Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
message.com.exe

Overview

General Information

Sample name:message.com.exe
Analysis ID:1446503
MD5:e5128ece1b9916a6df7cd56d66c193c2
SHA1:c99f687b182f3dee71e8434360595832ea431075
SHA256:6c37d14d5ad674e4c0fa8df0a999be6b27399936c9ff16f7fb30b802addb7b4c
Tags:exe
Infos:

Detection

MyDoom
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected MyDoom
AI detected suspicious sample
Drops PE files with benign system names
Drops executables to the windows directory (C:\Windows) and starts them
Exploit detected, runtime environment dropped PE file
Exploit detected, runtime environment starts unknown processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: System File Execution Location Anomaly
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to search for IE or Outlook window (often done to steal information)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • message.com.exe (PID: 6888 cmdline: "C:\Users\user\Desktop\message.com.exe" MD5: E5128ECE1B9916A6DF7CD56D66C193C2)
    • services.exe (PID: 5896 cmdline: "C:\Windows\services.exe" MD5: B0FE74719B1B647E2056641931907F4A)
    • WerFault.exe (PID: 7432 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6888 -s 1196 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • java.exe (PID: 7548 cmdline: "C:\Windows\java.exe" MD5: E5128ECE1B9916A6DF7CD56D66C193C2)
    • services.exe (PID: 7568 cmdline: "C:\Users\user\AppData\Local\Temp\services.exe" MD5: B0FE74719B1B647E2056641931907F4A)
  • services.exe (PID: 7732 cmdline: "C:\Windows\services.exe" MD5: B0FE74719B1B647E2056641931907F4A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmpJoeSecurity_MyDoomYara detected MyDoomJoe Security
    00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_MyDoomYara detected MyDoomJoe Security
      Process Memory Space: message.com.exe PID: 6888JoeSecurity_MyDoomYara detected MyDoomJoe Security
        Process Memory Space: java.exe PID: 7548JoeSecurity_MyDoomYara detected MyDoomJoe Security
          SourceRuleDescriptionAuthorStrings
          8.2.java.exe.500000.0.unpackJoeSecurity_MyDoomYara detected MyDoomJoe Security
            0.2.message.com.exe.500000.0.unpackJoeSecurity_MyDoomYara detected MyDoomJoe Security

              System Summary

              barindex
              Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\Desktop\message.com.exe, ProcessId: 6888, TargetFilename: C:\Windows\services.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: "C:\Windows\services.exe", CommandLine: "C:\Windows\services.exe", CommandLine|base64offset|contains: , Image: C:\Windows\services.exe, NewProcessName: C:\Windows\services.exe, OriginalFileName: C:\Windows\services.exe, ParentCommandLine: "C:\Users\user\Desktop\message.com.exe", ParentImage: C:\Users\user\Desktop\message.com.exe, ParentProcessId: 6888, ParentProcessName: message.com.exe, ProcessCommandLine: "C:\Windows\services.exe", ProcessId: 5896, ProcessName: services.exe
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Windows\java.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\message.com.exe, ProcessId: 6888, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM
              Source: Process startedAuthor: vburov: Data: Command: "C:\Windows\services.exe", CommandLine: "C:\Windows\services.exe", CommandLine|base64offset|contains: , Image: C:\Windows\services.exe, NewProcessName: C:\Windows\services.exe, OriginalFileName: C:\Windows\services.exe, ParentCommandLine: "C:\Users\user\Desktop\message.com.exe", ParentImage: C:\Users\user\Desktop\message.com.exe, ParentProcessId: 6888, ParentProcessName: message.com.exe, ProcessCommandLine: "C:\Windows\services.exe", ProcessId: 5896, ProcessName: services.exe
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: message.com.exeAvira: detected
              Source: C:\Users\user\AppData\Local\Temp\services.exeAvira: detection malicious, Label: BDS/Backdoor.fszhy
              Source: C:\Windows\java.exeAvira: detection malicious, Label: WORM/Mydoom.O.1
              Source: C:\Windows\services.exeAvira: detection malicious, Label: BDS/Backdoor.fszhy
              Source: C:\Users\user\AppData\Local\Temp\services.exeReversingLabs: Detection: 100%
              Source: C:\Users\user\AppData\Local\Temp\services.exeVirustotal: Detection: 84%Perma Link
              Source: C:\Windows\java.exeReversingLabs: Detection: 97%
              Source: C:\Windows\java.exeVirustotal: Detection: 91%Perma Link
              Source: C:\Windows\services.exeReversingLabs: Detection: 100%
              Source: C:\Windows\services.exeVirustotal: Detection: 84%Perma Link
              Source: message.com.exeReversingLabs: Detection: 97%
              Source: message.com.exeVirustotal: Detection: 91%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 95.3% probability
              Source: C:\Users\user\AppData\Local\Temp\services.exeJoe Sandbox ML: detected
              Source: C:\Windows\java.exeJoe Sandbox ML: detected
              Source: C:\Windows\services.exeJoe Sandbox ML: detected
              Source: message.com.exeJoe Sandbox ML: detected
              Source: message.com.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE

              Spreading

              barindex
              Source: Yara matchFile source: 8.2.java.exe.500000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.message.com.exe.500000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: message.com.exe PID: 6888, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: java.exe PID: 7548, type: MEMORYSTR
              Source: C:\Users\user\Desktop\message.com.exeCode function: 0_2_005052AD lstrcat,Sleep,lstrcpy,lstrcpy,lstrlen,lstrcat,lstrcat,memset,FindFirstFileA,FindNextFileA,lstrcpy,lstrlen,lstrcat,lstrcat,Sleep,FindClose,0_2_005052AD
              Source: C:\Windows\java.exeCode function: 8_2_005052AD lstrcat,Sleep,lstrcpy,lstrcpy,lstrlen,lstrcat,lstrcat,memset,FindFirstFileA,FindNextFileA,lstrcpy,lstrlen,lstrcat,lstrcat,Sleep,FindClose,8_2_005052AD
              Source: C:\Windows\java.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
              Source: C:\Windows\java.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
              Source: C:\Windows\java.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
              Source: C:\Windows\java.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
              Source: C:\Windows\java.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
              Source: C:\Windows\java.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior

              Software Vulnerabilities

              barindex
              Source: C:\Windows\java.exeProcess created: C:\Users\user\AppData\Local\Temp\services.exe
              Source: global trafficTCP traffic: 192.168.2.8:49705 -> 15.124.29.93:1034
              Source: global trafficTCP traffic: 192.168.2.8:49712 -> 4.240.78.155:1034
              Source: global trafficTCP traffic: 192.168.2.8:49713 -> 24.196.145.49:1034
              Source: global trafficTCP traffic: 192.168.2.8:49715 -> 159.134.165.119:1034
              Source: global trafficTCP traffic: 192.168.2.8:49716 -> 16.91.195.90:1034
              Source: unknownTCP traffic detected without corresponding DNS query: 15.124.29.93
              Source: unknownTCP traffic detected without corresponding DNS query: 15.124.29.93
              Source: unknownTCP traffic detected without corresponding DNS query: 15.124.29.93
              Source: unknownTCP traffic detected without corresponding DNS query: 15.124.29.93
              Source: unknownTCP traffic detected without corresponding DNS query: 15.124.29.93
              Source: unknownTCP traffic detected without corresponding DNS query: 4.240.78.155
              Source: unknownTCP traffic detected without corresponding DNS query: 4.240.78.155
              Source: unknownTCP traffic detected without corresponding DNS query: 4.240.78.155
              Source: unknownTCP traffic detected without corresponding DNS query: 4.240.78.155
              Source: unknownTCP traffic detected without corresponding DNS query: 4.240.78.155
              Source: unknownTCP traffic detected without corresponding DNS query: 24.196.145.49
              Source: unknownTCP traffic detected without corresponding DNS query: 24.196.145.49
              Source: unknownTCP traffic detected without corresponding DNS query: 24.196.145.49
              Source: unknownTCP traffic detected without corresponding DNS query: 24.196.145.49
              Source: unknownTCP traffic detected without corresponding DNS query: 24.196.145.49
              Source: unknownTCP traffic detected without corresponding DNS query: 159.134.165.119
              Source: unknownTCP traffic detected without corresponding DNS query: 159.134.165.119
              Source: unknownTCP traffic detected without corresponding DNS query: 159.134.165.119
              Source: unknownTCP traffic detected without corresponding DNS query: 159.134.165.119
              Source: unknownTCP traffic detected without corresponding DNS query: 159.134.165.119
              Source: unknownTCP traffic detected without corresponding DNS query: 16.91.195.90
              Source: unknownTCP traffic detected without corresponding DNS query: 16.91.195.90
              Source: unknownTCP traffic detected without corresponding DNS query: 16.91.195.90
              Source: unknownTCP traffic detected without corresponding DNS query: 16.91.195.90
              Source: unknownTCP traffic detected without corresponding DNS query: 16.91.195.90
              Source: C:\Users\user\Desktop\message.com.exeCode function: 0_2_00506AB8 select,recv,0_2_00506AB8
              Source: message.com.exe, 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmpString found in binary or memory: HLOToFrom%s %sSMTPServerSoftware\Microsoft\%s %s Manager\%ssInternetAccountmx.mail.smtp..logzincite"%s"servicesurlmon.dllURLDownloadToCacheFileAhttp://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s&nbq=%dhttp://www.altavista.com/web/results?q=%s&kgs=0&kls=0&n=%dhttp://search.yahoo.com/search?p=%s&ei=UTF-8&fr=fp-tab-web-t&cop=mss&tab=&num=%dhttp://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=%s%s+%s-contact+replymailtoU equals www.yahoo.com (Yahoo)
              Source: message.com.exe, message.com.exe, 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, java.exe, 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmpString found in binary or memory: http://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s
              Source: message.com.exe, 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmpString found in binary or memory: http://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s&nbq=%dhttp://www.altavista.c
              Source: message.com.exe, message.com.exe, 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, java.exe, 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmpString found in binary or memory: http://search.yahoo.com/search?p=%s&ei=UTF-8&fr=fp-tab-web-t&cop=mss&tab=
              Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
              Source: message.com.exe, message.com.exe, 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, java.exe, 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.altavista.com/web/results?q=%s&kgs=0&kls=0
              Source: message.com.exe, message.com.exe, 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, java.exe, 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=%s
              Source: message.com.exe, 00000000.00000002.1500711357.00000000005DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://denmark.smartscre_
              Source: message.com.exe, 00000000.00000002.1500711357.00000000005DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://denmark.smartscre_curlrcom
              Source: message.com.exe, 00000000.00000002.1500711357.00000000005DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://europe.d
              Source: message.com.exe, 00000000.00000002.1500711357.00000000005DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://europe.dbgcreepp
              Source: message.com.exe, 00000000.00000002.1500711357.00000000005DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://southkoreregid.1991-06.com.microsoftza
              Source: message.com.exe, 00000000.00000002.1500711357.00000000005DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unitUSOPrivaten.micrp
              Source: message.com.exe, 00000000.00000002.1500711357.00000000005B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unitedstates2.ss.wd.microsoft
              Source: message.com.exe, 00000000.00000002.1500711357.00000000005B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unitedstates4.ss.wd.microsoft.us

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: Yara matchFile source: 8.2.java.exe.500000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.message.com.exe.500000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: message.com.exe PID: 6888, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: java.exe PID: 7548, type: MEMORYSTR
              Source: C:\Users\user\Desktop\message.com.exeFile created: C:\Windows\services.exeJump to behavior
              Source: C:\Users\user\Desktop\message.com.exeFile created: C:\Windows\java.exeJump to behavior
              Source: C:\Users\user\Desktop\message.com.exeFile created: C:\Windows\java.exeJump to behavior
              Source: C:\Users\user\Desktop\message.com.exeFile created: C:\Windows\java.exe\:Zone.Identifier:$DATAJump to behavior
              Source: C:\Users\user\Desktop\message.com.exeFile deleted: C:\Windows\java.exeJump to behavior
              Source: C:\Users\user\Desktop\message.com.exeCode function: 0_2_005077300_2_00507730
              Source: C:\Users\user\Desktop\message.com.exeCode function: 0_2_005011C90_2_005011C9
              Source: C:\Windows\java.exeCode function: 8_2_005077308_2_00507730
              Source: C:\Windows\java.exeCode function: 8_2_005011C98_2_005011C9
              Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\services.exe BF316F51D0C345D61EAEE3940791B64E81F676E3BCA42BAD61073227BEE6653C
              Source: C:\Users\user\Desktop\message.com.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6888 -s 1196
              Source: message.com.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: classification engineClassification label: mal100.spre.expl.evad.winEXE@8/10@0/6
              Source: C:\Windows\java.exeMutant created: \Sessions\1\BaseNamedObjects\701188root701188root7701188root701188root77
              Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6888
              Source: C:\Users\user\Desktop\message.com.exeFile created: C:\Users\user\AppData\Local\Temp\zincite.logJump to behavior
              Source: C:\Users\user\Desktop\message.com.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: message.com.exeReversingLabs: Detection: 97%
              Source: message.com.exeVirustotal: Detection: 91%
              Source: C:\Users\user\Desktop\message.com.exeFile read: C:\Users\user\Desktop\message.com.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\message.com.exe "C:\Users\user\Desktop\message.com.exe"
              Source: C:\Users\user\Desktop\message.com.exeProcess created: C:\Windows\services.exe "C:\Windows\services.exe"
              Source: C:\Users\user\Desktop\message.com.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6888 -s 1196
              Source: unknownProcess created: C:\Windows\java.exe "C:\Windows\java.exe"
              Source: C:\Windows\java.exeProcess created: C:\Users\user\AppData\Local\Temp\services.exe "C:\Users\user\AppData\Local\Temp\services.exe"
              Source: unknownProcess created: C:\Windows\services.exe "C:\Windows\services.exe"
              Source: C:\Users\user\Desktop\message.com.exeProcess created: C:\Windows\services.exe "C:\Windows\services.exe"Jump to behavior
              Source: C:\Windows\java.exeProcess created: C:\Users\user\AppData\Local\Temp\services.exe "C:\Users\user\AppData\Local\Temp\services.exe"Jump to behavior
              Source: C:\Users\user\Desktop\message.com.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\message.com.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\message.com.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\message.com.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\message.com.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\message.com.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\message.com.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\message.com.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\message.com.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\message.com.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\message.com.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\message.com.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\message.com.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\message.com.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\message.com.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
              Source: C:\Users\user\Desktop\message.com.exeCode function: 0_2_00503620 GetModuleHandleA,LoadLibraryA,GetProcAddress,InternetGetConnectedState,0_2_00503620
              Source: services.exe.0.drStatic PE information: section name: UPX2
              Source: services.exe.8.drStatic PE information: section name: UPX2
              Source: C:\Users\user\Desktop\message.com.exeCode function: 0_2_0050A42D push ds; ret 0_2_0050A42E
              Source: C:\Users\user\Desktop\message.com.exeCode function: 0_2_0050DEA6 push ds; ret 0_2_0050DEBE
              Source: C:\Users\user\Desktop\message.com.exeCode function: 0_2_0050A501 push ecx; retf 0_2_0050A53F
              Source: C:\Users\user\Desktop\message.com.exeCode function: 0_2_0050A50F push ecx; retf 0_2_0050A53F
              Source: C:\Users\user\Desktop\message.com.exeCode function: 0_2_00509BA2 push edx; retf 0_2_00509BAB
              Source: C:\Windows\services.exeCode function: 2_2_00405A55 push es; iretd 2_2_00405A8E
              Source: C:\Windows\java.exeCode function: 8_2_0050A42D push ds; ret 8_2_0050A42E
              Source: C:\Windows\java.exeCode function: 8_2_0050DEA6 push ds; ret 8_2_0050DEBE
              Source: C:\Windows\java.exeCode function: 8_2_0050A501 push ecx; retf 8_2_0050A53F
              Source: C:\Windows\java.exeCode function: 8_2_0050A50F push ecx; retf 8_2_0050A53F
              Source: C:\Windows\java.exeCode function: 8_2_00509BA2 push edx; retf 8_2_00509BAB
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1

              Persistence and Installation Behavior

              barindex
              Source: C:\Users\user\Desktop\message.com.exeFile created: C:\Windows\services.exeJump to dropped file
              Source: C:\Windows\java.exeFile created: C:\Users\user\AppData\Local\Temp\services.exeJump to dropped file
              Source: unknownExecutable created and started: C:\Windows\java.exe
              Source: C:\Users\user\Desktop\message.com.exeExecutable created and started: C:\Windows\services.exeJump to behavior
              Source: C:\Windows\java.exeFile created: services.exe.8.drJump to dropped file
              Source: C:\Users\user\Desktop\message.com.exeFile created: C:\Windows\java.exeJump to dropped file
              Source: C:\Users\user\Desktop\message.com.exeFile created: C:\Windows\services.exeJump to dropped file
              Source: C:\Windows\java.exeFile created: C:\Users\user\AppData\Local\Temp\services.exeJump to dropped file
              Source: C:\Users\user\Desktop\message.com.exeFile created: C:\Windows\java.exeJump to dropped file
              Source: C:\Users\user\Desktop\message.com.exeFile created: C:\Windows\services.exeJump to dropped file
              Source: C:\Users\user\Desktop\message.com.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run JavaVMJump to behavior
              Source: C:\Users\user\Desktop\message.com.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run JavaVMJump to behavior
              Source: C:\Windows\services.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run ServicesJump to behavior
              Source: C:\Windows\services.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run ServicesJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\services.exeWindow / User API: threadDelayed 1426Jump to behavior
              Source: C:\Windows\java.exeWindow / User API: threadDelayed 1380Jump to behavior
              Source: C:\Windows\java.exeWindow / User API: threadDelayed 7702Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeWindow / User API: threadDelayed 2230Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeWindow / User API: threadDelayed 7767Jump to behavior
              Source: C:\Windows\services.exeWindow / User API: threadDelayed 9361Jump to behavior
              Source: C:\Windows\services.exeWindow / User API: threadDelayed 638Jump to behavior
              Source: C:\Windows\java.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_8-3537
              Source: C:\Windows\services.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_2-1036
              Source: C:\Users\user\Desktop\message.com.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-3533
              Source: C:\Users\user\Desktop\message.com.exe TID: 6732Thread sleep time: -56000s >= -30000sJump to behavior
              Source: C:\Windows\services.exe TID: 6380Thread sleep count: 1426 > 30Jump to behavior
              Source: C:\Windows\java.exe TID: 7576Thread sleep count: 1380 > 30Jump to behavior
              Source: C:\Windows\java.exe TID: 7576Thread sleep time: -1104000s >= -30000sJump to behavior
              Source: C:\Windows\java.exe TID: 7552Thread sleep count: 44 > 30Jump to behavior
              Source: C:\Windows\java.exe TID: 7576Thread sleep count: 7702 > 30Jump to behavior
              Source: C:\Windows\java.exe TID: 7576Thread sleep time: -6161600s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exe TID: 7572Thread sleep count: 2230 > 30Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exe TID: 7572Thread sleep time: -557500s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exe TID: 7572Thread sleep count: 7767 > 30Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exe TID: 7572Thread sleep time: -1941750s >= -30000sJump to behavior
              Source: C:\Windows\services.exe TID: 7736Thread sleep count: 9361 > 30Jump to behavior
              Source: C:\Windows\services.exe TID: 7736Thread sleep time: -2340250s >= -30000sJump to behavior
              Source: C:\Windows\services.exe TID: 7736Thread sleep count: 638 > 30Jump to behavior
              Source: C:\Windows\services.exe TID: 7736Thread sleep time: -159500s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\message.com.exeLast function: Thread delayed
              Source: C:\Windows\services.exeLast function: Thread delayed
              Source: C:\Windows\services.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\message.com.exeCode function: 0_2_00505717 GetSystemTime followed by cmp: cmp word ptr [ebp-10h], 07dch and CTI: jbe 00505758h0_2_00505717
              Source: C:\Windows\java.exeCode function: 8_2_00505717 GetSystemTime followed by cmp: cmp word ptr [ebp-10h], 07dch and CTI: jbe 00505758h8_2_00505717
              Source: C:\Users\user\Desktop\message.com.exeCode function: 0_2_005052AD lstrcat,Sleep,lstrcpy,lstrcpy,lstrlen,lstrcat,lstrcat,memset,FindFirstFileA,FindNextFileA,lstrcpy,lstrlen,lstrcat,lstrcat,Sleep,FindClose,0_2_005052AD
              Source: C:\Windows\java.exeCode function: 8_2_005052AD lstrcat,Sleep,lstrcpy,lstrcpy,lstrlen,lstrcat,lstrcat,memset,FindFirstFileA,FindNextFileA,lstrcpy,lstrlen,lstrcat,lstrcat,Sleep,FindClose,8_2_005052AD
              Source: C:\Users\user\Desktop\message.com.exeThread delayed: delay time: 56000Jump to behavior
              Source: C:\Windows\java.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
              Source: C:\Windows\java.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
              Source: C:\Windows\java.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
              Source: C:\Windows\java.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
              Source: C:\Windows\java.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
              Source: C:\Windows\java.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior
              Source: Amcache.hve.6.drBinary or memory string: VMware
              Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
              Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
              Source: Amcache.hve.6.drBinary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67
              Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
              Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
              Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
              Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
              Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: java.exe, 00000008.00000002.2622640497.000000000056E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlld}
              Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
              Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
              Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: services.exe, 00000002.00000002.2622723854.0000000000812000.00000004.00000020.00020000.00000000.sdmp, services.exe, 0000000B.00000002.2624896857.0000000000800000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: services.exe, 00000009.00000002.2622857477.0000000000812000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllw
              Source: Amcache.hve.6.drBinary or memory string: vmci.sys
              Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
              Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
              Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: message.com.exe, 00000000.00000002.1500711357.000000000059E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll2
              Source: Amcache.hve.6.drBinary or memory string: VMware20,1
              Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
              Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
              Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
              Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
              Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
              Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
              Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
              Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
              Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
              Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
              Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
              Source: C:\Windows\services.exeAPI call chain: ExitProcess graph end nodegraph_2-1005
              Source: C:\Users\user\Desktop\message.com.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\message.com.exeCode function: 0_2_00505A45 LdrInitializeThunk,lstrcpy,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcpy,lstrcat,lstrcat,lstrcpy,lstrcpy,0_2_00505A45
              Source: C:\Users\user\Desktop\message.com.exeCode function: 0_2_00503620 GetModuleHandleA,LoadLibraryA,GetProcAddress,InternetGetConnectedState,0_2_00503620
              Source: C:\Users\user\Desktop\message.com.exeCode function: 0_2_00504E00 GetProcessHeap,RtlAllocateHeap,CreateFileA,ReadFile,ReadFile,FindCloseChangeNotification,GetProcessHeap,HeapFree,0_2_00504E00
              Source: C:\Users\user\Desktop\message.com.exeProcess created: C:\Windows\services.exe "C:\Windows\services.exe"Jump to behavior
              Source: C:\Windows\java.exeProcess created: C:\Users\user\AppData\Local\Temp\services.exe "C:\Users\user\AppData\Local\Temp\services.exe"Jump to behavior
              Source: C:\Users\user\Desktop\message.com.exeCode function: 0_2_005032CB lstrlen,GetLocalTime,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeZoneInformation,lstrcat,wsprintfA,0_2_005032CB
              Source: C:\Users\user\Desktop\message.com.exeCode function: 0_2_005032CB lstrlen,GetLocalTime,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeZoneInformation,lstrcat,wsprintfA,0_2_005032CB
              Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
              Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
              Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
              Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
              Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe
              Source: C:\Users\user\Desktop\message.com.exeCode function: 0_2_0050311C FindWindowA,FindWindowA,FindWindowA,FindWindowA,RtlExitUserThread,0_2_0050311C
              Source: C:\Windows\java.exeCode function: 8_2_0050311C FindWindowA,FindWindowA,FindWindowA,FindWindowA,RtlExitUserThread,GetModuleHandleA,GetProcAddress,8_2_0050311C
              Source: C:\Windows\services.exeCode function: 2_2_00401F0E GetProcessHeap,RtlAllocateHeap,htons,htons,socket,closesocket,Sleep,htons,socket,bind,listen,CreateThread,select,Sleep,GetProcessHeap,RtlAllocateHeap,accept,closesocket,accept,GetProcessHeap,HeapFree,CreateThread,CloseHandle,2_2_00401F0E
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Native API
              1
              Registry Run Keys / Startup Folder
              11
              Process Injection
              22
              Masquerading
              OS Credential Dumping12
              System Time Discovery
              Remote Services1
              Email Collection
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts2
              Exploitation for Client Execution
              1
              DLL Side-Loading
              1
              Registry Run Keys / Startup Folder
              21
              Virtualization/Sandbox Evasion
              LSASS Memory131
              Security Software Discovery
              Remote Desktop Protocol1
              Archive Collected Data
              1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              11
              Process Injection
              Security Account Manager21
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive1
              Ingress Tool Transfer
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
              Obfuscated Files or Information
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Software Packing
              LSA Secrets2
              File and Directory Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain Credentials2
              System Information Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              File Deletion
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 1446503 Sample: message.com.exe Startdate: 23/05/2024 Architecture: WINDOWS Score: 100 34 Antivirus / Scanner detection for submitted sample 2->34 36 Multi AV Scanner detection for submitted file 2->36 38 Yara detected MyDoom 2->38 40 5 other signatures 2->40 6 java.exe 1 2->6         started        10 message.com.exe 1 5 2->10         started        12 services.exe 2->12         started        process3 file4 22 C:\Users\user\AppData\Local\...\services.exe, PE32 6->22 dropped 42 Antivirus detection for dropped file 6->42 44 Multi AV Scanner detection for dropped file 6->44 46 Machine Learning detection for dropped file 6->46 52 2 other signatures 6->52 14 services.exe 6->14         started        24 C:\Windows\services.exe, PE32 10->24 dropped 26 C:\Windows\java.exe, PE32 10->26 dropped 48 Drops executables to the windows directory (C:\Windows) and starts them 10->48 50 Drops PE files with benign system names 10->50 17 services.exe 1 1 10->17         started        20 WerFault.exe 19 16 10->20         started        signatures5 process6 dnsIp7 28 4.240.78.155, 1034, 49712 LEVEL3US United States 17->28 30 15.124.29.93, 1034, 49705 HPESUS United States 17->30 32 4 other IPs or domains 17->32 54 Antivirus detection for dropped file 17->54 56 Multi AV Scanner detection for dropped file 17->56 58 Machine Learning detection for dropped file 17->58 signatures8

