DFDB04CF98C4A0BAEBBF1EF84304F1480AAD551AB382C739AA85CF94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 404a40-404a67 WSAStartup 1 404d13 0->1 2 404a6d-404aa7 call 404a00 socket 0->2 3 404d15-404d18 1->3 2->1 6 404aad-404b07 call 403650 * 2 call 406d90 2->6 13 404b12-404b16 6->13 14 404b73-404bb5 call 4048c0 call 4035f0 * 2 13->14 15 404b18-404b26 13->15 29 404bc0 14->29 30 404bb7-404bbe 14->30 16 404b28-404b36 15->16 17 404b3c-404b49 15->17 16->17 19 404b38 16->19 20 404b71 17->20 21 404b4b-404b67 17->21 19->14 20->13 21->20 23 404b69-404b6c 21->23 23->20 31 404bc7-404be2 29->31 30->31 32 404be4-404beb 31->32 33 404bed 31->33 34 404bf4-404c0f 32->34 33->34 35 404c11-404c18 34->35 36 404c1a 34->36 37 404c21-404c5d 35->37 36->37 38 404c64-404c6b 37->38 39 404ce8-404d04 closesocket 38->39 40 404c6d-404c89 connect 38->40 43 404d0c-404d11 39->43 41 404cd8-404ce3 Sleep 40->41 42 404c8b-404cae send 40->42 41->38 42->41 44 404cb0-404cd4 send 42->44 43->3 44->41 45 404cd6 44->45 45->39
                                                      APIs
                                                      • WSAStartup.WS2_32(00000202,?), ref: 00404A63
                                                      • socket.WS2_32(?,00000001,00000000), ref: 00404A9E
                                                      • connect.WS2_32(000000FF,?,00000010), ref: 00404C84
                                                      • send.WS2_32(000000FF,84b52718-9e34-4c47-9efc-4e502155d85e,00000437,00000000), ref: 00404CA9
                                                      • send.WS2_32(000000FF,000000FF,0000002F,00000000), ref: 00404CCF
                                                      • Sleep.KERNEL32(000003E8), ref: 00404CDD
                                                      • closesocket.WS2_32(000000FF), ref: 00404CFA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372576838.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.372576838.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: send$SleepStartupclosesocketconnectsocket
                                                      • String ID: %d,%d,%d,%d,a%d,%d,%d,%d$.$0$0$0$111$84b52718-9e34-4c47-9efc-4e502155d85e$84b52718-9e34-4c47-9efc-4e502155d85e$@$gametools$gametools
                                                      • API String ID: 4285724308-351856712
                                                      • Opcode ID: 1e83a8a122139c377f586724cbee5ed2d8e0bac46524fa933d686979d05b723a
                                                      • Instruction ID: 16db693c6c969251986c864a8d8d3cbd4138a9ef300cd020343e65b521247af7
                                                      • Opcode Fuzzy Hash: 1e83a8a122139c377f586724cbee5ed2d8e0bac46524fa933d686979d05b723a
                                                      • Instruction Fuzzy Hash: 8E7156B0A04104ABE708CBA5DD55BBE7B79AFC4300F2481BAE604BF3C1D2B99E50C758
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 98 404b3a 99 404b71 98->99 102 404b73-404bb5 call 4048c0 call 4035f0 * 2 99->102 103 404b18-404b26 99->103 115 404bc0 102->115 116 404bb7-404bbe 102->116 104 404b28-404b36 103->104 105 404b3c-404b49 103->105 104->105 107 404b38 104->107 105->99 108 404b4b-404b67 105->108 107->102 108->99 110 404b69-404b6c 108->110 110->99 117 404bc7-404be2 115->117 116->117 118 404be4-404beb 117->118 119 404bed 117->119 120 404bf4-404c0f 118->120 119->120 121 404c11-404c18 120->121 122 404c1a 120->122 123 404c21-404c5d 121->123 122->123 124 404c64-404c6b 123->124 125 404ce8-404d18 closesocket 124->125 126 404c6d-404c89 connect 124->126 127 404cd8-404ce3 Sleep 126->127 128 404c8b-404cae send 126->128 127->124 128->127 130 404cb0-404cd4 send 128->130 130->127 132 404cd6 130->132 132->125
                                                      APIs
                                                      • connect.WS2_32(000000FF,?,00000010), ref: 00404C84
                                                      • send.WS2_32(000000FF,84b52718-9e34-4c47-9efc-4e502155d85e,00000437,00000000), ref: 00404CA9
                                                      • send.WS2_32(000000FF,000000FF,0000002F,00000000), ref: 00404CCF
                                                      • Sleep.KERNEL32(000003E8), ref: 00404CDD
                                                      • closesocket.WS2_32(000000FF), ref: 00404CFA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372576838.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.372576838.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: send$Sleepclosesocketconnect
                                                      • String ID: 1$1$1$111$84b52718-9e34-4c47-9efc-4e502155d85e$84b52718-9e34-4c47-9efc-4e502155d85e$@$gametools$gametools
                                                      • API String ID: 4223982704-3976769646
                                                      • Opcode ID: 72ddca90887ebf1c9032b2c4fb3ff0ad75baaa490d8bbd201062aee328199846
                                                      • Instruction ID: 26d48490503fff8eea378d019275d89596d083aea46842c49e36e17a5ee5e9e0
                                                      • Opcode Fuzzy Hash: 72ddca90887ebf1c9032b2c4fb3ff0ad75baaa490d8bbd201062aee328199846
                                                      • Instruction Fuzzy Hash: 42414BB06080049BE708CB69C950BBD7B769BC5300F2486BAE214BF3D1C279DE61D75D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 133 4040d0-4040ef call 403e00 136 4040f5-4040fc 133->136 137 4044ba 133->137 136->137 138 404102-4041ca call 406d90 call 403dc0 call 403650 EnterCriticalSection LeaveCriticalSection 136->138 139 4044bd-4044c0 137->139 147 4041d0-4041d4 138->147 148 4042e2-4042e6 138->148 147->148 150 4041da-40429c call 4037b0 call 403740 147->150 148->137 149 4042ec-40435d call 403650 * 2 EnterCriticalSection LeaveCriticalSection 148->149 163 404483-4044a8 EnterCriticalSection 149->163 164 404363-404379 call 403530 149->164 150->148 159 40429e-4042a9 150->159 161 4042db 159->161 162 4042ab-4042b2 call 403f10 159->162 161->148 162->161 169 4042b4-4042d4 call 4040d0 162->169 170 4044af-4044b4 LeaveCriticalSection 163->170 164->163 171 40437f-4043d4 call 403650 EnterCriticalSection 164->171 169->139 170->137 176 4043db-4043ed LeaveCriticalSection 171->176 176->163 177 4043f3-404402 176->177 177->163 178 404404-404414 177->178 179 404416-404423 178->179 180 40445d-404464 178->180 183 40442e-404432 179->183 181 404466 180->181 182 40446d-404480 call 403570 180->182 181->182 182->163 183->180 185 404434-404450 183->185 187 404452-404458 185->187 188 40445b 185->188 187->188 188->183
                                                      APIs
                                                        • Part of subcall function 00403E00: GetFileAttributesW.KERNELBASE(@@,?,?,004040E9,?), ref: 00403E08
                                                      • EnterCriticalSection.KERNEL32(0040E180), ref: 0040416E
                                                      • LeaveCriticalSection.KERNEL32(0040E180), ref: 004041BB
                                                      • EnterCriticalSection.KERNEL32(0040E180), ref: 00404314
                                                      • LeaveCriticalSection.KERNEL32(0040E180), ref: 00404353
                                                      • EnterCriticalSection.KERNEL32(0040E180), ref: 0040439C
                                                      • LeaveCriticalSection.KERNEL32(0040E180), ref: 004043E3
                                                      • EnterCriticalSection.KERNEL32(0040E180), ref: 00404488
                                                      • LeaveCriticalSection.KERNEL32(0040E180), ref: 004044B4
                                                        • Part of subcall function 00403F10: OpenProcess.KERNEL32(00000040,00000000,?), ref: 00403FCC
                                                        • Part of subcall function 00403F10: GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00403FEE
                                                        • Part of subcall function 00403F10: GetFileType.KERNEL32(000000FF), ref: 0040402E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372576838.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.372576838.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$EnterLeave$FileProcess$AttributesCurrentOpenType
                                                      • String ID: @$\??\%ws$\??\C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State
                                                      • API String ID: 201629988-4135269365
                                                      • Opcode ID: f6d3259441f57a08ba0c66ecedf04f6568fb199f383866d7992f87bc402ff705
                                                      • Instruction ID: 233d002cd56207b0f9b4dc3ec9bb6522c754bbf464353a14dba4981cbbde8731
                                                      • Opcode Fuzzy Hash: f6d3259441f57a08ba0c66ecedf04f6568fb199f383866d7992f87bc402ff705
                                                      • Instruction Fuzzy Hash: 8AB1C0B4E00208EBEB10CFA1D845BAEB775EF88704F108529E505BB3C1D7799A55CBA9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      APIs
                                                      • CreateMutexA.KERNELBASE(00000000,00000000,LMR-003-111-P), ref: 00404D34
                                                      • GetLastError.KERNEL32 ref: 00404D47
                                                      • InitializeCriticalSectionAndSpinCount.KERNEL32(0040E180,00001E01), ref: 00404D62
                                                      • DeleteCriticalSection.KERNEL32(0040E180), ref: 00404E79
                                                        • Part of subcall function 00405370: VirtualAlloc.KERNELBASE(00000000,00000020,00003000,00000040,?,00404DAE), ref: 0040538E
                                                        • Part of subcall function 00405370: GetCurrentProcess.KERNEL32(00000000), ref: 004053D1
                                                      • CreateThread.KERNELBASE ref: 00404E02
                                                      • CreateThread.KERNELBASE ref: 00404E1C
                                                      • CreateThread.KERNELBASE ref: 00404E36
                                                      • WaitForMultipleObjects.KERNEL32(00000003,?,00000001,000000FF), ref: 00404E49
                                                        • Part of subcall function 00404A40: WSAStartup.WS2_32(00000202,?), ref: 00404A63
                                                        • Part of subcall function 00404A40: socket.WS2_32(?,00000001,00000000), ref: 00404A9E
                                                        • Part of subcall function 00403570: GetProcessHeap.KERNEL32(00000000,00000000,?,00404E8B,009F3250), ref: 0040357F
                                                        • Part of subcall function 00403570: RtlFreeHeap.NTDLL(00000000,?,00404E8B,009F3250), ref: 00403586
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372576838.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.372576838.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Create$Thread$CriticalHeapProcessSection$AllocCountCurrentDeleteErrorFreeInitializeLastMultipleMutexObjectsSpinStartupVirtualWaitsocket
                                                      • String ID: LMR-003-111-P
                                                      • API String ID: 4133941914-797279375
                                                      • Opcode ID: 7ae5db80789d283892a9c153a22fb0bcb73e804ee8d60d7a49a1133312877cce
                                                      • Instruction ID: 170a5ccbe1781f8fc1d389477b3402a28932d328956110bf6c124a642a8f410b
                                                      • Opcode Fuzzy Hash: 7ae5db80789d283892a9c153a22fb0bcb73e804ee8d60d7a49a1133312877cce
                                                      • Instruction Fuzzy Hash: 6A4198B1E40204ABE710DBA1ED06FAE7774AB44705F104539FA08772D1E778A908CBA9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 462 8b003c-8b0047 463 8b0049 462->463 464 8b004c-8b0263 call 8b0a3f call 8b0e0f call 8b0d90 VirtualAlloc 462->464 463->464 479 8b028b-8b0292 464->479 480 8b0265-8b0289 call 8b0a69 464->480 481 8b02a1-8b02b0 479->481 483 8b02ce-8b03c2 VirtualProtect call 8b0cce call 8b0ce7 480->483 481->483 484 8b02b2-8b02cc 481->484 491 8b03d1-8b03e0 483->491 484->481 492 8b0439-8b04b8 VirtualFree 491->492 493 8b03e2-8b0437 call 8b0ce7 491->493 495 8b04be-8b04cd 492->495 496 8b05f4-8b05fe 492->496 493->491 497 8b04d3-8b04dd 495->497 498 8b077f-8b0789 496->498 499 8b0604-8b060d 496->499 497->496 503 8b04e3-8b0505 LoadLibraryA 497->503 501 8b078b-8b07a3 498->501 502 8b07a6-8b07b0 498->502 499->498 504 8b0613-8b0637 499->504 501->502 506 8b086e-8b08be LoadLibraryA 502->506 507 8b07b6-8b07cb 502->507 508 8b0517-8b0520 503->508 509 8b0507-8b0515 503->509 510 8b063e-8b0648 504->510 514 8b08c7-8b08f9 506->514 511 8b07d2-8b07d5 507->511 512 8b0526-8b0547 508->512 509->512 510->498 513 8b064e-8b065a 510->513 515 8b07d7-8b07e0 511->515 516 8b0824-8b0833 511->516 517 8b054d-8b0550 512->517 513->498 518 8b0660-8b066a 513->518 519 8b08fb-8b0901 514->519 520 8b0902-8b091d 514->520 521 8b07e2 515->521 522 8b07e4-8b0822 515->522 526 8b0839-8b083c 516->526 523 8b05e0-8b05ef 517->523 524 8b0556-8b056b 517->524 525 8b067a-8b0689 518->525 519->520 521->516 522->511 523->497 527 8b056f-8b057a 524->527 528 8b056d 524->528 529 8b068f-8b06b2 525->529 530 8b0750-8b077a 525->530 526->506 531 8b083e-8b0847 526->531 533 8b059b-8b05bb 527->533 534 8b057c-8b0599 527->534 528->523 535 8b06ef-8b06fc 529->535 536 8b06b4-8b06ed 529->536 530->510 537 8b084b-8b086c 531->537 538 8b0849 531->538 545 8b05bd-8b05db 533->545 534->545 539 8b074b 535->539 540 8b06fe-8b0748 535->540 536->535 537->526 538->506 539->525 540->539 545->517
                                                      APIs
                                                      • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 008B024D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372668115.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_8b0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocVirtual
                                                      • String ID: cess$kernel32.dll
                                                      • API String ID: 4275171209-1230238691
                                                      • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                      • Instruction ID: 0fdea2b578a004e139404501eb08fb367d617787f9fca6d9d9b2aee9f5418c3f
                                                      • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                      • Instruction Fuzzy Hash: E4526874A012299FDB64CF58C984BA9BBB1BF09304F1480E9E94DAB351DB30AE85DF14