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              message.com.exe97%ReversingLabsWin32.Worm.Mydoom
              message.com.exe92%VirustotalBrowse
              message.com.exe100%AviraWORM/Mydoom.O.1
              message.com.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Temp\services.exe100%AviraBDS/Backdoor.fszhy
              C:\Windows\java.exe100%AviraWORM/Mydoom.O.1
              C:\Windows\services.exe100%AviraBDS/Backdoor.fszhy
              C:\Users\user\AppData\Local\Temp\services.exe100%Joe Sandbox ML
              C:\Windows\java.exe100%Joe Sandbox ML
              C:\Windows\services.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\services.exe100%ReversingLabsWin32.Worm.Mydoom
              C:\Users\user\AppData\Local\Temp\services.exe85%VirustotalBrowse
              C:\Windows\java.exe97%ReversingLabsWin32.Worm.Mydoom
              C:\Windows\java.exe92%VirustotalBrowse
              C:\Windows\services.exe100%ReversingLabsWin32.Worm.Mydoom
              C:\Windows\services.exe85%VirustotalBrowse
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://upx.sf.net0%URL Reputationsafe
              http://www.altavista.com/web/results?q=%s&kgs=0&kls=00%Avira URL Cloudsafe
              http://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s&nbq=%dhttp://www.altavista.c0%Avira URL Cloudsafe
              http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=%s0%Avira URL Cloudsafe
              https://denmark.smartscre_0%Avira URL Cloudsafe
              https://unitUSOPrivaten.micrp0%Avira URL Cloudsafe
              https://unitedstates2.ss.wd.microsoft0%Avira URL Cloudsafe
              http://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s0%Avira URL Cloudsafe
              https://europe.dbgcreepp0%Avira URL Cloudsafe
              http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=%s1%VirustotalBrowse
              https://europe.d0%Avira URL Cloudsafe
              https://unitedstates2.ss.wd.microsoft0%VirustotalBrowse
              http://search.yahoo.com/search?p=%s&ei=UTF-8&fr=fp-tab-web-t&cop=mss&tab=0%Avira URL Cloudsafe
              https://denmark.smartscre_curlrcom0%Avira URL Cloudsafe
              https://unitedstates4.ss.wd.microsoft.us0%Avira URL Cloudsafe
              https://southkoreregid.1991-06.com.microsoftza0%Avira URL Cloudsafe
              http://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s0%VirustotalBrowse
              http://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s&nbq=%dhttp://www.altavista.c0%VirustotalBrowse
              https://unitedstates4.ss.wd.microsoft.us0%VirustotalBrowse
              http://search.yahoo.com/search?p=%s&ei=UTF-8&fr=fp-tab-web-t&cop=mss&tab=0%VirustotalBrowse
              http://www.altavista.com/web/results?q=%s&kgs=0&kls=00%VirustotalBrowse
              No contacted domains info
              NameSourceMaliciousAntivirus DetectionReputation
              https://unitUSOPrivaten.micrpmessage.com.exe, 00000000.00000002.1500711357.00000000005DE000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.altavista.com/web/results?q=%s&kgs=0&kls=0message.com.exe, message.com.exe, 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, java.exe, 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=%smessage.com.exe, message.com.exe, 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, java.exe, 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmpfalse
              • 1%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://denmark.smartscre_message.com.exe, 00000000.00000002.1500711357.00000000005DE000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s&nbq=%dhttp://www.altavista.cmessage.com.exe, 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://unitedstates2.ss.wd.microsoftmessage.com.exe, 00000000.00000002.1500711357.00000000005B4000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://upx.sf.netAmcache.hve.6.drfalse
              • URL Reputation: safe
              unknown
              https://europe.dbgcreeppmessage.com.exe, 00000000.00000002.1500711357.00000000005DE000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%smessage.com.exe, message.com.exe, 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, java.exe, 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://europe.dmessage.com.exe, 00000000.00000002.1500711357.00000000005DE000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://search.yahoo.com/search?p=%s&ei=UTF-8&fr=fp-tab-web-t&cop=mss&tab=message.com.exe, message.com.exe, 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, java.exe, 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://denmark.smartscre_curlrcommessage.com.exe, 00000000.00000002.1500711357.00000000005DE000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://unitedstates4.ss.wd.microsoft.usmessage.com.exe, 00000000.00000002.1500711357.00000000005B4000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://southkoreregid.1991-06.com.microsoftzamessage.com.exe, 00000000.00000002.1500711357.00000000005DE000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              15.124.29.93
              unknownUnited States
              1874HPESUSfalse
              4.240.78.155
              unknownUnited States
              3356LEVEL3USfalse
              159.134.165.119
              unknownIreland
              5466EIRCOMInternetHouseIEfalse
              16.91.195.90
              unknownUnited States
              unknownunknownfalse
              24.196.145.49
              unknownUnited States
              20115CHARTER-20115USfalse
              IP
              192.168.1.64
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1446503
              Start date and time:2024-05-23 15:13:05 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 7m 10s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:15
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Sample name:message.com.exe
              Detection:MAL
              Classification:mal100.spre.expl.evad.winEXE@8/10@0/6
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 55
              • Number of non-executed functions: 76
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 20.42.73.29
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size exceeded maximum capacity and may have missing behavior information.
              • Report size getting too big, too many NtQueryValueKey calls found.
              TimeTypeDescription
              09:13:54API Interceptor1x Sleep call for process: message.com.exe modified
              09:14:08API Interceptor1x Sleep call for process: WerFault.exe modified
              09:14:38API Interceptor930461x Sleep call for process: java.exe modified
              09:14:39API Interceptor387746x Sleep call for process: services.exe modified
              15:13:55AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run JavaVM C:\Windows\java.exe
              15:14:04AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run Services C:\Windows\services.exe
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              4.240.78.155AHnFoINkgu.exeGet hashmaliciousMyDoomBrowse
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                CHARTER-20115USgm7Kudjyws.elfGet hashmaliciousGafgytBrowse
                • 47.46.33.144
                6uBxa0vGQt.elfGet hashmaliciousGafgytBrowse
                • 47.39.126.138
                UTHyAUOVPD.elfGet hashmaliciousMiraiBrowse
                • 68.187.128.74
                6YyUQU3was.elfGet hashmaliciousMiraiBrowse
                • 47.6.68.123
                S4kCacU4pQ.elfGet hashmaliciousGafgyt, MiraiBrowse
                • 71.9.59.238
                hCNsvwoPS6.elfGet hashmaliciousUnknownBrowse
                • 97.94.126.144
                qwmLv2FcgD.elfGet hashmaliciousUnknownBrowse
                • 66.214.254.218
                https://teiegeram-hk.com/Get hashmaliciousUnknownBrowse
                • 47.238.230.216
                O7HAqYMIla.elfGet hashmaliciousGafgyt, MiraiBrowse
                • 47.6.192.223
                file.exeGet hashmaliciousFormBookBrowse
                • 47.238.226.135
                LEVEL3USyzKJORP7Q4.elfGet hashmaliciousMirai, MoobotBrowse
                • 195.122.148.75
                AsrP4dFOgM.elfGet hashmaliciousMirai, MoobotBrowse
                • 207.120.23.151
                4rg5Y5MHO8.elfGet hashmaliciousMirai, MoobotBrowse
                • 195.122.148.75
                gJlGkncVHO.elfGet hashmaliciousMirai, MoobotBrowse
                • 4.60.94.244
                j55aXfhPv3.elfGet hashmaliciousMirai, MoobotBrowse
                • 9.229.188.157
                gm7Kudjyws.elfGet hashmaliciousGafgytBrowse
                • 9.118.129.82
                vZBUQqNWgr.elfGet hashmaliciousMiraiBrowse
                • 9.14.76.91
                n8RoxsQ4om.elfGet hashmaliciousMiraiBrowse
                • 4.149.11.172
                Xi102MnZby.elfGet hashmaliciousMiraiBrowse
                • 8.195.231.20
                6YyUQU3was.elfGet hashmaliciousMiraiBrowse
                • 8.126.41.29
                EIRCOMInternetHouseIEN4OvIeLPCh.elfGet hashmaliciousMiraiBrowse
                • 159.134.126.188
                X7xw44e4Ob.elfGet hashmaliciousMiraiBrowse
                • 86.45.72.235
                3noHaWnI4J.elfGet hashmaliciousUnknownBrowse
                • 86.40.46.11
                16sbYI4aDX.elfGet hashmaliciousUnknownBrowse
                • 86.47.233.103
                BduAJLAMAy.elfGet hashmaliciousMirai, OkiruBrowse
                • 217.183.76.102
                240506-b7lv1sfmcw_pw_infected.zipGet hashmaliciousXmrigBrowse
                • 83.70.50.205
                bot.mips.elfGet hashmaliciousUnknownBrowse
                • 86.40.46.45
                2AAH1UYstb.elfGet hashmaliciousMiraiBrowse
                • 86.40.46.63
                arm7.elfGet hashmaliciousMiraiBrowse
                • 217.183.204.139
                gVPlpwuoVV.elfGet hashmaliciousMiraiBrowse
                • 86.41.149.5
                HPESUSzDAH4anUtC.elfGet hashmaliciousUnknownBrowse
                • 205.239.207.228
                bqHlnibJh9.elfGet hashmaliciousMiraiBrowse
                • 205.239.255.111
                nnrBAc4RLp.elfGet hashmaliciousMiraiBrowse
                • 66.54.49.18
                pagtZwlU1G.elfGet hashmaliciousUnknownBrowse
                • 15.141.5.31
                GSzQSyqWKB.elfGet hashmaliciousMiraiBrowse
                • 66.54.49.22
                z9QVrRPbJc.elfGet hashmaliciousUnknownBrowse
                • 15.210.207.16
                ZMDO0vznFx.elfGet hashmaliciousUnknownBrowse
                • 15.127.198.185
                lS9yzwGRef.elfGet hashmaliciousMiraiBrowse
                • 204.230.188.223
                UuD1zt2QpK.elfGet hashmaliciousMiraiBrowse
                • 170.213.223.118
                2xPVyj2lU8.elfGet hashmaliciousMiraiBrowse
                • 15.140.91.155
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                C:\Users\user\AppData\Local\Temp\services.exejava.exeGet hashmaliciousMyDoomBrowse
                  .scr.exeGet hashmaliciousMyDoomBrowse
                    File.scr.exeGet hashmaliciousMyDoomBrowse
                      document.scr.exeGet hashmaliciousMyDoomBrowse
                        document.scr.exeGet hashmaliciousMyDoomBrowse
                          gildong@hongs.com.exeGet hashmaliciousMyDoomBrowse
                            .com.exeGet hashmaliciousMyDoomBrowse
                              mail.txt .exeGet hashmaliciousMyDoomBrowse
                                instruction.scr.exeGet hashmaliciousMyDoomBrowse
                                  .scr.exeGet hashmaliciousMyDoomBrowse
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):65536
                                    Entropy (8bit):0.8568673996956846
                                    Encrypted:false
                                    SSDEEP:96:bZF6Wdh0nsRhM1yDfwQXIDcQvc6QcEVcw3cE/n+HbHg/opAnQzOqg7TlOy4aEuFZ:dAESnE0BU/gjdKzuiFlZ24IO8m
                                    MD5:E848028BB17E825EDBFA9B979C8504A2
                                    SHA1:ED7C6EC84289994D7CF4D35D3E0C64F7B6F06DCE
                                    SHA-256:DD4AEEE1437639FCCD21879266ED9F43014A65BD8B47B70043C6C06BCC5E09A7
                                    SHA-512:74F672708BA4EC180FF2536C6200F9C6C8083B85DCA1C18D06F2764955301701CE05EFDCC522C0DF831E1982603C2B9779E36BEA2A6D345F7E20230A72B3B8B8
                                    Malicious:false
                                    Reputation:low
                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.0.9.4.3.6.4.2.4.9.3.2.6.6.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.0.9.4.3.6.4.2.9.1.5.1.5.8.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.2.7.a.1.6.b.7.-.0.a.f.0.-.4.c.1.f.-.b.8.5.f.-.b.3.b.6.0.0.1.c.5.4.2.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.a.a.c.b.2.7.d.-.5.8.b.a.-.4.e.0.3.-.b.c.f.a.-.1.8.e.a.d.0.3.1.8.2.1.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.m.e.s.s.a.g.e...c.o.m...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.e.8.-.0.0.0.1.-.0.0.1.4.-.1.0.1.6.-.d.c.0.f.1.3.a.d.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.6.e.9.2.8.3.d.6.a.0.f.6.8.a.3.f.3.9.7.a.8.7.e.7.e.d.b.0.d.a.7.d.0.0.0.0.f.f.f.f.!.0.0.0.0.c.9.9.f.6.8.7.b.1.8.2.f.3.d.e.e.7.1.e.8.4.3.4.3.6.0.5.9.5.8.3.2.e.a.4.3.1.0.7.5.!.m.e.s.s.a.g.e...c.o.m...e.x.e.....T.a.r.g.e.t.A.
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Mini DuMP crash report, 14 streams, Thu May 23 13:14:02 2024, 0x1205a4 type
                                    Category:dropped
                                    Size (bytes):99262
                                    Entropy (8bit):1.977843795848732
                                    Encrypted:false
                                    SSDEEP:384:kMqoys/4EtjvwVlMU4hZgQERGgY1ttp4cugcbEgbQ8DgnkkDr71:kyP/4Etjvw/MU4hrEcgYRpuRI7
                                    MD5:0B6D6470B86E7A3E87C6A55F817B9519
                                    SHA1:92C801A2CD7F1F49E32E3EFA03F561ACA8489172
                                    SHA-256:8CA59B520D5E57EF917FE793D9EC6E180B058B6ED1D6895C3FFEE64CE1346992
                                    SHA-512:76A73A48BF056A47F014F7FF97445C4F8E7DB19C25D1D4FB37B826550D0A8A8BCF8A8AC54E9B17C87D5BB0D400582C4E1760D73ED37708F87580C599BD14ECB4
                                    Malicious:false
                                    Reputation:low
                                    Preview:MDMP..a..... ........AOf........................................0>..........T.......8...........T............/...T......................x...............................................................................eJ..............GenuineIntel............T............AOf.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):8334
                                    Entropy (8bit):3.6928575628570646
                                    Encrypted:false
                                    SSDEEP:192:R6l7wVeJTS6RK6YS+SU9JFgmfyJjRprk89b/ysfi1m:R6lXJG6M6YbSU9JFgmfyJjN/xfp
                                    MD5:67D75DD3B5795AC758F64B022996C708
                                    SHA1:0FF780F7EB7E1FD75DB00BCA377F2F02C2561852
                                    SHA-256:A1FC779693DEEAA7993BCADF5D85E99E0D1F86BBAC56FC0EA10F8BD132E746CA
                                    SHA-512:5EBBD259610156DE3DFDE2C261ED7AFE9AB374F8C3DEFAD2AD630EC5A630B86DDDD97E26E219F569B878F98857129672DA3B42BC298FCD8503C31126C94D540C
                                    Malicious:false
                                    Reputation:low
                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.8.8.8.<./.P.i.
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):4590
                                    Entropy (8bit):4.424182974969968
                                    Encrypted:false
                                    SSDEEP:48:cvIwWl8zsFJg77aI9zYWpW8VYEYm8M4JJ8F1m+q8VdutWh31Ed:uIjffI7JR7VUJYm0utWh31Ed
                                    MD5:D8D4DE2B29ED4761AB6AD14A83A0A49A
                                    SHA1:76CF10EB0893C73098E24245E2DCED4C1911A8DE
                                    SHA-256:05D71F426D7C82552AE654DFC2418C85731CCCB656C87C83571A327A62E54A9E
                                    SHA-512:2A23E198587DBBC3C61CA2EF6ABC831A4C305D5C5966F3B5021890CEAB92EFB96AE242E05026E404F06189B6A37DF46712DBE4186C81B0FB00B5858A403C3E14
                                    Malicious:false
                                    Reputation:low
                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="335776" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                    Process:C:\Windows\java.exe
                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                    Category:dropped
                                    Size (bytes):8192
                                    Entropy (8bit):6.951274251785221
                                    Encrypted:false
                                    SSDEEP:192:tZWNqWKIzebvOZnzCj6juhEJS3/Uf/tpfmG62X9f3:tZ6qWTYvczfahX/UHtF6e9f3
                                    MD5:B0FE74719B1B647E2056641931907F4A
                                    SHA1:E858C206D2D1542A79936CB00D85DA853BFC95E2
                                    SHA-256:BF316F51D0C345D61EAEE3940791B64E81F676E3BCA42BAD61073227BEE6653C
                                    SHA-512:9C82E88264696D0DADEF9C0442AD8D1183E48F0FB355A4FC9BF4FA5DB4E27745039F98B1FD1FEBFF620A5DED6DD493227F00D7D2E74B19757685AA8655F921C2
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Avira, Detection: 100%
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    • Antivirus: ReversingLabs, Detection: 100%
                                    • Antivirus: Virustotal, Detection: 85%, Browse
                                    Joe Sandbox View:
                                    • Filename: java.exe, Detection: malicious, Browse
                                    • Filename: .scr.exe, Detection: malicious, Browse
                                    • Filename: File.scr.exe, Detection: malicious, Browse
                                    • Filename: document.scr.exe, Detection: malicious, Browse
                                    • Filename: document.scr.exe, Detection: malicious, Browse
                                    • Filename: gildong@hongs.com.exe, Detection: malicious, Browse
                                    • Filename: .com.exe, Detection: malicious, Browse
                                    • Filename: mail.txt .exe, Detection: malicious, Browse
                                    • Filename: instruction.scr.exe, Detection: malicious, Browse
                                    • Filename: .scr.exe, Detection: malicious, Browse
                                    Reputation:moderate, very likely benign file
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................................................................PE..L........................ .......@..pg...P...p....@..........................................................................p......................................................................................................................UPX0.....@..............................UPX1..... ...P......................@...UPX2.........p......................@..............................................................................................................................................................................................................................................................................................................................................................................................................................................1.24.UPX!....
                                    Process:C:\Users\user\Desktop\message.com.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):1184
                                    Entropy (8bit):7.795514762507085
                                    Encrypted:false
                                    SSDEEP:24:TviXk7ETV5CXcNvHn6zBXTKFu+v3lAd2OcBaAaS/:TviXk7ET7CsPlud2O4aAx
                                    MD5:99EAC78C50F59FB1ABD6FE2D24B626B4
                                    SHA1:ED0F4878EE2991DEE65BBCADEDA817F25E766660
                                    SHA-256:864228C23218197BF3AB9B125CB222744643101B0BB20925C28AA6F700075677
                                    SHA-512:F7174858FE7027768EEC922370371DF7E080571FD582C7473CB854B9AB4BED11688CDD334FB0317298B1A2F16D64C4CB82F5A7E4B0A3809955150638EFFD3FE1
                                    Malicious:false
                                    Reputation:low
                                    Preview:..`....^..._.NN.@;7.@.r...0..(...E....j.Y.j.>..B6.q..k...k.>..h.;M.B7.g...$4.g..^.......g.....<H.l..{..\.lW/f.W./]\....c..I.ex.3y..y..1r.3{#........c...0..V\...*.`\...U..[......s.W.\...$.H..>W.."W.d.H..F..$...X.ZE....c.6..xZE.....$.G..6..RW.th.Yp.1X....h.X..=Y....$.......[.&....3E...3.....q:...^f..Q......q.......?...k...P+.A...A..1G%..xr...XL......D...].*@....6..8?....X...V8..X..z.qc@X...c...o....#7...f..A.P..]_~..9..x...X......#n..e.AEq.:je.A?......k.U....bo.....#<.j.\...3%...%j.\...8.}b....z}b.}b...EV..7....}....A.C....I.:..3.^...U.y.AR3(..k.vL...K.R..vv.......1f.K..i.N{VG..y..:.....`M....VG.. v....z.......,..&....?..2.:.V.x.....C.GPy.+.y.2-.+.yH.~...6.v..aIK-...,...%...,.IK/.IK-.....",.P.....{...#Q..{...{.......{..wx.=....cB..w..H/.H/..H/.....r...%.NN%.%%.Z}j.T.$.Z}j~N..|..e.N._.N....K...qJ.E....K...u."?\.`..:"mZ:)...u.o.u....s...R..}.M%._M%.k.......v!...M%....(..7uCF..C.............W. ....[......0d.O.]NQ.MO.d.O..k..F...,[.V`..
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:MS Windows registry file, NT/2000 or above
                                    Category:dropped
                                    Size (bytes):1835008
                                    Entropy (8bit):4.372055515072458
                                    Encrypted:false
                                    SSDEEP:6144:1FVfpi6ceLP/9skLmb0ayWWSPtaJG8nAge35OlMMhA2AX4WABlguN4iL:zV1QyWWI/glMM6kF7eq
                                    MD5:1EF560964D6B2495B7641A7A6AD0A045
                                    SHA1:5E786957A509884124C673B16A91FF3FB39AC58F
                                    SHA-256:B865A591EA1ABB4BF24A27BA3B9C4AB437DB90CF61BFF722814A372EF0013828
                                    SHA-512:192ED9FE41DD5D343E20C6EFFB9B6AF8F6A7B85B8F30BADB75E3434ACEC35A2142E5006F7B74CB84ECC61A71F37286830874326993BA7AD75D407ACC9D4A8786
                                    Malicious:false
                                    Reputation:low
                                    Preview:regfC...C....\.Z.................... ....0......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm:....................................................................................................................................................................................................................................................................................................................................................z. ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\message.com.exe
                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                    Category:dropped
                                    Size (bytes):28864
                                    Entropy (8bit):7.564388249755126
                                    Encrypted:false
                                    SSDEEP:384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyNHS6e:Dv8IRRdsxq1DjJcqfH
                                    MD5:E5128ECE1B9916A6DF7CD56D66C193C2
                                    SHA1:C99F687B182F3DEE71E8434360595832EA431075
                                    SHA-256:6C37D14D5AD674E4C0FA8DF0A999BE6B27399936C9FF16F7FB30B802ADDB7B4C
                                    SHA-512:67B9166F33C78140CE2259DF9A7BAE92E6CAE066B7F54CB0EBDEC183EF1FFAF958F6CD24B0BB01E2B6A302FB73E9C5C057554C825E1496EF3B679E77DD7715AF
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Avira, Detection: 100%
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    • Antivirus: ReversingLabs, Detection: 97%
                                    • Antivirus: Virustotal, Detection: 92%, Browse
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...............................................................................................PE..L........................`........................P.............................................................................0...................................................................................................................UPX0....................................UPX1.....`.......`..................@....rsrc................d..............@......................................................................................................................................................................................................................................................................................................................................................................................................................1.24.UPX!....
                                    Process:C:\Users\user\Desktop\message.com.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:modified
                                    Size (bytes):26
                                    Entropy (8bit):3.95006375643621
                                    Encrypted:false
                                    SSDEEP:3:ggPYV:rPYV
                                    MD5:187F488E27DB4AF347237FE461A079AD
                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                    Malicious:false
                                    Preview:[ZoneTransfer]....ZoneId=0
                                    Process:C:\Users\user\Desktop\message.com.exe
                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                    Category:dropped
                                    Size (bytes):8192
                                    Entropy (8bit):6.951274251785221
                                    Encrypted:false
                                    SSDEEP:192:tZWNqWKIzebvOZnzCj6juhEJS3/Uf/tpfmG62X9f3:tZ6qWTYvczfahX/UHtF6e9f3
                                    MD5:B0FE74719B1B647E2056641931907F4A
                                    SHA1:E858C206D2D1542A79936CB00D85DA853BFC95E2
                                    SHA-256:BF316F51D0C345D61EAEE3940791B64E81F676E3BCA42BAD61073227BEE6653C
                                    SHA-512:9C82E88264696D0DADEF9C0442AD8D1183E48F0FB355A4FC9BF4FA5DB4E27745039F98B1FD1FEBFF620A5DED6DD493227F00D7D2E74B19757685AA8655F921C2
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Avira, Detection: 100%
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    • Antivirus: ReversingLabs, Detection: 100%
                                    • Antivirus: Virustotal, Detection: 85%, Browse
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................................................................PE..L........................ .......@..pg...P...p....@..........................................................................p......................................................................................................................UPX0.....@..............................UPX1..... ...P......................@...UPX2.........p......................@..............................................................................................................................................................................................................................................................................................................................................................................................................................................1.24.UPX!....
                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                    Entropy (8bit):7.564388249755126
                                    TrID:
                                    • Win32 Executable (generic) a (10002005/4) 99.37%
                                    • UPX compressed Win32 Executable (30571/9) 0.30%
                                    • Win32 EXE Yoda's Crypter (26571/9) 0.26%
                                    • Clipper DOS Executable (2020/12) 0.02%
                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                    File name:message.com.exe
                                    File size:28'864 bytes
                                    MD5:e5128ece1b9916a6df7cd56d66c193c2
                                    SHA1:c99f687b182f3dee71e8434360595832ea431075
                                    SHA256:6c37d14d5ad674e4c0fa8df0a999be6b27399936c9ff16f7fb30b802addb7b4c
                                    SHA512:67b9166f33c78140ce2259df9a7bae92e6cae066b7f54cb0ebdec183ef1ffaf958f6cd24b0bb01e2b6a302fb73e9c5c057554c825e1496ef3b679e77dd7715af
                                    SSDEEP:384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyNHS6e:Dv8IRRdsxq1DjJcqfH
                                    TLSH:72D2C091B040B6E2D05682731D86C462F8129D600A9BD2CBB724BF7FFDF23854B0DD26
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...............................................................................................PE..L........................`.........
                                    Icon Hash:9361c4a092b08082
                                    Entrypoint:0x50ed00
                                    Entrypoint Section:UPX1
                                    Digitally signed:false
                                    Imagebase:0x500000
                                    Subsystem:windows gui
                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                    DLL Characteristics:
                                    Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:98cd465c2ab2841f9fd90d5e847563f4
                                    Instruction
                                    pushad
                                    mov esi, 00509000h
                                    lea edi, dword ptr [esi-00008000h]
                                    push edi
                                    or ebp, FFFFFFFFh
                                    jmp 00007F03ACB31D02h
                                    nop
                                    nop
                                    nop
                                    nop
                                    nop
                                    nop
                                    mov al, byte ptr [esi]
                                    inc esi
                                    mov byte ptr [edi], al
                                    inc edi
                                    add ebx, ebx
                                    jne 00007F03ACB31CF9h
                                    mov ebx, dword ptr [esi]
                                    sub esi, FFFFFFFCh
                                    adc ebx, ebx
                                    jc 00007F03ACB31CDFh
                                    mov eax, 00000001h
                                    add ebx, ebx
                                    jne 00007F03ACB31CF9h
                                    mov ebx, dword ptr [esi]
                                    sub esi, FFFFFFFCh
                                    adc ebx, ebx
                                    adc eax, eax
                                    add ebx, ebx
                                    jnc 00007F03ACB31CE1h
                                    jne 00007F03ACB31CFBh
                                    mov ebx, dword ptr [esi]
                                    sub esi, FFFFFFFCh
                                    adc ebx, ebx
                                    jnc 00007F03ACB31CD6h
                                    xor ecx, ecx
                                    sub eax, 03h
                                    jc 00007F03ACB31CFFh
                                    shl eax, 08h
                                    mov al, byte ptr [esi]
                                    inc esi
                                    xor eax, FFFFFFFFh
                                    je 00007F03ACB31D66h
                                    mov ebp, eax
                                    add ebx, ebx
                                    jne 00007F03ACB31CF9h
                                    mov ebx, dword ptr [esi]
                                    sub esi, FFFFFFFCh
                                    adc ebx, ebx
                                    adc ecx, ecx
                                    add ebx, ebx
                                    jne 00007F03ACB31CF9h
                                    mov ebx, dword ptr [esi]
                                    sub esi, FFFFFFFCh
                                    adc ebx, ebx
                                    adc ecx, ecx
                                    jne 00007F03ACB31D12h
                                    inc ecx
                                    add ebx, ebx
                                    jne 00007F03ACB31CF9h
                                    mov ebx, dword ptr [esi]
                                    sub esi, FFFFFFFCh
                                    adc ebx, ebx
                                    adc ecx, ecx
                                    add ebx, ebx
                                    jnc 00007F03ACB31CE1h
                                    jne 00007F03ACB31CFBh
                                    mov ebx, dword ptr [esi]
                                    sub esi, FFFFFFFCh
                                    adc ebx, ebx
                                    jnc 00007F03ACB31CD6h
                                    add ecx, 02h
                                    cmp ebp, FFFFF300h
                                    adc ecx, 01h
                                    lea edx, dword ptr [edi+ebp]
                                    cmp ebp, FFFFFFFCh
                                    jbe 00007F03ACB31D01h
                                    mov al, byte ptr [edx]
                                    inc edx
                                    mov byte ptr [edi], al
                                    inc edi
                                    dec ecx
                                    jne 00007F03ACB31CE9h
                                    jmp 00007F03ACB31C58h
                                    nop
                                    mov eax, dword ptr [edx]
                                    add edx, 04h
                                    mov dword ptr [edi], eax
                                    add edi, 04h
                                    sub ecx, 00000000h
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xf5140x130.rsrc
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xf0000x514.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    UPX00x10000x80000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    UPX10x90000x60000x600020cc7d301223a53410f8b542bb816f9aFalse0.971923828125data7.859086691322967IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .rsrc0xf0000x10000x80060d328df3a5dff05a8db261a75a0dedaFalse0.27880859375data2.6542421841999686IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_ICON0xf0d80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.2782258064516129
                                    RT_ICON0xf3c40x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.4189189189189189
                                    RT_GROUP_ICON0xf4f00x22dataEnglishUnited States1.0
                                    DLLImport
                                    KERNEL32.DLLLoadLibraryA, GetProcAddress, ExitProcess
                                    ADVAPI32.dllRegCloseKey
                                    MSVCRT.dllmemset
                                    USER32.dllwsprintfA
                                    WS2_32.dllgethostname
                                    Language of compilation systemCountry where language is spokenMap
                                    EnglishUnited States
                                    TimestampSource PortDest PortSource IPDest IP
                                    May 23, 2024 15:13:56.199729919 CEST497051034192.168.2.815.124.29.93
                                    May 23, 2024 15:13:56.204732895 CEST10344970515.124.29.93192.168.2.8
                                    May 23, 2024 15:13:56.204822063 CEST497051034192.168.2.815.124.29.93
                                    May 23, 2024 15:13:56.208085060 CEST497051034192.168.2.815.124.29.93
                                    May 23, 2024 15:13:56.256030083 CEST10344970515.124.29.93192.168.2.8
                                    May 23, 2024 15:14:17.612704992 CEST10344970515.124.29.93192.168.2.8
                                    May 23, 2024 15:14:17.612771988 CEST497051034192.168.2.815.124.29.93
                                    May 23, 2024 15:14:17.612983942 CEST497051034192.168.2.815.124.29.93
                                    May 23, 2024 15:14:17.613805056 CEST497121034192.168.2.84.240.78.155
                                    May 23, 2024 15:14:17.669143915 CEST10344970515.124.29.93192.168.2.8
                                    May 23, 2024 15:14:17.719350100 CEST1034497124.240.78.155192.168.2.8
                                    May 23, 2024 15:14:17.719434977 CEST497121034192.168.2.84.240.78.155
                                    May 23, 2024 15:14:17.719491005 CEST497121034192.168.2.84.240.78.155
                                    May 23, 2024 15:14:17.773034096 CEST1034497124.240.78.155192.168.2.8
                                    May 23, 2024 15:14:39.139288902 CEST1034497124.240.78.155192.168.2.8
                                    May 23, 2024 15:14:39.139518976 CEST497121034192.168.2.84.240.78.155
                                    May 23, 2024 15:14:39.139518976 CEST497121034192.168.2.84.240.78.155
                                    May 23, 2024 15:14:39.140522003 CEST497131034192.168.2.824.196.145.49
                                    May 23, 2024 15:14:39.192744970 CEST1034497124.240.78.155192.168.2.8
                                    May 23, 2024 15:14:39.239397049 CEST10344971324.196.145.49192.168.2.8
                                    May 23, 2024 15:14:39.239522934 CEST497131034192.168.2.824.196.145.49
                                    May 23, 2024 15:14:39.239590883 CEST497131034192.168.2.824.196.145.49
                                    May 23, 2024 15:14:39.296145916 CEST10344971324.196.145.49192.168.2.8
                                    May 23, 2024 15:15:00.645147085 CEST10344971324.196.145.49192.168.2.8
                                    May 23, 2024 15:15:00.645246029 CEST497131034192.168.2.824.196.145.49
                                    May 23, 2024 15:15:00.645279884 CEST497131034192.168.2.824.196.145.49
                                    May 23, 2024 15:15:00.652292013 CEST497151034192.168.2.8159.134.165.119
                                    May 23, 2024 15:15:00.657354116 CEST10344971324.196.145.49192.168.2.8
                                    May 23, 2024 15:15:00.707402945 CEST103449715159.134.165.119192.168.2.8
                                    May 23, 2024 15:15:00.707582951 CEST497151034192.168.2.8159.134.165.119
                                    May 23, 2024 15:15:00.715615988 CEST497151034192.168.2.8159.134.165.119
                                    May 23, 2024 15:15:00.763462067 CEST103449715159.134.165.119192.168.2.8
                                    May 23, 2024 15:15:22.131966114 CEST103449715159.134.165.119192.168.2.8
                                    May 23, 2024 15:15:22.132095098 CEST497151034192.168.2.8159.134.165.119
                                    May 23, 2024 15:15:22.561502934 CEST497151034192.168.2.8159.134.165.119
                                    May 23, 2024 15:15:22.563697100 CEST497161034192.168.2.816.91.195.90
                                    May 23, 2024 15:15:22.566627979 CEST103449715159.134.165.119192.168.2.8
                                    May 23, 2024 15:15:22.571651936 CEST10344971616.91.195.90192.168.2.8
                                    May 23, 2024 15:15:22.571789980 CEST497161034192.168.2.816.91.195.90
                                    May 23, 2024 15:15:22.588049889 CEST497161034192.168.2.816.91.195.90
                                    May 23, 2024 15:15:22.624295950 CEST10344971616.91.195.90192.168.2.8
                                    May 23, 2024 15:15:43.976439953 CEST10344971616.91.195.90192.168.2.8
                                    May 23, 2024 15:15:43.976541996 CEST497161034192.168.2.816.91.195.90
                                    May 23, 2024 15:15:43.977761030 CEST497171034192.168.2.8192.168.1.64
                                    May 23, 2024 15:15:43.978130102 CEST497161034192.168.2.816.91.195.90
                                    May 23, 2024 15:15:44.032623053 CEST103449717192.168.1.64192.168.2.8
                                    May 23, 2024 15:15:44.032718897 CEST497171034192.168.2.8192.168.1.64
                                    May 23, 2024 15:15:44.033354044 CEST497171034192.168.2.8192.168.1.64
                                    May 23, 2024 15:15:44.037688017 CEST10344971616.91.195.90192.168.2.8
                                    May 23, 2024 15:15:44.042493105 CEST103449717192.168.1.64192.168.2.8
                                    May 23, 2024 15:16:05.417108059 CEST103449717192.168.1.64192.168.2.8
                                    May 23, 2024 15:16:05.417193890 CEST497171034192.168.2.8192.168.1.64
                                    May 23, 2024 15:16:05.417237997 CEST497171034192.168.2.8192.168.1.64
                                    May 23, 2024 15:16:05.468353987 CEST103449717192.168.1.64192.168.2.8

                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:09:13:54
                                    Start date:23/05/2024
                                    Path:C:\Users\user\Desktop\message.com.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\message.com.exe"
                                    Imagebase:0x500000
                                    File size:28'864 bytes
                                    MD5 hash:E5128ECE1B9916A6DF7CD56D66C193C2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_MyDoom, Description: Yara detected MyDoom, Source: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                    Reputation:low
                                    Has exited:true

                                    Target ID:2
                                    Start time:09:13:54
                                    Start date:23/05/2024
                                    Path:C:\Windows\services.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Windows\services.exe"
                                    Imagebase:0x400000
                                    File size:8'192 bytes
                                    MD5 hash:B0FE74719B1B647E2056641931907F4A
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Antivirus matches:
                                    • Detection: 100%, Avira
                                    • Detection: 100%, Joe Sandbox ML
                                    • Detection: 100%, ReversingLabs
                                    • Detection: 85%, Virustotal, Browse
                                    Reputation:moderate
                                    Has exited:false

                                    Target ID:6
                                    Start time:09:14:02
                                    Start date:23/05/2024
                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6888 -s 1196
                                    Imagebase:0x90000
                                    File size:483'680 bytes
                                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:8
                                    Start time:09:14:04
                                    Start date:23/05/2024
                                    Path:C:\Windows\java.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Windows\java.exe"
                                    Imagebase:0x500000
                                    File size:28'864 bytes
                                    MD5 hash:E5128ECE1B9916A6DF7CD56D66C193C2
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_MyDoom, Description: Yara detected MyDoom, Source: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                                    Antivirus matches:
                                    • Detection: 100%, Avira
                                    • Detection: 100%, Joe Sandbox ML
                                    • Detection: 97%, ReversingLabs
                                    • Detection: 92%, Virustotal, Browse
                                    Reputation:low
                                    Has exited:false

                                    Target ID:9
                                    Start time:09:14:04
                                    Start date:23/05/2024
                                    Path:C:\Users\user\AppData\Local\Temp\services.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\AppData\Local\Temp\services.exe"
                                    Imagebase:0x400000
                                    File size:8'192 bytes
                                    MD5 hash:B0FE74719B1B647E2056641931907F4A
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Antivirus matches:
                                    • Detection: 100%, Avira
                                    • Detection: 100%, Joe Sandbox ML
                                    • Detection: 100%, ReversingLabs
                                    • Detection: 85%, Virustotal, Browse
                                    Reputation:moderate
                                    Has exited:false

                                    Target ID:11
                                    Start time:09:14:12
                                    Start date:23/05/2024
                                    Path:C:\Windows\services.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Windows\services.exe"
                                    Imagebase:0x400000
                                    File size:8'192 bytes
                                    MD5 hash:B0FE74719B1B647E2056641931907F4A
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate
                                    Has exited:false