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 596 41c6a0-41c6c2 598 41c6c4-41c6ca 596->598 599 41c6da-41c6e0 598->599 600 41c6cc-41c6d6 598->600 601 41c6f2-41c6f9 599->601 602 41c6e2-41c6e8 599->602 600->599 601->598 605 41c6fb-41c705 601->605 602->601 604 41c6ea-41c6f0 602->604 604->601 604->605 606 41c7a0-41c7b2 605->606 607 41c70b-41c797 605->607 608 41c7b4-41c7ba 606->608 607->606 610 41c7c7-41c7ce 608->610 611 41c7bc-41c7c1 608->611 612 41c7d0-41c7e5 610->612 613 41c7e8-41c7ef 610->613 611->610 612->613 613->608 615 41c7f1-41c82a GlobalAlloc 613->615 616 41c830-41c833 615->616 619 41c853-41c858 616->619 620 41c835-41c84e 616->620 622 41c90a-41c90e 619->622 623 41c85e-41c905 619->623 620->619 622->616 626 41c914-41c918 622->626 623->622 627 41c971-41c97a 626->627 628 41c91a-41c926 626->628 632 41c9d1-41c9dd 627->632 633 41c97c-41c9cf 627->633 634 41c92c-41c931 628->634 635 41c9e2-41c9f7 632->635 633->632 637 41c933-41c942 634->637 638 41c946-41c953 call 41c440 634->638 660 41c9f9-41c9ff 635->660 637->638 646 41c955-41c967 638->646 647 41c96c-41c96f 638->647 646->647 647->627 647->634 661 41ca04-41ca0e 660->661 665 41ca10 661->665 666 41ca14-41ca15 661->666 665->666 666->661 668 41ca17-41ca45 VirtualProtect call 41c660 666->668 676 41ca4a-41ca50 668->676 677 41ca62-41ca68 676->677 678 41ca52-41ca5e 676->678 680 41ca74-41ca7b 677->680 681 41ca6a 677->681 678->677 680->676 685 41ca7d-41cab8 LoadLibraryA 680->685 681->680 686 41cb80-41cb89 685->686 687 41cabe-41cb78 685->687 687->686
                                                      APIs
                                                      • GlobalAlloc.KERNELBASE(00000000,0070686C), ref: 0041C7FA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372583600.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00411000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_411000_file.jbxd
                                                      Similarity
                                                      • API ID: AllocGlobal
                                                      • String ID: t^:
                                                      • API String ID: 3761449716-1317908726
                                                      • Opcode ID: 26836b13f233095548e7e8767e78901c862f527461d55b569fbced6fec92ff15
                                                      • Instruction ID: 1aa6a8640389b5813f3f68f19352c2cab43cb2a8ee3d2139d40dd4c81a61a424
                                                      • Opcode Fuzzy Hash: 26836b13f233095548e7e8767e78901c862f527461d55b569fbced6fec92ff15
                                                      • Instruction Fuzzy Hash: F1D1CD716C4344BBF350AB91DD8AF5937A4EB44B01F10403AF789BA5E0D6F46984CB6E
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 771 41c799-41c7b2 773 41c7b4-41c7ba 771->773 774 41c7c7-41c7ce 773->774 775 41c7bc-41c7c1 773->775 776 41c7d0-41c7e5 774->776 777 41c7e8-41c7ef 774->777 775->774 776->777 777->773 778 41c7f1-41c82a GlobalAlloc 777->778 779 41c830-41c833 778->779 781 41c853-41c858 779->781 782 41c835-41c84e 779->782 784 41c90a-41c90e 781->784 785 41c85e-41c905 781->785 782->781 784->779 787 41c914-41c918 784->787 785->784 788 41c971-41c97a 787->788 789 41c91a-41c926 787->789 792 41c9d1-41c9dd 788->792 793 41c97c-41c9cf 788->793 794 41c92c-41c931 789->794 795 41c9e2-41c9f7 792->795 793->792 797 41c933-41c942 794->797 798 41c946-41c953 call 41c440 794->798 816 41c9f9-41c9ff 795->816 797->798 805 41c955-41c967 798->805 806 41c96c-41c96f 798->806 805->806 806->788 806->794 817 41ca04-41ca0e 816->817 820 41ca10 817->820 821 41ca14-41ca15 817->821 820->821 821->817 823 41ca17-41ca45 VirtualProtect call 41c660 821->823 829 41ca4a-41ca50 823->829 830 41ca62-41ca68 829->830 831 41ca52-41ca5e 829->831 833 41ca74-41ca7b 830->833 834 41ca6a 830->834 831->830 833->829 837 41ca7d-41cab8 LoadLibraryA 833->837 834->833 838 41cb80-41cb89 837->838 839 41cabe-41cb78 837->839 839->838
                                                      APIs
                                                      • GlobalAlloc.KERNELBASE(00000000,0070686C), ref: 0041C7FA
                                                      • VirtualProtect.KERNELBASE(00440DFC,0070686C,00000040,?), ref: 0041CA32
                                                      • LoadLibraryA.KERNELBASE(0043C068), ref: 0041CAA8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372583600.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00411000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_411000_file.jbxd
                                                      Similarity
                                                      • API ID: AllocGlobalLibraryLoadProtectVirtual
                                                      • String ID: t^:
                                                      • API String ID: 1263758589-1317908726
                                                      • Opcode ID: 1c95d482b29cc829393ce32e361dc03256f96975ec041af07a67bdae48e234e1
                                                      • Instruction ID: f64e39110550a32180f51a84cf44b81d5c7a5a599cf11c0b68cdfe27368ffb40
                                                      • Opcode Fuzzy Hash: 1c95d482b29cc829393ce32e361dc03256f96975ec041af07a67bdae48e234e1
                                                      • Instruction Fuzzy Hash: DCB18971684344EBE3109F90EE8AF9977A4FB44B01F108526F785BA5E0D7B46884CB6E
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      APIs
                                                      • EnterCriticalSection.KERNEL32(0040E180,?,?,00405272,00000208), ref: 00403539
                                                      • GetProcessHeap.KERNEL32(00000008,00405272,?,?,00405272,00000208), ref: 00403545
                                                      • RtlAllocateHeap.NTDLL(00000000,?,?,00405272,00000208), ref: 0040354C
                                                      • LeaveCriticalSection.KERNEL32(0040E180,?,?,00405272,00000208), ref: 0040355A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372576838.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.372576838.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalHeapSection$AllocateEnterLeaveProcess
                                                      • String ID:
                                                      • API String ID: 1367039788-0
                                                      • Opcode ID: 51d9cabb7f51bd8f68d26aefdd08daf424fbc9846409ac88fca74241acb23cb4
                                                      • Instruction ID: d03b1218f6db39d4e0ea1f79d35053aa653235b1eabe4e26975e9452da2ef5a7
                                                      • Opcode Fuzzy Hash: 51d9cabb7f51bd8f68d26aefdd08daf424fbc9846409ac88fca74241acb23cb4
                                                      • Instruction Fuzzy Hash: D2E0C278E40208FFE7009FD0DE0D9687BA8EB0C305F004461FD0CA2240CA709D0A8B79
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • EnterCriticalSection.KERNEL32(0040E180,?,?,?,?,?,?,?,?,?,?,?,0040C1E7,00000000,?,00000000), ref: 0040BF6B
                                                      • LeaveCriticalSection.KERNEL32(0040E180,?,?,?,?,?,?,?,?,?,?,?,0040C1E7), ref: 0040BF91
                                                      • LeaveCriticalSection.KERNEL32(0040E180), ref: 0040BFCC
                                                        • Part of subcall function 00403570: GetProcessHeap.KERNEL32(00000000,00000000,?,00404E8B,009F3250), ref: 0040357F
                                                        • Part of subcall function 00403570: RtlFreeHeap.NTDLL(00000000,?,00404E8B,009F3250), ref: 00403586
                                                      • LeaveCriticalSection.KERNEL32(0040E180,?,?,?,?,?,?,?,?,00000003), ref: 0040C18D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372576838.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.372576838.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$Leave$Heap$EnterFreeProcess
                                                      • String ID:
                                                      • API String ID: 2223192847-0
                                                      • Opcode ID: b0fe354d7f4ecbf5a1f2af5e73ec57aae7db1da13cd5814ec88a8fd8a777a3b5
                                                      • Instruction ID: c9483220be1b29621597449c8acc6be0275a18916525e68a7ca52970bde799aa
                                                      • Opcode Fuzzy Hash: b0fe354d7f4ecbf5a1f2af5e73ec57aae7db1da13cd5814ec88a8fd8a777a3b5
                                                      • Instruction Fuzzy Hash: 6D711074A00209EFCB04DF94D981AAEB7B5FF48304F148569F909AB391D7349E45CF99
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • EnterCriticalSection.KERNEL32(0040E180), ref: 00404314
                                                      • LeaveCriticalSection.KERNEL32(0040E180), ref: 00404353
                                                      • EnterCriticalSection.KERNEL32(0040E180), ref: 0040439C
                                                      • LeaveCriticalSection.KERNEL32(0040E180), ref: 004043E3
                                                      • EnterCriticalSection.KERNEL32(0040E180), ref: 00404488
                                                      • LeaveCriticalSection.KERNEL32(0040E180), ref: 004044B4
                                                        • Part of subcall function 00403530: EnterCriticalSection.KERNEL32(0040E180,?,?,00405272,00000208), ref: 00403539
                                                        • Part of subcall function 00403530: GetProcessHeap.KERNEL32(00000008,00405272,?,?,00405272,00000208), ref: 00403545
                                                        • Part of subcall function 00403530: RtlAllocateHeap.NTDLL(00000000,?,?,00405272,00000208), ref: 0040354C
                                                        • Part of subcall function 00403530: LeaveCriticalSection.KERNEL32(0040E180,?,?,00405272,00000208), ref: 0040355A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372576838.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.372576838.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$EnterLeave$Heap$AllocateProcess
                                                      • String ID:
                                                      • API String ID: 4148517753-0
                                                      • Opcode ID: a4dc46155340f4e730613e68d11d17b2c7b3fa7d84d5ef02707da3958b1fa990
                                                      • Instruction ID: 8a1a12ff2a48980f07d7f736d937d9940b1318255f7c41e280a62138209a90ff
                                                      • Opcode Fuzzy Hash: a4dc46155340f4e730613e68d11d17b2c7b3fa7d84d5ef02707da3958b1fa990
                                                      • Instruction Fuzzy Hash: 4141E1B0E00308EBDB14CFA1CC45BAEB775FB88704F10896AE611BA2C1D7795645CB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetFileAttributesW.KERNELBASE(@@,?,?,004040E9,?), ref: 00403E08
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372576838.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.372576838.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AttributesFile
                                                      • String ID: @@
                                                      • API String ID: 3188754299-1653905929
                                                      • Opcode ID: 5cabb0733c0374d102225fa8efd0b51622dcea8957433c8c6e068a9ac0be8701
                                                      • Instruction ID: 70c0842cc4f2fd47db523d4b365ffe37f5c593160b96cad823cdc561254d3772
                                                      • Opcode Fuzzy Hash: 5cabb0733c0374d102225fa8efd0b51622dcea8957433c8c6e068a9ac0be8701
                                                      • Instruction Fuzzy Hash: 3CD05E70809108E7CB00CF98D90879D7BBC9B04325F204395F818A72C0C379DF555BD9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • DeleteFileW.KERNEL32(00000000), ref: 004022D1
                                                      • FindNextFileW.KERNELBASE(000000FF,?), ref: 00402A7D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372576838.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.372576838.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$DeleteFindNext
                                                      • String ID:
                                                      • API String ID: 918895714-0
                                                      • Opcode ID: bfb4492a2c97c338c1193278cfc2cc1e451d3e5ee37e682d500a4256e9f60d24
                                                      • Instruction ID: a9b38581b9f5e2af640ed4a08d11583c120f7bdae4d7d02a9cace8dc40330def
                                                      • Opcode Fuzzy Hash: bfb4492a2c97c338c1193278cfc2cc1e451d3e5ee37e682d500a4256e9f60d24
                                                      • Instruction Fuzzy Hash: 9B619FB0D042589BEB10CBA5D954BEEB7B5EF58304F1044BDE508BB3D1D7BA8A80CB59
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SetErrorMode.KERNELBASE(00000400,?,?,008B0223,?,?), ref: 008B0E19
                                                      • SetErrorMode.KERNELBASE(00000000,?,?,008B0223,?,?), ref: 008B0E1E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372668115.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_8b0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorMode
                                                      • String ID:
                                                      • API String ID: 2340568224-0
                                                      • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                      • Instruction ID: c8ee7785ec40c83d6f57f546c265962584c58f89b5ad5e99698589515ecd4ea5
                                                      • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                      • Instruction Fuzzy Hash: 5ED0123114512877D7002A94DC09BCE7B1CDF05B62F008411FB0DD9180C770994046E5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • FindNextFileW.KERNELBASE(000000FF,?), ref: 00402A7D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372576838.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.372576838.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FileFindNext
                                                      • String ID:
                                                      • API String ID: 2029273394-0
                                                      • Opcode ID: 072e2c57f1f4c7ffb3555e70ac4fb021623f177394cadb4a91a03bcc9d71300f
                                                      • Instruction ID: 967f0f8756ce382391e2010d6228bff57261670077a873627ae2a563e97d8f7f
                                                      • Opcode Fuzzy Hash: 072e2c57f1f4c7ffb3555e70ac4fb021623f177394cadb4a91a03bcc9d71300f
                                                      • Instruction Fuzzy Hash: C1315C70A181689AEB14CB64C850BEEB372EF59300F0050E9E54CEB3A1E6795E90CB5A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 00A06271
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372688011.0000000000A00000.00000040.00000020.00020000.00000000.sdmp, Offset: 00A00000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_a00000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocVirtual
                                                      • String ID:
                                                      • API String ID: 4275171209-0