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:12.1%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:13.5%
                                      Total number of Nodes:657
                                      Total number of Limit Nodes:13
                                      execution_graph 2858 503280 WSAStartup 2863 5033a8 GetTickCount 2858->2863 2860 5032a0 memset 2864 5031e4 2860->2864 2863->2860 2886 502c90 2864->2886 2867 5031ff 2871 50327c ExitProcess 2867->2871 2897 5075e5 2867->2897 2878 503255 2882 50325a CreateThread 2878->2882 2879 50322c CreateThread 2926 5033b4 2879->2926 3142 50311c FindWindowA 2879->3142 2881 503240 Sleep 2881->2878 2883 50326e 2882->2883 3149 504c1b 2882->3149 2927 50565b GetCurrentThread SetThreadPriority 2883->2927 2888 502caa 2886->2888 2887 502d0f RegOpenKeyExA 2887->2888 2889 502d83 RegCloseKey 2887->2889 2888->2887 2890 502d3a 2888->2890 2891 502d7e 2889->2891 2890->2891 2892 502d43 RegCreateKeyExA 2890->2892 2891->2867 2894 502d8e memset gethostname lstrcat 2891->2894 2892->2890 2893 502d6c RegCloseKey 2892->2893 2893->2890 2895 502e0b lstrcat lstrcat CreateMutexA GetLastError 2894->2895 2896 502ddd 2894->2896 2895->2867 2896->2895 2934 50746b GetModuleFileNameA CreateFileA 2897->2934 2899 507627 GetTempPathA 2903 5075f6 2899->2903 2900 507619 GetWindowsDirectoryA 2900->2903 2901 50766b lstrcat lstrcat lstrcat CreateFileA 2902 5076c8 2901->2902 2901->2903 2945 50737c 2902->2945 2903->2899 2903->2900 2903->2901 2904 503209 2903->2904 2907 502e50 GetModuleFileNameA lstrcpy 2904->2907 2914 502eb6 2907->2914 2908 502ec1 GetWindowsDirectoryA 2908->2914 2909 502ecf GetTempPathA 2909->2914 2910 502ee7 lstrlen 2911 502f01 lstrcat 2910->2911 2912 502f0f lstrcat SetFileAttributesA CreateFileA 2910->2912 2911->2912 2912->2914 2915 502f7e GetFileAttributesA 2912->2915 2913 502f9d 2918 502fb0 RegOpenKeyExA 2913->2918 2914->2908 2914->2909 2914->2910 2914->2913 2914->2915 2916 502f51 CloseHandle DeleteFileA CopyFileA 2914->2916 2917 502f9f lstrcpy 2914->2917 2915->2914 2916->2914 2917->2913 2919 5030c2 lstrlen RegSetValueExA RegCloseKey 2918->2919 2920 5030ad RegOpenKeyExA 2918->2920 2921 5030eb 2919->2921 2920->2919 2920->2921 2922 50315c GetModuleHandleA 2921->2922 2923 5031e2 2922->2923 2924 5031cd GetProcAddress 2922->2924 2923->2878 2923->2879 2924->2923 2925 5031dc 2924->2925 2925->2923 2926->2881 2962 504ff8 RegOpenKeyExA 2927->2962 2931 505674 2979 5055b4 memset GetWindowsDirectoryA lstrcpy 2931->2979 2935 507545 2934->2935 2936 5074b8 2934->2936 2935->2903 2951 5073e8 GetTempPathA lstrlen 2936->2951 2938 5074c4 CreateFileA 2938->2935 2939 5074e6 2938->2939 2954 503697 SetFilePointer ReadFile 2939->2954 2942 50751b ReadFile 2943 507503 WriteFile 2942->2943 2944 507535 FindCloseChangeNotification CloseHandle 2942->2944 2943->2942 2944->2935 2946 507391 2945->2946 2947 5073ac WriteFile 2946->2947 2948 5073cd 2946->2948 2947->2946 2949 5073d1 WriteFile 2948->2949 2950 5073e4 FindCloseChangeNotification wsprintfA memset CreateProcessA 2948->2950 2949->2950 2950->2904 2952 507414 2951->2952 2953 507435 lstrcat lstrcat lstrcpy 2951->2953 2952->2953 2953->2938 2955 5036d4 SetFilePointer 2954->2955 2956 503772 SetFilePointer 2954->2956 2955->2956 2957 5036e7 ReadFile 2955->2957 2956->2942 2957->2956 2958 5036fd 2957->2958 2958->2956 2959 50371e SetFilePointer 2958->2959 2959->2956 2960 50373f ReadFile 2959->2960 2960->2956 2961 503758 2960->2961 2961->2956 2961->2960 2963 5050c8 memset RegQueryValueExA RegCloseKey 2962->2963 2964 505119 2962->2964 2963->2964 2965 50510c 2963->2965 2968 505449 2964->2968 2987 504eea CreateFileA 2965->2987 2969 505503 memset 2968->2969 2970 505521 GetWindowsDirectoryA 2969->2970 2971 505529 GetEnvironmentVariableA 2969->2971 2972 505534 2970->2972 2971->2972 2972->2969 2973 50553c lstrlen 2972->2973 2975 5055af 2972->2975 2976 505585 lstrcat 2972->2976 2977 50556a lstrcat lstrcat 2972->2977 2973->2972 2974 505556 lstrcat 2973->2974 2974->2972 2975->2931 3080 5052ad 2976->3080 2977->2976 2980 5052ad 82 API calls 2979->2980 2981 50560a 2980->2981 2982 50561b GetDriveTypeA 2981->2982 2984 505657 Sleep 2981->2984 2982->2981 2983 50562d Sleep 2982->2983 2985 5052ad 82 API calls 2983->2985 2984->2931 2986 505646 2985->2986 2986->2981 2988 504fee 2987->2988 2989 504f1f 2987->2989 2988->2964 2989->2988 2990 504f28 GetFileSize CreateFileMappingA 2989->2990 2991 504fe9 2990->2991 2992 504f4b 2990->2992 2994 504fdc CloseHandle 2991->2994 2992->2991 2993 504f54 MapViewOfFile 2992->2993 2995 504f67 2993->2995 3000 504f6c 2993->3000 2994->2988 2996 504fd2 CloseHandle 2995->2996 2996->2994 2997 504fcb UnmapViewOfFile 2997->2996 2998 504f7c memset 2998->3000 3000->2997 3000->2998 3001 50463f lstrlen 3000->3001 3002 50465b 3001->3002 3003 50466d 3001->3003 3009 5045cf 3002->3009 3003->3000 3005 504669 3005->3003 3006 50469a lstrlen GetProcessHeap RtlAllocateHeap 3005->3006 3007 50467e lstrcmpiA 3005->3007 3006->3003 3008 5046c5 memset GetTickCount lstrcpy 3006->3008 3007->3003 3007->3005 3008->3003 3019 50402f lstrlen 3009->3019 3011 50461e 3018 5045e1 3011->3018 3061 504449 3011->3061 3014 5045dc 3014->3011 3016 5045f2 lstrlen 3014->3016 3014->3018 3044 5042ce 3014->3044 3015 50462b 3015->3018 3065 50450e 3015->3065 3016->3014 3018->3005 3024 50404c 3019->3024 3026 504044 3019->3026 3020 504055 isspace 3023 504065 isalnum 3020->3023 3020->3024 3021 504090 3022 504092 strchr 3021->3022 3029 5040af 3021->3029 3022->3021 3022->3029 3023->3021 3023->3024 3024->3020 3024->3021 3025 5040fa 3025->3026 3028 50410b lstrlen 3025->3028 3026->3014 3027 5040bb isalnum 3027->3029 3030 5040de tolower 3027->3030 3036 504150 3028->3036 3029->3025 3029->3027 3029->3030 3030->3029 3031 50411a isspace 3032 50412a strchr 3031->3032 3031->3036 3033 504140 isalnum 3032->3033 3032->3036 3033->3036 3034 5041c2 lstrlen 3043 504209 3034->3043 3035 50417f isalnum 3037 50416d 3035->3037 3036->3031 3036->3037 3037->3034 3037->3035 3038 5041ad tolower 3037->3038 3038->3037 3039 5041d3 isspace 3041 5041e5 strchr 3039->3041 3039->3043 3040 504224 lstrlen 3040->3026 3042 5041fa isalnum 3041->3042 3041->3043 3042->3043 3043->3039 3043->3040 3045 5042d7 3044->3045 3046 5042da 3044->3046 3045->3014 3047 504417 3046->3047 3048 50430a lstrlen 3046->3048 3047->3014 3049 504315 3048->3049 3049->3047 3050 504339 lstrlen 3049->3050 3050->3047 3051 504354 3050->3051 3051->3047 3071 504244 3051->3071 3054 504383 3054->3047 3055 50438c lstrlen 3054->3055 3055->3047 3056 50439d 3055->3056 3056->3047 3057 5043a2 lstrlen 3056->3057 3058 5043a7 3057->3058 3058->3047 3059 5043fa lstrlen lstrlen 3058->3059 3059->3047 3060 504425 lstrlen 3059->3060 3060->3047 3062 50445a 3061->3062 3063 50447a tolower 3062->3063 3064 504469 3062->3064 3063->3062 3063->3064 3064->3015 3066 504520 3065->3066 3067 50452a tolower 3066->3067 3070 504546 3066->3070 3067->3066 3067->3070 3068 504561 lstrcmp 3069 50457d 3068->3069 3068->3070 3069->3018 3070->3068 3070->3069 3072 504279 3071->3072 3077 504252 3071->3077 3074 5042b8 3072->3074 3079 504286 3072->3079 3073 50425d isspace 3073->3077 3075 5042b3 lstrlen 3074->3075 3076 5042bf lstrcpy 3074->3076 3075->3047 3075->3054 3076->3075 3077->3072 3077->3073 3078 504299 isspace 3078->3079 3079->3075 3079->3078 3081 5052cb 3080->3081 3082 5052bf 3080->3082 3081->2972 3082->3081 3083 5052d2 Sleep 3082->3083 3084 5052e5 lstrcpy lstrlen 3082->3084 3083->3082 3085 505310 lstrcat 3084->3085 3086 505322 lstrcat memset 3084->3086 3085->3086 3096 50534c 3086->3096 3087 505358 FindFirstFileA 3087->3096 3088 50537b FindNextFileA 3089 505438 FindClose 3088->3089 3088->3096 3089->3081 3090 5053b0 lstrcpy lstrlen 3091 5053e1 lstrcat 3090->3091 3092 5053cf lstrcat 3090->3092 3093 5053fe Sleep 3091->3093 3091->3096 3092->3091 3094 5052ad 68 API calls 3093->3094 3094->3096 3096->3081 3096->3087 3096->3088 3096->3090 3097 505131 3096->3097 3099 505141 3097->3099 3100 505299 3097->3100 3098 50516e lstrcpyn CharLowerA 3103 505167 3098->3103 3099->3098 3099->3103 3100->3096 3101 505278 Sleep 3101->3103 3102 50528c 3104 505291 3102->3104 3105 50529b 3102->3105 3103->3100 3103->3101 3103->3102 3109 504e00 GetProcessHeap RtlAllocateHeap 3104->3109 3105->3100 3106 5052a0 3105->3106 3108 504eea 48 API calls 3106->3108 3108->3100 3110 504e2b CreateFileA 3109->3110 3111 504e23 3109->3111 3112 504ed0 3110->3112 3118 504e50 3110->3118 3111->3100 3113 504ed3 GetProcessHeap HeapFree 3112->3113 3113->3111 3114 504eb6 ReadFile 3115 504ec2 FindCloseChangeNotification 3114->3115 3114->3118 3115->3113 3118->3112 3118->3114 3118->3115 3119 504c29 3118->3119 3125 504d0c 3118->3125 3120 504c38 3119->3120 3122 504d05 3120->3122 3124 504c8b memcpy 3120->3124 3129 50343e 3120->3129 3133 5034b8 3120->3133 3122->3118 3124->3120 3126 504df8 3125->3126 3127 504d24 3125->3127 3126->3118 3127->3126 3128 50463f 40 API calls 3127->3128 3128->3127 3131 50347c 3129->3131 3132 50344b 3129->3132 3130 503454 tolower tolower 3130->3131 3130->3132 3131->3120 3132->3130 3132->3131 3134 503618 3133->3134 3141 5034d1 3133->3141 3134->3120 3135 5034ed isdigit 3135->3141 3136 50353f memset 3137 503562 WideCharToMultiByte 3136->3137 3136->3141 3137->3141 3138 503582 lstrlen 3139 50359b lstrlen 3138->3139 3140 5035ec lstrlen memcpy 3138->3140 3139->3141 3140->3141 3141->3134 3141->3135 3141->3136 3141->3138 3141->3140 3152 5030f0 3142->3152 3145 5030f0 3 API calls 3146 503142 FindWindowA 3145->3146 3147 5030f0 3 API calls 3146->3147 3148 503152 RtlExitUserThread 3147->3148 3155 504ae2 3149->3155 3153 503119 FindWindowA 3152->3153 3154 5030fc PostMessageA PostMessageA PostMessageA 3152->3154 3153->3145 3154->3153 3158 504af2 3155->3158 3157 504b00 Sleep 3157->3158 3158->3157 3159 504b99 CreateThread 3158->3159 3161 504b61 3158->3161 3162 504bec GetTickCount 3158->3162 3166 503620 GetModuleHandleA 3158->3166 3159->3161 3226 504a37 InterlockedIncrement GetCurrentThread SetThreadPriority 3159->3226 3161->3158 3163 504bba CloseHandle 3161->3163 3171 504a85 3161->3171 3162->3158 3164 504bfd 3162->3164 3163->3157 3164->3157 3176 5047b7 3164->3176 3167 503672 GetProcAddress 3166->3167 3168 503664 LoadLibraryA 3166->3168 3169 503682 3167->3169 3170 503687 InternetGetConnectedState 3167->3170 3168->3167 3168->3169 3169->3158 3170->3158 3172 504a94 3171->3172 3173 504adf 3172->3173 3174 504a9a GetTickCount 3172->3174 3175 504ac1 GetProcessHeap HeapFree 3172->3175 3173->3161 3174->3172 3174->3175 3175->3172 3177 50486e 3176->3177 3178 5047d2 3176->3178 3177->3164 3178->3177 3179 50481c lstrcpyn lstrlen GetProcessHeap RtlAllocateHeap 3178->3179 3179->3177 3180 50484d lstrcpy CreateThread 3179->3180 3180->3177 3181 50477f GetCurrentThread SetThreadPriority 3180->3181 3182 504797 3181->3182 3183 5047ae RtlExitUserThread 3181->3183 3186 504708 memset 3182->3186 3194 507730 memset memset 3186->3194 3189 504741 memset 3218 507940 3189->3218 3190 50477b GetProcessHeap HeapFree 3190->3183 3193 504e00 57 API calls 3193->3190 3197 507763 3194->3197 3195 507771 lstrcpy 3199 5077fc 3195->3199 3197->3195 3198 50779a 3197->3198 3201 5077b0 lstrcat 3198->3201 3202 5077bb 3198->3202 3200 50781f wsprintfA 3199->3200 3203 507835 3200->3203 3201->3202 3206 5077f1 lstrcat 3202->3206 3207 5077cb lstrcat 3202->3207 3204 50784d wsprintfA 3203->3204 3205 50789f 3203->3205 3217 50785f 3204->3217 3208 5078a7 wsprintfA 3205->3208 3209 5078df 3205->3209 3206->3199 3210 5077db 3207->3210 3208->3217 3211 5078e7 wsprintfA 3209->3211 3212 50792f 3209->3212 3210->3206 3214 5077e6 lstrcat 3210->3214 3211->3217 3213 507937 wsprintfA 3212->3213 3216 504735 3213->3216 3214->3206 3215 507920 lstrlen 3215->3213 3216->3189 3216->3190 3217->3215 3217->3216 3219 507952 3218->3219 3220 507955 GetModuleHandleA 3218->3220 3219->3220 3221 507970 GetProcAddress 3220->3221 3222 507965 LoadLibraryA 3220->3222 3223 504763 3221->3223 3224 507985 3221->3224 3222->3221 3222->3223 3223->3190 3223->3193 3224->3223 3225 5079a0 lstrcpy 3224->3225 3225->3223 3227 504a66 3226->3227 3228 504a5c 3226->3228 3230 504a74 InterlockedDecrement 3227->3230 3231 504a7b RtlExitUserThread 3227->3231 3232 5049c5 3228->3232 3230->3231 3233 5049d9 3232->3233 3234 5049ea lstrcpyn 3233->3234 3239 504a28 3233->3239 3242 504971 3234->3242 3236 504a02 3236->3239 3256 506966 3236->3256 3239->3227 3241 504a1f GlobalFree 3241->3239 3302 504874 3242->3302 3244 50497c 3245 504981 3244->3245 3307 503ff8 3244->3307 3245->3236 3248 5049a2 3310 50489d 3248->3310 3249 504994 GetTickCount 3249->3248 3250 50499e 3249->3250 3250->3236 3253 504874 lstrcmpiA 3254 5049af 3253->3254 3254->3250 3318 50400c 3254->3318 3257 504a0f 3256->3257 3258 50697e lstrlen 3256->3258 3257->3239 3283 5071f8 3257->3283 3258->3257 3259 50698e memset 3258->3259 3260 5069af 3259->3260 3329 505a21 3260->3329 3262 5069f2 3332 505a45 3262->3332 3271 506a25 GlobalAlloc 3272 506a75 3271->3272 3273 506a57 3271->3273 3274 506a8a 3272->3274 3275 506a7d DeleteFileA 3272->3275 3403 5067c2 3273->3403 3274->3257 3277 506a8f GlobalFree 3274->3277 3275->3274 3277->3257 3278 506a64 3408 506895 lstrlen wsprintfA lstrlen wsprintfA lstrlen 3278->3408 3281 506a9c 3281->3257 3282 506aa4 DeleteFileA 3281->3282 3282->3257 3284 507253 3283->3284 3285 507208 3283->3285 3284->3241 3498 506b89 3285->3498 3287 50721e 3287->3284 3288 507258 lstrcpy 3287->3288 3289 507271 3288->3289 3292 507280 htons 3289->3292 3293 5072aa 3289->3293 3299 5072e8 3289->3299 3504 506b54 inet_addr 3289->3504 3291 5072fd lstrcpy 3291->3293 3508 506e01 3292->3508 3293->3291 3294 5072cd lstrcpy lstrcat 3293->3294 3295 507367 3293->3295 3298 506b54 2 API calls 3293->3298 3293->3299 3300 507328 htons 3293->3300 3294->3293 3537 507093 wsprintfA wsprintfA RegOpenKeyExA 3295->3537 3298->3293 3299->3241 3301 506e01 16 API calls 3300->3301 3301->3293 3303 50488f 3302->3303 3304 504895 3303->3304 3305 50487d lstrcmpiA 3303->3305 3304->3244 3305->3303 3306 504899 3305->3306 3306->3244 3322 503e35 GetModuleHandleA 3307->3322 3311 5048da GetProcessHeap RtlAllocateHeap 3310->3311 3314 5048af 3310->3314 3312 5048f4 3311->3312 3313 5048f9 memset lstrcpyn GetTickCount 3311->3313 3312->3253 3313->3312 3314->3311 3314->3312 3315 504936 GetTickCount 3314->3315 3316 50400c 2 API calls 3315->3316 3317 504953 lstrcpyn 3316->3317 3317->3312 3319 504014 3318->3319 3320 50402d 3318->3320 3321 504015 GetProcessHeap HeapFree 3319->3321 3320->3250 3321->3320 3321->3321 3323 503e56 GetProcAddress 3322->3323 3324 503e4b LoadLibraryA 3322->3324 3325 503e7a 3323->3325 3326 503e66 3323->3326 3324->3323 3324->3325 3325->3248 3325->3249 3326->3325 3327 503e98 GetProcessHeap RtlAllocateHeap 3326->3327 3327->3325 3328 503eae memset lstrcpyn 3327->3328 3328->3326 3330 505a27 lstrcpy 3329->3330 3330->3262 3333 505a60 3332->3333 3334 505b25 3332->3334 3336 505ab7 lstrcpy lstrcat 3333->3336 3334->3334 3335 505b61 3334->3335 3339 505bba lstrcpy 3334->3339 3337 505b95 lstrcat lstrcpy 3335->3337 3340 505ad1 3336->3340 3338 505bd2 3337->3338 3343 505bf9 strstr 3338->3343 3342 505a21 lstrcpy 3339->3342 3341 505af5 lstrcat lstrcat lstrcat lstrcpy lstrcat 3340->3341 3341->3338 3342->3338 3344 505c13 3343->3344 3348 505c6e 3343->3348 3345 505c26 3344->3345 3344->3348 3346 505c48 lstrcpy lstrcpy lstrcpy 3345->3346 3347 505dc3 3346->3347 3356 505dc7 3347->3356 3349 505d08 lstrcpy 3348->3349 3350 505c81 3348->3350 3349->3350 3351 505d63 lstrcpy wsprintfA 3350->3351 3352 505d99 3351->3352 3353 505db7 3352->3353 3354 505dbc CharUpperA 3352->3354 3355 505dac CharUpperBuffA 3352->3355 3353->3347 3353->3354 3354->3347 3355->3347 3363 505dd0 3356->3363 3357 505e98 lstrcpy 3358 505dde 3357->3358 3359 505ece 3358->3359 3360 505ed3 CharUpperA 3358->3360 3361 505ebd CharUpperBuffA 3358->3361 3359->3360 3362 505ee0 3359->3362 3360->3362 3361->3362 3364 505faf 3362->3364 3363->3357 3363->3358 3365 505fcb 3364->3365 3366 505ff0 GetModuleFileNameA 3365->3366 3367 506014 GetTempPathA 3365->3367 3417 505f2a GetTempPathA GetTempFileNameA CopyFileA 3366->3417 3369 506036 GetTempFileNameA GetModuleFileNameA CopyFileA 3367->3369 3378 50632b 3367->3378 3422 505ee3 CreateFileA 3369->3422 3372 5060b8 3381 5060e2 3372->3381 3382 5060ef lstrcpy lstrcat 3372->3382 3373 5062d0 CreateFileA 3375 5062f7 3373->3375 3377 50631d 3373->3377 3374 50600e 3374->3373 3380 50625d GetTempPathA GetTempFileNameA 3374->3380 3376 5062fc GetFileSize CloseHandle 3375->3376 3375->3377 3376->3377 3376->3378 3377->3378 3379 506339 DeleteFileA 3377->3379 3378->3257 3378->3271 3379->3378 3383 5057e6 27 API calls 3380->3383 3429 5057e6 CreateFileA 3381->3429 3391 50611c 3382->3391 3384 50629f 3383->3384 3386 5062b5 DeleteFileA lstrcpy 3384->3386 3387 5062a6 DeleteFileA 3384->3387 3386->3373 3387->3373 3389 50614f lstrcat 3392 50615d 3389->3392 3390 506219 DeleteFileA wsprintfA 3390->3374 3391->3389 3393 506185 lstrcat 3392->3393 3394 506172 lstrcat 3392->3394 3395 506198 3393->3395 3394->3393 3394->3394 3396 5061d7 lstrcat 3395->3396 3397 5061ac 3395->3397 3400 5061c1 lstrcat 3396->3400 3398 5061c8 lstrcat 3397->3398 3399 5061af 3397->3399 3398->3400 3399->3400 3402 5061b2 lstrcat 3399->3402 3400->3381 3402->3400 3404 5067de 3403->3404 3405 5067ea 8 API calls 3404->3405 3464 5032cb 3405->3464 3407 506869 lstrcat lstrlen wsprintfA lstrcat 3407->3278 3470 506518 3408->3470 3410 5068ea lstrcat 3411 5068fd 3410->3411 3412 506915 lstrlen wsprintfA lstrlen 3411->3412 3474 50666d CreateFileA 3412->3474 3415 506947 3415->3272 3415->3281 3416 50694c lstrlen wsprintfA 3416->3415 3418 505ee3 18 API calls 3417->3418 3419 505f87 3418->3419 3420 505f93 DeleteFileA 3419->3420 3421 505f9a lstrcpy 3419->3421 3420->3421 3421->3374 3423 505f07 3422->3423 3424 505f28 GetTempPathA GetTempFileNameA 3422->3424 3425 503697 6 API calls 3423->3425 3424->3372 3424->3378 3426 505f11 SetFilePointer 3425->3426 3445 50754a 3426->3445 3430 505a19 3429->3430 3431 50581c 3429->3431 3430->3379 3430->3390 3431->3430 3432 505824 CreateFileA 3431->3432 3433 505843 3432->3433 3434 505a14 3432->3434 3433->3434 3436 50584b memset memset memset 3433->3436 3435 505a07 CloseHandle 3434->3435 3435->3430 3453 505717 GetSystemTime 3436->3453 3440 5058b7 8 API calls 3441 50595b ReadFile 3440->3441 3442 50593c 3441->3442 3443 50597c 6 API calls 3441->3443 3442->3443 3444 505941 WriteFile 3442->3444 3443->3435 3444->3441 3446 5073e8 5 API calls 3445->3446 3447 507560 CreateFileA 3446->3447 3448 505f20 CloseHandle 3447->3448 3449 507588 3447->3449 3448->3424 3450 5075cd ReadFile 3449->3450 3451 5075a5 WriteFile 3450->3451 3452 5075d7 CloseHandle 3450->3452 3451->3450 3452->3448 3454 50574a 3453->3454 3455 505772 SetFilePointer 3454->3455 3456 5057b9 ReadFile 3455->3456 3457 5057d2 SetFilePointer 3456->3457 3459 50579c 3456->3459 3457->3440 3459->3456 3459->3457 3460 5056d5 3459->3460 3461 5056de 3460->3461 3463 5056e3 3460->3463 3462 50568c malloc 3461->3462 3462->3463 3463->3459 3465 5032e8 FileTimeToLocalFileTime FileTimeToSystemTime 3464->3465 3466 5032dc GetLocalTime 3464->3466 3467 503303 GetTimeZoneInformation 3465->3467 3466->3467 3468 503319 wsprintfA 3467->3468 3468->3407 3472 506521 3470->3472 3471 50652f 3471->3410 3472->3471 3481 50641f 3472->3481 3475 50669c 3474->3475 3479 5066a4 3474->3479 3475->3415 3475->3416 3476 5066bb ReadFile 3478 50677d 3476->3478 3476->3479 3477 5067ab CloseHandle 3477->3475 3478->3477 3479->3476 3480 506767 memset 3479->3480 3480->3479 3485 50642d 3481->3485 3482 506452 3482->3471 3484 506509 lstrlen 3484->3485 3485->3482 3486 50641f 7 API calls 3485->3486 3487 506346 3485->3487 3486->3485 3488 5063b1 3487->3488 3489 506351 3487->3489 3490 5063b6 3488->3490 3496 5063d3 3488->3496 3492 506381 lstrcpy 3489->3492 3495 506361 3489->3495 3490->3489 3491 5063bb 3490->3491 3493 5032cb GetLocalTime FileTimeToLocalFileTime FileTimeToSystemTime GetTimeZoneInformation wsprintfA 3491->3493 3491->3495 3492->3484 3494 5063c8 3493->3494 3494->3484 3495->3484 3497 506400 wsprintfA 3496->3497 3497->3495 3499 506c8e 3498->3499 3503 506ba1 3498->3503 3499->3287 3500 506c38 lstrlen 3501 506c4e lstrlen 3500->3501 3500->3503 3501->3503 3502 506c6d CharLowerA lstrcmpiA 3502->3499 3502->3503 3503->3499 3503->3500 3503->3502 3505 506b6c gethostbyname 3504->3505 3506 506b63 3504->3506 3507 506b77 3505->3507 3506->3505 3506->3507 3507->3289 3509 506b89 4 API calls 3508->3509 3510 506e25 3509->3510 3511 506b89 4 API calls 3510->3511 3514 506e82 3510->3514 3512 506e4d 3511->3512 3513 506e8a lstrcpy socket 3512->3513 3512->3514 3513->3514 3515 506eb8 connect 3513->3515 3514->3289 3516 50707a closesocket 3515->3516 3517 506ecd 3515->3517 3516->3514 3548 506d65 3517->3548 3521 506d65 5 API calls 3522 506f12 3521->3522 3523 506f39 3522->3523 3524 506d65 5 API calls 3522->3524 3523->3516 3525 506d65 5 API calls 3523->3525 3524->3523 3526 506f6e 3525->3526 3526->3516 3527 506d65 5 API calls 3526->3527 3528 506fa0 3527->3528 3528->3516 3529 506d65 5 API calls 3528->3529 3530 506fc1 3529->3530 3530->3516 3531 507042 send 3530->3531 3532 507017 send 3530->3532 3533 507028 send 3530->3533 3534 506d65 5 API calls 3531->3534 3532->3533 3533->3516 3533->3530 3535 50705b 3534->3535 3535->3516 3536 506d65 5 API calls 3535->3536 3536->3516 3538 507103 3537->3538 3539 5070fb 3537->3539 3540 5071d5 RegEnumKeyA 3538->3540 3544 5071bc RegCloseKey 3538->3544 3545 506b54 2 API calls 3538->3545 3546 50718f htons 3538->3546 3539->3299 3541 5071e2 RegCloseKey 3540->3541 3542 507123 RegOpenKeyExA 3540->3542 3541->3539 3542->3538 3543 507148 memset RegQueryValueExA 3542->3543 3543->3538 3543->3544 3544->3538 3544->3541 3545->3538 3547 506e01 16 API calls 3546->3547 3547->3538 3549 506d78 wvsprintfA lstrlen send 3548->3549 3550 506daa 3548->3550 3549->3550 3552 506dfb 3550->3552 3553 506ab8 3550->3553 3552->3516 3552->3521 3554 506acf 3553->3554 3555 506b41 3553->3555 3554->3555 3556 506b1c recv 3554->3556 3557 506adf select 3554->3557 3555->3550 3556->3554 3556->3555 3557->3555 3557->3556 3558 50ed00 3561 50ed18 3558->3561 3559 50ee12 LoadLibraryA 3559->3561 3560 50ee57 3561->3559 3561->3560 3562 50ee3b GetProcAddress 3561->3562 3562->3561 3563 50ee51 ExitProcess 3562->3563 3572 503ef3 GetModuleHandleA 3573 503f11 LoadLibraryA 3572->3573 3574 503f0c 3572->3574 3575 503f18 3573->3575 3574->3573 3574->3575 3576 503ff1 3575->3576 3577 503f29 GetProcAddress 3575->3577 3577->3576 3578 503f3f GetProcessHeap RtlAllocateHeap 3577->3578 3579 503f63 3578->3579 3579->3576 3580 503fde GetProcessHeap HeapFree 3579->3580 3581 503f80 htons inet_addr 3579->3581 3582 503fa5 gethostbyname 3579->3582 3584 503dff 3579->3584 3580->3576 3581->3579 3581->3582 3582->3579 3585 503e06 3584->3585 3587 503e30 3585->3587 3588 503e22 Sleep 3585->3588 3589 503b7c GetProcessHeap RtlAllocateHeap 3585->3589 3587->3579 3588->3585 3588->3587 3590 503bb3 socket 3589->3590 3591 503bac 3589->3591 3592 503de7 GetProcessHeap HeapFree 3590->3592 3593 503bce 3590->3593 3591->3585 3592->3591 3593->3592 3607 503bd7 3593->3607 3594 503bf5 htons 3609 503819 memset GetTickCount htons 3594->3609 3596 503c1b select 3598 503c4d memset recv 3596->3598 3596->3607 3597 503db8 3599 503dc7 GetProcessHeap HeapFree closesocket 3597->3599 3598->3607 3599->3591 3600 503c7d htons 3600->3597 3600->3607 3601 503c9e htons 3601->3597 3601->3607 3604 503d08 GetProcessHeap RtlAllocateHeap 3605 503d23 memset htons 3604->3605 3604->3607 3622 503983 3605->3622 3607->3594 3607->3596 3607->3597 3607->3599 3607->3600 3607->3601 3607->3604 3608 503d61 GetProcessHeap HeapFree 3607->3608 3612 503a35 3607->3612 3626 503a16 3607->3626 3608->3607 3610 5038d7 htons htons sendto 3609->3610 3611 503881 3609->3611 3610->3607 3611->3610 3613 503a56 3612->3613 3614 503a4f 3612->3614 3630 50392a htons 3613->3630 3614->3607 3616 503aa2 memset 3617 503983 htons 3616->3617 3621 503a66 3617->3621 3618 503ad8 htons htons htons 3618->3614 3619 503b13 GetProcessHeap RtlAllocateHeap 3618->3619 3619->3614 3620 503b31 memset 3619->3620 3620->3621 3621->3614 3621->3616 3621->3618 3623 5039f5 3622->3623 3625 50399b 3622->3625 3623->3607 3624 5039d5 htons 3624->3623 3624->3625 3625->3623 3625->3624 3627 503a33 3626->3627 3628 503a1a 3626->3628 3627->3607 3629 503a1b GetProcessHeap HeapFree 3628->3629 3629->3627 3629->3629 3631 50397d 3630->3631 3632 503948 3630->3632 3631->3621 3632->3631 3633 50396e htons 3632->3633 3633->3631 3633->3632 3564 5011c9 3565 5011e3 3564->3565 3566 502d0f RegOpenKeyExA 3565->3566 3568 502d3a 3565->3568 3566->3565 3567 502d83 RegCloseKey 3566->3567 3569 502d7e 3567->3569 3568->3569 3570 502d43 RegCreateKeyExA 3568->3570 3570->3568 3571 502d6c RegCloseKey 3570->3571 3571->3568

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 6 5052ad-5052bd 7 5052cb-5052cd 6->7 8 5052bf-5052c4 6->8 10 5052ce-5052d1 7->10 8->7 9 5052c6-5052c9 8->9 9->7 11 5052dd-5052e3 9->11 12 5052d2-5052d7 Sleep 11->12 13 5052e5-50530e lstrcpy lstrlen 11->13 12->11 14 505310-50531c lstrcat 13->14 15 505322-505349 lstrcat memset 13->15 14->15 16 50534c-505356 15->16 17 505358-50536b FindFirstFileA 16->17 18 50537b-505386 FindNextFileA 16->18 19 505370-505373 17->19 20 50536d 17->20 21 505438-50543b FindClose 18->21 22 50538c-505393 18->22 23 505441-505444 19->23 24 505379 19->24 20->19 21->23 25 5053b0-5053cd lstrcpy lstrlen 22->25 26 505395-50539c 22->26 23->10 24->22 28 5053e1-5053fc lstrcat 25->28 29 5053cf-5053db lstrcat 25->29 26->16 27 50539e-5053a5 26->27 27->25 32 5053a7-5053ae 27->32 30 50541e-50542b call 505131 28->30 31 5053fe-505412 Sleep call 5052ad 28->31 29->28 36 505430-505433 30->36 35 505417-505419 31->35 32->16 32->25 35->16 36->16
                                      APIs
                                      • Sleep.KERNEL32(00000800,75568A60,00000184), ref: 005052D7
                                      • lstrcpy.KERNEL32(?,?), ref: 005052F4
                                      • lstrlen.KERNEL32(?), ref: 00505304
                                      • lstrcat.KERNEL32(?,00501190), ref: 0050531C
                                      • lstrcat.KERNEL32(?,*.*), ref: 0050532E
                                      • memset.MSVCRT ref: 00505341
                                      • FindFirstFileA.KERNELBASE(?,00000010), ref: 0050535F
                                      • FindNextFileA.KERNELBASE(?,?), ref: 0050537E
                                      • lstrcpy.KERNEL32(?,?), ref: 005053BA
                                      • lstrlen.KERNEL32(?), ref: 005053C3
                                      • lstrcat.KERNEL32(?,00501190), ref: 005053DB
                                      • lstrcat.KERNEL32(?,0000002E), ref: 005053EF
                                      • Sleep.KERNELBASE(0000004B), ref: 00505400
                                      • FindClose.KERNELBASE(?), ref: 0050543B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$Find$FileSleeplstrcpylstrlen$CloseFirstNextmemset
                                      • String ID: *.*$.$.
                                      • API String ID: 56755240-1892373925
                                      • Opcode ID: 4a0de44cde8d01dfa769ae8b9abc51166f6d7055e572fb8d163d85066ff3cfd8
                                      • Instruction ID: dd7eaa64cc3021d8f9cf9a778dce5b9b88d54ccfb1cc30c989f9fa4e0a5d9972
                                      • Opcode Fuzzy Hash: 4a0de44cde8d01dfa769ae8b9abc51166f6d7055e572fb8d163d85066ff3cfd8
                                      • Instruction Fuzzy Hash: 3B417B71C40A5DEBDF219BA0DC4DBDEBF7CBB05301F1084A2E645A2090E7749A89DF95
                                      APIs
                                      • RegOpenKeyExA.KERNELBASE(?,Software\Microsoft\Daemon,00000000,00020019,?), ref: 00502D27
                                      • RegCreateKeyExA.KERNELBASE(00000002,00000053,00000000,00000000,00000000,00020006,00000000,?,?), ref: 00502D62
                                      • RegCloseKey.KERNELBASE(?), ref: 00502D6F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseCreateOpen
                                      • String ID: "%s"$"%s"$"%s"$%P$1&lo$Software\Microsoft\Daemon$UTF-$fp-t$mss&
                                      • API String ID: 199004384-1742729895
                                      • Opcode ID: 54c313d72eed5809ea717c3aaa2ef99b5af84961543d7f94290a47e14dd327ee
                                      • Instruction ID: 5ddebe979ae4482ff55674c5fd03efcc6dad104ab151d763a66a24a0e48becba
                                      • Opcode Fuzzy Hash: 54c313d72eed5809ea717c3aaa2ef99b5af84961543d7f94290a47e14dd327ee
                                      • Instruction Fuzzy Hash: 3A13CA6284DBD54ECB278B704A6E26D7FA5BB23310B1D49CEC8818B1F3D2589905D36F

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 923 504e00-504e21 GetProcessHeap RtlAllocateHeap 924 504e23-504e26 923->924 925 504e2b-504e4a CreateFileA 923->925 926 504ee7-504ee9 924->926 927 504ed0-504ed2 925->927 928 504e50-504e53 925->928 930 504ed3-504ee6 GetProcessHeap HeapFree 927->930 928->927 929 504e55-504e71 928->929 931 504eb6-504ec0 ReadFile 929->931 930->926 932 504ec2-504ece FindCloseChangeNotification 931->932 933 504e73-504e75 931->933 932->930 934 504e77-504e79 933->934 935 504e7c-504e9f call 504c29 call 504d0c 933->935 934->935 940 504ea1-504ea8 935->940 941 504eaa-504eb3 935->941 940->932 940->941 941->931
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00008010,?,?,?,?,0050477B,00000000), ref: 00504E0F
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00504E16
                                      • CreateFileA.KERNELBASE({GP,80000000,00000003,00000000,00000003,00000080,00000000,00000200,?,?,?,?,0050477B,00000000), ref: 00504E3F
                                      • ReadFile.KERNELBASE(00000000,?,00008000,?,00000000,?,?,?,?,?,0050477B,00000000), ref: 00504EB9
                                      • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,0050477B,00000000), ref: 00504EC5
                                      • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,0050477B,00000000), ref: 00504ED7
                                      • HeapFree.KERNEL32(00000000,?,?,?,?,0050477B,00000000), ref: 00504EDE
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$FileProcess$AllocateChangeCloseCreateFindFreeNotificationRead
                                      • String ID: {GP
                                      • API String ID: 3486390565-1941362325
                                      • Opcode ID: 428cdfe4e4e56a777748bbb5e178a34146adc0e2ef22d4898716c37ae4cd4343
                                      • Instruction ID: cde6f649d8a6e970d913e8d6152b8159acc1393c7919c2b618bcbc601deb3034
                                      • Opcode Fuzzy Hash: 428cdfe4e4e56a777748bbb5e178a34146adc0e2ef22d4898716c37ae4cd4343
                                      • Instruction Fuzzy Hash: 8A216BB5D00208FBDF119FA4DD48AAEBFBDFB04394F204469F642A2190D3304E54AF66

                                      Control-flow Graph

                                      APIs
                                      • FindWindowA.USER32(rctrl_renwnd32,00000000), ref: 0050312A
                                        • Part of subcall function 005030F0: PostMessageA.USER32(?,00000012,00000000,00000000), ref: 00503108
                                        • Part of subcall function 005030F0: PostMessageA.USER32(?,00000010,00000000,00000000), ref: 0050310F
                                        • Part of subcall function 005030F0: PostMessageA.USER32(?,00000002,00000000,00000000), ref: 00503116
                                      • FindWindowA.USER32(ATH_Note,00000000), ref: 0050313A
                                      • FindWindowA.USER32(IEFrame,00000000), ref: 0050314A
                                      • RtlExitUserThread.NTDLL(00000000), ref: 00503155
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: FindMessagePostWindow$ExitThreadUser
                                      • String ID: ATH_Note$IEFrame$rctrl_renwnd32
                                      • API String ID: 2235905160-3881057634
                                      • Opcode ID: 3dc4a38075e9342e6b02805258b341f4c805c4931865141f3460f12dc90b924c
                                      • Instruction ID: a650038179976161dc88b4fd2029094447a0c5a8afe537662e8923af550cda7c
                                      • Opcode Fuzzy Hash: 3dc4a38075e9342e6b02805258b341f4c805c4931865141f3460f12dc90b924c
                                      • Instruction Fuzzy Hash: 79D06776AC172579E63C33B96D1FF9E1E1CAB44B61F200406B2459A4C35DE4664085BE

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 988 503620-503662 GetModuleHandleA 989 503672-503680 GetProcAddress 988->989 990 503664-503670 LoadLibraryA 988->990 991 503682-503686 989->991 992 503687-503696 InternetGetConnectedState 989->992 990->989 990->991
                                      APIs
                                      • GetModuleHandleA.KERNEL32(?), ref: 0050365A
                                      • LoadLibraryA.KERNELBASE(wininet.dll), ref: 00503668
                                      • GetProcAddress.KERNEL32(00000000,InternetGetConnectedState), ref: 00503678
                                      • InternetGetConnectedState.WININET(?,00000000), ref: 0050368D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressConnectedHandleInternetLibraryLoadModuleProcState
                                      • String ID: InternetGetConnectedState$wininet.dll
                                      • API String ID: 1505668628-596207600
                                      • Opcode ID: 383ecea641d6cbcfcb23eacf179140b95e1886bb47d9fb192bb945b850ba0d9a
                                      • Instruction ID: 2b294e7ad4bcb9401aef01a1c95623af15c32a98deb04781e5990a6f2b8114d4
                                      • Opcode Fuzzy Hash: 383ecea641d6cbcfcb23eacf179140b95e1886bb47d9fb192bb945b850ba0d9a
                                      • Instruction Fuzzy Hash: 5F011620A083C9E9EF11D7F8D81DBAD7FA91B21748F0485D89185E61C1D7BB8358C776

                                      Control-flow Graph

                                      APIs
                                      • RegOpenKeyExA.KERNELBASE(80000001,?,00000000,00020019,?,75570F00), ref: 005050BE
                                      • memset.MSVCRT ref: 005050D5
                                      • RegQueryValueExA.KERNELBASE(?,00000000,00000000,00000000,?,?), ref: 005050F5
                                      • RegCloseKey.ADVAPI32(?), ref: 005050FE
                                        • Part of subcall function 00504EEA: CreateFileA.KERNEL32(00000020,80000000,00000003,00000000,00000003,00000080,00000000,75570F10,00000000), ref: 00504F0C
                                        • Part of subcall function 00504EEA: GetFileSize.KERNEL32(00000000,00000000), ref: 00504F2A
                                        • Part of subcall function 00504EEA: CreateFileMappingA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000000), ref: 00504F3A
                                        • Part of subcall function 00504EEA: MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000,00000000), ref: 00504F5B
                                        • Part of subcall function 00504EEA: CloseHandle.KERNEL32(?), ref: 00504FD5
                                        • Part of subcall function 00504EEA: CloseHandle.KERNEL32(?), ref: 00504FDF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$Close$CreateHandle$MappingOpenQuerySizeValueViewmemset
                                      • String ID: $ $4$A$A$B$B$F$M$N$S$W$W$W$\$\$\$\$a$a$a$b$c$e$e$e$f$f$i$i$l$m$o$o$o$r$r$s$t$t$w
                                      • API String ID: 1447734293-2356155605
                                      • Opcode ID: d70b678158a2ddeabdc93fb81de4d72fe2e86aa731343c368a4f6e47c38d2075
                                      • Instruction ID: d5002688ff9bd9582a131d6a7ee4c8a73c9f60058928140604e211d2a98eee7b
                                      • Opcode Fuzzy Hash: d70b678158a2ddeabdc93fb81de4d72fe2e86aa731343c368a4f6e47c38d2075
                                      • Instruction Fuzzy Hash: 5141F050D082CDDDFB02C6A8D948BDEBFB55B26748F0840D8D5847A282D3FB1658C77A