                                                      • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                      • Instruction ID: 94a101267d5b0f0616e2f1d1de162fd7073d76dcacaf24313aa906a0b3b4b142
                                                      • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                      • Instruction Fuzzy Hash: 1D113C79A00208EFDB01DF98CA85E98BBF5AF08751F058094F9489B362D371EA50DF80
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 00403530: EnterCriticalSection.KERNEL32(0040E180,?,?,00405272,00000208), ref: 00403539
                                                        • Part of subcall function 00403530: GetProcessHeap.KERNEL32(00000008,00405272,?,?,00405272,00000208), ref: 00403545
                                                        • Part of subcall function 00403530: RtlAllocateHeap.NTDLL(00000000,?,?,00405272,00000208), ref: 0040354C
                                                        • Part of subcall function 00403530: LeaveCriticalSection.KERNEL32(0040E180,?,?,00405272,00000208), ref: 0040355A
                                                      • OpenProcess.KERNEL32(00000040,00000000,?), ref: 004011BC
                                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 004011DE
                                                      • GetFileType.KERNEL32(000000FF), ref: 0040121E
                                                      • CloseHandle.KERNEL32(000000FF), ref: 00401241
                                                      • GetCurrentProcess.KERNEL32(000000FF,00000000,00000000,00000001), ref: 00401251
                                                      • CloseHandle.KERNEL32(000000FF), ref: 00401289
                                                      • CloseHandle.KERNEL32(00000000), ref: 0040129A
                                                      • CloseHandle.KERNEL32(00000000), ref: 004012A6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372576838.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.372576838.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandleProcess$CriticalCurrentHeapSection$AllocateEnterFileLeaveOpenType
                                                      • String ID:
                                                      • API String ID: 1542303429-0
                                                      • Opcode ID: f6c87a539dfa72355f260533f684e7efd8583d3e00dfb6a3342fd27d32a4be87
                                                      • Instruction ID: 8e9a20c15c72bff634c72a78754b3217163a8ee98a141fbf8363607e7f657408
                                                      • Opcode Fuzzy Hash: f6c87a539dfa72355f260533f684e7efd8583d3e00dfb6a3342fd27d32a4be87
                                                      • Instruction Fuzzy Hash: 27513EB5E00209EFDB14CFD4DD44BAEB7B9BB48304F104169E615BB2D4D7389A45CB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 00403530: EnterCriticalSection.KERNEL32(0040E180,?,?,00405272,00000208), ref: 00403539
                                                        • Part of subcall function 00403530: GetProcessHeap.KERNEL32(00000008,00405272,?,?,00405272,00000208), ref: 00403545
                                                        • Part of subcall function 00403530: RtlAllocateHeap.NTDLL(00000000,?,?,00405272,00000208), ref: 0040354C
                                                        • Part of subcall function 00403530: LeaveCriticalSection.KERNEL32(0040E180,?,?,00405272,00000208), ref: 0040355A
                                                      • OpenProcess.KERNEL32(00000040,00000000,?), ref: 00403FCC
                                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00403FEE
                                                      • GetFileType.KERNEL32(000000FF), ref: 0040402E
                                                      • CloseHandle.KERNEL32(000000FF), ref: 0040404D
                                                      • GetCurrentProcess.KERNEL32(000000FF,00000000,00000000,00000001), ref: 0040405D
                                                      • CloseHandle.KERNEL32(000000FF), ref: 00404095
                                                      • CloseHandle.KERNEL32(00000000), ref: 004040A6
                                                      • CloseHandle.KERNEL32(00000000), ref: 004040B2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372576838.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.372576838.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandleProcess$CriticalCurrentHeapSection$AllocateEnterFileLeaveOpenType
                                                      • String ID:
                                                      • API String ID: 1542303429-0
                                                      • Opcode ID: f5b203630af429c5b22260a68f736c2fcbec229ff287be812919e718faf10da1
                                                      • Instruction ID: abdecdd355210c94ed0d7ef6c451ccbce21182920f42216e88442e2660da4c49
                                                      • Opcode Fuzzy Hash: f5b203630af429c5b22260a68f736c2fcbec229ff287be812919e718faf10da1
                                                      • Instruction Fuzzy Hash: 8E5151B1D00209EFDB14CFD8CD44BAEB7B9AB88304F104569E215BB2D0D7799A45CB99
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000020,00003000,00000040,?,008B5015), ref: 008B55F5
                                                      • GetCurrentProcess.KERNEL32(00000000), ref: 008B5638
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372668115.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_8b0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocCurrentProcessVirtual
                                                      • String ID: cE
                                                      • API String ID: 1355094253-163553156
                                                      • Opcode ID: 131d8fbaf52e4aacefb1ca881fda82ba2867afc8e4ff3a223c6b3db2e92c1f5d
                                                      • Instruction ID: 24ac87105f526182b5e386d6924cb90aa6bb79386cefefaa56c51338a930eed8
                                                      • Opcode Fuzzy Hash: 131d8fbaf52e4aacefb1ca881fda82ba2867afc8e4ff3a223c6b3db2e92c1f5d
                                                      • Instruction Fuzzy Hash: EC02D23061060087F7188B35C12D7BA6222FF90B04F5496BDD169DFBE6DB79C922C78A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372668115.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_8b0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: .$GetProcAddress.$l
                                                      • API String ID: 0-2784972518
                                                      • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                      • Instruction ID: 61eb064abd2f97f60d2e3233172b424a25ed13047e52e2dc11221790a43d3415
                                                      • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                      • Instruction Fuzzy Hash: 0A3117B6900619DFDB10CF99C880AEEBBF5FB48324F25414AD441E7351D771AA45CFA4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CryptProtectData.CRYPT32(?,?,00000000,00000000,00000000,00000000,?), ref: 008B3699
                                                      Strings
                                                      • Poverty is the parent of crime., xrefs: 008B367B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372668115.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_8b0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CryptDataProtect
                                                      • String ID: Poverty is the parent of crime.
                                                      • API String ID: 3091777813-459368448
                                                      • Opcode ID: d4143964ca4384b1c13305824362e6d05fb34c821f536e753f076ceb60ab8675
                                                      • Instruction ID: 3cbe7b24745f9776e9f1e6e953d4de0d7d1c69f3dd6b956400ee19ed34b78d04
                                                      • Opcode Fuzzy Hash: d4143964ca4384b1c13305824362e6d05fb34c821f536e753f076ceb60ab8675
                                                      • Instruction Fuzzy Hash: 77114475A00218BBDB04CF98CC41FEEB779FB99710F108569EA15AB3C0D770AA04CB94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372688011.0000000000A00000.00000040.00000020.00020000.00000000.sdmp, Offset: 00A00000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_a00000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 733767e90f28cf9fa209a80896cfd3694955e122320fc68d413aad28ccb36ed3
                                                      • Instruction ID: 7e2e4e840c6d9744d1fce5cae1dd435411cd954607492837183d073cc2dd4738
                                                      • Opcode Fuzzy Hash: 733767e90f28cf9fa209a80896cfd3694955e122320fc68d413aad28ccb36ed3
                                                      • Instruction Fuzzy Hash: 3A8176B25693899FC3068F78EC961E37FA1EF57314B1805DDD4908F1A3E6269417CB82
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372688011.0000000000A00000.00000040.00000020.00020000.00000000.sdmp, Offset: 00A00000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_a00000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c9753ea3043e502ebe55b8ba787f2ffd76f3daabc9858a27ef7ef996b04cb9ed
                                                      • Instruction ID: 3f272058c30a33b7e3cba0f4e525db0bfec089e12bbb3d9a34d6f4ef3b98e159
                                                      • Opcode Fuzzy Hash: c9753ea3043e502ebe55b8ba787f2ffd76f3daabc9858a27ef7ef996b04cb9ed
                                                      • Instruction Fuzzy Hash: 336143B64663899FC7068F38EC961D77FB1EF57318B6814D9C4808F163E622A407DB91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372668115.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_8b0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6f3b9fd9301a22d3de611e37c3fecbb0355f5607246e4d9618f88d1ade5c2f8d
                                                      • Instruction ID: dc508fabba81987a4277c226d29a48ef77c309eeff722cf2d9805f2b7d2e156d
                                                      • Opcode Fuzzy Hash: 6f3b9fd9301a22d3de611e37c3fecbb0355f5607246e4d9618f88d1ade5c2f8d
                                                      • Instruction Fuzzy Hash: D5513774D04119AFDB08CF98C491BEEBBF1FF49308F1480A9D951AB392C775AA81CB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372688011.0000000000A00000.00000040.00000020.00020000.00000000.sdmp, Offset: 00A00000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_a00000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                      • Instruction ID: 55710bfdb1cf1de67c78ee9c5e636aadd9b8443c7fd9bd4e66b48bbffc7a23fb
                                                      • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                      • Instruction Fuzzy Hash: 2D11C2727405049FD744CF65EC81FA773EAEB88360B298055ED08CB341E675ED01CB60
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372668115.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_8b0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                      • Instruction ID: 5fefef4fe29634cb6bb1f178c77fef3bc052991d2a7d67ed0ad67b88818bceb7
                                                      • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                      • Instruction Fuzzy Hash: A701A276A006048FDF21CF64C805BEB33E5FB86316F5945A5D90AD7391E774A9418F90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372668115.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_8b0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e0734f66c746c75eb04e7d9580fd22f43b52c7d22f6abfdddb15326e3d8a7dd6
                                                      • Instruction ID: 996e8c5117d4177d3ccccccab83f49465e5c9e5c7149023c01fb92f5381cea96
                                                      • Opcode Fuzzy Hash: e0734f66c746c75eb04e7d9580fd22f43b52c7d22f6abfdddb15326e3d8a7dd6
                                                      • Instruction Fuzzy Hash: E6F0659281D3D13FA762EAB4049A5A3BFD1764324434BDDEEC5419B553EA208047B3C2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372668115.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_8b0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7a88e8bf70f81f21f5d8115bb18535d9954857786cc332dc0272fde5ec97f570
                                                      • Instruction ID: acb9a085a138d8ad5e0510ddfe7da8e33e6ce5c69f5517c805f06a663255bbf3
                                                      • Opcode Fuzzy Hash: 7a88e8bf70f81f21f5d8115bb18535d9954857786cc332dc0272fde5ec97f570
                                                      • Instruction Fuzzy Hash: 83E0927242C3517FAB61ADB441851937BD1A743344357A8EDC141AB412E9308447B3C1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372668115.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_8b0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f9ed70d17b65b173f63ea8bde167bd4dbe7c19cd1b27e585218ed96e6e4df4c6
                                                      • Instruction ID: 58c6f5837427d6eca2c2deaad74ce6c6656098581891570576efec04afcca601
                                                      • Opcode Fuzzy Hash: f9ed70d17b65b173f63ea8bde167bd4dbe7c19cd1b27e585218ed96e6e4df4c6
                                                      • Instruction Fuzzy Hash: 42D001392A1A48CFC241CF4CD084E40B3F8FB0DA20B068092FA0A8BB32C334FC00DA80
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372576838.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.372576838.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f9ed70d17b65b173f63ea8bde167bd4dbe7c19cd1b27e585218ed96e6e4df4c6
                                                      • Instruction ID: 58c6f5837427d6eca2c2deaad74ce6c6656098581891570576efec04afcca601
                                                      • Opcode Fuzzy Hash: f9ed70d17b65b173f63ea8bde167bd4dbe7c19cd1b27e585218ed96e6e4df4c6
                                                      • Instruction Fuzzy Hash: 42D001392A1A48CFC241CF4CD084E40B3F8FB0DA20B068092FA0A8BB32C334FC00DA80
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 008B4067: GetFileAttributesW.KERNEL32(008B1550,?,?,008B1550,?), ref: 008B406F
                                                      • RtlEnterCriticalSection.NTDLL(0040E180), ref: 008B43D5
                                                      • RtlLeaveCriticalSection.NTDLL(0040E180), ref: 008B4422
                                                      • RtlEnterCriticalSection.NTDLL(0040E180), ref: 008B457B
                                                      • RtlLeaveCriticalSection.NTDLL(0040E180), ref: 008B45BA
                                                      • RtlEnterCriticalSection.NTDLL(0040E180), ref: 008B4603
                                                      • RtlLeaveCriticalSection.NTDLL(0040E180), ref: 008B464A
                                                      • RtlEnterCriticalSection.NTDLL(0040E180), ref: 008B46EF
                                                      • RtlLeaveCriticalSection.NTDLL(0040E180), ref: 008B471B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372668115.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_8b0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$EnterLeave$AttributesFile