                                      Control-flow Graph

                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00502E8E
                                      • lstrcpy.KERNEL32(.exe,?), ref: 00502EAB
                                      • GetWindowsDirectoryA.KERNEL32(?,00000118), ref: 00502EC7
                                      • GetTempPathA.KERNEL32(00000118,?), ref: 00502ED5
                                      • lstrlen.KERNEL32(?), ref: 00502EEE
                                      • lstrcat.KERNEL32(?,00501190), ref: 00502F0D
                                      • lstrcat.KERNEL32(?,java.exe), ref: 00502F1A
                                      • SetFileAttributesA.KERNELBASE(?,00000020), ref: 00502F25
                                      • CreateFileA.KERNELBASE(?,40000000,00000003,00000000,00000002,00000080,00000000), ref: 00502F42
                                      • CloseHandle.KERNEL32(00000000), ref: 00502F52
                                      • DeleteFileA.KERNELBASE(?), ref: 00502F5F
                                      • CopyFileA.KERNEL32(?,?,00000000), ref: 00502F74
                                      • GetFileAttributesA.KERNEL32(?), ref: 00502F85
                                      • lstrcpy.KERNEL32(?,?), ref: 00502FA9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$Attributeslstrcatlstrcpy$CloseCopyCreateDeleteDirectoryHandleModuleNamePathTempWindowslstrlen
                                      • String ID: .exe$java.exe
                                      • API String ID: 3096175462-2602780958
                                      • Opcode ID: 473512d9f1244c06d08cbd740965cc33da0b9b43a2f3904d5a041e8f1c7c422d
                                      • Instruction ID: dece3f8ae99a5382c4877d1b044eea6b25dfa7d2f7fe03871ebba1afd8658fdb
                                      • Opcode Fuzzy Hash: 473512d9f1244c06d08cbd740965cc33da0b9b43a2f3904d5a041e8f1c7c422d
                                      • Instruction Fuzzy Hash: 72416A7190429DAFEB10DBA4DC8DBDEBFBCAB18354F104096F585E6090DB749AC8CB21

                                      Control-flow Graph

                                      APIs
                                        • Part of subcall function 0050746B: GetModuleFileNameA.KERNEL32(00000000,?,00000100,00000000,?), ref: 00507487
                                        • Part of subcall function 0050746B: CreateFileA.KERNELBASE(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 005074AA
                                        • Part of subcall function 0050746B: CreateFileA.KERNELBASE(?,C0000000,00000003,00000000,00000002,00000080,00000000), ref: 005074DC
                                        • Part of subcall function 0050746B: SetFilePointer.KERNELBASE(?,00000000,00000000,00000000), ref: 005074F5
                                        • Part of subcall function 0050746B: ReadFile.KERNELBASE(?,?,00000100,?,00000000), ref: 0050752E
                                        • Part of subcall function 0050746B: FindCloseChangeNotification.KERNELBASE(00000000), ref: 0050753E
                                        • Part of subcall function 0050746B: CloseHandle.KERNEL32(?), ref: 00507543
                                      • GetWindowsDirectoryA.KERNEL32(?,00000100,00000000,?), ref: 0050761F
                                        • Part of subcall function 0050737C: WriteFile.KERNELBASE(00000000,?,00000001,?,00000000,00000000,75568A60), ref: 005073BD
                                        • Part of subcall function 0050737C: WriteFile.KERNEL32(00000000,?,00000001,?,00000000,00000000,75568A60), ref: 005073E2
                                      • GetTempPathA.KERNEL32(00000100,?,00000000,?), ref: 0050762D
                                      • lstrcat.KERNEL32(?,services), ref: 00507677
                                      • lstrcat.KERNEL32(?,00501830), ref: 00507685
                                      • lstrcat.KERNEL32(?,exe), ref: 00507693
                                      • CreateFileA.KERNELBASE(?,C0000000,00000003,00000000,00000002,00000080,00000000), ref: 005076AC
                                      • FindCloseChangeNotification.KERNELBASE(00000000), ref: 005076D0
                                      • wsprintfA.USER32 ref: 005076E9
                                      • memset.MSVCRT ref: 005076F8
                                      • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000001,00000000,00000000,00000000,?,?), ref: 00507725
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$Create$Closelstrcat$ChangeFindNotificationWrite$DirectoryHandleModuleNamePathPointerProcessReadTempWindowsmemsetwsprintf
                                      • String ID: "%s"$\$exe$services
                                      • API String ID: 1621132550-3764781487
                                      • Opcode ID: 4e5a91acdd77911c355f3c749416d69306de053efc37594798bdc49c714c615a
                                      • Instruction ID: 5cab7ea6ea662128e4a800645ff2ec6955619924f35eec1abec093929e757c50
                                      • Opcode Fuzzy Hash: 4e5a91acdd77911c355f3c749416d69306de053efc37594798bdc49c714c615a
                                      • Instruction Fuzzy Hash: 6D3184B1D04A9CEAEB109BA49C8DFEE7F7CFB48341F1004A1F245E61C1D6705E898A65

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 909 505449-5054fe 910 505503-50551f memset 909->910 911 505521-505527 GetWindowsDirectoryA 910->911 912 505529-50552e GetEnvironmentVariableA 910->912 913 505534-50553a 911->913 912->913 914 5055a2-5055a9 913->914 915 50553c-505554 lstrlen 913->915 914->910 918 5055af-5055b3 914->918 916 505564-505568 915->916 917 505556-505562 lstrcat 915->917 919 505585-50559b lstrcat call 5052ad 916->919 920 50556a-505583 lstrcat * 2 916->920 917->916 922 5055a0-5055a1 919->922 920->919 922->914
                                      APIs
                                      • memset.MSVCRT ref: 0050550C
                                      • GetWindowsDirectoryA.KERNEL32(?,00000184,00000000,75570F10,75570F00), ref: 00505521
                                      • GetEnvironmentVariableA.KERNEL32(USERPROFILE,?,00000184,00000000,75570F10,75570F00), ref: 0050552E
                                      • lstrlen.KERNEL32(?), ref: 00505543
                                      • lstrcat.KERNEL32(?,00501190), ref: 00505562
                                      • lstrcat.KERNEL32(?,Local Settings), ref: 00505575
                                      • lstrcat.KERNEL32(?,00501190), ref: 00505583
                                      • lstrcat.KERNEL32(?,Temporary Internet Files), ref: 00505590
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$DirectoryEnvironmentVariableWindowslstrlenmemset
                                      • String ID: Local Settings$Temporary Internet Files$USERPROFILE
                                      • API String ID: 527352983-4053592351
                                      • Opcode ID: d89d942958c9cba20cc904a98748bb533d06aa26e497641e0aaf6626ffe246d0
                                      • Instruction ID: cacbc361b4096883e695f9cd27b791d52763dfaa7485a7004b5a6053e68340e0
                                      • Opcode Fuzzy Hash: d89d942958c9cba20cc904a98748bb533d06aa26e497641e0aaf6626ffe246d0
                                      • Instruction Fuzzy Hash: 63410C61C083CCDAEB11D7A8D9087DEBFB95F26348F0840D9D18476282D7BA5758CB76

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 942 502fb0-5030ab RegOpenKeyExA 943 5030c2-5030e5 lstrlen RegSetValueExA RegCloseKey 942->943 944 5030ad-5030c0 RegOpenKeyExA 942->944 945 5030eb-5030ef 943->945 944->943 944->945
                                      APIs
                                      • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,00020006,?), ref: 005030A7
                                      • RegOpenKeyExA.ADVAPI32(80000001,Software\Microsoft\Windows\CurrentVersion\Run,00000000,00020006,?), ref: 005030BC
                                      • lstrlen.KERNEL32(00000052), ref: 005030C9
                                      • RegSetValueExA.KERNELBASE(?,JavaVM,00000000,00000001,00000052,00000001), ref: 005030DC
                                      • RegCloseKey.ADVAPI32(?), ref: 005030E5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Open$CloseValuelstrlen
                                      • String ID: JavaVM$Software\Microsoft\Windows\CurrentVersion\Run
                                      • API String ID: 1812710942-1525231178
                                      • Opcode ID: e7c4ab6b2f41031e5725f1ab95989c2709ffec37f0edb752e120a5812798a4be
                                      • Instruction ID: cd70c8d2d714d64a17d00ab414c80a8edff05e1f62e6019a642830455d294362
                                      • Opcode Fuzzy Hash: e7c4ab6b2f41031e5725f1ab95989c2709ffec37f0edb752e120a5812798a4be
                                      • Instruction Fuzzy Hash: 6241BC10D0C2C9EDFB02C2A8D8487DEBFB65B26748F084099D5847A292C2FF1658C77A

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 946 503697-5036ce SetFilePointer ReadFile 947 5036d4-5036e1 SetFilePointer 946->947 948 503776 946->948 947->948 950 5036e7-5036fb ReadFile 947->950 949 503778-50377c 948->949 950->948 951 5036fd-50370f 950->951 951->948 952 503711-503715 951->952 952->948 953 503717-50371c 952->953 953->948 954 50371e-50373d SetFilePointer 953->954 955 503772-503774 954->955 956 50373f-503756 ReadFile 954->956 955->949 956->948 957 503758-503762 956->957 958 503764 957->958 959 503766-503770 957->959 958->959 959->955 959->956
                                      APIs
                                      • SetFilePointer.KERNELBASE(00000000,0000003C,00000000,00000000,00000100,00000000,75573130), ref: 005036AF
                                      • ReadFile.KERNELBASE(00000000,00000000,00000004,?,00000000), ref: 005036C8
                                      • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000), ref: 005036DC
                                      • ReadFile.KERNELBASE(00000000,?,00000016,00000004,00000000), ref: 005036F5
                                      • SetFilePointer.KERNELBASE(00000000,00000018,00000000,00000000), ref: 00503732
                                      • ReadFile.KERNEL32(00000000,?,00000028,00000500,00000000), ref: 00503750
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$PointerRead
                                      • String ID: (
                                      • API String ID: 3154509469-3887548279
                                      • Opcode ID: 8d052d63ba2457e03fe9d7e8e13cec42e15aac050f382052b2be9159c5306ec8
                                      • Instruction ID: f73d0bf622d8b4d7441a19c50e1fac5286902f701a87a8b44225c7f7ee392bb3
                                      • Opcode Fuzzy Hash: 8d052d63ba2457e03fe9d7e8e13cec42e15aac050f382052b2be9159c5306ec8
                                      • Instruction Fuzzy Hash: 8C3106B6901118FBDF21DF95CE849EEBFBDFF04790F108065E905A2190E6319B81DBA0

                                      Control-flow Graph

                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000100,00000000,?), ref: 00507487
                                      • CreateFileA.KERNELBASE(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 005074AA
                                        • Part of subcall function 005073E8: GetTempPathA.KERNEL32(00000104,?), ref: 005073FD
                                        • Part of subcall function 005073E8: lstrlen.KERNEL32(?), ref: 0050740A
                                        • Part of subcall function 005073E8: lstrcat.KERNEL32(?,zincite), ref: 00507448
                                        • Part of subcall function 005073E8: lstrcat.KERNEL32(?,.log), ref: 00507456
                                        • Part of subcall function 005073E8: lstrcpy.KERNEL32(?,?), ref: 00507462
                                      • CreateFileA.KERNELBASE(?,C0000000,00000003,00000000,00000002,00000080,00000000), ref: 005074DC
                                        • Part of subcall function 00503697: SetFilePointer.KERNELBASE(00000000,0000003C,00000000,00000000,00000100,00000000,75573130), ref: 005036AF
                                        • Part of subcall function 00503697: ReadFile.KERNELBASE(00000000,00000000,00000004,?,00000000), ref: 005036C8
                                        • Part of subcall function 00503697: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000), ref: 005036DC
                                        • Part of subcall function 00503697: ReadFile.KERNELBASE(00000000,?,00000016,00000004,00000000), ref: 005036F5
                                        • Part of subcall function 00503697: SetFilePointer.KERNELBASE(00000000,00000018,00000000,00000000), ref: 00503732
                                        • Part of subcall function 00503697: ReadFile.KERNEL32(00000000,?,00000028,00000500,00000000), ref: 00503750
                                      • SetFilePointer.KERNELBASE(?,00000000,00000000,00000000), ref: 005074F5
                                      • WriteFile.KERNELBASE(00000000,?,?,?,00000000), ref: 00507515
                                      • ReadFile.KERNELBASE(?,?,00000100,?,00000000), ref: 0050752E
                                      • FindCloseChangeNotification.KERNELBASE(00000000), ref: 0050753E
                                      • CloseHandle.KERNEL32(?), ref: 00507543
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$PointerRead$CloseCreatelstrcat$ChangeFindHandleModuleNameNotificationPathTempWritelstrcpylstrlen
                                      • String ID:
                                      • API String ID: 3217969230-0
                                      • Opcode ID: 945720a1fce9431e2360ffcd8314ee30a754bd9a45bede0f71f403d5586aa745
                                      • Instruction ID: 3ee29f7f2fe5b884bcaff3a16fbbd882d52692b313de89af8fed5149c55411fd
                                      • Opcode Fuzzy Hash: 945720a1fce9431e2360ffcd8314ee30a754bd9a45bede0f71f403d5586aa745
                                      • Instruction Fuzzy Hash: 1521F875D00128BBDB219BA1DC48FDEBF7CEF15360F104292B654A2090D6706B84DFA4

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 978 5055b4-505605 memset GetWindowsDirectoryA lstrcpy call 5052ad 980 50560a-505612 978->980 981 505613-505619 980->981 982 505648-505655 981->982 983 50561b-50562b GetDriveTypeA 981->983 982->981 985 505657-50565a 982->985 983->982 984 50562d-505647 Sleep call 5052ad 983->984 984->982
                                      APIs
                                      • memset.MSVCRT ref: 005055CE
                                      • GetWindowsDirectoryA.KERNEL32(?,00000104,?,75570F10,75570F00), ref: 005055DE
                                      • lstrcpy.KERNEL32(?,00501888), ref: 005055F6
                                      • GetDriveTypeA.KERNEL32(00000043,?,75570F10,75570F00), ref: 00505622
                                      • Sleep.KERNEL32(00001194,?,75570F10,75570F00), ref: 00505632
                                        • Part of subcall function 005052AD: Sleep.KERNEL32(00000800,75568A60,00000184), ref: 005052D7
                                        • Part of subcall function 005052AD: lstrcpy.KERNEL32(?,?), ref: 005052F4
                                        • Part of subcall function 005052AD: lstrlen.KERNEL32(?), ref: 00505304
                                        • Part of subcall function 005052AD: lstrcat.KERNEL32(?,00501190), ref: 0050531C
                                        • Part of subcall function 005052AD: lstrcat.KERNEL32(?,*.*), ref: 0050532E
                                        • Part of subcall function 005052AD: memset.MSVCRT ref: 00505341
                                        • Part of subcall function 005052AD: FindFirstFileA.KERNELBASE(?,00000010), ref: 0050535F
                                        • Part of subcall function 005052AD: FindNextFileA.KERNELBASE(?,?), ref: 0050537E
                                        • Part of subcall function 005052AD: lstrcpy.KERNEL32(?,?), ref: 005053BA
                                        • Part of subcall function 005052AD: lstrlen.KERNEL32(?), ref: 005053C3
                                        • Part of subcall function 005052AD: lstrcat.KERNEL32(?,00501190), ref: 005053DB
                                        • Part of subcall function 005052AD: lstrcat.KERNEL32(?,0000002E), ref: 005053EF
                                        • Part of subcall function 005052AD: Sleep.KERNELBASE(0000004B), ref: 00505400
                                        • Part of subcall function 005052AD: FindClose.KERNELBASE(?), ref: 0050543B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$FindSleeplstrcpy$Filelstrlenmemset$CloseDirectoryDriveFirstNextTypeWindows
                                      • String ID: Z
                                      • API String ID: 798667630-1505515367
                                      • Opcode ID: c6931e2ca908d11bfe10dd74d10df2d0473876e0ea701a3d5757cf76e3dc8de0
                                      • Instruction ID: c2197e004829da8253717f8257516700dd35be32272eb9ca971d862e6122c766
                                      • Opcode Fuzzy Hash: c6931e2ca908d11bfe10dd74d10df2d0473876e0ea701a3d5757cf76e3dc8de0
                                      • Instruction Fuzzy Hash: B5016DB5D046AA6BDB2093609D89BDE7B6CAB21314F0404D1E389E20C1E6B49AC88F55

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 993 502c90-502d0a 996 502d0f-502d2f RegOpenKeyExA 993->996 997 502d31-502d38 996->997 998 502d83-502d8c RegCloseKey 996->998 997->996 999 502d3a-502d40 997->999 1000 502d7e-502d82 998->1000 1001 502d43-502d6a RegCreateKeyExA 999->1001 1002 502d75-502d7c 1001->1002 1003 502d6c-502d6f RegCloseKey 1001->1003 1002->1000 1002->1001 1003->1002
                                      APIs
                                      • RegOpenKeyExA.KERNELBASE(?,Software\Microsoft\Daemon,00000000,00020019,?), ref: 00502D27
                                      • RegCreateKeyExA.KERNELBASE(00000002,00000053,00000000,00000000,00000000,00020006,00000000,?,?), ref: 00502D62
                                      • RegCloseKey.KERNELBASE(?), ref: 00502D6F
                                      • RegCloseKey.ADVAPI32(?), ref: 00502D86
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Close$CreateOpen
                                      • String ID: Software\Microsoft\Daemon
                                      • API String ID: 1299239824-1912283813
                                      • Opcode ID: dca647fb5f665cc76b449c390acf53b1ca5190e4f5961b617e44826d8c6e7f19
                                      • Instruction ID: a7eee4beb99658644a23fa6dbb2239ba827f2e479c7b42f201d4ea8a8906cff2
                                      • Opcode Fuzzy Hash: dca647fb5f665cc76b449c390acf53b1ca5190e4f5961b617e44826d8c6e7f19
                                      • Instruction Fuzzy Hash: 033168519082CDEDEF02C7A8C94C7DEBFB95F22748F084099D584BA182D3BA4B58C776

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1004 505131-50513b 1005 505141-505149 1004->1005 1006 5052ab-5052ac 1004->1006 1007 505167-50516c 1005->1007 1008 50514b-505150 1005->1008 1009 50518c-505198 1007->1009 1010 505152-505157 1008->1010 1011 505163-505165 1008->1011 1013 5051a4-5051a9 1009->1013 1014 50519a-50519f 1009->1014 1015 505159 1010->1015 1016 50515b-505161 1010->1016 1011->1007 1012 50516e-505189 lstrcpyn CharLowerA 1011->1012 1012->1009 1018 5051ab-5051ae 1013->1018 1019 5051bd-5051c2 1013->1019 1017 50525f-505266 1014->1017 1015->1016 1016->1008 1016->1011 1020 505271-505274 1017->1020 1021 505268-50526d 1017->1021 1018->1017 1022 5051b4-5051b7 1018->1022 1023 5051c4-5051c7 1019->1023 1024 5051de-5051e0 1019->1024 1026 505276 1020->1026 1027 5052a9-5052aa 1020->1027 1021->1020 1025 50526f 1021->1025 1022->1017 1022->1019 1028 5051d3-5051d6 1023->1028 1029 5051c9-5051ce 1023->1029 1030 5051e2-5051e5 1024->1030 1031 5051e7-5051e9 1024->1031 1025->1020 1034 505283-50528a 1026->1034 1027->1006 1035 5051d8-5051da 1028->1035 1036 50521f-505224 1028->1036 1029->1017 1030->1017 1030->1031 1032 5051f5-5051f7 1031->1032 1033 5051eb-5051ee 1031->1033 1039 505203-505205 1032->1039 1040 5051f9-5051fc 1032->1040 1037 5051f0-5051f3 1033->1037 1038 505207-50520a 1033->1038 1041 505278-50527d Sleep 1034->1041 1042 50528c-50528f 1034->1042 1035->1036 1043 5051dc 1035->1043 1044 505226-505229 1036->1044 1045 505237-50523e 1036->1045 1037->1017 1037->1032 1038->1036 1049 50520c-50520f 1038->1049 1039->1038 1048 505211-505213 1039->1048 1040->1036 1047 5051fe-505201 1040->1047 1041->1034 1050 505291-505294 call 504e00 1042->1050 1051 50529b-50529e 1042->1051 1052 505230-505235 1043->1052 1044->1045 1053 50522b-50522e 1044->1053 1045->1027 1046 505240-505251 call 5033b4 1045->1046 1046->1027 1063 505253-50525c 1046->1063 1047->1017 1047->1039 1048->1036 1056 505215-505218 1048->1056 1049->1017 1049->1048 1061 505299 1050->1061 1051->1027 1054 5052a0-5052a3 call 504eea 1051->1054 1052->1017 1053->1045 1053->1052 1062 5052a8 1054->1062 1056->1036 1060 50521a-50521d 1056->1060 1060->1017 1060->1036 1061->1062 1062->1027 1063->1017
                                      APIs
                                      • lstrcpyn.KERNEL32(?,00000070,0000000F,?,?,00505430,?), ref: 00505179
                                      • CharLowerA.USER32(?,?,?,00505430,?), ref: 00505183
                                      • Sleep.KERNEL32(00000800,?,755683C0,?,?,00505430,?), ref: 0050527D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CharLowerSleeplstrcpyn
                                      • String ID: 0TP
                                      • API String ID: 267381043-1855386918
                                      • Opcode ID: 076539342993601403a397f8d3848ee9606f614aa553588212fb02b9d72115e3
                                      • Instruction ID: 8274f9cbfd694f8c2d5fe74a321f0c892786a0426ba65b7b33d98da66336cf23
                                      • Opcode Fuzzy Hash: 076539342993601403a397f8d3848ee9606f614aa553588212fb02b9d72115e3
                                      • Instruction Fuzzy Hash: 2841C168A44E4A4EFF344624C9497BF2F5B7FB2314F98491BD193420D3FA264C8ACE16