                                                      • String ID: @$\??\C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State
                                                      • API String ID: 1320886263-3544443730
                                                      • Opcode ID: ff5c832f2408d1daefc49f7896c2b8b144615d5a798c709d2e25dde031fd0526
                                                      • Instruction ID: 53f5b326587a48493cee0c932f4d2bd2ab28263e54aa64e252f4580e89f7c6c3
                                                      • Opcode Fuzzy Hash: ff5c832f2408d1daefc49f7896c2b8b144615d5a798c709d2e25dde031fd0526
                                                      • Instruction Fuzzy Hash: 19B1A174E00208EBEB14CFA4D846BEE7771FF58700F108528E504EB381D77A9A55CB59
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372576838.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.372576838.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: (null)$(null)$0123456789ABCDEF$0123456789abcdef
                                                      • API String ID: 0-1267642376
                                                      • Opcode ID: 4c356fb5d5d8c95d00141f1f3a8287f21bac98838fd882f1a7378106d59b9684
                                                      • Instruction ID: 0f9fa89e4bb1acb399efe6d468b8bfcb7991c3a550fdf07217e8f19a8632a6ac
                                                      • Opcode Fuzzy Hash: 4c356fb5d5d8c95d00141f1f3a8287f21bac98838fd882f1a7378106d59b9684
                                                      • Instruction Fuzzy Hash: 0D02CA74A00209EFCB04CF58D590BADBBB2FF48304F25C56AE806AB394C735AE91DB55
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateMutexA.KERNEL32(00000000,00000000,0040E26D), ref: 008B4F9B
                                                      • GetLastError.KERNEL32 ref: 008B4FAE
                                                      • InitializeCriticalSectionAndSpinCount.KERNEL32(0040E180,00001E01), ref: 008B4FC9
                                                      • RtlDeleteCriticalSection.NTDLL(0040E180), ref: 008B50E0
                                                        • Part of subcall function 008B55D7: VirtualAlloc.KERNEL32(00000000,00000020,00003000,00000040,?,008B5015), ref: 008B55F5
                                                        • Part of subcall function 008B55D7: GetCurrentProcess.KERNEL32(00000000), ref: 008B5638
                                                      • CreateThread.KERNEL32(00000000,00000000,00402F50,?,00000000,00000000), ref: 008B5069
                                                      • CreateThread.KERNEL32(00000000,00000000,00402A90,?,00000000,00000000), ref: 008B5083
                                                      • CreateThread.KERNEL32(00000000,00000000,00405FD0,?,00000000,00000000), ref: 008B509D
                                                      • WaitForMultipleObjects.KERNEL32(00000003,?,00000001,000000FF), ref: 008B50B0
                                                        • Part of subcall function 008B37D7: GetProcessHeap.KERNEL32(00000000,00000000), ref: 008B37E6
                                                        • Part of subcall function 008B37D7: HeapFree.KERNEL32(00000000), ref: 008B37ED
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372668115.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_8b0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Create$Thread$CriticalHeapProcessSection$AllocCountCurrentDeleteErrorFreeInitializeLastMultipleMutexObjectsSpinVirtualWait
                                                      • String ID:
                                                      • API String ID: 1036980007-0
                                                      • Opcode ID: bcb5c1e57dab3d49e4a7d3f8574e49763282264c78b863ad9f8538fc4529f769
                                                      • Instruction ID: 2cd7c6e1c5d4f59f4a17a230aaf6dc0d6047fbd9cd09d9cacc355cfa6f01ce33
                                                      • Opcode Fuzzy Hash: bcb5c1e57dab3d49e4a7d3f8574e49763282264c78b863ad9f8538fc4529f769
                                                      • Instruction Fuzzy Hash: 4E4183B1E40204ABE710DB94DD06FEE7778FB44700F104434FA09B63D0DA759909CBAA
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __aulldiv.LIBCMT ref: 008B497B
                                                      • GetModuleFileNameW.KERNEL32(00000000,0040E29F,00000208), ref: 008B4997
                                                      • GetDC.USER32(00000000), ref: 008B499F
                                                      • GetCurrentObject.GDI32(?,00000007), ref: 008B49AE
                                                      • GetObjectW.GDI32(?,00000018,?), ref: 008B49C1
                                                      • DeleteObject.GDI32(?), ref: 008B49E0
                                                      • ReleaseDC.USER32(00000000,?), ref: 008B49EC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372668115.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_8b0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Object$CurrentDeleteFileModuleNameRelease__aulldiv
                                                      • String ID:
                                                      • API String ID: 2286704243-0
                                                      • Opcode ID: 0cc418bdd18285d6d32df7ac9944fa68292c4ff33d780f037c74295a2ca43fb1
                                                      • Instruction ID: 94da4649a336850d7def42b002f882b2981253e6e59180adc5f8cd66c8273b60
                                                      • Opcode Fuzzy Hash: 0cc418bdd18285d6d32df7ac9944fa68292c4ff33d780f037c74295a2ca43fb1
                                                      • Instruction Fuzzy Hash: 66A198B0A002199BEB04CFA5D842BEDBBB4FF48304F109469E609F7391EB745A51CB5A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372668115.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_8b0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Sleep
                                                      • String ID: .$0$0$0$111$@
                                                      • API String ID: 3472027048-572483225
                                                      • Opcode ID: 159d0f1b6d08e07750d3a3e32510e190e74df9d6fb5c026aabeb73ae57e0bf0f
                                                      • Instruction ID: e91edaab8df7b23d9738e01eff7e96c61f3837341d6efdab9d6fdc25c63ca5b9
                                                      • Opcode Fuzzy Hash: 159d0f1b6d08e07750d3a3e32510e190e74df9d6fb5c026aabeb73ae57e0bf0f
                                                      • Instruction Fuzzy Hash: E5710570A041089AE718CBA9CD56BFDBB75FF84300F2485A8E614EF3C2D6B59E50C755
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • IsDBCSLeadByte.KERNEL32(?), ref: 00406ACE
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000001,?,00000001), ref: 00406AE8
                                                      • IsDBCSLeadByte.KERNEL32(?), ref: 00406B44
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,?,00000002), ref: 00406B76
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372576838.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.372576838.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Byte$CharLeadMultiWide
                                                      • String ID: x
                                                      • API String ID: 2561704868-2363233923
                                                      • Opcode ID: e69aaaac0603ebfef08d3f47f7e5ea15235603ee742426351ac40fc6946a8042
                                                      • Instruction ID: 6cecbc450f97827f75e97a1dc4a391dac297818cbbcd28653831cc4ab1e2fd33
                                                      • Opcode Fuzzy Hash: e69aaaac0603ebfef08d3f47f7e5ea15235603ee742426351ac40fc6946a8042
                                                      • Instruction Fuzzy Hash: 0002DBB0E04219DFCB04CF98C591AAEBBB1FF49304F14816AE856BB354D734AA51CF59
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RtlEnterCriticalSection.NTDLL(0040E180), ref: 008BC1D2
                                                      • RtlLeaveCriticalSection.NTDLL(0040E180), ref: 008BC1F8
                                                      • RtlLeaveCriticalSection.NTDLL(0040E180), ref: 008BC233
                                                        • Part of subcall function 008B37D7: GetProcessHeap.KERNEL32(00000000,00000000), ref: 008B37E6
                                                        • Part of subcall function 008B37D7: HeapFree.KERNEL32(00000000), ref: 008B37ED
                                                      • RtlLeaveCriticalSection.NTDLL(0040E180), ref: 008BC3F4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372668115.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_8b0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$Leave$Heap$EnterFreeProcess
                                                      • String ID:
                                                      • API String ID: 2223192847-0
                                                      • Opcode ID: 45cf105668e53e985d64f316b3950ee3059e9ed6dfd61e78e0550ca36c51a9ce
                                                      • Instruction ID: 8ab3c74220f4963c6d0f67073fffb6a488801ba92670ed76ded683d5eec4e7bc
                                                      • Opcode Fuzzy Hash: 45cf105668e53e985d64f316b3950ee3059e9ed6dfd61e78e0550ca36c51a9ce
                                                      • Instruction Fuzzy Hash: 9A7119B4A00209EFCB04DF98D981AEEB7B1FF48304F14C558F909AB351D735AA45CBA6
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RtlEnterCriticalSection.NTDLL(0040E180), ref: 008B457B
                                                      • RtlLeaveCriticalSection.NTDLL(0040E180), ref: 008B45BA
                                                      • RtlEnterCriticalSection.NTDLL(0040E180), ref: 008B4603
                                                      • RtlLeaveCriticalSection.NTDLL(0040E180), ref: 008B464A
                                                      • RtlEnterCriticalSection.NTDLL(0040E180), ref: 008B46EF
                                                      • RtlLeaveCriticalSection.NTDLL(0040E180), ref: 008B471B
                                                        • Part of subcall function 008B3797: RtlEnterCriticalSection.NTDLL(0040E180), ref: 008B37A0
                                                        • Part of subcall function 008B3797: GetProcessHeap.KERNEL32(00000008,008B1385,?,?,008B1385,00001000), ref: 008B37AC
                                                        • Part of subcall function 008B3797: RtlAllocateHeap.NTDLL(00000000), ref: 008B37B3
                                                        • Part of subcall function 008B3797: RtlLeaveCriticalSection.NTDLL(0040E180), ref: 008B37C1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372668115.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_8b0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$EnterLeave$Heap$AllocateProcess
                                                      • String ID:
                                                      • API String ID: 4148517753-0
                                                      • Opcode ID: 835dac65a19b1ce1349f95ed64455aec13dcaeb3b2eef544cf05500428b4ff76
                                                      • Instruction ID: 32774665feb62178b565cd3cdb686cf9c91b51b88346c0f666228b40e7c8485f
                                                      • Opcode Fuzzy Hash: 835dac65a19b1ce1349f95ed64455aec13dcaeb3b2eef544cf05500428b4ff76
                                                      • Instruction Fuzzy Hash: 3E41CE74E00308EBEB04CFA0C856BEEB7B1FF49704F108928E500AA382D7755649CB55
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372583600.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00411000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_411000_file.jbxd
                                                      Similarity
                                                      • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                      • String ID:
                                                      • API String ID: 3016257755-0
                                                      • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                                      • Instruction ID: f6f3aced188d2654ddf67743fe828d95121b6f27d5806d0341e73ded57ca25bb
                                                      • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                                      • Instruction Fuzzy Hash: 1911837640004DFBCF225F96CC05CEE3F66BB18394B198416FE2859131C73ACAB1AB85
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RtlEnterCriticalSection.NTDLL(0040E180), ref: 008B37A0
                                                      • GetProcessHeap.KERNEL32(00000008,008B1385,?,?,008B1385,00001000), ref: 008B37AC
                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 008B37B3
                                                      • RtlLeaveCriticalSection.NTDLL(0040E180), ref: 008B37C1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372668115.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_8b0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalHeapSection$AllocateEnterLeaveProcess
                                                      • String ID:
                                                      • API String ID: 1367039788-0
                                                      • Opcode ID: 51d9cabb7f51bd8f68d26aefdd08daf424fbc9846409ac88fca74241acb23cb4
                                                      • Instruction ID: d03b1218f6db39d4e0ea1f79d35053aa653235b1eabe4e26975e9452da2ef5a7
                                                      • Opcode Fuzzy Hash: 51d9cabb7f51bd8f68d26aefdd08daf424fbc9846409ac88fca74241acb23cb4
                                                      • Instruction Fuzzy Hash: D2E0C278E40208FFE7009FD0DE0D9687BA8EB0C305F004461FD0CA2240CA709D0A8B79
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.372576838.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.372576838.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalHeapSection$AllocateAttributesEnterFileLeaveProcess
                                                      • String ID: %s\%s$%s\*
                                                      • API String ID: 3295714881-2848263008
                                                      • Opcode ID: 8e5a15dbfa6556ae8ac79fcb8fdcd9d5c697ea9240cb10633434fdaa9da34813
                                                      • Instruction ID: 308d2fca5881b34be8af7a30c03c4363a924540ae401d536cf9ca5417b20ff13
                                                      • Opcode Fuzzy Hash: 8e5a15dbfa6556ae8ac79fcb8fdcd9d5c697ea9240cb10633434fdaa9da34813
                                                      • Instruction Fuzzy Hash: 2D41B4F5D00209ABDB00EF94DC45BAE77B8AB44308F0449B9E509BB2D1E7399B44CB99
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%