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1064 504ae2-504af0 1065 504b06-504b0d call 503620 1064->1065 1068 504af2-504af9 call 505127 1065->1068 1069 504b0f-504b2f call 505127 1065->1069 1074 504b00 Sleep 1068->1074 1075 504b31-504b36 1069->1075 1076 504b7a 1069->1076 1074->1065 1078 504b45-504b4c 1075->1078 1079 504b38-504b3b 1075->1079 1077 504b7c-504b80 1076->1077 1080 504b82-504b84 1077->1080 1081 504bd6-504be3 call 505127 1077->1081 1084 504b52-504b57 1078->1084 1085 504b4e 1078->1085 1082 504b43 1079->1082 1083 504b3d-504b41 1079->1083 1080->1081 1087 504b86-504b8d 1080->1087 1094 504be5-504bea 1081->1094 1095 504bcc-504bd1 1081->1095 1082->1078 1083->1078 1083->1082 1084->1075 1088 504b59-504b5f 1084->1088 1085->1084 1091 504b99-504bb3 CreateThread 1087->1091 1092 504b8f-504b94 1087->1092 1088->1076 1089 504b61-504b6e call 504a85 1088->1089 1089->1077 1101 504b70-504b78 call 505127 1089->1101 1096 504bb5-504bb8 1091->1096 1097 504bc8 1091->1097 1092->1074 1094->1095 1099 504bec-504bfb GetTickCount 1094->1099 1095->1074 1096->1097 1100 504bba-504bc3 CloseHandle 1096->1100 1097->1095 1099->1095 1102 504bfd-504c04 call 5047b7 1099->1102 1100->1074 1101->1077 1102->1074
                                      APIs
                                        • Part of subcall function 00503620: GetModuleHandleA.KERNEL32(?), ref: 0050365A
                                        • Part of subcall function 00503620: LoadLibraryA.KERNELBASE(wininet.dll), ref: 00503668
                                        • Part of subcall function 00503620: GetProcAddress.KERNEL32(00000000,InternetGetConnectedState), ref: 00503678
                                      • Sleep.KERNELBASE(00000001,?,?,?,?,?,?,00504C20), ref: 00504B00
                                      • CreateThread.KERNEL32(00000000,00000000,00504A37,00000000,00000000,?), ref: 00504BAB
                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,00504C20), ref: 00504BBB
                                      • GetTickCount.KERNEL32 ref: 00504BEC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Handle$AddressCloseCountCreateLibraryLoadModuleProcSleepThreadTick
                                      • String ID:
                                      • API String ID: 50151514-0
                                      • Opcode ID: 7bd039e2053160122893935ea775d366336ab228428e61975a78905543a36c9c
                                      • Instruction ID: ab1ee794b50bf540a74e33d7e95b3844ad5376a59cf73203d230b0ff36f6ead8
                                      • Opcode Fuzzy Hash: 7bd039e2053160122893935ea775d366336ab228428e61975a78905543a36c9c
                                      • Instruction Fuzzy Hash: 2331BFF06047829AEB24AF749C9DF7FBED9BB90301F114A19F695C61D1EB60C844CE62
                                      APIs
                                        • Part of subcall function 00502C90: RegOpenKeyExA.KERNELBASE(?,Software\Microsoft\Daemon,00000000,00020019,?), ref: 00502D27
                                        • Part of subcall function 00502C90: RegCreateKeyExA.KERNELBASE(00000002,00000053,00000000,00000000,00000000,00020006,00000000,?,?), ref: 00502D62
                                        • Part of subcall function 00502C90: RegCloseKey.KERNELBASE(?), ref: 00502D6F
                                      • CreateThread.KERNELBASE(00000000,00000000,Function_0000311C,00000000,00000000,?), ref: 00503239
                                      • Sleep.KERNELBASE ref: 00503253
                                      • CreateThread.KERNELBASE(00000000,00000000,Function_00004C1B,00000000,00000000,?), ref: 00503267
                                      • Sleep.KERNEL32(000003E8), ref: 00503278
                                        • Part of subcall function 00502D8E: memset.MSVCRT ref: 00502DA8
                                        • Part of subcall function 00502D8E: gethostname.WS2_32(?,00000100), ref: 00502DB8
                                        • Part of subcall function 00502D8E: lstrcat.KERNEL32(?,root), ref: 00502DD0
                                        • Part of subcall function 00502D8E: lstrcat.KERNEL32(00000000,00000000), ref: 00502E19
                                        • Part of subcall function 00502D8E: lstrcat.KERNEL32(00000000,00000000), ref: 00502E29
                                        • Part of subcall function 00502D8E: CreateMutexA.KERNEL32(00000000,00000001,00000000), ref: 00502E36
                                        • Part of subcall function 00502D8E: GetLastError.KERNEL32 ref: 00502E3C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Create$lstrcat$SleepThread$CloseErrorLastMutexOpengethostnamememset
                                      • String ID:
                                      • API String ID: 2995464708-0
                                      • Opcode ID: 5b84a6266cc0cddde8327f0e5fcd076bdfc815fbfa76804f980ebbea6f6bd2a6
                                      • Instruction ID: c3a13703e42c1b4ec363eec73e7dae4186dad5f565332290872ed40493be106c
                                      • Opcode Fuzzy Hash: 5b84a6266cc0cddde8327f0e5fcd076bdfc815fbfa76804f980ebbea6f6bd2a6
                                      • Instruction Fuzzy Hash: B701B13A14065676D71177729C4FDAF6F6CFFC6B11B10041AFA44920C2DE349A4589B9
                                      APIs
                                      • WSAStartup.WS2_32(00000101,?), ref: 00503295
                                        • Part of subcall function 005033A8: GetTickCount.KERNEL32 ref: 005033A8
                                      • memset.MSVCRT ref: 005032AE
                                        • Part of subcall function 005031E4: CreateThread.KERNELBASE(00000000,00000000,Function_0000311C,00000000,00000000,?), ref: 00503239
                                        • Part of subcall function 005031E4: Sleep.KERNELBASE ref: 00503253
                                        • Part of subcall function 005031E4: CreateThread.KERNELBASE(00000000,00000000,Function_00004C1B,00000000,00000000,?), ref: 00503267
                                        • Part of subcall function 005031E4: Sleep.KERNEL32(000003E8), ref: 00503278
                                      • ExitProcess.KERNEL32 ref: 005032C4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CreateSleepThread$CountExitProcessStartupTickmemset
                                      • String ID:
                                      • API String ID: 3857727052-0
                                      • Opcode ID: 88d01b5b5f6c5010676a2a66d5ceb351fe4fc908ad08d7981e774765898afe9f
                                      • Instruction ID: e6c800b91a5105f6af05a8ed022c94dfcb71a2cb97930a29ec3ddceb2131e2e1
                                      • Opcode Fuzzy Hash: 88d01b5b5f6c5010676a2a66d5ceb351fe4fc908ad08d7981e774765898afe9f
                                      • Instruction Fuzzy Hash: 93E08C309442086BEB50B7A0CC0EFDD7B2CAB14701F8008A1B284950D2EEA166C88AA6
                                      APIs
                                      • GetCurrentThread.KERNEL32 ref: 0050565D
                                      • SetThreadPriority.KERNELBASE(00000000), ref: 00505664
                                        • Part of subcall function 00504FF8: RegOpenKeyExA.KERNELBASE(80000001,?,00000000,00020019,?,75570F00), ref: 005050BE
                                        • Part of subcall function 00504FF8: memset.MSVCRT ref: 005050D5
                                        • Part of subcall function 00504FF8: RegQueryValueExA.KERNELBASE(?,00000000,00000000,00000000,?,?), ref: 005050F5
                                        • Part of subcall function 00504FF8: RegCloseKey.ADVAPI32(?), ref: 005050FE
                                        • Part of subcall function 00505449: memset.MSVCRT ref: 0050550C
                                        • Part of subcall function 00505449: GetWindowsDirectoryA.KERNEL32(?,00000184,00000000,75570F10,75570F00), ref: 00505521
                                        • Part of subcall function 00505449: lstrlen.KERNEL32(?), ref: 00505543
                                        • Part of subcall function 00505449: lstrcat.KERNEL32(?,00501190), ref: 00505562
                                        • Part of subcall function 00505449: lstrcat.KERNEL32(?,Local Settings), ref: 00505575
                                        • Part of subcall function 00505449: lstrcat.KERNEL32(?,00501190), ref: 00505583
                                        • Part of subcall function 00505449: lstrcat.KERNEL32(?,Temporary Internet Files), ref: 00505590
                                        • Part of subcall function 005055B4: memset.MSVCRT ref: 005055CE
                                        • Part of subcall function 005055B4: GetWindowsDirectoryA.KERNEL32(?,00000104,?,75570F10,75570F00), ref: 005055DE
                                        • Part of subcall function 005055B4: lstrcpy.KERNEL32(?,00501888), ref: 005055F6
                                        • Part of subcall function 005055B4: GetDriveTypeA.KERNEL32(00000043,?,75570F10,75570F00), ref: 00505622
                                        • Part of subcall function 005055B4: Sleep.KERNEL32(00001194,?,75570F10,75570F00), ref: 00505632
                                      • Sleep.KERNEL32(000061A8), ref: 00505684
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$memset$DirectorySleepThreadWindows$CloseCurrentDriveOpenPriorityQueryTypeValuelstrcpylstrlen
                                      • String ID:
                                      • API String ID: 1200182354-0
                                      • Opcode ID: d3dfe3ca985f4e689f16a7144f6eb9c4b7e5f550bcfda9f1fc34b3dd57ffe1dd
                                      • Instruction ID: a00bd4ce691c911287dc50f1ec9ddfcc97e79f3b0b06d643ae5355c187a33e16
                                      • Opcode Fuzzy Hash: d3dfe3ca985f4e689f16a7144f6eb9c4b7e5f550bcfda9f1fc34b3dd57ffe1dd
                                      • Instruction Fuzzy Hash: 94C0123100098687DF043BF49C1E49E3E21BFA13623384701F263840E3DF2004C86E2B
                                      APIs
                                      • WriteFile.KERNELBASE(00000000,?,00000001,?,00000000,00000000,75568A60), ref: 005073BD
                                      • WriteFile.KERNEL32(00000000,?,00000001,?,00000000,00000000,75568A60), ref: 005073E2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: FileWrite
                                      • String ID:
                                      • API String ID: 3934441357-0
                                      • Opcode ID: 3c2d70d6b2ebeca3607b6924ad4f9547b586735f7dfb2575c4133ed41483a66d
                                      • Instruction ID: 22b37714542d64fe014a8661f32d504f0c3aa166d1667109d1551e00d35c67e0
                                      • Opcode Fuzzy Hash: 3c2d70d6b2ebeca3607b6924ad4f9547b586735f7dfb2575c4133ed41483a66d
                                      • Instruction Fuzzy Hash: DAF0C8B2D0025DBEEB00DB65CD49BEF7BACFB48300F1044B5AA15E3182E230AE449B90
                                      APIs
                                      Strings
                                      • &num=%d, xrefs: 00507895
                                      • mailto, xrefs: 00507771
                                      • http://search.yahoo.com/search?p=%s&ei=UTF-8&fr=fp-tab-web-t&cop=mss&tab=, xrefs: 005078A7
                                      • &n=%d, xrefs: 005078D8
                                      • &nbq=%d, xrefs: 0050791B
                                      • http://www.altavista.com/web/results?q=%s&kgs=0&kls=0, xrefs: 005078E7
                                      • w, xrefs: 005077E9
                                      • mail, xrefs: 005077F4
                                      • http://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s, xrefs: 0050792F
                                      • %s+%s, xrefs: 00507825
                                      • contact+, xrefs: 005077B3
                                      • reply, xrefs: 00507793
                                      • http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=%s, xrefs: 0050784D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: wsprintf$lstrcat$memset$lstrcpylstrlen
                                      • String ID: %s+%s$&n=%d$&nbq=%d$&num=%d$contact+$http://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s$http://search.yahoo.com/search?p=%s&ei=UTF-8&fr=fp-tab-web-t&cop=mss&tab=$http://www.altavista.com/web/results?q=%s&kgs=0&kls=0$http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=%s$mail$mailto$reply$w
                                      • API String ID: 3204893122-2625203255
                                      • Opcode ID: 635e0927980e0d4f1e152389c1cd3419be9ed90e47190587e3b17e1ee343d797
                                      • Instruction ID: ded823d3f8bc32eef99a2724958b2501f44dba1139f3c98e25ba8aed4e19c952
                                      • Opcode Fuzzy Hash: 635e0927980e0d4f1e152389c1cd3419be9ed90e47190587e3b17e1ee343d797
                                      • Instruction Fuzzy Hash: D551E430F4450C7AEF08A6669D8EEEE3E5FBBDCB10F18C827F105610D6DDB0AA158525
                                      APIs
                                      • lstrcpy.KERNEL32(?,"Postmaster"), ref: 00505AB8
                                      • lstrcat.KERNEL32(?,00502644), ref: 00505ACA
                                      • lstrcat.KERNEL32(?,postmaster), ref: 00505AF6
                                      • lstrcat.KERNEL32(?,00501868), ref: 00505AFE
                                      • lstrcat.KERNEL32(?,?), ref: 00505B05
                                      • lstrcpy.KERNEL32(?,?), ref: 00505B12
                                      • lstrcat.KERNEL32(?,0050261C), ref: 00505B1E
                                      • lstrcat.KERNEL32(?,yahoo.com), ref: 00505BA4
                                      • lstrcpy.KERNEL32(?,yahoo.com), ref: 00505BB2
                                      • lstrcpy.KERNEL32(?,0000000A), ref: 00505BBF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$lstrcpy
                                      • String ID: "Automatic Email Delivery Software"$"Bounced mail"$"MAILER-DAEMON"$"Mail Administrator"$"Mail Delivery Subsystem"$"Post Office"$"Postmaster"$"Returned mail"$"The Post Office"$MAILER-DAEMON$noreply$postmaster$yahoo.com
                                      • API String ID: 2482611188-423193620
                                      • Opcode ID: 7d073a5acc986f1f03e9c764ca59b1a8bfb834ff45090a4b13ef80b0dc7bb979
                                      • Instruction ID: a9b0a225ccebaa74ed32a98531ce4ef3425950baae9838941721c6dfd1e2a18b
                                      • Opcode Fuzzy Hash: 7d073a5acc986f1f03e9c764ca59b1a8bfb834ff45090a4b13ef80b0dc7bb979
                                      • Instruction Fuzzy Hash: D8417771340B11A7E71097259CCEBBF7E9CFB91B01F144016F982960C2FEE59845AEB6
                                      APIs
                                      • GetLocalTime.KERNEL32(?), ref: 005032E0
                                      • FileTimeToLocalFileTime.KERNEL32(00000000,?), ref: 005032EF
                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 005032FD
                                      • GetTimeZoneInformation.KERNEL32(?), ref: 0050330B
                                      • wsprintfA.USER32 ref: 00503399
                                      Strings
                                      • %s, %u %s %u %.2u:%.2u:%.2u %c%.2u%.2u, xrefs: 00503391
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Time$File$Local$InformationSystemZonewsprintf
                                      • String ID: %s, %u %s %u %.2u:%.2u:%.2u %c%.2u%.2u
                                      • API String ID: 4026320513-1580571061
                                      • Opcode ID: 3a7b98e65f6c78f5d9b51af2aadc7aef16cb77ea1e4a24cd175063a99b3a5637
                                      • Instruction ID: a724780acf2ae77f2b438354054414b458c2743b998ef78bcc664df01f72aa73
                                      • Opcode Fuzzy Hash: 3a7b98e65f6c78f5d9b51af2aadc7aef16cb77ea1e4a24cd175063a99b3a5637
                                      • Instruction Fuzzy Hash: 7921287290024CAADF24DF99DC59AFE3BBDBF08705F10441AF956C2090E778CA88DB65
                                      APIs
                                      • select.WS2_32(00000001,?,00000000,00000000,00000200), ref: 00506B12
                                      • recv.WS2_32(00000000,?,00000001,00000000), ref: 00506B21
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: recvselect
                                      • String ID:
                                      • API String ID: 741273618-0
                                      • Opcode ID: c7b9de3faed6e7e385b1f76ede6720dd13d837e2c864222dfe83f2688b9843cd
                                      • Instruction ID: 03514d87830b8e2bd1425e58e666e4343d3a5ee024025f41421e549905ad165e
                                      • Opcode Fuzzy Hash: c7b9de3faed6e7e385b1f76ede6720dd13d837e2c864222dfe83f2688b9843cd
                                      • Instruction Fuzzy Hash: 7511B271A00208ABDB15CF59CC86BEEBBB8FF81700F104059A915E62C0DB30DA91CB24
                                      APIs
                                      • GetSystemTime.KERNEL32(0000002E,0000002E,?,00000000,0000001E), ref: 00505721
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: SystemTime
                                      • String ID:
                                      • API String ID: 2656138-0
                                      • Opcode ID: c9c0e3fb25f61834500a3681515ade6d4997d58bd528bc0d92d3ea59b26e053d
                                      • Instruction ID: 19201fb6aed2fae6b5a5d3050ea43a42579a100c3c4deb84fc8169bf925c8c27
                                      • Opcode Fuzzy Hash: c9c0e3fb25f61834500a3681515ade6d4997d58bd528bc0d92d3ea59b26e053d
                                      • Instruction Fuzzy Hash: 50F0BD78D10629EBDB00DBA8C4984AEB7B4FF44744B405A55D421E7390E3B0E645CB95
                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,00000000), ref: 00506002
                                      • GetTempPathA.KERNEL32(00000104,?,?,00000000), ref: 00506023
                                      • GetTempFileNameA.KERNEL32(00000000,tmp,00000000,?), ref: 0050604C
                                      • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 0050605B
                                      • CopyFileA.KERNEL32(00000000,?,00000000), ref: 00506070
                                        • Part of subcall function 00505EE3: CreateFileA.KERNEL32(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,?,00506082,?), ref: 00505EFA
                                        • Part of subcall function 00505EE3: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00505F14
                                        • Part of subcall function 00505EE3: CloseHandle.KERNEL32(00000000), ref: 00505F22
                                      • GetTempPathA.KERNEL32(00000104,00000000), ref: 00506094
                                      • GetTempFileNameA.KERNEL32(00000000,tmp,00000000,?), ref: 005060A9
                                      • lstrcpy.KERNEL32(?,?), ref: 005060FD
                                      • lstrcat.KERNEL32(?,00501830), ref: 00506115
                                      • lstrcat.KERNEL32(?,doc), ref: 00506156
                                      • lstrcat.KERNEL32(?,00501870), ref: 0050617E
                                      • lstrcat.KERNEL32(?,00501830), ref: 00506191
                                      • lstrcat.KERNEL32(?,00502734), ref: 005061B8
                                      • lstrcat.KERNEL32(?,0050272C), ref: 005061CE
                                      • lstrcat.KERNEL32(?,00502724), ref: 005061DD
                                      • lstrcat.KERNEL32(?,00502720), ref: 005061EB
                                      • DeleteFileA.KERNEL32(?), ref: 00506219
                                      • wsprintfA.USER32 ref: 00506232
                                      • GetTempPathA.KERNEL32(00000104,?), ref: 00506265
                                      • GetTempFileNameA.KERNEL32(?,tmp,00000000,00000000), ref: 0050627F
                                      • DeleteFileA.KERNEL32(00000000), ref: 005062AD
                                      • DeleteFileA.KERNEL32(?), ref: 005062B6
                                      • lstrcpy.KERNEL32(?,00000000), ref: 005062C4
                                      • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 005062EA
                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 00506304
                                      • CloseHandle.KERNEL32( jP), ref: 0050630F
                                      • DeleteFileA.KERNEL32(?), ref: 00506339
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$lstrcat$Temp$Name$Delete$Path$CloseCreateHandleModulelstrcpy$CopyPointerSizewsprintf
                                      • String ID: jP$%s.zip$com$doc$htm$html$tmp$txt
                                      • API String ID: 3181343175-3074387375
                                      • Opcode ID: a5d0772700f06ebca4c143b7e350f5dc79510eb46c2f0f3208337496e6dbf733
                                      • Instruction ID: 215d56b1a9a915398b7b7de64b2b15009c2de42112ae2f90419e4ee996d24c39
                                      • Opcode Fuzzy Hash: a5d0772700f06ebca4c143b7e350f5dc79510eb46c2f0f3208337496e6dbf733
                                      • Instruction Fuzzy Hash: 54A1B4B1940659AEDB209760CC8DFEF7FADFB51300F04085AF296D20C1D6B49A98DB66
                                      APIs
                                      • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000,75568A60,?,00000104), ref: 0050580E
                                      • CreateFileA.KERNEL32(?,40000000,00000003,00000000,00000002,00000080,00000000), ref: 00505833
                                      • memset.MSVCRT ref: 00505852
                                      • memset.MSVCRT ref: 0050585E
                                      • memset.MSVCRT ref: 0050586A
                                        • Part of subcall function 00505717: GetSystemTime.KERNEL32(0000002E,0000002E,?,00000000,0000001E), ref: 00505721
                                        • Part of subcall function 00505772: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,75573130), ref: 00505786
                                        • Part of subcall function 00505772: ReadFile.KERNEL32(00000000,?,00000400,0000001E,00000000), ref: 005057CC
                                        • Part of subcall function 00505772: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 005057D8
                                      • GetFileSize.KERNEL32(?,00000000), ref: 005058CA
                                      • GetFileSize.KERNEL32(?,00000000), ref: 005058D6
                                      • lstrlen.KERNEL32(00506207), ref: 005058E7
                                      • WriteFile.KERNEL32(00000000,04034B50,0000001E,?,00000000), ref: 0050590E
                                      • lstrlen.KERNEL32(00506207,?,00000000), ref: 00505918
                                      • WriteFile.KERNEL32(?,00506207,00000000), ref: 00505921
                                      • lstrlen.KERNEL32(00506207), ref: 00505926
                                      • SetFilePointer.KERNEL32(?,00000000,00000000,00000000), ref: 00505934
                                      • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00505953
                                      • ReadFile.KERNEL32(?,?,00000400,?,00000000), ref: 00505972
                                      • WriteFile.KERNEL32(?,?,0000002E,?,00000000), ref: 005059A8
                                      • lstrlen.KERNEL32(00506207,?,00000000), ref: 005059B2
                                      • WriteFile.KERNEL32(?,00506207,00000000), ref: 005059BB
                                      • lstrlen.KERNEL32(00506207), ref: 005059C0
                                      • WriteFile.KERNEL32(?,06054B50,00000016,?,00000000), ref: 005059FC
                                      • CloseHandle.KERNEL32(?), ref: 00505A01
                                      • CloseHandle.KERNEL32(?), ref: 00505A0A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$Write$lstrlen$Pointermemset$CloseCreateHandleReadSize$SystemTime
                                      • String ID:
                                      • API String ID: 2136260124-3916222277
                                      • Opcode ID: d3892d766c3aa4be7e112a987401fd98666d2ac7ac1380c23e6cc41f9b4c72c6
                                      • Instruction ID: 773f872c4516b25f3d46c8f58171cf100fa68b818a43c43766e7d6fd81e4158a
                                      • Opcode Fuzzy Hash: d3892d766c3aa4be7e112a987401fd98666d2ac7ac1380c23e6cc41f9b4c72c6
                                      • Instruction Fuzzy Hash: F0710275D1125CAADF21DFA4DD88ADFBBB8FF08350F10011AF514A6260E7319A44DBA9
                                      APIs
                                        • Part of subcall function 00506B89: lstrlen.KERNEL32(00000000,00000000,00000000), ref: 00506C46
                                        • Part of subcall function 00506B89: lstrlen.KERNEL32(00000000), ref: 00506C55
                                        • Part of subcall function 00506B89: CharLowerA.USER32(00000000), ref: 00506C74
                                        • Part of subcall function 00506B89: lstrcmpiA.KERNEL32(00000000,?), ref: 00506C84
                                      • lstrcpy.KERNEL32(?,?), ref: 00506E94
                                      • socket.WS2_32(00000002,00000001,00000006), ref: 00506EA0
                                      • connect.WS2_32(00000000,00000002,00000010), ref: 00506EBF
                                      • send.WS2_32(00000000,00501830,00000001,00000000), ref: 00507023
                                      • send.WS2_32(00000000,005071AD,00000002,00000000), ref: 00507034
                                      • send.WS2_32(00000000,.,00000005,00000000), ref: 0050704E
                                      • closesocket.WS2_32(00000000), ref: 00507086
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: send$lstrlen$CharLowerclosesocketconnectlstrcmpilstrcpysocket
                                      • String ID: .$%sO %s$DATA$E%s %s$From$HEL$HLO$IL F$MA%sROM:<%s>$PT T$QUIT$RC%sO:<%s>
                                      • API String ID: 461202756-3815809343
                                      • Opcode ID: 137dcdbcc398edce13df37ae931c225a0fe07400167ff2055b513371b32ddfb0
                                      • Instruction ID: 33585215259ea1a97b37e4a6d099c67cd5c3f73b094bdd9841701b712144618c
                                      • Opcode Fuzzy Hash: 137dcdbcc398edce13df37ae931c225a0fe07400167ff2055b513371b32ddfb0
                                      • Instruction Fuzzy Hash: 31611936F0421D6FDB309BA4CC5DBEE7FACBB58710F204562F644E22C1D6B09A948B50
                                      APIs
                                      • lstrlen.KERNEL32(00000000,?,?,?,005045DC,?,75570440,?,?,00504669), ref: 00504039
                                      • isspace.MSVCRT ref: 0050405A
                                      • isalnum.MSVCRT ref: 0050406A
                                      • lstrlen.KERNEL32(?,005045DC,?,75570440,?,?,00504669), ref: 00504110
                                      • lstrlen.KERNEL32(?), ref: 005041CD
                                      • lstrlen.KERNEL32(?), ref: 0050422A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrlen$isalnumisspace
                                      • String ID: _-!.$_-!.@
                                      • API String ID: 942633883-1107819772
                                      • Opcode ID: 13f1972239871b3c44236b19c0e3c7acdde54ddd6e475e0e74b5625e8a80bea5
                                      • Instruction ID: 46a4e0ed4f2d23864a61de77937e1c011c01544acd97643bc178da60782ba0d3
                                      • Opcode Fuzzy Hash: 13f1972239871b3c44236b19c0e3c7acdde54ddd6e475e0e74b5625e8a80bea5
                                      • Instruction Fuzzy Hash: FA61F6F5908B925EEB255BB06C5833F7F98BF62312F28045EEBC1C90C2E668C481CE15
                                      APIs
                                      • wsprintfA.USER32 ref: 00506807
                                      • wsprintfA.USER32 ref: 00506816
                                      • lstrlen.KERNEL32(?,To: %s,?), ref: 0050682D
                                      • wsprintfA.USER32 ref: 00506832
                                      • lstrlen.KERNEL32(?,Subject: %s,?), ref: 00506844
                                      • wsprintfA.USER32 ref: 00506849
                                      • lstrcat.KERNEL32(?,Date: ), ref: 0050685A
                                      • lstrlen.KERNEL32(?), ref: 0050685D
                                        • Part of subcall function 005032CB: GetLocalTime.KERNEL32(?), ref: 005032E0
                                        • Part of subcall function 005032CB: GetTimeZoneInformation.KERNEL32(?), ref: 0050330B
                                        • Part of subcall function 005032CB: wsprintfA.USER32 ref: 00503399
                                      • lstrcat.KERNEL32(?,MIME-Version: 1.0), ref: 00506871
                                      • lstrlen.KERNEL32(?,Content-Type: multipart/mixed;boundary="%s",?), ref: 0050687D
                                      • wsprintfA.USER32 ref: 00506882
                                      • lstrcat.KERNEL32(?,X-Priority: 3X-MSMail-Priority: NormalX-Mailer: Microsoft Outlook Express 6.00.2600.0000X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600.0000), ref: 0050688D
                                      Strings
                                      • Date: , xrefs: 00506854
                                      • X-Priority: 3X-MSMail-Priority: NormalX-Mailer: Microsoft Outlook Express 6.00.2600.0000X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600.0000, xrefs: 00506887
                                      • MIME-Version: 1.0, xrefs: 0050686B
                                      • NextPart, xrefs: 005067F6
                                      • To: %s, xrefs: 00506827
                                      • Subject: %s, xrefs: 0050683E
                                      • From: %s, xrefs: 00506810
                                      • Content-Type: multipart/mixed;boundary="%s", xrefs: 00506877
                                      • ----=_%s_%.3u_%.4u_%.8X.%.8X, xrefs: 005067FB
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: wsprintf$lstrlen$lstrcat$Time$InformationLocalZone
                                      • String ID: MIME-Version: 1.0$----=_%s_%.3u_%.4u_%.8X.%.8X$Content-Type: multipart/mixed;boundary="%s"$Date: $From: %s$NextPart$Subject: %s$To: %s$X-Priority: 3X-MSMail-Priority: NormalX-Mailer: Microsoft Outlook Express 6.00.2600.0000X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
                                      • API String ID: 1752939335-3336112092
                                      • Opcode ID: 4b9b89b98c63909c37f3a55d16aa84089577f12d36d32ece7d67388f72588239
                                      • Instruction ID: 516944fcafe1d406c4de45a34c5fbbf3ebfe04e920b5b8b11edbf61359fe2e0a
                                      • Opcode Fuzzy Hash: 4b9b89b98c63909c37f3a55d16aa84089577f12d36d32ece7d67388f72588239
                                      • Instruction Fuzzy Hash: E111BF767817153AD2047721AC8FFAFBE4CFF81B20F040425F908A21C2DAA9B61995BD
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00001000,00000000), ref: 00503B9D
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00503BA0
                                      • socket.WS2_32(00000002,00000002,00000011), ref: 00503BBA
                                      • htons.WS2_32(00000000), ref: 00503BF5
                                      • select.WS2_32 ref: 00503C3F
                                      • memset.MSVCRT ref: 00503C51
                                      • recv.WS2_32(?,00000000,00001000,00000000), ref: 00503C61
                                      • htons.WS2_32(?), ref: 00503C88
                                      • htons.WS2_32(?), ref: 00503CA3
                                      • GetProcessHeap.KERNEL32(00000000,00000108), ref: 00503D10
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heaphtons$Process$Allocatememsetrecvselectsocket
                                      • String ID:
                                      • API String ID: 1083883850-0
                                      • Opcode ID: 2774ab65e68e478f934b67ed2fed43b34ffd1c969f5f9ebea79d8cc2d8644057
                                      • Instruction ID: 407117dfceaa818f317e20e129298f2efd80ccf421d121f9015e9229cc58b6dd
                                      • Opcode Fuzzy Hash: 2774ab65e68e478f934b67ed2fed43b34ffd1c969f5f9ebea79d8cc2d8644057
                                      • Instruction Fuzzy Hash: 8F61D2769047069FD720AF64DC48B6FBFECFF94784F100809F98997290D7709A489BA2
                                      APIs
                                      • wsprintfA.USER32 ref: 005070BC
                                      • wsprintfA.USER32 ref: 005070D4
                                      • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 005070F1
                                      • RegEnumKeyA.ADVAPI32(?,00000000,?,00000100), ref: 005071D8
                                      • RegCloseKey.ADVAPI32(?), ref: 005071E5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: wsprintf$CloseEnumOpen
                                      • String ID: %s %s$Account$Internet$SMTP$Server$Software\Microsoft\%s %s Manager\%ss
                                      • API String ID: 1693054222-1692917665
                                      • Opcode ID: d5346e02a52f48e42c981e2d26ebe83a68710e29bf017808395a5baaf78aa8eb
                                      • Instruction ID: 919e163466d9f41961a9d57fd17da3ca6bbeb631558065ae4de98a1fa7a4ba0d
                                      • Opcode Fuzzy Hash: d5346e02a52f48e42c981e2d26ebe83a68710e29bf017808395a5baaf78aa8eb
                                      • Instruction Fuzzy Hash: 7641F671E0021DABDB21DBA1DD49EEFBBBCFF88741F0000A5A905E2090E774AA44DB61
                                      APIs
                                      • lstrlen.KERNEL32(?,This is a multi-part message in MIME format.,?,?,00000000,?,?,00506A70,?), ref: 005068B1
                                      • wsprintfA.USER32 ref: 005068BC
                                      • lstrlen.KERNEL32(?,--%sContent-Type: text/plain;charset=us-asciiContent-Transfer-Encoding: 7bit,?,?,?,00506A70,?), ref: 005068D2
                                      • wsprintfA.USER32 ref: 005068D7
                                      • lstrlen.KERNEL32(?,?,?,?,?,?), ref: 005068DD
                                      • lstrcat.KERNEL32(?,), ref: 005068F2
                                      • lstrlen.KERNEL32(?,--%sContent-Type: application/octet-stream;name="%s"Content-Transfer-Encoding: base64Content-Disposition: %s;filename="%s",?,?,attachment,?,?,?,?,?,?), ref: 00506929
                                      • wsprintfA.USER32 ref: 0050692E
                                      • lstrlen.KERNEL32(?,?), ref: 00506937
                                      • lstrlen.KERNEL32(?,--%s--,?), ref: 00506955
                                      • wsprintfA.USER32 ref: 0050695A
                                      Strings
                                      • , xrefs: 005068EC
                                      • --%s--, xrefs: 0050694F
                                      • --%sContent-Type: text/plain;charset=us-asciiContent-Transfer-Encoding: 7bit, xrefs: 005068C9
                                      • This is a multi-part message in MIME format., xrefs: 005068AB
                                      • --%sContent-Type: application/octet-stream;name="%s"Content-Transfer-Encoding: base64Content-Disposition: %s;filename="%s", xrefs: 00506923
                                      • inline, xrefs: 00506910, 0050691E
                                      • attachment, xrefs: 00506906
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrlen$wsprintf$lstrcat
                                      • String ID: $--%s--$--%sContent-Type: application/octet-stream;name="%s"Content-Transfer-Encoding: base64Content-Disposition: %s;filename="%s"$--%sContent-Type: text/plain;charset=us-asciiContent-Transfer-Encoding: 7bit$This is a multi-part message in MIME format.$attachment$inline
                                      • API String ID: 3012818462-48772991
                                      • Opcode ID: cae06789496e9d4e026e2ffa55617fbe67ac389098ddb8fb236da88765f6ea02
                                      • Instruction ID: 3fdca0e5f0ffa1fa4bef71aa3ca571d11d6ceae177e96fc01e7fdd5b86b94422
                                      • Opcode Fuzzy Hash: cae06789496e9d4e026e2ffa55617fbe67ac389098ddb8fb236da88765f6ea02
                                      • Instruction Fuzzy Hash: 2B11E472A402047BDB04A769DC8EDBF3FADEFC1720F180426F904D61C1DA39D95066B5
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$CharUpper$Buffstrstrwsprintf
                                      • String ID: %s.%s$.com$com
                                      • API String ID: 1204462619-569357965
                                      • Opcode ID: aff7aef32e20002ebd41d7685b69dc327a5e07d15891742e9745e351183a1eb9
                                      • Instruction ID: 2a81d91e2002685be900b6559790254c352ea299669c914cf5c60e1db04ad5da
                                      • Opcode Fuzzy Hash: aff7aef32e20002ebd41d7685b69dc327a5e07d15891742e9745e351183a1eb9
                                      • Instruction Fuzzy Hash: FF414BB7340B425AE7046326AC8DBBF3A9AFBD0711F11041AF781C20C1EE758A469E35
                                      APIs
                                      • GetModuleHandleA.KERNEL32(iphlpapi.dll), ref: 00503F02
                                      • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 00503F12
                                      • GetProcAddress.KERNEL32(00000000,GetNetworkParams), ref: 00503F2F
                                      • GetProcessHeap.KERNEL32(00000000,00004000), ref: 00503F4D
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00503F50
                                      • htons.WS2_32(00000035), ref: 00503F88
                                      • inet_addr.WS2_32(?), ref: 00503F93
                                      • gethostbyname.WS2_32(?), ref: 00503FA6
                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00503FE3
                                      • HeapFree.KERNEL32(00000000), ref: 00503FE6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$Process$AddressAllocateFreeHandleLibraryLoadModuleProcgethostbynamehtonsinet_addr
                                      • String ID: GetNetworkParams$iphlpapi.dll
                                      • API String ID: 2899438970-2099955842
                                      • Opcode ID: e30f29e266a04806bc51eef7561a6e33902f13042b838279bdac54ccba920e99
                                      • Instruction ID: acfe8a1e42ac83ed393b8fa399d380572ad7b045617876d8cdea66422d8a7479
                                      • Opcode Fuzzy Hash: e30f29e266a04806bc51eef7561a6e33902f13042b838279bdac54ccba920e99
                                      • Instruction Fuzzy Hash: C5319F35E00A07AFDF109BB89C49AAE7FBCBF14361B140115F914E32D0DB38DA459BA5
                                      APIs
                                        • Part of subcall function 00506B89: lstrlen.KERNEL32(00000000,00000000,00000000), ref: 00506C46
                                        • Part of subcall function 00506B89: lstrlen.KERNEL32(00000000), ref: 00506C55
                                        • Part of subcall function 00506B89: CharLowerA.USER32(00000000), ref: 00506C74
                                        • Part of subcall function 00506B89: lstrcmpiA.KERNEL32(00000000,?), ref: 00506C84
                                      • lstrcpy.KERNEL32(?,?), ref: 0050726A
                                      • htons.WS2_32(00000019), ref: 00507288
                                      • lstrcpy.KERNEL32(00000000,mx.), ref: 005072D4
                                      • lstrcat.KERNEL32(00000000,?), ref: 005072E4
                                      • lstrcpy.KERNEL32(?,?), ref: 0050730B
                                      • htons.WS2_32(00000019), ref: 00507330
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$htonslstrlen$CharLowerlstrcatlstrcmpi
                                      • String ID: mail.$mx.$smtp.
                                      • API String ID: 3218502294-1213875280
                                      • Opcode ID: 804a74257488d78c00b214698439b83876a0d802025c44b510a4b9a1897df326
                                      • Instruction ID: 61d13515a21d5bbe502a9dd85473b184d0e7fa3ad14d9318c08b4ea8da931990
                                      • Opcode Fuzzy Hash: 804a74257488d78c00b214698439b83876a0d802025c44b510a4b9a1897df326
                                      • Instruction Fuzzy Hash: 7B417076E0821E9BDF25DBA0DD49BEE7BB8BF48300F100496F905E61C1DB70AA449B61
                                      APIs
                                      • GetModuleHandleA.KERNEL32(dnsapi.dll,?,?,?,?,00504001,?,0050498D,?,?,?,00504A02,?), ref: 00503E3F
                                      • LoadLibraryA.KERNEL32(dnsapi.dll,?,?,?,00504001,?,0050498D,?,?,?,00504A02,?), ref: 00503E4C
                                      • GetProcAddress.KERNEL32(00000000,DnsQuery_A), ref: 00503E5C
                                      • GetProcessHeap.KERNEL32(00000000,00000108,?,?,?,?,?,00504001,?,0050498D,?,?,?,00504A02,?), ref: 00503E9B
                                      • RtlAllocateHeap.NTDLL(00000000,?,?), ref: 00503EA2
                                      • memset.MSVCRT ref: 00503EB2
                                      • lstrcpyn.KERNEL32(00000008,0027D9E8,000000FF,?), ref: 00503ECD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AddressAllocateHandleLibraryLoadModuleProcProcesslstrcpynmemset
                                      • String ID: DnsQuery_A$dnsapi.dll
                                      • API String ID: 979329682-3847274415
                                      • Opcode ID: dca0aab8c91f9d596bb827dcb1b0edf6cee5f3e290248c7e98bdbcda5f02536a
                                      • Instruction ID: 40075319653eeb29a435cd9483c3460f96daf6c4fdfe13ee8d6bb4df6979a84e
                                      • Opcode Fuzzy Hash: dca0aab8c91f9d596bb827dcb1b0edf6cee5f3e290248c7e98bdbcda5f02536a
                                      • Instruction Fuzzy Hash: 09210276504B0AABC7209F52DC08A3FBFACFF54780F104A29F145D2180DBB1E98897A5
                                      APIs
                                      • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?), ref: 0050668E
                                      • ReadFile.KERNEL32(?,?,00000400,?,00000000,?,75570440,76C08400), ref: 005066CF
                                      • memset.MSVCRT ref: 0050676E
                                      • CloseHandle.KERNEL32(?,?,75570440,76C08400), ref: 005067B5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$CloseCreateHandleReadmemset
                                      • String ID: =$AiP$AiP$L
                                      • API String ID: 1934991721-3068730819
                                      • Opcode ID: 4b4b3571be216019aa3e8e3fed23bcde9ca09769882202b2b4a052264b8fe6bc
                                      • Instruction ID: 75c36a7ddd45a5937c5c7dc736fdda1d92c830406bf875cefc640d4579443e51
                                      • Opcode Fuzzy Hash: 4b4b3571be216019aa3e8e3fed23bcde9ca09769882202b2b4a052264b8fe6bc
                                      • Instruction Fuzzy Hash: 24418034900299EBDF11CF98C884AEEBFB9FF46304F1045A5E991A7182D3709A51CBA1
                                      APIs
                                      • memset.MSVCRT ref: 00502DA8
                                      • gethostname.WS2_32(?,00000100), ref: 00502DB8
                                      • lstrcat.KERNEL32(?,root), ref: 00502DD0
                                      • lstrcat.KERNEL32(00000000,00000000), ref: 00502E19
                                      • lstrcat.KERNEL32(00000000,00000000), ref: 00502E29
                                      • CreateMutexA.KERNEL32(00000000,00000001,00000000), ref: 00502E36
                                      • GetLastError.KERNEL32 ref: 00502E3C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$CreateErrorLastMutexgethostnamememset
                                      • String ID: root
                                      • API String ID: 3016363891-385153371
                                      • Opcode ID: 8a72bc0ed65294613998b6506ccfb39ae7e57c9a2bb16a50c2e50e91b418762a
                                      • Instruction ID: f5e5deb4a2873d9f3c4a82aa4f30ac048af43ff210c46692099915afef873f95
                                      • Opcode Fuzzy Hash: 8a72bc0ed65294613998b6506ccfb39ae7e57c9a2bb16a50c2e50e91b418762a
                                      • Instruction Fuzzy Hash: 1511E67794025C6BDB229B74EC49FEE3B6CBB69300F0401D6E585E20C1D6B49ACB8B65
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$PathTemplstrcpylstrlen
                                      • String ID: .log$\$zincite
                                      • API String ID: 1195028341-2520228640
                                      • Opcode ID: 9b8db98ae055c8dff7040cdb26ef09709199bca6636e77b7a4b7fff887e6c2cb
                                      • Instruction ID: b4afade12c0fc9fcd69d2ee1c841bfa627f913ce1fee5f64901a70284f785ff6
                                      • Opcode Fuzzy Hash: 9b8db98ae055c8dff7040cdb26ef09709199bca6636e77b7a4b7fff887e6c2cb
                                      • Instruction Fuzzy Hash: B70186B180455D9BDF109F74DD9DFDE7FBCAB24300F5000A1A6C4D2091D6B0AAC88F51
                                      APIs
                                      • CreateFileA.KERNEL32(00000020,80000000,00000003,00000000,00000003,00000080,00000000,75570F10,00000000), ref: 00504F0C
                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 00504F2A
                                      • CreateFileMappingA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000000), ref: 00504F3A
                                      • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000,00000000), ref: 00504F5B
                                      • memset.MSVCRT ref: 00504F89
                                      • UnmapViewOfFile.KERNEL32(00000000), ref: 00504FCC
                                      • CloseHandle.KERNEL32(?), ref: 00504FD5
                                      • CloseHandle.KERNEL32(?), ref: 00504FDF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$CloseCreateHandleView$MappingSizeUnmapmemset
                                      • String ID:
                                      • API String ID: 3315828190-0
                                      • Opcode ID: ea459288a82a99d4b24cf1e29823d3646dec14334e4c9beca5f678ee1d7cd67b
                                      • Instruction ID: 0ab0f1c3a718459e2b74eb1b04299cdf3ef3ce68078fedbeea16834dce009e45
                                      • Opcode Fuzzy Hash: ea459288a82a99d4b24cf1e29823d3646dec14334e4c9beca5f678ee1d7cd67b
                                      • Instruction Fuzzy Hash: 1D31D5F190438AAFDB206F649C88EAE7FACFB04359F100529FB92D22D1D7209C45CB61
                                      APIs
                                      • lstrlen.KERNEL32(00000000,?), ref: 00504652
                                      • lstrcmpiA.KERNEL32(0000000A,?), ref: 00504689
                                      • lstrlen.KERNEL32(?), ref: 005046A1
                                      • GetProcessHeap.KERNEL32(?,-0000000F), ref: 005046AA
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 005046B1
                                      • memset.MSVCRT ref: 005046C9
                                      • GetTickCount.KERNEL32 ref: 005046D5
                                      • lstrcpy.KERNEL32(0000000A,?), ref: 005046EE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heaplstrlen$AllocateCountProcessTicklstrcmpilstrcpymemset
                                      • String ID:
                                      • API String ID: 518059893-0
                                      • Opcode ID: 1daf1c05f38e62147fa237e0655a6596e761156900e08a1e520a1545e835069c
                                      • Instruction ID: 707180101a398f47e83f4d7edf7de099827023ee405d7e436c1cd2a4ce101803
                                      • Opcode Fuzzy Hash: 1daf1c05f38e62147fa237e0655a6596e761156900e08a1e520a1545e835069c
                                      • Instruction Fuzzy Hash: E2212676800655ABC7219F64DC08BDF7BE8FB19350F004865EA86D3290E770E9489FA1
                                      APIs
                                      • isdigit.MSVCRT ref: 005034F2
                                      • memset.MSVCRT ref: 00503548
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000014,00000000,00000000,?,?,00000000), ref: 00503572
                                      • lstrlen.KERNEL32(00000000,?,?,00000000), ref: 0050358E
                                      • lstrlen.KERNEL32(?,?,?,00000000), ref: 005035A9
                                      • lstrlen.KERNEL32(00000000,?,?,00000000), ref: 005035F0
                                      • memcpy.MSVCRT ref: 00503602
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrlen$ByteCharMultiWideisdigitmemcpymemset
                                      • String ID:
                                      • API String ID: 3478709927-0
                                      • Opcode ID: 20185cf25f03a19cac97d795cc106f02322d58cc053b962646699da87d9d3388
                                      • Instruction ID: 23a442e20ae22f83cb2f45545b469242e3b658874f908f9248848cc5510e9995
                                      • Opcode Fuzzy Hash: 20185cf25f03a19cac97d795cc106f02322d58cc053b962646699da87d9d3388
                                      • Instruction Fuzzy Hash: BE41B471804299AFDB25CFA4C988AEE7FACAF19344F14019DD882A7191D6719F49CB60
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4b01e0d636c3c5e7f2603455e11ec21e70862c83b27c4529908b2baa5dc44e6a
                                      • Instruction ID: 1af87907bf89bedeb0649b551357384cbbe48afd0fdc4005cd780a5b5450faca
                                      • Opcode Fuzzy Hash: 4b01e0d636c3c5e7f2603455e11ec21e70862c83b27c4529908b2baa5dc44e6a
                                      • Instruction Fuzzy Hash: 7841B039A00219ABCB00DFA5CC84AEEBBF8FF48715F104456E959E7291E3749A41CB64
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000090,00000000,?,?,005049A9,?,00000000,?,?,00504A02,?), ref: 005048E1
                                      • RtlAllocateHeap.NTDLL(00000000,?,005049A9), ref: 005048E8
                                      • memset.MSVCRT ref: 005048FC
                                      • lstrcpyn.KERNEL32(00000010,?,0000007F,?), ref: 00504915
                                      • GetTickCount.KERNEL32 ref: 0050491B
                                      • GetTickCount.KERNEL32 ref: 00504942
                                      • lstrcpyn.KERNEL32(00000010,?,0000007F,?,005049A9,?,00000000,?,?,00504A02,?), ref: 0050495B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CountHeapTicklstrcpyn$AllocateProcessmemset
                                      • String ID:
                                      • API String ID: 2696074827-0
                                      • Opcode ID: 1c86731311e4b75f3192dccd85ac791b4297224c5a05b58980cdcf0866b5c10e
                                      • Instruction ID: 703d1ba90af1539a1c1e71d69a92d341ab7fc86eaf6e4218c2875852d7dfb891
                                      • Opcode Fuzzy Hash: 1c86731311e4b75f3192dccd85ac791b4297224c5a05b58980cdcf0866b5c10e
                                      • Instruction Fuzzy Hash: A0214AB2900B919FD730DF64D98896FBBE4FF54700B108D2DE69AD3691D334A8489F51
                                      APIs
                                        • Part of subcall function 005073E8: GetTempPathA.KERNEL32(00000104,?), ref: 005073FD
                                        • Part of subcall function 005073E8: lstrlen.KERNEL32(?), ref: 0050740A
                                        • Part of subcall function 005073E8: lstrcat.KERNEL32(?,zincite), ref: 00507448
                                        • Part of subcall function 005073E8: lstrcat.KERNEL32(?,.log), ref: 00507456
                                        • Part of subcall function 005073E8: lstrcpy.KERNEL32(?,?), ref: 00507462
                                      • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000,00000104), ref: 0050757A
                                      • WriteFile.KERNEL32( _P,?,00000000,00000000,00000000), ref: 005075B7
                                      • ReadFile.KERNEL32(00000000,?,00000100,00000000,00000000,00000000,00000000), ref: 005075D0
                                      • CloseHandle.KERNEL32(?), ref: 005075DA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$lstrcat$CloseCreateHandlePathReadTempWritelstrcpylstrlen
                                      • String ID: _P$ _P
                                      • API String ID: 285733917-3595566573
                                      • Opcode ID: a1883ad2f206a693e9717ab779b99790b24625ca6c7e82073e9dc987f6aa6288
                                      • Instruction ID: 95e29d51a280f3ee1416f365a270c88ebcaea3d62707c39128d041610a3427a9
                                      • Opcode Fuzzy Hash: a1883ad2f206a693e9717ab779b99790b24625ca6c7e82073e9dc987f6aa6288
                                      • Instruction Fuzzy Hash: 3211FAB690410CFFEB11DB94DC88EEEBB7CEB58354F1001A6B681A2090DA706F84DB60
                                      APIs
                                      • GetModuleHandleA.KERNEL32(urlmon.dll,?,00000200), ref: 0050795B
                                      • LoadLibraryA.KERNEL32(urlmon.dll,?,00000200), ref: 00507966
                                      • GetProcAddress.KERNEL32(00000000,URLDownloadToCacheFileA), ref: 00507976
                                      • lstrcpy.KERNEL32(?,?), ref: 005079A8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressHandleLibraryLoadModuleProclstrcpy
                                      • String ID: URLDownloadToCacheFileA$urlmon.dll
                                      • API String ID: 1765825236-446873360
                                      • Opcode ID: 8d756ae2cdbdadfac3edac27fec9d7869389870997cdf4f7ecb942f188448ba0
                                      • Instruction ID: 185a24763c0bcb0fc453a4a8a7a4dc2d3681b975c5b2d20548b30850ca32465b
                                      • Opcode Fuzzy Hash: 8d756ae2cdbdadfac3edac27fec9d7869389870997cdf4f7ecb942f188448ba0
                                      • Instruction Fuzzy Hash: A0F0C872A0861977E7115B748C59FEF7F6CAF59B40F000424FA45D10C0EBB0E54986A5
                                      APIs
                                      • GetTempPathA.KERNEL32(00000104,?,00000000,?), ref: 00505F41
                                      • GetTempFileNameA.KERNEL32(?,tmp,00000000,?), ref: 00505F5C
                                      • CopyFileA.KERNEL32(005065B9,?,00000000), ref: 00505F75
                                        • Part of subcall function 00505EE3: CreateFileA.KERNEL32(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,?,00506082,?), ref: 00505EFA
                                        • Part of subcall function 00505EE3: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00505F14
                                        • Part of subcall function 00505EE3: CloseHandle.KERNEL32(00000000), ref: 00505F22
                                      • DeleteFileA.KERNEL32(005065B9), ref: 00505F94
                                      • lstrcpy.KERNEL32(005065B9,?), ref: 00505FA2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$Temp$CloseCopyCreateDeleteHandleNamePathPointerlstrcpy
                                      • String ID: tmp
                                      • API String ID: 2319981759-753892680
                                      • Opcode ID: edf9a31c2175ba5224d3b1140d48908c277679a7e7ee6f9f0873a1c53c273d39
                                      • Instruction ID: b6d547f1361db50440f4c558ef177c196600c1e2c9737aacd924c07538a66ded
                                      • Opcode Fuzzy Hash: edf9a31c2175ba5224d3b1140d48908c277679a7e7ee6f9f0873a1c53c273d39
                                      • Instruction Fuzzy Hash: B101A2B690065AAFDB109B60DC8DFDE7BBCAB54700F000095F6C5E2091E6B466C9CF62
                                      APIs
                                      • lstrlen.KERNEL32(?,?,?,?,005045EB,75570440,?,?,00504669), ref: 00504311
                                      • lstrlen.KERNEL32(?,?,005045EB,75570440,?,?,00504669), ref: 0050433A
                                      • lstrlen.KERNEL32(0050B178,?,005045EB,75570440,?,?,00504669), ref: 00504373
                                      • lstrlen.KERNEL32(0050B280,?,005045EB,75570440,?,?,00504669), ref: 0050438D
                                      • lstrlen.KERNEL32(0050B280,?,005045EB,75570440,?,?,00504669), ref: 005043A3
                                      • lstrlen.KERNEL32(0050B178,?,005045EB,75570440,?,?,00504669), ref: 005043FB
                                      • lstrlen.KERNEL32(0050B178,?,005045EB,75570440,?,?,00504669), ref: 00504410
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrlen
                                      • String ID:
                                      • API String ID: 1659193697-0
                                      • Opcode ID: 7234369e607e997fc05737b92fa64be9d20d6ac8b389998761447fe385796dbe
                                      • Instruction ID: 2d6b92822a5ce253097b69b3c07574bdd26a63d487101100c5e09b38dca8b49d
                                      • Opcode Fuzzy Hash: 7234369e607e997fc05737b92fa64be9d20d6ac8b389998761447fe385796dbe
                                      • Instruction Fuzzy Hash: CB419FF0A4564ACBFB214F34AEF836E3EE4B759705F90152ADB41C72A1E7248889DF01
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: DeleteFileGlobal$AllocFreelstrlenmemset
                                      • String ID:
                                      • API String ID: 986129705-0
                                      • Opcode ID: c0b672306122552f2995b5b1776029508f415337df1c08127a0dd511841b9662
                                      • Instruction ID: 64ff1dbb5a700912d54094296ca3f5a4976b8a1cb91408c58090539e8bb41b0b
                                      • Opcode Fuzzy Hash: c0b672306122552f2995b5b1776029508f415337df1c08127a0dd511841b9662
                                      • Instruction Fuzzy Hash: 6631AA72D04259DBDB10EB61DC89ADD7BB9FF85700F1044EAE109E6181D734AE948FA0
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: htons$CountTickmemsetsendto
                                      • String ID:
                                      • API String ID: 2621409306-0
                                      • Opcode ID: b3b5947bce572049420d80081d79d006cc1fcd4d3d740dc27c7c1cedb21463b1
                                      • Instruction ID: db08ba042e804f953b88991fca2d77eeadd2c4749c7c0b9e33eca97f00638003
                                      • Opcode Fuzzy Hash: b3b5947bce572049420d80081d79d006cc1fcd4d3d740dc27c7c1cedb21463b1
                                      • Instruction Fuzzy Hash: 1E312121A0025A5BDB258FB48C04BEE7BE8FF14304F1440B8EA09A7291E3B05E86CB59
                                      APIs
                                      • lstrcpyn.KERNEL32(?,-00000009,0000007F,00000000), ref: 00504824
                                      • lstrlen.KERNEL32(?), ref: 0050482E
                                      • GetProcessHeap.KERNEL32(00000000,-0000000A), ref: 0050483A
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00504841
                                      • lstrcpy.KERNEL32(00000000,?), ref: 00504852
                                      • CreateThread.KERNEL32(00000000,00000000,0050477F,00000000,00000000,?), ref: 00504868
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocateCreateProcessThreadlstrcpylstrcpynlstrlen
                                      • String ID:
                                      • API String ID: 3371211169-0
                                      • Opcode ID: b0110b9564446553085c75ac71a692edf586f148188e76fdc507fc1a0d64157a
                                      • Instruction ID: 07f746d2b3960384b515d2a8365d25916a05af25f1ccb339341a6fe92818cc76
                                      • Opcode Fuzzy Hash: b0110b9564446553085c75ac71a692edf586f148188e76fdc507fc1a0d64157a
                                      • Instruction Fuzzy Hash: AA11E2B5E00AA59BEB208BB59D5DBBE3BACFF50700F148811FB46D70D0EB20C8058B65
                                      APIs
                                      • InterlockedIncrement.KERNEL32(0050B390), ref: 00504A3F
                                      • GetCurrentThread.KERNEL32 ref: 00504A47
                                      • SetThreadPriority.KERNEL32(00000000), ref: 00504A4E
                                      • InterlockedDecrement.KERNEL32(0050B390), ref: 00504A75
                                      • RtlExitUserThread.NTDLL(00000000), ref: 00504A7D
                                        • Part of subcall function 005049C5: lstrcpyn.KERNEL32(?,?,0000007F), ref: 005049F3
                                        • Part of subcall function 005049C5: GlobalFree.KERNEL32(00000000), ref: 00504A22
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Thread$Interlocked$CurrentDecrementExitFreeGlobalIncrementPriorityUserlstrcpyn
                                      • String ID:
                                      • API String ID: 3760226487-0
                                      • Opcode ID: 4cbbf26141544510d966b90899a4a27ebab7c4cfef4a543942c3c1baaca5dbd7
                                      • Instruction ID: 59da798909faaf52fbb5bb2341fb00456894eff524a9a69de734a8fe505154a2
                                      • Opcode Fuzzy Hash: 4cbbf26141544510d966b90899a4a27ebab7c4cfef4a543942c3c1baaca5dbd7
                                      • Instruction Fuzzy Hash: 79E0E532504690DBD3105BA5AC1CB9F7FE8BB95721F05C519F19AC21D187701088AA7B
                                      APIs
                                      • GetCurrentThread.KERNEL32 ref: 00504782
                                      • SetThreadPriority.KERNEL32(00000000), ref: 00504789
                                      • RtlExitUserThread.NTDLL(00000000), ref: 005047B0
                                        • Part of subcall function 00504708: memset.MSVCRT ref: 00504721
                                        • Part of subcall function 00504708: memset.MSVCRT ref: 0050474B
                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 005047A1
                                      • HeapFree.KERNEL32(00000000), ref: 005047A8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Thread$Heapmemset$CurrentExitFreePriorityProcessUser
                                      • String ID:
                                      • API String ID: 2017824994-0
                                      • Opcode ID: 836c254a06e8348137cac086d59406f412e6514e815de78c3af08e5fd35cbc47
                                      • Instruction ID: 134dd03ee56ed5e35b093408589009be06d3af64b950e7fdb32cbac4dc487e3d
                                      • Opcode Fuzzy Hash: 836c254a06e8348137cac086d59406f412e6514e815de78c3af08e5fd35cbc47
                                      • Instruction Fuzzy Hash: 66E0EC72545A60ABD6102BA1AD1DB8E3FA8EF15762F054101F69A960E08B6054849ABB
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: isspace$lstrcpy
                                      • String ID: EP
                                      • API String ID: 3591682678-39091752
                                      • Opcode ID: 97e05d28098dfa30c11553f396c773aa8e9dcaeee145c2bf642825238118a22f
                                      • Instruction ID: d322a60b3cd344418dea32cdce2ecae7b80887596fe3726befac56383c2b426d
                                      • Opcode Fuzzy Hash: 97e05d28098dfa30c11553f396c773aa8e9dcaeee145c2bf642825238118a22f
                                      • Instruction Fuzzy Hash: 2011E7E96087D39EEB224EB4444477E7FD87F56311F0805A9F7D0861D6C3A48885CBA1
                                      APIs
                                      • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 005031C3
                                      • GetProcAddress.KERNEL32(00000000,RegisterServiceProcess), ref: 005031D2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressHandleModuleProc
                                      • String ID: RegisterServiceProcess$kernel32.dll
                                      • API String ID: 1646373207-4020013434
                                      • Opcode ID: 88f355962e72c872d7e8e3649b1a006756f8412f5a34d5979d28c820e35911b0
                                      • Instruction ID: a02a020f7e88b2a2deb55d5915b0d8113451b0eb92c2fbf378a69a289d5184d3
                                      • Opcode Fuzzy Hash: 88f355962e72c872d7e8e3649b1a006756f8412f5a34d5979d28c820e35911b0
                                      • Instruction Fuzzy Hash: A711BF10D0C6C999FB0297B8891979EBEA61F22749F0840C894846A2D2C6FF5718D3B6
                                      APIs
                                      • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 00506C46
                                      • lstrlen.KERNEL32(00000000), ref: 00506C55
                                      • CharLowerA.USER32(00000000), ref: 00506C74
                                      • lstrcmpiA.KERNEL32(00000000,?), ref: 00506C84
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1500589975.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000000.00000002.1500571830.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500589975.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500641180.000000000050E000.00000080.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1500657146.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_500000_message.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrlen$CharLowerlstrcmpi
                                      • String ID:
                                      • API String ID: 1011886143-0
                                      • Opcode ID: 1614e062b7db843fd35929ba8e3fbe92fee8bfd64a38d3db1eeeb3163424b487
                                      • Instruction ID: a780f0e17b679421bcea0a2979c9bb813d318467be715c50e32b2a5f4f05fe6d
                                      • Opcode Fuzzy Hash: 1614e062b7db843fd35929ba8e3fbe92fee8bfd64a38d3db1eeeb3163424b487
                                      • Instruction Fuzzy Hash: F351D476A481994AFF364B2C84187FC7FD6FB26340F9814AAC8C1861D6D2648CF3C75A

                                      Execution Graph

                                      Execution Coverage:35.9%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:10.4%
                                      Total number of Nodes:230
                                      Total number of Limit Nodes:5
                                      execution_graph 798 402110 WSAStartup 801 401f0e GetProcessHeap RtlAllocateHeap 798->801 802 401f37 801->802 803 401f2e 801->803 833 4022e0 GetProcessHeap RtlAllocateHeap 802->833 814 401fb8 socket bind 815 401f94 closesocket Sleep htons 814->815 816 401fd5 listen 814->816 815->814 866 402b3b GetTickCount 816->866 820 40200a 821 402b3b GetTickCount 820->821 823 402043 select 820->823 826 401d22 6 API calls 820->826 829 401c50 34 API calls 820->829 872 402714 820->872 821->820 824 402085 GetProcessHeap RtlAllocateHeap 823->824 825 40207c Sleep 823->825 827 4020b2 accept 824->827 828 40209b accept closesocket 824->828 825->820 826->820 830 4020f0 CreateThread 827->830 831 4020dc GetProcessHeap HeapFree 827->831 828->820 829->820 832 40210b 830->832 831->820 832->820 834 4022fa 833->834 835 401f44 833->835 876 402180 834->876 835->803 837 402746 835->837 884 4028c8 837->884 839 40275b gethostname 840 402771 839->840 841 4027af lstrlen 840->841 842 4027df 840->842 841->840 843 4027ec GetProcessHeap RtlAllocateHeap 842->843 844 401f58 843->844 845 40280e GetTempPathA 843->845 850 40272d 844->850 846 402846 lstrlen 845->846 849 402825 845->849 847 4028b5 lstrcpy 846->847 848 40286b 846->848 847->844 848->847 849->846 851 401f64 850->851 852 402735 850->852 854 401d22 GetModuleFileNameA RegOpenKeyExA 851->854 852->851 885 402667 CreateFileA 852->885 855 401e52 lstrlen RegSetValueExA RegCloseKey 854->855 856 401e3d RegOpenKeyExA 854->856 857 401e81 855->857 856->855 856->857 858 401c50 GetTempPathA lstrlen 857->858 859 401c9d lstrcat lstrcat 858->859 862 401c7c 858->862 860 402667 18 API calls 859->860 861 401ccf CreateFileA 860->861 863 401cf7 861->863 864 401d15 htons 861->864 862->859 921 402528 863->921 864->814 867 401fe8 CreateThread 866->867 868 401e86 GetModuleHandleA 867->868 951 401c36 867->951 869 401ef7 GetProcAddress 868->869 870 401f0c 868->870 869->870 871 401f06 869->871 870->820 871->870 873 40272a 872->873 874 40271c 872->874 873->820 874->873 944 402409 CreateFileA 874->944 877 402184 876->877 878 402187 876->878 877->835 879 4021de GetProcessHeap RtlAllocateHeap 878->879 880 402197 878->880 883 4021bd 879->883 882 4021a1 GetProcessHeap RtlReAllocateHeap 880->882 880->883 882->883 883->835 884->839 886 402696 885->886 891 402691 885->891 893 402c20 SetFilePointer ReadFile 886->893 889 4026b1 890 4026c7 ReadFile 889->890 889->891 902 40238e 889->902 890->889 890->891 891->851 894 402c5d SetFilePointer 893->894 895 40269c SetFilePointer 893->895 894->895 896 402c70 ReadFile 894->896 895->889 896->895 897 402c86 896->897 897->895 898 402ca7 SetFilePointer 897->898 899 402cc8 ReadFile 898->899 900 402cfb 898->900 899->895 901 402ce1 899->901 900->895 901->899 901->900 903 40239e 902->903 903->903 904 4023aa htonl 903->904 905 4023c0 htonl 904->905 905->905 908 4023d1 905->908 906 4023d5 906->889 907 4023dd htonl 907->908 908->906 908->907 910 402241 908->910 917 402159 910->917 912 402286 912->908 913 40224d 913->912 914 402180 4 API calls 913->914 915 402275 914->915 915->912 916 402b3b GetTickCount 915->916 916->912 918 402168 917->918 919 402160 Sleep 918->919 920 40216e 918->920 919->918 920->913 932 4024ab gethostname gethostbyname 921->932 924 40257a 924->864 925 40255d GetProcessHeap RtlAllocateHeap 925->924 926 402580 925->926 927 402159 Sleep 926->927 929 402591 927->929 928 402650 GetProcessHeap HeapFree 928->924 929->928 937 402311 929->937 931 402632 WriteFile 931->928 931->929 933 402526 932->933 934 4024d9 932->934 933->924 933->925 934->933 935 402311 3 API calls 934->935 936 402510 WriteFile 935->936 936->933 942 402326 937->942 938 402355 939 40235d htonl 938->939 939->939 940 40236f htonl 939->940 941 40237d 940->941 941->931 941->941 942->938 943 402343 htonl 942->943 943->942 945 402433 944->945 946 402438 944->946 945->873 947 402159 Sleep 946->947 948 402442 947->948 948->945 949 402311 3 API calls 948->949 950 40247a WriteFile 949->950 950->945 950->948 952 401c47 RtlExitUserThread 951->952 953 401c3d 951->953 956 401af2 953->956 958 401b00 956->958 960 402159 Sleep 958->960 964 401b09 Sleep 958->964 965 402bdc GetModuleHandleA 958->965 970 401947 gethostname gethostbyname 958->970 972 4019a3 958->972 991 401a97 958->991 960->958 964->958 966 402bf9 GetProcAddress 965->966 967 402bee LoadLibraryA 965->967 968 402c09 966->968 969 402c0e InternetGetConnectedState 966->969 967->966 967->968 968->958 969->968 971 401973 970->971 971->958 973 401947 2 API calls 972->973 974 4019b3 973->974 975 4019c0 htons socket connect 974->975 976 4019b8 974->976 977 401a88 closesocket 975->977 978 4019fd 975->978 976->958 977->976 979 402159 Sleep 978->979 980 401a08 979->980 981 401a31 980->981 982 401a19 980->982 984 402241 6 API calls 981->984 983 402b3b GetTickCount 982->983 985 401a1e 983->985 984->985 986 401a43 send 985->986 987 401a56 recv 986->987 988 401a75 987->988 989 401a86 987->989 988->987 988->989 990 40238e 9 API calls 988->990 989->977 990->988 992 401aa5 991->992 996 401ae6 991->996 993 4019a3 17 API calls 992->993 994 401abd 993->994 994->996 997 402298 994->997 996->958 998 402159 Sleep 997->998 999 4022a3 998->999 999->996 1000 406770 1001 406788 1000->1001 1002 406882 LoadLibraryA 1001->1002 1003 4068c7 1001->1003 1004 4068ab GetProcAddress 1001->1004 1002->1001 1004->1001 1005 4068c1 ExitProcess 1004->1005 1006 401910 1007 401919 1006->1007 1008 40193e RtlExitUserThread 1006->1008 1013 4017e4 1007->1013 1010 40191f 1011 401927 closesocket 1010->1011 1012 40192e GetProcessHeap HeapFree 1010->1012 1011->1012 1012->1008 1014 402159 Sleep 1013->1014 1016 4017fa 1014->1016 1015 401811 1018 40181e recv 1015->1018 1016->1015 1017 402b3b GetTickCount 1016->1017 1017->1015 1019 401839 1018->1019 1032 40188c 1018->1032 1020 401902 1019->1020 1021 401848 1019->1021 1055 4015ee GetProcessHeap RtlAllocateHeap 1020->1055 1022 4018fa 1021->1022 1023 40184f 1021->1023 1035 4012c6 1022->1035 1025 401852 1023->1025 1026 40188e 1023->1026 1028 401859 recv 1025->1028 1030 40238e 9 API calls 1025->1030 1025->1032 1029 402159 Sleep 1026->1029 1028->1025 1028->1032 1031 401894 1029->1031 1030->1025 1031->1032 1033 402311 3 API calls 1031->1033 1032->1010 1034 4018d5 send 1033->1034 1034->1031 1034->1032 1036 4012f8 recv 1035->1036 1037 4015db 1036->1037 1038 40131d 1036->1038 1037->1032 1038->1036 1039 401323 GetTempPathA lstrlen 1038->1039 1040 401366 GetTickCount GetTickCount lstrlen wsprintfA CreateFileA 1039->1040 1041 401346 1039->1041 1040->1037 1045 4013cb 1040->1045 1041->1040 1042 401419 recv 1043 401432 closesocket 1042->1043 1042->1045 1047 40146a 1043->1047 1044 401403 WriteFile 1044->1042 1045->1042 1045->1044 1045->1045 1046 4015e3 1049 4015ce DeleteFileA 1046->1049 1047->1046 1048 4014ba SetFilePointer htonl 1047->1048 1050 4014d9 1048->1050 1052 40152a 1048->1052 1049->1037 1051 4014ea ReadFile 1050->1051 1050->1052 1051->1046 1051->1050 1052->1046 1053 401555 CloseHandle wsprintfA CreateProcessA 1052->1053 1053->1049 1054 4015b9 WaitForSingleObject CloseHandle CloseHandle 1053->1054 1054->1049 1056 401619 1055->1056 1061 4017dd 1055->1061 1057 402159 Sleep 1056->1057 1058 40162c 1057->1058 1062 402b9a htonl 1058->1062 1068 4016c2 1058->1068 1059 4017bf GetProcessHeap HeapFree 1060 402241 6 API calls 1059->1060 1060->1061 1061->1032 1062->1058 1063 40175d 1063->1059 1064 402311 3 API calls 1063->1064 1066 40179c send 1064->1066 1065 402b9a htonl 1065->1068 1066->1063 1067 4017bc 1066->1067 1067->1059 1068->1063 1068->1065

                                      Callgraph

                                      • Executed
                                      • Not Executed
                                      • Opacity -> Relevance
                                      • Disassembly available
                                      callgraph 0 Function_00402241 17 Function_00402159 0->17 43 Function_00402180 0->43 70 Function_0040221C 0->70 92 Function_00402B3B 0->92 1 Function_004057C5 2 Function_00402746 5 Function_004028C8 2->5 11 Function_00402AD0 2->11 78 Function_00402A28 2->78 3 Function_004012C6 3->5 3->11 40 Function_00402EFA 3->40 3->78 4 Function_00401947 6 Function_004054C8 7 Function_00405C49 8 Function_004010CA 9 Function_0040634E 10 Function_00401C50 27 Function_00402667 10->27 28 Function_00402B68 10->28 77 Function_00402528 10->77 11->78 12 Function_00405A55 13 Function_004064D5 14 Function_00405FD7 15 Function_00405BD8 16 Function_00405959 18 Function_00405C5A 19 Function_004066DB 20 Function_00402BDC 21 Function_0040545E 22 Function_0040595E 23 Function_004022E0 23->43 24 Function_00405C63 25 Function_004066E3 26 Function_004017E4 26->3 26->17 32 Function_004015EE 26->32 39 Function_00402177 26->39 59 Function_0040238E 26->59 63 Function_00402311 26->63 26->70 26->92 27->59 71 Function_00402C20 27->71 29 Function_004056E9 30 Function_0040566A 31 Function_00405B6B 32->0 32->17 32->39 48 Function_00402B84 32->48 32->63 69 Function_00402B9A 32->69 89 Function_00402134 32->89 33 Function_00405AEF 34 Function_00406770 35 Function_004028F0 36 Function_00406571 37 Function_00401AF2 37->4 37->17 37->20 37->28 37->39 66 Function_00401A97 37->66 75 Function_004019A3 37->75 38 Function_00405C72 45 Function_00402E80 40->45 41 Function_004054FC 42 Function_00405CFF 43->89 44 Function_00405500 49 Function_00402D06 45->49 57 Function_00402D8C 45->57 46 Function_00405702 47 Function_00406304 48->28 50 Function_00406506 51 Function_00401E86 52 Function_00405787 53 Function_00405908 54 Function_00402409 54->17 54->63 55 Function_00405F09 56 Function_00405D89 76 Function_00402D26 57->76 58 Function_00401F0E 58->2 58->10 58->23 58->51 64 Function_00402714 58->64 73 Function_00401D22 58->73 83 Function_0040272D 58->83 90 Function_00401C36 58->90 58->92 59->0 60 Function_00405A8F 61 Function_00402110 61->58 62 Function_00401910 62->26 63->28 63->48 64->54 65 Function_00406316 66->48 67 Function_00402298 66->67 66->75 67->17 67->70 68 Function_00406019 72 Function_00401120 74 Function_004055A2 75->0 75->4 75->17 75->39 75->59 75->70 75->92 77->17 77->63 80 Function_004024AB 77->80 77->89 78->35 79 Function_00406428 80->63 81 Function_0040552B 82 Function_004059AC 83->27 84 Function_00405C2E 85 Function_00405DAE 86 Function_00406130 87 Function_00405C32 88 Function_00401233 90->37 91 Function_004060B7 93 Function_004059BC 94 Function_0040123F

                                      Control-flow Graph

                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,0000001C), ref: 00401F19
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00401F20
                                        • Part of subcall function 00402746: gethostname.WS2_32(?,00000100), ref: 00402769
                                        • Part of subcall function 00402746: lstrlen.KERNEL32(00000000), ref: 004027B2
                                        • Part of subcall function 00402746: GetProcessHeap.KERNEL32(00000000,00000200), ref: 004027F5
                                        • Part of subcall function 00402746: RtlAllocateHeap.NTDLL(00000000), ref: 004027FC
                                        • Part of subcall function 00402746: GetTempPathA.KERNEL32(00000100,00000000), ref: 00402819
                                        • Part of subcall function 00401D22: GetModuleFileNameA.KERNEL32(00000000,?,00000100), ref: 00401E17
                                        • Part of subcall function 00401D22: RegOpenKeyExA.KERNELBASE(80000002,Software\Microsoft\Windows\CurrentVersion\Run,00000000,00020006,?), ref: 00401E37
                                        • Part of subcall function 00401D22: RegOpenKeyExA.ADVAPI32(80000001,Software\Microsoft\Windows\CurrentVersion\Run,00000000,00020006,?), ref: 00401E4C
                                        • Part of subcall function 00401D22: lstrlen.KERNEL32(?), ref: 00401E59
                                        • Part of subcall function 00401C50: GetTempPathA.KERNEL32(00000104,?), ref: 00401C65
                                        • Part of subcall function 00401C50: lstrlen.KERNEL32(?), ref: 00401C72
                                        • Part of subcall function 00401C50: lstrcat.KERNEL32(?,zincite), ref: 00401CB0
                                        • Part of subcall function 00401C50: lstrcat.KERNEL32(?,.log), ref: 00401CBE
                                        • Part of subcall function 00401C50: CreateFileA.KERNELBASE(?,C0000000,00000003,00000000,00000002,00000080,00000000), ref: 00401CEA
                                        • Part of subcall function 00401C50: FindCloseChangeNotification.KERNELBASE(00000000), ref: 00401D19
                                      • htons.WS2_32(0000040A), ref: 00401F8A
                                      • closesocket.WS2_32(?), ref: 00401F97
                                      • Sleep.KERNEL32(000000FA), ref: 00401FA2
                                      • htons.WS2_32(0000040A), ref: 00401FB6
                                      • socket.WS2_32(00000002,00000001,00000006), ref: 00401FC2
                                      • bind.WS2_32(00000000,00000004,00000010), ref: 00401FCB
                                      • listen.WS2_32(?,7FFFFFFF), ref: 00401FDD
                                      • CreateThread.KERNELBASE(00000000,00000000,Function_00001C36,00000000,00000000,?), ref: 00401FFF
                                      • select.WS2_32(?,?), ref: 00402072
                                      • Sleep.KERNELBASE(00000001), ref: 0040207D
                                      • GetProcessHeap.KERNEL32(00000000,0000001C), ref: 00402088
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 0040208F
                                      • accept.WS2_32(?,00000000,00000000), ref: 004020A0
                                      • closesocket.WS2_32(00000000), ref: 004020A7
                                      • accept.WS2_32(?,00000008,00000018), ref: 004020CE
                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004020DE
                                      • HeapFree.KERNEL32(00000000), ref: 004020E5
                                      • CreateThread.KERNEL32(00000000,00000000,Function_00001910,00000000,00000000,00000000), ref: 004020FE
                                      • CloseHandle.KERNEL32(00000000), ref: 00402105
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2620157564.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000002.00000002.2620081257.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620157564.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620298869.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620432699.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_400000_services.jbxd
                                      Similarity
                                      • API ID: Heap$Process$AllocateCreatelstrlen$CloseFileOpenPathSleepTempThreadacceptclosesockethtonslstrcat$ChangeFindFreeHandleModuleNameNotificationbindgethostnamelistenselectsocket
                                      • String ID: zincite$.Wu
                                      • API String ID: 3879026950-911148204
                                      • Opcode ID: fe2f1d9fdd21c84416cc25d48b1996b681bad49b490d28944656e069e58d6bc5
                                      • Instruction ID: 63643564f20939399de5e248beed26de427b9082207dbc7f249a8e94aa20677d
                                      • Opcode Fuzzy Hash: fe2f1d9fdd21c84416cc25d48b1996b681bad49b490d28944656e069e58d6bc5
                                      • Instruction Fuzzy Hash: E551BD70504304AFE320AF61DE49B1BBBF8FF44784F10453AF686E61F1DB78A8408A69

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 44 401c50-401c7a GetTempPathA lstrlen 45 401c7c-401c86 44->45 46 401c9d-401cf5 lstrcat * 2 call 402667 CreateFileA 44->46 45->46 47 401c88-401c8b 45->47 51 401cf7-401d18 call 402b68 call 402528 46->51 52 401d1f-401d21 46->52 47->46 50 401c8d-401c95 47->50 50->46 51->52
                                      APIs
                                      • GetTempPathA.KERNEL32(00000104,?), ref: 00401C65
                                      • lstrlen.KERNEL32(?), ref: 00401C72
                                      • lstrcat.KERNEL32(?,zincite), ref: 00401CB0
                                      • lstrcat.KERNEL32(?,.log), ref: 00401CBE
                                      • CreateFileA.KERNELBASE(?,C0000000,00000003,00000000,00000002,00000080,00000000), ref: 00401CEA
                                      • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00401D19
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2620157564.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000002.00000002.2620081257.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620157564.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620298869.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620432699.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_400000_services.jbxd
                                      Similarity
                                      • API ID: lstrcat$ChangeCloseCreateFileFindNotificationPathTemplstrlen
                                      • String ID: .log$\$zincite$.Wu
                                      • API String ID: 2721264048-5949404
                                      • Opcode ID: 862124e1eb0eee65f550ee3459eb0c6eb416149437c4fea1a35bd8d2657bf9b4
                                      • Instruction ID: d308b9f2279752326791d57484c75deaf2d3a492223dede54109555acb1d5f82
                                      • Opcode Fuzzy Hash: 862124e1eb0eee65f550ee3459eb0c6eb416149437c4fea1a35bd8d2657bf9b4
                                      • Instruction Fuzzy Hash: 2411C8B59402586BEB206B64DD4EFFA37AC9B04710F1000B3F784F61E1D6F89AC88B58

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 57 402746-40276f call 4028c8 gethostname 60 402771-40277c 57->60 61 402787-402789 60->61 62 40277e-402785 60->62 63 4027a6-4027a8 61->63 64 40278b-4027a4 61->64 62->60 62->61 65 4027a9-4027ad 63->65 64->63 66 4027c8-4027dd call 402a28 65->66 67 4027af-4027c5 lstrlen call 402a28 65->67 66->65 72 4027df-402808 call 402ad0 GetProcessHeap RtlAllocateHeap 66->72 67->66 75 4028c3-4028c7 72->75 76 40280e-402823 GetTempPathA 72->76 77 402825-40282a 76->77 78 402846-402869 lstrlen 76->78 77->77 79 40282c-40282e 77->79 80 4028b5-4028c1 lstrcpy 78->80 81 40286b 78->81 79->78 82 402830-402838 79->82 80->75 83 40286e-402877 81->83 82->78 84 40283a-40283d 82->84 85 402889-4028a1 83->85 86 402879-402887 83->86 84->78 87 40283f-402842 84->87 88 4028a3-4028b3 85->88 86->88 87->78 88->80 88->83
                                      APIs
                                      • gethostname.WS2_32(?,00000100), ref: 00402769
                                      • lstrlen.KERNEL32(00000000), ref: 004027B2
                                      • GetProcessHeap.KERNEL32(00000000,00000200), ref: 004027F5
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 004027FC
                                      • GetTempPathA.KERNEL32(00000100,00000000), ref: 00402819
                                      • lstrlen.KERNEL32(00000000), ref: 00402856
                                      • lstrcpy.KERNEL32(00000000,.log), ref: 004028BB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2620157564.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000002.00000002.2620081257.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620157564.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620298869.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620432699.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_400000_services.jbxd
                                      Similarity
                                      • API ID: Heaplstrlen$AllocatePathProcessTempgethostnamelstrcpy
                                      • String ID: .log
                                      • API String ID: 3142192315-299349702
                                      • Opcode ID: 4a549d7456097e64e3e163d2aeb9219a779bb868f440c68a974d96d48cf1f2d2
                                      • Instruction ID: 465d614720e4f98c554e9bbc52a771583fa62571e225c13d7661abedabf026f6
                                      • Opcode Fuzzy Hash: 4a549d7456097e64e3e163d2aeb9219a779bb868f440c68a974d96d48cf1f2d2
                                      • Instruction Fuzzy Hash: 5B41CD73A00204ABDB159BB8DE0CBFF3BE9BB49300F18407BE541E72C1D5B989458B54

                                      Control-flow Graph

                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000100), ref: 00401E17
                                      • RegOpenKeyExA.KERNELBASE(80000002,Software\Microsoft\Windows\CurrentVersion\Run,00000000,00020006,?), ref: 00401E37
                                      • RegOpenKeyExA.ADVAPI32(80000001,Software\Microsoft\Windows\CurrentVersion\Run,00000000,00020006,?), ref: 00401E4C
                                      • lstrlen.KERNEL32(?), ref: 00401E59
                                      • RegSetValueExA.KERNELBASE(?,Services,00000000,00000001,?,00000001), ref: 00401E72
                                      • RegCloseKey.ADVAPI32(?), ref: 00401E7B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2620157564.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000002.00000002.2620081257.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620157564.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620298869.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620432699.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_400000_services.jbxd
                                      Similarity
                                      • API ID: Open$CloseFileModuleNameValuelstrlen
                                      • String ID: Services$Software\Microsoft\Windows\CurrentVersion\Run
                                      • API String ID: 3264941416-1243856414
                                      • Opcode ID: c0ff7b9709e14f39830c692d285c4254b3bd2cef27112853d439ce5e8ff935ad
                                      • Instruction ID: bab74bb5fb5e80abe69f2363fff059b18a7d2aa8d11ef8515edd262db9c0df91
                                      • Opcode Fuzzy Hash: c0ff7b9709e14f39830c692d285c4254b3bd2cef27112853d439ce5e8ff935ad
                                      • Instruction Fuzzy Hash: 0A51BE10D0C2C9EDFB02C6A8D9487EEBFB55B26749F084099D5847A292C2FF1658C776

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 93 402c20-402c57 SetFilePointer ReadFile 94 402c5d-402c6a SetFilePointer 93->94 95 402cff 93->95 94->95 96 402c70-402c84 ReadFile 94->96 97 402d01-402d05 95->97 96->95 98 402c86-402c98 96->98 98->95 99 402c9a-402c9e 98->99 99->95 100 402ca0-402ca5 99->100 100->95 101 402ca7-402cc6 SetFilePointer 100->101 102 402cc8-402cdf ReadFile 101->102 103 402cfb-402cfd 101->103 102->95 104 402ce1-402ceb 102->104 103->97 105 402ced 104->105 106 402cef-402cf9 104->106 105->106 106->102 106->103
                                      APIs
                                      • SetFilePointer.KERNELBASE(00000000,0000003C,00000000,00000000,?,00000000,00000000), ref: 00402C38
                                      • ReadFile.KERNELBASE(00000000,00000000,00000004,?,00000000,?,00000000,00000000), ref: 00402C51
                                      • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00402C65
                                      • ReadFile.KERNELBASE(00000000,?,00000016,00000004,00000000,?,00000000,00000000), ref: 00402C7E
                                      • SetFilePointer.KERNEL32(00000000,00000018,00000000,00000000,?,00000000,00000000), ref: 00402CBB
                                      • ReadFile.KERNEL32(00000000,?,00000028,00000500,00000000,?,00000000,00000000), ref: 00402CD9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2620157564.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000002.00000002.2620081257.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620157564.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620298869.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620432699.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_400000_services.jbxd
                                      Similarity
                                      • API ID: File$PointerRead
                                      • String ID: (
                                      • API String ID: 3154509469-3887548279
                                      • Opcode ID: 6867e366b6f43ad089afff83f7b127a1952e869132ce6ddbdd4ebe026399a56d
                                      • Instruction ID: 0a2bc8566371eb4e5b481824b359c4a7693ed211b1de43140c1e77ab5c19bb7d
                                      • Opcode Fuzzy Hash: 6867e366b6f43ad089afff83f7b127a1952e869132ce6ddbdd4ebe026399a56d
                                      • Instruction Fuzzy Hash: 42313676901118BADF21DF94CE449EFBBB9FF04390F10406AE905B2290D6749A81EBA8

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 107 402667-40268f CreateFileA 108 402691-402694 107->108 109 402696-4026b0 call 402c20 SetFilePointer 107->109 111 402710-402713 108->111 113 4026b1-4026b6 109->113 114 4026c7-4026ea ReadFile 113->114 115 4026b8-4026bb 113->115 118 402706 114->118 119 4026ec-4026fc call 40238e 114->119 116 4026c2-4026c5 115->116 117 4026bd-4026c0 115->117 116->114 116->118 117->116 117->118 122 40270d-40270f 118->122 123 402701-402704 119->123 124 4026fe 119->124 122->111 123->113 124->123
                                      APIs
                                      • CreateFileA.KERNELBASE(?,80000000,00000003,00000000,00000003,00000080,00000000,75568A60), ref: 00402684
                                      • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00401CCF,?,?), ref: 004026A4
                                      • ReadFile.KERNELBASE(00000000,?,00000020,?,00000000,?,?,?,?,?,?,?,?,?,00401CCF,?), ref: 004026E0
                                      • FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,00401CCF,?,?), ref: 00402707
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2620157564.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000002.00000002.2620081257.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620157564.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620298869.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620432699.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_400000_services.jbxd
                                      Similarity
                                      • API ID: File$ChangeCloseCreateFindNotificationPointerRead
                                      • String ID: $.Wu
                                      • API String ID: 2405668454-3665634735
                                      • Opcode ID: a846899278c3e595d7c3445bfc842bfb2744db7b400f7519058065fdcd010807
                                      • Instruction ID: 65b246ce000513070fce25458afbecf7756c4f1386a5a2a80221073d1864df85
                                      • Opcode Fuzzy Hash: a846899278c3e595d7c3445bfc842bfb2744db7b400f7519058065fdcd010807
                                      • Instruction Fuzzy Hash: 65118771900114FAEB209BA5DE88ADFBB7CEF05360F204537F915F61D1C7B49A448A69

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 125 402bdc-402bec GetModuleHandleA 126 402bf9-402c07 GetProcAddress 125->126 127 402bee-402bf7 LoadLibraryA 125->127 128 402c09-402c0c 126->128 129 402c0e-402c1b InternetGetConnectedState 126->129 127->126 127->128 130 402c1d-402c1f 128->130 129->130
                                      APIs
                                      • GetModuleHandleA.KERNEL32(wininet.dll,?,?,00401B05,?,?,?,?,?,00401C46,00000000), ref: 00402BE4
                                      • LoadLibraryA.KERNELBASE(wininet.dll,?,?,00401B05,?,?,?,?,?,00401C46,00000000), ref: 00402BEF
                                      • GetProcAddress.KERNEL32(00000000,InternetGetConnectedState), ref: 00402BFF
                                      • InternetGetConnectedState.WININET(00000000,00000000,?,?,00401B05,?,?,?,?,?,00401C46,00000000), ref: 00402C15
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2620157564.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000002.00000002.2620081257.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620157564.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620298869.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620432699.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_400000_services.jbxd
                                      Similarity
                                      • API ID: AddressConnectedHandleInternetLibraryLoadModuleProcState
                                      • String ID: InternetGetConnectedState$wininet.dll
                                      • API String ID: 1505668628-596207600
                                      • Opcode ID: a37456e34d594103b89777690462d1489ba709ca72bb1b5dfb4240220dcd0849
                                      • Instruction ID: 9a479a25d9d6a13632a63e79a708e40800bebfc4b8359a5714031e7911cbad49
                                      • Opcode Fuzzy Hash: a37456e34d594103b89777690462d1489ba709ca72bb1b5dfb4240220dcd0849
                                      • Instruction Fuzzy Hash: 40E04F75655212ABF7201B719F4EF6B225C5B05B41F10497BF103F51E1EBBCD44055AC

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 131 4019a3-4019b6 call 401947 134 4019c0-4019f7 htons socket connect 131->134 135 4019b8-4019bb 131->135 137 401a88-401a93 closesocket 134->137 138 4019fd-401a17 call 402159 call 40221c 134->138 136 401a94-401a96 135->136 137->136 143 401a31-401a40 call 402177 call 402241 138->143 144 401a19-401a2f call 402b3b call 402177 138->144 153 401a43-401a55 send 143->153 144->153 154 401a56-401a73 recv 153->154 155 401a75-401a84 call 40238e 154->155 156 401a86 154->156 155->154 155->156 156->137
                                      APIs
                                        • Part of subcall function 00401947: gethostname.WS2_32(?,00000100), ref: 0040195C
                                        • Part of subcall function 00401947: gethostbyname.WS2_32(?), ref: 00401969
                                      • htons.WS2_32(0000040A), ref: 004019D0
                                      • socket.WS2_32(00000002,00000001,00000006), ref: 004019DF
                                      • connect.WS2_32(00000000,?,00000010), ref: 004019EF
                                      • send.WS2_32(00000000,00401164,00000001,00000000), ref: 00401A4F
                                      • recv.WS2_32(00000000,?,00000020,00000000), ref: 00401A6A
                                      • closesocket.WS2_32(00000000), ref: 00401A8B
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2620157564.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000002.00000002.2620081257.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620157564.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620298869.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620432699.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_400000_services.jbxd
                                      Similarity
                                      • API ID: closesocketconnectgethostbynamegethostnamehtonsrecvsendsocket
                                      • String ID:
                                      • API String ID: 1510073661-0
                                      • Opcode ID: 2a21ca618489f6ec19938a17c44a3dae582688b32802aec640c23780eae26ec9
                                      • Instruction ID: 0b23af087cc8eec7cc1e21334d5c71020c57f0b57cd055084c320c5618d28d3d
                                      • Opcode Fuzzy Hash: 2a21ca618489f6ec19938a17c44a3dae582688b32802aec640c23780eae26ec9
                                      • Instruction Fuzzy Hash: F121C375600205FBEB10AFA1DE0AF9E7BB9EF04344F20003AFA85B61F1D7B549418B49

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 159 402528-40253b call 4024ab 162 402544-40254d 159->162 163 40253d 159->163 164 402552-402557 162->164 165 40254f 162->165 163->162 166 402664-402666 164->166 167 40255d-402578 GetProcessHeap RtlAllocateHeap 164->167 165->164 168 402580-402597 call 402134 call 402159 167->168 169 40257a-40257b 167->169 175 402599-4025a4 168->175 176 4025fa-402602 168->176 170 402662-402663 169->170 170->166 175->176 179 4025a6 175->179 177 402650-402660 GetProcessHeap HeapFree 176->177 178 402604-40260e 176->178 177->170 180 402611-402617 178->180 181 4025a9-4025b3 179->181 182 402629-40264e call 402311 WriteFile 180->182 183 402619-402627 180->183 184 4025c3-4025c8 181->184 185 4025b5-4025b8 181->185 182->177 182->178 183->180 183->182 186 4025d7-4025da 184->186 187 4025ca-4025d5 184->187 189 4025ba-4025bd 185->189 190 4025bf-4025c1 185->190 191 4025dd-4025e5 186->191 187->186 187->191 189->185 189->190 190->184 190->191 191->181 193 4025e7-4025ec 191->193 193->176 194 4025ee-4025f8 193->194 194->175 194->176
                                      APIs
                                        • Part of subcall function 004024AB: gethostname.WS2_32(?,00000100), ref: 004024C0
                                        • Part of subcall function 004024AB: gethostbyname.WS2_32(?), ref: 004024CD
                                        • Part of subcall function 004024AB: WriteFile.KERNELBASE(6%@,?,00000020,00000000,00000000), ref: 00402520
                                      • GetProcessHeap.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,00401D15), ref: 00402567
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 0040256E
                                      • WriteFile.KERNELBASE(00000000,?,00000020,?,00000000,?,?,?,?,?,?,00401D15), ref: 00402642
                                      • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401D15), ref: 00402653
                                      • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,00401D15), ref: 0040265A
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2620157564.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000002.00000002.2620081257.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620157564.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620298869.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620432699.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_400000_services.jbxd
                                      Similarity
                                      • API ID: Heap$FileProcessWrite$AllocateFreegethostbynamegethostname
                                      • String ID:
                                      • API String ID: 1381504460-0
                                      • Opcode ID: cb84bfe19f4f92fb60ffda4fede0af42123b7535614bf0299b989d0789685bc5
                                      • Instruction ID: e93690f6efb094d726be1ca240a6e8d252680ed4df48be1e4ed5d20c378adae6
                                      • Opcode Fuzzy Hash: cb84bfe19f4f92fb60ffda4fede0af42123b7535614bf0299b989d0789685bc5
                                      • Instruction Fuzzy Hash: BE419F71A00259EFCB14DF64CA98A9E77B5FB44304F20457AE915BB2C1CBB4EE50CB98

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 195 402409-402431 CreateFileA 196 402433-402436 195->196 197 402438-402445 call 402159 195->197 198 4024a8-4024aa 196->198 201 402447 197->201 202 402498-4024a7 197->202 203 402448-402455 201->203 202->198 205 402457-40245c 203->205 206 402471-402495 call 402311 WriteFile 205->206 207 40245e-40246f 205->207 206->203 210 402497 206->210 207->205 207->206 210->202
                                      APIs
                                      • CreateFileA.KERNELBASE(?,40000000,00000003,00000000,00000002,00000080,00000000), ref: 00402425
                                      • WriteFile.KERNELBASE(?,?,00000020,?,00000000), ref: 0040248A
                                      • CloseHandle.KERNEL32(?), ref: 0040249F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2620157564.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000002.00000002.2620081257.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620157564.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620298869.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620432699.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_400000_services.jbxd
                                      Similarity
                                      • API ID: File$CloseCreateHandleWrite
                                      • String ID: .Wu
                                      • API String ID: 1065093856-3424199868
                                      • Opcode ID: 02cce61bae3da03cfbe432f57d36e2110cdf58b40a94688df2534fc4476fb847
                                      • Instruction ID: 869e521865e1404736e4a209302c2f71d5a307e29bced8060bbcdd2507a7e97b
                                      • Opcode Fuzzy Hash: 02cce61bae3da03cfbe432f57d36e2110cdf58b40a94688df2534fc4476fb847
                                      • Instruction Fuzzy Hash: 5B11D672500208BFDB109F94DD84F9EB7B8EF44325F20853AF545F61D0D774A9858B64

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 211 4024ab-4024d7 gethostname gethostbyname 212 402526-402527 211->212 213 4024d9-4024e7 211->213 214 4024ea-4024f2 213->214 215 402503-402505 214->215 216 4024f4-402501 214->216 215->212 217 402507-402520 call 402311 WriteFile 215->217 216->214 216->215 217->212
                                      APIs
                                      • gethostname.WS2_32(?,00000100), ref: 004024C0
                                      • gethostbyname.WS2_32(?), ref: 004024CD
                                      • WriteFile.KERNELBASE(6%@,?,00000020,00000000,00000000), ref: 00402520
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2620157564.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000002.00000002.2620081257.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620157564.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620298869.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620432699.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_400000_services.jbxd
                                      Similarity
                                      • API ID: FileWritegethostbynamegethostname
                                      • String ID: 6%@
                                      • API String ID: 318559467-1099485511
                                      • Opcode ID: f034063b5387ddc9d0de5fa9bbd9bc3ce1eafbdd233045a66a0e29a2c198d38c
                                      • Instruction ID: 54dfa080bba5bf9ad2062c22b38b8dcdf997bae28b9b2d9a825c475ac44d6093
                                      • Opcode Fuzzy Hash: f034063b5387ddc9d0de5fa9bbd9bc3ce1eafbdd233045a66a0e29a2c198d38c
                                      • Instruction Fuzzy Hash: 9F014071A00209ABDF14DF65DE59ADEB7BCEB48300F10407AE945F72D0E774EA448B58

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 220 402180-402182 221 402184-402186 220->221 222 402187-40218e 220->222 223 402190-402195 222->223 224 4021de-4021e5 222->224 223->224 225 402197-402199 223->225 226 4021e7-4021eb 224->226 227 4021ed-402209 GetProcessHeap RtlAllocateHeap 224->227 228 402217 225->228 229 40219b-40219f 225->229 226->226 226->227 230 40220b-402212 call 402134 227->230 231 4021bd-4021c0 227->231 233 402219-40221b 228->233 229->229 232 4021a1-4021bb GetProcessHeap RtlReAllocateHeap 229->232 230->228 231->233 232->231 235 4021c2-4021dc call 402134 232->235 235->228
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,?,?,004026F8,75345350,00402275,004026F8,00000007,004023FA,00000000,004026FC), ref: 004021AA
                                      • RtlReAllocateHeap.NTDLL(00000000), ref: 004021B1
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2620157564.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000002.00000002.2620081257.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620157564.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620298869.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620432699.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_400000_services.jbxd
                                      Similarity
                                      • API ID: Heap$AllocateProcess
                                      • String ID:
                                      • API String ID: 1357844191-0
                                      • Opcode ID: 26a0c9002352f9922aa997980867025a6c0a5e0e25f200c771313e238489ce55
                                      • Instruction ID: b91e93daa79bc00c502a8745a29ed674d322f15872cdf6577bcb50ea8502c1c8
                                      • Opcode Fuzzy Hash: 26a0c9002352f9922aa997980867025a6c0a5e0e25f200c771313e238489ce55
                                      • Instruction Fuzzy Hash: 6D113A7130170157DB184AA98E8C63BB29AAFC4341714443EE657EF7D0EFB4C8428714

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 238 401947-401971 gethostname gethostbyname 239 401973-401978 238->239 240 40197a-40197d 238->240 239->240 241 40197e-401982 239->241 242 401983-401987 241->242 243 401999 242->243 244 401989-40198e 242->244 247 40199b-40199d 243->247 245 401990-401997 244->245 246 40199e-4019a1 244->246 245->242 245->243 246->247
                                      APIs
                                      • gethostname.WS2_32(?,00000100), ref: 0040195C
                                      • gethostbyname.WS2_32(?), ref: 00401969
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2620157564.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000002.00000002.2620081257.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620157564.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620298869.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620432699.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_400000_services.jbxd
                                      Similarity
                                      • API ID: gethostbynamegethostname
                                      • String ID:
                                      • API String ID: 3961807697-0
                                      • Opcode ID: 7f7489a05263d50e9f5280867374dca372806a9a6e7122dc19f1c9b7e6bb3912
                                      • Instruction ID: d087f8dd0fb0701926f1ae1460b74465c54af62c64bb0150b0245bb175ba3ed1
                                      • Opcode Fuzzy Hash: 7f7489a05263d50e9f5280867374dca372806a9a6e7122dc19f1c9b7e6bb3912
                                      • Instruction Fuzzy Hash: DCF054717101045BEF10DA799C14BFB73ECEB44344F1854B6A986F72B0E678ED41C694

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 248 402110-402126 WSAStartup call 401f0e 250 40212b-402131 248->250
                                      APIs
                                      • WSAStartup.WS2_32(00000101), ref: 00402120
                                        • Part of subcall function 00401F0E: GetProcessHeap.KERNEL32(00000000,0000001C), ref: 00401F19
                                        • Part of subcall function 00401F0E: RtlAllocateHeap.NTDLL(00000000), ref: 00401F20
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2620157564.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000002.00000002.2620081257.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620157564.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620298869.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620432699.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_400000_services.jbxd
                                      Similarity
                                      • API ID: Heap$AllocateProcessStartup
                                      • String ID:
                                      • API String ID: 758850586-0
                                      • Opcode ID: e59473464d790235308ec1e16d264448846f175b2295cd92bdf9d6610ea48e59
                                      • Instruction ID: 394aaf448670e1c9671958fd0a23c61cfec1bbe2cdcd19ae9f34d9542a64428f
                                      • Opcode Fuzzy Hash: e59473464d790235308ec1e16d264448846f175b2295cd92bdf9d6610ea48e59
                                      • Instruction Fuzzy Hash: 4BC02B725000402FE301B300DC02FB6312C7704300F0004353581400E2E3F940184163

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 251 401af2-401afc 252 401b00-401b07 call 402bdc 251->252 255 401b13-401b26 call 402159 252->255 256 401b09-401b0e 252->256 260 401b67-401b71 call 402177 255->260 261 401b28-401b2a 255->261 257 401c24-401c2a Sleep 256->257 257->252 268 401b83-401b8b 260->268 269 401b73-401b7c call 4019a3 260->269 263 401b4c-401b54 call 401947 261->263 264 401b2c-401b37 261->264 271 401b59-401b5c 263->271 264->263 266 401b39-401b4a call 402b68 264->266 266->263 276 401b60-401b65 266->276 273 401b97-401b9d 268->273 274 401b8d-401b92 268->274 278 401b81-401b82 269->278 271->276 277 401b5e 271->277 279 401ba3-401ba6 273->279 280 401b9f-401ba1 273->280 274->257 276->260 276->261 277->276 278->268 282 401ba8-401baa 279->282 283 401bac-401baf 279->283 281 401bb3 280->281 285 401bb4-401bbf 281->285 282->281 284 401bb1 283->284 283->285 284->281 286 401bc1-401bc4 285->286 287 401bcf-401bd3 285->287 288 401bc6-401bc8 286->288 289 401bc9-401bcb 286->289 290 401bd5-401bd6 call 401a97 287->290 291 401bfa-401bfd 287->291 288->289 289->287 292 401bcd 289->292 298 401bdb-401bde 290->298 294 401c06-401c0f 291->294 295 401bff-401c04 291->295 292->287 296 401c11-401c16 294->296 297 401c18-401c1d 294->297 295->257 296->257 299 401c2f-401c34 297->299 300 401c1f 297->300 301 401be0-401bf2 call 402b68 298->301 302 401bf5-401bf8 298->302 299->257 300->257 301->302 305 401bf4 301->305 302->290 302->291 305->302
                                      APIs
                                        • Part of subcall function 00402BDC: GetModuleHandleA.KERNEL32(wininet.dll,?,?,00401B05,?,?,?,?,?,00401C46,00000000), ref: 00402BE4
                                        • Part of subcall function 00402BDC: LoadLibraryA.KERNELBASE(wininet.dll,?,?,00401B05,?,?,?,?,?,00401C46,00000000), ref: 00402BEF
                                        • Part of subcall function 00402BDC: GetProcAddress.KERNEL32(00000000,InternetGetConnectedState), ref: 00402BFF
                                      • Sleep.KERNEL32(0000EA60,?,?,?,?,?,00401C46,00000000), ref: 00401C24
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2620157564.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000002.00000002.2620081257.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620157564.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620298869.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620432699.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_400000_services.jbxd
                                      Similarity
                                      • API ID: AddressHandleLibraryLoadModuleProcSleep
                                      • String ID:
                                      • API String ID: 598054177-0
                                      • Opcode ID: cc4ed5cdb316f89ee48a959f0db2784bda8b517e773fa2b5245cd414c5d5d6a3
                                      • Instruction ID: 556554e90d697c25865dfeac8bb208c10a23844f2c0764a878470f5d7dc47180
                                      • Opcode Fuzzy Hash: cc4ed5cdb316f89ee48a959f0db2784bda8b517e773fa2b5245cd414c5d5d6a3
                                      • Instruction Fuzzy Hash: 683113356442159BE224AA15C981E39B3F5EB01B18F21013FF251BB2F2EB7CEC41868E
                                      APIs
                                      • recv.WS2_32(?,?,00000080,00000000), ref: 0040130C
                                      • GetTempPathA.KERNEL32(00000100,?,?,?), ref: 0040132F
                                      • lstrlen.KERNEL32(?,?,?), ref: 0040133C
                                      • GetTickCount.KERNEL32 ref: 00401372
                                      • GetTickCount.KERNEL32 ref: 0040137A
                                      • lstrlen.KERNEL32(?,%.8x.%c%c%c,?,?,?), ref: 0040138F
                                      • wsprintfA.USER32 ref: 0040139D
                                      • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000002,00000080,00000000), ref: 004013B9
                                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00401413
                                      • recv.WS2_32(?,?,00000200,00000000), ref: 00401425
                                      • closesocket.WS2_32(?), ref: 00401435
                                      • SetFilePointer.KERNEL32(?,00000000,00000000,00000000), ref: 004014C1
                                      • htonl.WS2_32(?), ref: 004014CA
                                      • ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 004014FA
                                      • CloseHandle.KERNEL32(?), ref: 0040155E
                                      • wsprintfA.USER32 ref: 00401573
                                      • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,00000000,00000000,00000000,?,?), ref: 004015AF
                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 004015BE
                                      • CloseHandle.KERNEL32(?), ref: 004015C7
                                      • CloseHandle.KERNEL32(?), ref: 004015CC
                                      • DeleteFileA.KERNEL32(?), ref: 004015D5
                                      • CloseHandle.KERNEL32(?), ref: 004015E6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2620157564.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000002.00000002.2620081257.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620157564.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620298869.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620432699.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_400000_services.jbxd
                                      Similarity
                                      • API ID: File$CloseHandle$CountCreateTicklstrlenrecvwsprintf$DeleteObjectPathPointerProcessReadSingleTempWaitWriteclosesockethtonl
                                      • String ID: "%s"$%.8x.%c%c%c$.Wu
                                      • API String ID: 2752258614-1702882265
                                      • Opcode ID: d87f23115844a503b3769bbd931cddded3c6aecd11922378917989d44afb3391
                                      • Instruction ID: 87b5d8eef72c4e099ef873e594ac55454593937c6fbe0acc7a325c837c011b3a
                                      • Opcode Fuzzy Hash: d87f23115844a503b3769bbd931cddded3c6aecd11922378917989d44afb3391
                                      • Instruction Fuzzy Hash: 1BA17AB290124CABEB119FA4DD88EDE7BADFB04300F104576FA09E31A1DB34D9858F64
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000200), ref: 004015FF
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00401606
                                      • send.WS2_32(00000000,?,00000020,00000000), ref: 004017AB
                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 004017C4
                                      • HeapFree.KERNEL32(00000000), ref: 004017CB
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2620157564.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000002.00000002.2620081257.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620157564.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620298869.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620432699.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_400000_services.jbxd
                                      Similarity
                                      • API ID: Heap$Process$AllocateFreesend
                                      • String ID:
                                      • API String ID: 4105135367-0
                                      • Opcode ID: 3d1d185d2aa9f56e36d5c05daaa268825108e9a00c95c9ce06bd95516940abd8
                                      • Instruction ID: 52fb6d836b38e9ee9535e48970a26cdb363203125a638cc4e1af546f8777f0e4
                                      • Opcode Fuzzy Hash: 3d1d185d2aa9f56e36d5c05daaa268825108e9a00c95c9ce06bd95516940abd8
                                      • Instruction Fuzzy Hash: 6D616F35A00105AFDB10DFA5C984AADB7B5EF44328F24847AE915BB2E1C779ED41CB48
                                      APIs
                                      • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00401EED
                                      • GetProcAddress.KERNEL32(00000000,RegisterServiceProcess), ref: 00401EFC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2620157564.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000002.00000002.2620081257.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620157564.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620298869.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620432699.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_400000_services.jbxd
                                      Similarity
                                      • API ID: AddressHandleModuleProc
                                      • String ID: RegisterServiceProcess$kernel32.dll
                                      • API String ID: 1646373207-4020013434
                                      • Opcode ID: 88965b28d84923e145c86964e19b387d6cdeb36cc163beab82d193450ada039d
                                      • Instruction ID: fe3fddd0a83443da577e5a50337f346177ffc8e2680221d965c1de18958cb581
                                      • Opcode Fuzzy Hash: 88965b28d84923e145c86964e19b387d6cdeb36cc163beab82d193450ada039d
                                      • Instruction Fuzzy Hash: F611BF10D0C2C9D9FB0297E8895979FBEA51F22749F0840D895847A2D2C7FF5718C3B6
                                      APIs
                                      • RtlExitUserThread.NTDLL(00000000), ref: 00401940
                                        • Part of subcall function 004017E4: recv.WS2_32(?,?,00000001,00000000), ref: 0040182A
                                        • Part of subcall function 004017E4: recv.WS2_32(?,?,00000020,00000000), ref: 0040186D
                                      • closesocket.WS2_32(?), ref: 00401928
                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00401931
                                      • HeapFree.KERNEL32(00000000), ref: 00401938
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2620157564.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000002.00000002.2620081257.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620157564.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620298869.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000002.00000002.2620432699.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_400000_services.jbxd
                                      Similarity
                                      • API ID: Heaprecv$ExitFreeProcessThreadUserclosesocket
                                      • String ID:
                                      • API String ID: 2166171475-0
                                      • Opcode ID: f08946cb0ca92a7e7864d3179d4bb38cfe4129f2fea6f70c9f97e31e457419b4
                                      • Instruction ID: a39a1a5debe07bde33d46ee6b6cdb91c709c7e08ef56850422b225088ed05449
                                      • Opcode Fuzzy Hash: f08946cb0ca92a7e7864d3179d4bb38cfe4129f2fea6f70c9f97e31e457419b4
                                      • Instruction Fuzzy Hash: 19E08C36601260E7C6102BA09E0CB8B3BA8AF08762F040026F585F65B0CB348440C7A8

                                      Execution Graph

                                      Execution Coverage:11.2%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:0%
                                      Total number of Nodes:660
                                      Total number of Limit Nodes:12
                                      execution_graph 2862 503280 WSAStartup 2867 5033a8 GetTickCount 2862->2867 2864 5032a0 memset 2868 5031e4 2864->2868 2867->2864 2890 502c90 2868->2890 2871 5031ff 2876 50327c ExitProcess 2871->2876 2901 5075e5 2871->2901 2882 503255 2886 50325a CreateThread 2882->2886 2883 50322c CreateThread 2937 5033b4 2883->2937 3149 50311c FindWindowA 2883->3149 2885 503240 Sleep 2885->2882 2887 50326e 2886->2887 3146 504c1b 2886->3146 2930 50565b GetCurrentThread SetThreadPriority 2887->2930 2892 502caa 2890->2892 2891 502d0f RegOpenKeyExA 2891->2892 2893 502d83 RegCloseKey 2891->2893 2892->2891 2894 502d3a 2892->2894 2895 502d7e 2893->2895 2894->2895 2896 502d43 RegCreateKeyExA 2894->2896 2895->2871 2898 502d8e memset gethostname lstrcat 2895->2898 2896->2894 2897 502d6c RegCloseKey 2896->2897 2897->2894 2899 502e0b lstrcat lstrcat CreateMutexA GetLastError 2898->2899 2900 502ddd 2898->2900 2899->2871 2900->2899 2938 50746b GetModuleFileNameA CreateFileA 2901->2938 2903 5075f6 2904 507627 GetTempPathA 2903->2904 2905 507619 GetWindowsDirectoryA 2903->2905 2906 50766b lstrcat lstrcat lstrcat CreateFileA 2903->2906 2908 503209 2903->2908 2904->2903 2905->2903 2906->2903 2907 5076c8 2906->2907 2949 50737c 2907->2949 2911 502e50 GetModuleFileNameA lstrcpy 2908->2911 2918 502eb6 2911->2918 2912 502ec1 GetWindowsDirectoryA 2912->2918 2913 502ecf GetTempPathA 2913->2918 2914 502ee7 lstrlen 2915 502f01 lstrcat 2914->2915 2916 502f0f lstrcat SetFileAttributesA CreateFileA 2914->2916 2915->2916 2916->2918 2919 502f7e GetFileAttributesA 2916->2919 2917 502f9d 2922 502fb0 RegOpenKeyExA 2917->2922 2918->2912 2918->2913 2918->2914 2918->2917 2918->2919 2920 502f51 CloseHandle DeleteFileA CopyFileA 2918->2920 2921 502f9f lstrcpy 2918->2921 2919->2918 2920->2918 2921->2917 2923 5030c2 lstrlen RegSetValueExA RegCloseKey 2922->2923 2924 5030ad RegOpenKeyExA 2922->2924 2925 5030eb 2923->2925 2924->2923 2924->2925 2926 50315c GetModuleHandleA 2925->2926 2927 5031e2 2926->2927 2928 5031cd GetProcAddress 2926->2928 2927->2882 2927->2883 2928->2927 2929 5031dc 2928->2929 2929->2927 2966 504ff8 RegOpenKeyExA 2930->2966 2934 505674 2983 5055b4 memset GetWindowsDirectoryA lstrcpy 2934->2983 2937->2885 2939 507545 2938->2939 2940 5074b8 2938->2940 2939->2903 2955 5073e8 GetTempPathA lstrlen 2940->2955 2942 5074c4 CreateFileA 2942->2939 2943 5074e6 2942->2943 2958 503697 SetFilePointer ReadFile 2943->2958 2946 50751b ReadFile 2947 507503 WriteFile 2946->2947 2948 507535 FindCloseChangeNotification CloseHandle 2946->2948 2947->2946 2948->2939 2950 507391 2949->2950 2951 5073ac WriteFile 2950->2951 2952 5073cd 2950->2952 2951->2950 2953 5073d1 WriteFile 2952->2953 2954 5073e4 FindCloseChangeNotification wsprintfA memset CreateProcessA 2952->2954 2953->2954 2954->2908 2956 507435 lstrcat lstrcat lstrcpy 2955->2956 2957 507414 2955->2957 2956->2942 2957->2956 2959 5036d4 SetFilePointer 2958->2959 2960 503772 SetFilePointer 2958->2960 2959->2960 2961 5036e7 ReadFile 2959->2961 2960->2946 2961->2960 2962 5036fd 2961->2962 2962->2960 2963 50371e SetFilePointer 2962->2963 2963->2960 2964 50373f ReadFile 2963->2964 2964->2960 2965 503758 2964->2965 2965->2960 2965->2964 2967 5050c8 memset RegQueryValueExA RegCloseKey 2966->2967 2968 505119 2966->2968 2967->2968 2969 50510c 2967->2969 2972 505449 2968->2972 2991 504eea CreateFileA 2969->2991 2973 505503 memset 2972->2973 2974 505521 GetWindowsDirectoryA 2973->2974 2975 505529 GetEnvironmentVariableA 2973->2975 2976 505534 2974->2976 2975->2976 2976->2973 2977 50553c lstrlen 2976->2977 2979 5055af 2976->2979 2980 505585 lstrcat 2976->2980 2981 50556a lstrcat lstrcat 2976->2981 2977->2976 2978 505556 lstrcat 2977->2978 2978->2976 2979->2934 3084 5052ad 2980->3084 2981->2980 2984 5052ad 82 API calls 2983->2984 2985 50560a 2984->2985 2986 50561b GetDriveTypeA 2985->2986 2987 505657 Sleep 2985->2987 2986->2985 2988 50562d Sleep 2986->2988 2987->2934 2989 5052ad 82 API calls 2988->2989 2990 505646 2989->2990 2990->2985 2992 504fee 2991->2992 2993 504f1f 2991->2993 2992->2968 2993->2992 2994 504f28 GetFileSize CreateFileMappingA 2993->2994 2995 504fe9 2994->2995 2996 504f4b 2994->2996 2998 504fdc CloseHandle 2995->2998 2996->2995 2997 504f54 MapViewOfFile 2996->2997 2999 504f67 2997->2999 3004 504f6c 2997->3004 2998->2992 3000 504fd2 CloseHandle 2999->3000 3000->2998 3001 504fcb UnmapViewOfFile 3001->3000 3002 504f7c memset 3002->3004 3004->3001 3004->3002 3005 50463f lstrlen 3004->3005 3006 50465b 3005->3006 3007 50466d 3005->3007 3013 5045cf 3006->3013 3007->3004 3009 504669 3009->3007 3010 50469a lstrlen GetProcessHeap RtlAllocateHeap 3009->3010 3011 50467e lstrcmpiA 3009->3011 3010->3007 3012 5046c5 memset GetTickCount lstrcpy 3010->3012 3011->3007 3011->3009 3012->3007 3023 50402f lstrlen 3013->3023 3015 50461e 3021 5045e1 3015->3021 3065 504449 3015->3065 3018 50462b 3018->3021 3069 50450e 3018->3069 3019 5045f2 lstrlen 3022 5045dc 3019->3022 3021->3009 3022->3015 3022->3019 3022->3021 3048 5042ce 3022->3048 3028 50404c 3023->3028 3030 504044 3023->3030 3024 504055 isspace 3027 504065 isalnum 3024->3027 3024->3028 3025 504090 3026 504092 strchr 3025->3026 3033 5040af 3025->3033 3026->3025 3026->3033 3027->3025 3027->3028 3028->3024 3028->3025 3029 5040fa 3029->3030 3032 50410b lstrlen 3029->3032 3030->3022 3031 5040bb isalnum 3031->3033 3034 5040de tolower 3031->3034 3040 504150 3032->3040 3033->3029 3033->3031 3033->3034 3034->3033 3035 50411a isspace 3036 50412a strchr 3035->3036 3035->3040 3037 504140 isalnum 3036->3037 3036->3040 3037->3040 3038 5041c2 lstrlen 3047 504209 3038->3047 3039 50417f isalnum 3041 50416d 3039->3041 3040->3035 3040->3041 3041->3038 3041->3039 3042 5041ad tolower 3041->3042 3042->3041 3043 5041d3 isspace 3045 5041e5 strchr 3043->3045 3043->3047 3044 504224 lstrlen 3044->3030 3046 5041fa isalnum 3045->3046 3045->3047 3046->3047 3047->3043 3047->3044 3049 5042d7 3048->3049 3050 5042da 3048->3050 3049->3022 3051 504417 3050->3051 3052 50430a lstrlen 3050->3052 3051->3022 3053 504315 3052->3053 3053->3051 3054 504339 lstrlen 3053->3054 3054->3051 3055 504354 3054->3055 3055->3051 3075 504244 3055->3075 3058 504383 3058->3051 3059 50438c lstrlen 3058->3059 3059->3051 3060 50439d 3059->3060 3060->3051 3061 5043a2 lstrlen 3060->3061 3062 5043a7 3061->3062 3062->3051 3063 5043fa lstrlen lstrlen 3062->3063 3063->3051 3064 504425 lstrlen 3063->3064 3064->3051 3066 50445a 3065->3066 3067 50447a tolower 3066->3067 3068 504469 3066->3068 3067->3066 3067->3068 3068->3018 3070 504520 3069->3070 3071 50452a tolower 3070->3071 3074 504546 3070->3074 3071->3070 3071->3074 3072 50457d 3072->3021 3073 504561 lstrcmp 3073->3072 3073->3074 3074->3072 3074->3073 3076 504279 3075->3076 3081 504252 3075->3081 3078 5042b8 3076->3078 3083 504286 3076->3083 3077 50425d isspace 3077->3081 3079 5042b3 lstrlen 3078->3079 3080 5042bf lstrcpy 3078->3080 3079->3051 3079->3058 3080->3079 3081->3076 3081->3077 3082 504299 isspace 3082->3083 3083->3079 3083->3082 3085 5052cb 3084->3085 3086 5052bf 3084->3086 3085->2976 3086->3085 3087 5052d2 Sleep 3086->3087 3088 5052e5 lstrcpy lstrlen 3086->3088 3087->3086 3089 505310 lstrcat 3088->3089 3090 505322 lstrcat memset 3088->3090 3089->3090 3100 50534c 3090->3100 3091 505358 FindFirstFileA 3091->3100 3092 50537b FindNextFileA 3093 505438 FindClose 3092->3093 3092->3100 3093->3085 3094 5053b0 lstrcpy lstrlen 3095 5053e1 lstrcat 3094->3095 3096 5053cf lstrcat 3094->3096 3097 5053fe Sleep 3095->3097 3095->3100 3096->3095 3098 5052ad 68 API calls 3097->3098 3098->3100 3100->3085 3100->3091 3100->3092 3100->3094 3101 505131 3100->3101 3102 505141 3101->3102 3104 505299 3101->3104 3103 50516e lstrcpyn CharLowerA 3102->3103 3105 505167 3102->3105 3103->3105 3104->3100 3105->3104 3106 505278 Sleep 3105->3106 3107 50528c 3105->3107 3106->3105 3108 505291 3107->3108 3109 50529b 3107->3109 3113 504e00 GetProcessHeap RtlAllocateHeap 3108->3113 3109->3104 3111 5052a0 3109->3111 3112 504eea 48 API calls 3111->3112 3112->3104 3114 504e2b CreateFileA 3113->3114 3115 504e23 3113->3115 3116 504ed0 3114->3116 3122 504e50 3114->3122 3115->3104 3117 504ed3 GetProcessHeap RtlFreeHeap 3116->3117 3117->3115 3118 504eb6 ReadFile 3119 504ec2 FindCloseChangeNotification 3118->3119 3118->3122 3119->3117 3122->3116 3122->3118 3122->3119 3123 504c29 3122->3123 3129 504d0c 3122->3129 3124 504c38 3123->3124 3126 504d05 3124->3126 3128 504c8b memcpy 3124->3128 3133 50343e 3124->3133 3137 5034b8 3124->3137 3126->3122 3128->3124 3130 504df8 3129->3130 3131 504d24 3129->3131 3130->3122 3131->3130 3132 50463f 40 API calls 3131->3132 3132->3131 3135 50347c 3133->3135 3136 50344b 3133->3136 3134 503454 tolower tolower 3134->3135 3134->3136 3135->3124 3136->3134 3136->3135 3138 503618 3137->3138 3145 5034d1 3137->3145 3138->3124 3139 5034ed isdigit 3139->3145 3140 50353f memset 3141 503562 WideCharToMultiByte 3140->3141 3140->3145 3141->3145 3142 503582 lstrlen 3143 50359b lstrlen 3142->3143 3144 5035ec lstrlen memcpy 3142->3144 3143->3145 3144->3145 3145->3138 3145->3139 3145->3140 3145->3142 3145->3144 3159 504ae2 3146->3159 3562 5030f0 3149->3562 3152 5030f0 3 API calls 3153 503142 FindWindowA 3152->3153 3154 5030f0 3 API calls 3153->3154 3155 503152 RtlExitUserThread 3154->3155 3156 50315c GetModuleHandleA 3155->3156 3157 5031cd GetProcAddress 3156->3157 3158 5031dc 3156->3158 3157->3158 3162 504af2 3159->3162 3161 504b00 Sleep 3161->3162 3162->3161 3163 504b99 CreateThread 3162->3163 3165 504b61 3162->3165 3166 504bec GetTickCount 3162->3166 3170 503620 GetModuleHandleA 3162->3170 3163->3165 3230 504a37 InterlockedIncrement GetCurrentThread SetThreadPriority 3163->3230 3165->3162 3167 504bba CloseHandle 3165->3167 3175 504a85 3165->3175 3166->3162 3168 504bfd 3166->3168 3167->3161 3168->3161 3180 5047b7 3168->3180 3171 503672 GetProcAddress 3170->3171 3172 503664 LoadLibraryA 3170->3172 3173 503682 3171->3173 3174 503687 InternetGetConnectedState 3171->3174 3172->3171 3172->3173 3173->3162 3174->3162 3176 504a94 3175->3176 3177 504adf 3176->3177 3178 504a9a GetTickCount 3176->3178 3179 504ac1 GetProcessHeap HeapFree 3176->3179 3177->3165 3178->3176 3178->3179 3179->3176 3181 50486e 3180->3181 3182 5047d2 3180->3182 3181->3168 3182->3181 3183 50481c lstrcpyn lstrlen GetProcessHeap RtlAllocateHeap 3182->3183 3183->3181 3184 50484d lstrcpy CreateThread 3183->3184 3184->3181 3185 50477f GetCurrentThread SetThreadPriority 3184->3185 3186 504797 3185->3186 3187 5047ae RtlExitUserThread 3185->3187 3190 504708 memset 3186->3190 3198 507730 memset memset 3190->3198 3193 504741 memset 3222 507940 3193->3222 3196 504e00 57 API calls 3197 50477b GetProcessHeap HeapFree 3196->3197 3197->3187 3201 507763 3198->3201 3199 507771 lstrcpy 3203 5077fc 3199->3203 3201->3199 3202 50779a 3201->3202 3205 5077b0 lstrcat 3202->3205 3206 5077bb 3202->3206 3204 50781f wsprintfA 3203->3204 3207 507835 3204->3207 3205->3206 3208 5077f1 lstrcat 3206->3208 3209 5077cb lstrcat 3206->3209 3210 50784d wsprintfA 3207->3210 3211 50789f 3207->3211 3208->3203 3212 5077db 3209->3212 3221 50785f 3210->3221 3213 5078a7 wsprintfA 3211->3213 3214 5078df 3211->3214 3212->3208 3217 5077e6 lstrcat 3212->3217 3213->3221 3215 5078e7 wsprintfA 3214->3215 3216 50792f 3214->3216 3215->3221 3218 507937 wsprintfA 3216->3218 3217->3208 3220 504735 3218->3220 3219 507920 lstrlen 3219->3218 3220->3193 3220->3197 3221->3219 3221->3220 3223 507952 3222->3223 3224 507955 GetModuleHandleA 3222->3224 3223->3224 3225 507970 GetProcAddress 3224->3225 3226 507965 LoadLibraryA 3224->3226 3227 504763 3225->3227 3228 507985 3225->3228 3226->3225 3226->3227 3227->3196 3227->3197 3228->3227 3229 5079a0 lstrcpy 3228->3229 3229->3227 3231 504a66 3230->3231 3232 504a5c 3230->3232 3234 504a74 InterlockedDecrement 3231->3234 3235 504a7b RtlExitUserThread 3231->3235 3236 5049c5 3232->3236 3234->3235 3237 5049d9 3236->3237 3238 5049ea lstrcpyn 3237->3238 3243 504a28 3237->3243 3246 504971 3238->3246 3240 504a02 3240->3243 3260 506966 3240->3260 3243->3231 3245 504a1f GlobalFree 3245->3243 3306 504874 3246->3306 3248 50497c 3249 504981 3248->3249 3311 503ff8 3248->3311 3249->3240 3252 5049a2 3314 50489d 3252->3314 3253 504994 GetTickCount 3253->3252 3254 50499e 3253->3254 3254->3240 3257 504874 lstrcmpiA 3258 5049af 3257->3258 3258->3254 3322 50400c 3258->3322 3261 504a0f 3260->3261 3262 50697e lstrlen 3260->3262 3261->3243 3287 5071f8 3261->3287 3262->3261 3263 50698e memset 3262->3263 3264 5069af 3263->3264 3333 505a21 3264->3333 3266 5069f2 3336 505a45 3266->3336 3275 506a25 GlobalAlloc 3276 506a75 3275->3276 3277 506a57 3275->3277 3278 506a8a 3276->3278 3279 506a7d DeleteFileA 3276->3279 3407 5067c2 3277->3407 3278->3261 3281 506a8f GlobalFree 3278->3281 3279->3278 3281->3261 3282 506a64 3412 506895 lstrlen wsprintfA lstrlen wsprintfA lstrlen 3282->3412 3285 506a9c 3285->3261 3286 506aa4 DeleteFileA 3285->3286 3286->3261 3288 507253 3287->3288 3289 507208 3287->3289 3288->3245 3502 506b89 3289->3502 3291 50721e 3291->3288 3292 507258 lstrcpy 3291->3292 3293 507271 3292->3293 3296 507280 htons 3293->3296 3297 5072aa 3293->3297 3303 5072e8 3293->3303 3508 506b54 inet_addr 3293->3508 3295 5072fd lstrcpy 3295->3297 3512 506e01 3296->3512 3297->3295 3298 507367 3297->3298 3300 5072cd lstrcpy lstrcat 3297->3300 3301 506b54 2 API calls 3297->3301 3297->3303 3304 507328 htons 3297->3304 3541 507093 wsprintfA wsprintfA RegOpenKeyExA 3298->3541 3300->3297 3301->3297 3303->3245 3305 506e01 16 API calls 3304->3305 3305->3297 3307 50488f 3306->3307 3308 504895 3307->3308 3309 50487d lstrcmpiA 3307->3309 3308->3248 3309->3307 3310 504899 3309->3310 3310->3248 3326 503e35 GetModuleHandleA 3311->3326 3315 5048da GetProcessHeap RtlAllocateHeap 3314->3315 3318 5048af 3314->3318 3316 5048f4 3315->3316 3317 5048f9 memset lstrcpyn GetTickCount 3315->3317 3316->3257 3317->3316 3318->3315 3318->3316 3319 504936 GetTickCount 3318->3319 3320 50400c 2 API calls 3319->3320 3321 504953 lstrcpyn 3320->3321 3321->3316 3323 504014 3322->3323 3324 50402d 3322->3324 3325 504015 GetProcessHeap HeapFree 3323->3325 3324->3254 3325->3324 3325->3325 3327 503e56 GetProcAddress 3326->3327 3328 503e4b LoadLibraryA 3326->3328 3329 503e7a 3327->3329 3330 503e66 3327->3330 3328->3327 3328->3329 3329->3252 3329->3253 3330->3329 3331 503e98 GetProcessHeap RtlAllocateHeap 3330->3331 3331->3329 3332 503eae memset lstrcpyn 3331->3332 3332->3330 3334 505a27 lstrcpy 3333->3334 3334->3266 3337 505a60 3336->3337 3338 505b25 3336->3338 3340 505ab7 lstrcpy lstrcat 3337->3340 3338->3338 3339 505b61 3338->3339 3343 505bba lstrcpy 3338->3343 3341 505b95 lstrcat lstrcpy 3339->3341 3344 505ad1 3340->3344 3342 505bd2 3341->3342 3347 505bf9 strstr 3342->3347 3346 505a21 lstrcpy 3343->3346 3345 505af5 lstrcat lstrcat lstrcat lstrcpy lstrcat 3344->3345 3345->3342 3346->3342 3348 505c13 3347->3348 3352 505c6e 3347->3352 3349 505c26 3348->3349 3348->3352 3350 505c48 lstrcpy lstrcpy lstrcpy 3349->3350 3351 505dc3 3350->3351 3360 505dc7 3351->3360 3353 505d08 lstrcpy 3352->3353 3354 505c81 3352->3354 3353->3354 3355 505d63 lstrcpy wsprintfA 3354->3355 3356 505d99 3355->3356 3357 505db7 3356->3357 3358 505dbc CharUpperA 3356->3358 3359 505dac CharUpperBuffA 3356->3359 3357->3351 3357->3358 3358->3351 3359->3351 3367 505dd0 3360->3367 3361 505e98 lstrcpy 3362 505dde 3361->3362 3363 505ece 3362->3363 3364 505ed3 CharUpperA 3362->3364 3365 505ebd CharUpperBuffA 3362->3365 3363->3364 3366 505ee0 3363->3366 3364->3366 3365->3366 3368 505faf 3366->3368 3367->3361 3367->3362 3369 505fcb 3368->3369 3370 505ff0 GetModuleFileNameA 3369->3370 3371 506014 GetTempPathA 3369->3371 3421 505f2a GetTempPathA GetTempFileNameA CopyFileA 3370->3421 3373 506036 GetTempFileNameA GetModuleFileNameA CopyFileA 3371->3373 3381 50632b 3371->3381 3426 505ee3 CreateFileA 3373->3426 3374 50600e 3377 5062d0 CreateFileA 3374->3377 3384 50625d GetTempPathA GetTempFileNameA 3374->3384 3378 5062f7 3377->3378 3382 50631d 3377->3382 3379 5062fc GetFileSize CloseHandle 3378->3379 3378->3382 3379->3381 3379->3382 3380 5060b8 3385 5060e2 3380->3385 3386 5060ef lstrcpy lstrcat 3380->3386 3381->3261 3381->3275 3382->3381 3383 506339 DeleteFileA 3382->3383 3383->3381 3387 5057e6 27 API calls 3384->3387 3433 5057e6 CreateFileA 3385->3433 3393 50611c 3386->3393 3388 50629f 3387->3388 3389 5062b5 DeleteFileA lstrcpy 3388->3389 3390 5062a6 DeleteFileA 3388->3390 3389->3377 3390->3377 3394 50614f lstrcat 3393->3394 3396 50615d 3394->3396 3395 506219 DeleteFileA wsprintfA 3395->3374 3397 506185 lstrcat 3396->3397 3398 506172 lstrcat 3396->3398 3399 506198 3397->3399 3398->3397 3398->3398 3400 5061d7 lstrcat 3399->3400 3401 5061ac 3399->3401 3402 5061c1 lstrcat 3400->3402 3403 5061c8 lstrcat 3401->3403 3404 5061af 3401->3404 3402->3385 3403->3402 3404->3402 3405 5061b2 lstrcat 3404->3405 3405->3402 3408 5067de 3407->3408 3409 5067ea 8 API calls 3408->3409 3468 5032cb 3409->3468 3411 506869 lstrcat lstrlen wsprintfA lstrcat 3411->3282 3474 506518 3412->3474 3414 5068ea lstrcat 3415 5068fd 3414->3415 3416 506915 lstrlen wsprintfA lstrlen 3415->3416 3478 50666d CreateFileA 3416->3478 3419 506947 3419->3276 3419->3285 3420 50694c lstrlen wsprintfA 3420->3419 3422 505ee3 18 API calls 3421->3422 3423 505f87 3422->3423 3424 505f93 DeleteFileA 3423->3424 3425 505f9a lstrcpy 3423->3425 3424->3425 3425->3374 3427 505f07 3426->3427 3428 505f28 GetTempPathA GetTempFileNameA 3426->3428 3429 503697 6 API calls 3427->3429 3428->3380 3428->3381 3430 505f11 SetFilePointer 3429->3430 3449 50754a 3430->3449 3434 505a19 3433->3434 3435 50581c 3433->3435 3434->3383 3434->3395 3435->3434 3436 505824 CreateFileA 3435->3436 3437 505843 3436->3437 3438 505a14 3436->3438 3437->3438 3440 50584b memset memset memset 3437->3440 3439 505a07 CloseHandle 3438->3439 3439->3434 3457 505717 GetSystemTime 3440->3457 3444 5058b7 8 API calls 3445 50595b ReadFile 3444->3445 3446 50593c 3445->3446 3447 50597c 6 API calls 3445->3447 3446->3447 3448 505941 WriteFile 3446->3448 3447->3439 3448->3445 3450 5073e8 5 API calls 3449->3450 3451 507560 CreateFileA 3450->3451 3452 505f20 CloseHandle 3451->3452 3453 507588 3451->3453 3452->3428 3454 5075cd ReadFile 3453->3454 3455 5075a5 WriteFile 3454->3455 3456 5075d7 CloseHandle 3454->3456 3455->3454 3456->3452 3458 50574a 3457->3458 3459 505772 SetFilePointer 3458->3459 3460 5057b9 ReadFile 3459->3460 3461 5057d2 SetFilePointer 3460->3461 3463 50579c 3460->3463 3461->3444 3463->3460 3463->3461 3464 5056d5 3463->3464 3465 5056de 3464->3465 3467 5056e3 3464->3467 3466 50568c malloc 3465->3466 3466->3467 3467->3463 3469 5032e8 FileTimeToLocalFileTime FileTimeToSystemTime 3468->3469 3470 5032dc GetLocalTime 3468->3470 3471 503303 GetTimeZoneInformation 3469->3471 3470->3471 3472 503319 wsprintfA 3471->3472 3472->3411 3476 506521 3474->3476 3475 50652f 3475->3414 3476->3475 3485 50641f 3476->3485 3479 50669c 3478->3479 3483 5066a4 3478->3483 3479->3419 3479->3420 3480 5066bb ReadFile 3482 50677d 3480->3482 3480->3483 3481 5067ab CloseHandle 3481->3479 3482->3481 3483->3480 3484 506767 memset 3483->3484 3484->3483 3489 50642d 3485->3489 3486 506452 3486->3475 3488 506509 lstrlen 3488->3489 3489->3486 3490 50641f 7 API calls 3489->3490 3491 506346 3489->3491 3490->3489 3492 5063b1 3491->3492 3493 506351 3491->3493 3494 5063b6 3492->3494 3500 5063d3 3492->3500 3496 506381 lstrcpy 3493->3496 3499 506361 3493->3499 3494->3493 3495 5063bb 3494->3495 3497 5032cb GetLocalTime FileTimeToLocalFileTime FileTimeToSystemTime GetTimeZoneInformation wsprintfA 3495->3497 3495->3499 3496->3488 3498 5063c8 3497->3498 3498->3488 3499->3488 3501 506400 wsprintfA 3500->3501 3501->3499 3503 506c8e 3502->3503 3507 506ba1 3502->3507 3503->3291 3504 506c38 lstrlen 3505 506c4e lstrlen 3504->3505 3504->3507 3505->3507 3506 506c6d CharLowerA lstrcmpiA 3506->3503 3506->3507 3507->3503 3507->3504 3507->3506 3509 506b6c gethostbyname 3508->3509 3510 506b63 3508->3510 3511 506b77 3509->3511 3510->3509 3510->3511 3511->3293 3513 506b89 4 API calls 3512->3513 3514 506e25 3513->3514 3515 506b89 4 API calls 3514->3515 3518 506e82 3514->3518 3516 506e4d 3515->3516 3517 506e8a lstrcpy socket 3516->3517 3516->3518 3517->3518 3519 506eb8 connect 3517->3519 3518->3293 3520 50707a closesocket 3519->3520 3521 506ecd 3519->3521 3520->3518 3552 506d65 3521->3552 3525 506d65 5 API calls 3526 506f12 3525->3526 3527 506f39 3526->3527 3528 506d65 5 API calls 3526->3528 3527->3520 3529 506d65 5 API calls 3527->3529 3528->3527 3530 506f6e 3529->3530 3530->3520 3531 506d65 5 API calls 3530->3531 3532 506fa0 3531->3532 3532->3520 3533 506d65 5 API calls 3532->3533 3534 506fc1 3533->3534 3534->3520 3535 507042 send 3534->3535 3536 507017 send 3534->3536 3537 507028 send 3534->3537 3538 506d65 5 API calls 3535->3538 3536->3537 3537->3520 3537->3534 3539 50705b 3538->3539 3539->3520 3540 506d65 5 API calls 3539->3540 3540->3520 3542 507103 3541->3542 3543 5070fb 3541->3543 3544 5071d5 RegEnumKeyA 3542->3544 3548 5071bc RegCloseKey 3542->3548 3549 506b54 2 API calls 3542->3549 3550 50718f htons 3542->3550 3543->3303 3545 5071e2 RegCloseKey 3544->3545 3546 507123 RegOpenKeyExA 3544->3546 3545->3543 3546->3542 3547 507148 memset RegQueryValueExA 3546->3547 3547->3542 3547->3548 3548->3542 3548->3545 3549->3542 3551 506e01 16 API calls 3550->3551 3551->3542 3553 506d78 wvsprintfA lstrlen send 3552->3553 3554 506daa 3552->3554 3553->3554 3556 506dfb 3554->3556 3557 506ab8 3554->3557 3556->3520 3556->3525 3558 506acf 3557->3558 3559 506b41 3557->3559 3558->3559 3560 506b1c recv 3558->3560 3561 506adf select 3558->3561 3559->3554 3560->3558 3560->3559 3561->3559 3561->3560 3563 503119 FindWindowA 3562->3563 3564 5030fc PostMessageA PostMessageA PostMessageA 3562->3564 3563->3152 3564->3563 3565 50ed00 3568 50ed18 3565->3568 3566 50ee12 LoadLibraryA 3566->3568 3567 50ee57 3568->3566 3568->3567 3569 50ee3b GetProcAddress 3568->3569 3569->3568 3570 50ee51 ExitProcess 3569->3570 3579 503ef3 GetModuleHandleA 3580 503f11 LoadLibraryA 3579->3580 3581 503f0c 3579->3581 3582 503f18 3580->3582 3581->3580 3581->3582 3583 503ff1 3582->3583 3584 503f29 GetProcAddress 3582->3584 3584->3583 3585 503f3f GetProcessHeap RtlAllocateHeap 3584->3585 3586 503f63 3585->3586 3586->3583 3587 503fde GetProcessHeap HeapFree 3586->3587 3588 503f80 htons inet_addr 3586->3588 3589 503fa5 gethostbyname 3586->3589 3591 503dff 3586->3591 3587->3583 3588->3586 3588->3589 3589->3586 3592 503e06 3591->3592 3594 503e30 3592->3594 3595 503e22 Sleep 3592->3595 3596 503b7c GetProcessHeap RtlAllocateHeap 3592->3596 3594->3586 3595->3592 3595->3594 3597 503bb3 socket 3596->3597 3598 503bac 3596->3598 3599 503de7 GetProcessHeap HeapFree 3597->3599 3600 503bce 3597->3600 3598->3592 3599->3598 3600->3599 3614 503bd7 3600->3614 3601 503bf5 htons 3616 503819 memset GetTickCount htons 3601->3616 3603 503c1b select 3605 503c4d memset recv 3603->3605 3603->3614 3604 503db8 3606 503dc7 GetProcessHeap HeapFree closesocket 3604->3606 3605->3614 3606->3598 3607 503c7d htons 3607->3604 3607->3614 3608 503c9e htons 3608->3604 3608->3614 3611 503d08 GetProcessHeap RtlAllocateHeap 3612 503d23 memset htons 3611->3612 3611->3614 3629 503983 3612->3629 3614->3601 3614->3603 3614->3604 3614->3606 3614->3607 3614->3608 3614->3611 3615 503d61 GetProcessHeap HeapFree 3614->3615 3619 503a35 3614->3619 3633 503a16 3614->3633 3615->3614 3617 5038d7 htons htons sendto 3616->3617 3618 503881 3616->3618 3617->3614 3618->3617 3620 503a56 3619->3620 3621 503a4f 3619->3621 3637 50392a htons 3620->3637 3621->3614 3623 503aa2 memset 3624 503983 htons 3623->3624 3628 503a66 3624->3628 3625 503ad8 htons htons htons 3625->3621 3626 503b13 GetProcessHeap RtlAllocateHeap 3625->3626 3626->3621 3627 503b31 memset 3626->3627 3627->3628 3628->3621 3628->3623 3628->3625 3630 5039f5 3629->3630 3631 50399b 3629->3631 3630->3614 3631->3630 3632 5039d5 htons 3631->3632 3632->3630 3632->3631 3634 503a33 3633->3634 3635 503a1a 3633->3635 3634->3614 3636 503a1b GetProcessHeap HeapFree 3635->3636 3636->3634 3636->3636 3638 503948 3637->3638 3639 50397d 3637->3639 3638->3639 3640 50396e htons 3638->3640 3639->3628 3640->3638 3640->3639 3571 5011c9 3572 5011e3 3571->3572 3573 502d0f RegOpenKeyExA 3572->3573 3575 502d3a 3572->3575 3573->3572 3574 502d83 RegCloseKey 3573->3574 3576 502d7e 3574->3576 3575->3576 3577 502d43 RegCreateKeyExA 3575->3577 3577->3575 3578 502d6c RegCloseKey 3577->3578 3578->3575

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 6 5052ad-5052bd 7 5052cb-5052cd 6->7 8 5052bf-5052c4 6->8 10 5052ce-5052d1 7->10 8->7 9 5052c6-5052c9 8->9 9->7 11 5052dd-5052e3 9->11 12 5052d2-5052d7 Sleep 11->12 13 5052e5-50530e lstrcpy lstrlen 11->13 12->11 14 505310-50531c lstrcat 13->14 15 505322-505349 lstrcat memset 13->15 14->15 16 50534c-505356 15->16 17 505358-50536b FindFirstFileA 16->17 18 50537b-505386 FindNextFileA 16->18 19 505370-505373 17->19 20 50536d 17->20 21 505438-50543b FindClose 18->21 22 50538c-505393 18->22 23 505441-505444 19->23 24 505379 19->24 20->19 21->23 25 5053b0-5053cd lstrcpy lstrlen 22->25 26 505395-50539c 22->26 23->10 24->22 28 5053e1-5053fc lstrcat 25->28 29 5053cf-5053db lstrcat 25->29 26->16 27 50539e-5053a5 26->27 27->25 32 5053a7-5053ae 27->32 30 50541e-50542b call 505131 28->30 31 5053fe-505412 Sleep call 5052ad 28->31 29->28 36 505430-505433 30->36 35 505417-505419 31->35 32->16 32->25 35->16 36->16
                                      APIs
                                      • Sleep.KERNEL32(00000800,75568A60,00000184), ref: 005052D7
                                      • lstrcpy.KERNEL32(?,?), ref: 005052F4
                                      • lstrlen.KERNEL32(?), ref: 00505304
                                      • lstrcat.KERNEL32(?,00501190), ref: 0050531C
                                      • lstrcat.KERNEL32(?,*.*), ref: 0050532E
                                      • memset.MSVCRT ref: 00505341
                                      • FindFirstFileA.KERNELBASE(?,00000010), ref: 0050535F
                                      • FindNextFileA.KERNELBASE(?,?), ref: 0050537E
                                      • lstrcpy.KERNEL32(?,?), ref: 005053BA
                                      • lstrlen.KERNEL32(?), ref: 005053C3
                                      • lstrcat.KERNEL32(?,00501190), ref: 005053DB
                                      • lstrcat.KERNEL32(?,0000002E), ref: 005053EF
                                      • Sleep.KERNELBASE(0000004B), ref: 00505400
                                      • FindClose.KERNELBASE(?), ref: 0050543B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$Find$FileSleeplstrcpylstrlen$CloseFirstNextmemset
                                      • String ID: *.*$.$.
                                      • API String ID: 56755240-1892373925
                                      • Opcode ID: 4a0de44cde8d01dfa769ae8b9abc51166f6d7055e572fb8d163d85066ff3cfd8
                                      • Instruction ID: dd7eaa64cc3021d8f9cf9a778dce5b9b88d54ccfb1cc30c989f9fa4e0a5d9972
                                      • Opcode Fuzzy Hash: 4a0de44cde8d01dfa769ae8b9abc51166f6d7055e572fb8d163d85066ff3cfd8
                                      • Instruction Fuzzy Hash: 3B417B71C40A5DEBDF219BA0DC4DBDEBF7CBB05301F1084A2E645A2090E7749A89DF95
                                      APIs
                                      • RegOpenKeyExA.KERNELBASE(?,Software\Microsoft\Daemon,00000000,00020019,?), ref: 00502D27
                                      • RegCreateKeyExA.ADVAPI32(00000002,00000053,00000000,00000000,00000000,00020006,00000000,?,?), ref: 00502D62
                                      • RegCloseKey.ADVAPI32(?), ref: 00502D6F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseCreateOpen
                                      • String ID: "%s"$"%s"$"%s"$%P$1&lo$Software\Microsoft\Daemon$UTF-$fp-t$mss&
                                      • API String ID: 199004384-1742729895
                                      • Opcode ID: 54c313d72eed5809ea717c3aaa2ef99b5af84961543d7f94290a47e14dd327ee
                                      • Instruction ID: 5ddebe979ae4482ff55674c5fd03efcc6dad104ab151d763a66a24a0e48becba
                                      • Opcode Fuzzy Hash: 54c313d72eed5809ea717c3aaa2ef99b5af84961543d7f94290a47e14dd327ee
                                      • Instruction Fuzzy Hash: 3A13CA6284DBD54ECB278B704A6E26D7FA5BB23310B1D49CEC8818B1F3D2589905D36F

                                      Control-flow Graph

                                      APIs
                                      • RegOpenKeyExA.KERNELBASE(80000001,?,00000000,00020019,?,75570F00), ref: 005050BE
                                      • memset.MSVCRT ref: 005050D5
                                      • RegQueryValueExA.KERNELBASE(?,00000000,00000000,00000000,?,?), ref: 005050F5
                                      • RegCloseKey.KERNELBASE(?), ref: 005050FE
                                        • Part of subcall function 00504EEA: CreateFileA.KERNEL32(00000020,80000000,00000003,00000000,00000003,00000080,00000000,75570F10,00000000), ref: 00504F0C
                                        • Part of subcall function 00504EEA: GetFileSize.KERNEL32(00000000,00000000), ref: 00504F2A
                                        • Part of subcall function 00504EEA: CreateFileMappingA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000000), ref: 00504F3A
                                        • Part of subcall function 00504EEA: MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000,00000000), ref: 00504F5B
                                        • Part of subcall function 00504EEA: CloseHandle.KERNEL32(?), ref: 00504FD5
                                        • Part of subcall function 00504EEA: CloseHandle.KERNEL32(?), ref: 00504FDF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$Close$CreateHandle$MappingOpenQuerySizeValueViewmemset
                                      • String ID: $ $4$A$A$B$B$F$M$N$S$W$W$W$\$\$\$\$a$a$a$b$c$e$e$e$f$f$i$i$l$m$o$o$o$r$r$s$t$t$w
                                      • API String ID: 1447734293-2356155605
                                      • Opcode ID: d70b678158a2ddeabdc93fb81de4d72fe2e86aa731343c368a4f6e47c38d2075
                                      • Instruction ID: d5002688ff9bd9582a131d6a7ee4c8a73c9f60058928140604e211d2a98eee7b
                                      • Opcode Fuzzy Hash: d70b678158a2ddeabdc93fb81de4d72fe2e86aa731343c368a4f6e47c38d2075
                                      • Instruction Fuzzy Hash: 5141F050D082CDDDFB02C6A8D948BDEBFB55B26748F0840D8D5847A282D3FB1658C77A

                                      Control-flow Graph

                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00502E8E
                                      • lstrcpy.KERNEL32(.exe,?), ref: 00502EAB
                                      • GetWindowsDirectoryA.KERNEL32(?,00000118), ref: 00502EC7
                                      • GetTempPathA.KERNEL32(00000118,?), ref: 00502ED5
                                      • lstrlen.KERNEL32(?), ref: 00502EEE
                                      • lstrcat.KERNEL32(?,00501190), ref: 00502F0D
                                      • lstrcat.KERNEL32(?,java.exe), ref: 00502F1A
                                      • SetFileAttributesA.KERNELBASE(?,00000020), ref: 00502F25
                                      • CreateFileA.KERNELBASE(?,40000000,00000003,00000000,00000002,00000080,00000000), ref: 00502F42
                                      • CloseHandle.KERNEL32(00000000), ref: 00502F52
                                      • DeleteFileA.KERNEL32(?), ref: 00502F5F
                                      • CopyFileA.KERNEL32(?,?,00000000), ref: 00502F74
                                      • GetFileAttributesA.KERNELBASE(?), ref: 00502F85
                                      • lstrcpy.KERNEL32(?,?), ref: 00502FA9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$Attributeslstrcatlstrcpy$CloseCopyCreateDeleteDirectoryHandleModuleNamePathTempWindowslstrlen
                                      • String ID: .exe$java.exe
                                      • API String ID: 3096175462-2602780958
                                      • Opcode ID: 473512d9f1244c06d08cbd740965cc33da0b9b43a2f3904d5a041e8f1c7c422d
                                      • Instruction ID: dece3f8ae99a5382c4877d1b044eea6b25dfa7d2f7fe03871ebba1afd8658fdb
                                      • Opcode Fuzzy Hash: 473512d9f1244c06d08cbd740965cc33da0b9b43a2f3904d5a041e8f1c7c422d
                                      • Instruction Fuzzy Hash: 72416A7190429DAFEB10DBA4DC8DBDEBFBCAB18354F104096F585E6090DB749AC8CB21

                                      Control-flow Graph

                                      APIs
                                        • Part of subcall function 0050746B: GetModuleFileNameA.KERNEL32(00000000,?,00000100,00000000,?), ref: 00507487
                                        • Part of subcall function 0050746B: CreateFileA.KERNELBASE(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 005074AA
                                        • Part of subcall function 0050746B: CreateFileA.KERNELBASE(?,C0000000,00000003,00000000,00000002,00000080,00000000), ref: 005074DC
                                        • Part of subcall function 0050746B: SetFilePointer.KERNELBASE(?,00000000,00000000,00000000), ref: 005074F5
                                        • Part of subcall function 0050746B: ReadFile.KERNELBASE(?,?,00000100,?,00000000), ref: 0050752E
                                        • Part of subcall function 0050746B: FindCloseChangeNotification.KERNELBASE(00000000), ref: 0050753E
                                        • Part of subcall function 0050746B: CloseHandle.KERNEL32(?), ref: 00507543
                                      • GetWindowsDirectoryA.KERNEL32(?,00000100,00000000,?), ref: 0050761F
                                        • Part of subcall function 0050737C: WriteFile.KERNELBASE(00000000,?,00000001,?,00000000,00000000,75568A60), ref: 005073BD
                                        • Part of subcall function 0050737C: WriteFile.KERNEL32(00000000,?,00000001,?,00000000,00000000,75568A60), ref: 005073E2
                                      • GetTempPathA.KERNEL32(00000100,?,00000000,?), ref: 0050762D
                                      • lstrcat.KERNEL32(?,services), ref: 00507677
                                      • lstrcat.KERNEL32(?,00501830), ref: 00507685
                                      • lstrcat.KERNEL32(?,exe), ref: 00507693
                                      • CreateFileA.KERNELBASE(?,C0000000,00000003,00000000,00000002,00000080,00000000), ref: 005076AC
                                      • FindCloseChangeNotification.KERNELBASE(00000000), ref: 005076D0
                                      • wsprintfA.USER32 ref: 005076E9
                                      • memset.MSVCRT ref: 005076F8
                                      • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000001,00000000,00000000,00000000,?,?), ref: 00507725
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$Create$Closelstrcat$ChangeFindNotificationWrite$DirectoryHandleModuleNamePathPointerProcessReadTempWindowsmemsetwsprintf
                                      • String ID: "%s"$\$exe$services
                                      • API String ID: 1621132550-3764781487
                                      • Opcode ID: 4e5a91acdd77911c355f3c749416d69306de053efc37594798bdc49c714c615a
                                      • Instruction ID: 5cab7ea6ea662128e4a800645ff2ec6955619924f35eec1abec093929e757c50
                                      • Opcode Fuzzy Hash: 4e5a91acdd77911c355f3c749416d69306de053efc37594798bdc49c714c615a
                                      • Instruction Fuzzy Hash: 6D3184B1D04A9CEAEB109BA49C8DFEE7F7CFB48341F1004A1F245E61C1D6705E898A65

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 909 505449-5054fe 910 505503-50551f memset 909->910 911 505521-505527 GetWindowsDirectoryA 910->911 912 505529-50552e GetEnvironmentVariableA 910->912 913 505534-50553a 911->913 912->913 914 5055a2-5055a9 913->914 915 50553c-505554 lstrlen 913->915 914->910 918 5055af-5055b3 914->918 916 505564-505568 915->916 917 505556-505562 lstrcat 915->917 919 505585-50559b lstrcat call 5052ad 916->919 920 50556a-505583 lstrcat * 2 916->920 917->916 922 5055a0-5055a1 919->922 920->919 922->914
                                      APIs
                                      • memset.MSVCRT ref: 0050550C
                                      • GetWindowsDirectoryA.KERNEL32(?,00000184,00000000,75570F10,75570F00), ref: 00505521
                                      • GetEnvironmentVariableA.KERNEL32(USERPROFILE,?,00000184,00000000,75570F10,75570F00), ref: 0050552E
                                      • lstrlen.KERNEL32(?), ref: 00505543
                                      • lstrcat.KERNEL32(?,00501190), ref: 00505562
                                      • lstrcat.KERNEL32(?,Local Settings), ref: 00505575
                                      • lstrcat.KERNEL32(?,00501190), ref: 00505583
                                      • lstrcat.KERNEL32(?,Temporary Internet Files), ref: 00505590
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$DirectoryEnvironmentVariableWindowslstrlenmemset
                                      • String ID: Local Settings$Temporary Internet Files$USERPROFILE
                                      • API String ID: 527352983-4053592351
                                      • Opcode ID: d89d942958c9cba20cc904a98748bb533d06aa26e497641e0aaf6626ffe246d0
                                      • Instruction ID: cacbc361b4096883e695f9cd27b791d52763dfaa7485a7004b5a6053e68340e0
                                      • Opcode Fuzzy Hash: d89d942958c9cba20cc904a98748bb533d06aa26e497641e0aaf6626ffe246d0
                                      • Instruction Fuzzy Hash: 63410C61C083CCDAEB11D7A8D9087DEBFB95F26348F0840D9D18476282D7BA5758CB76

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 923 504e00-504e21 GetProcessHeap RtlAllocateHeap 924 504e23-504e26 923->924 925 504e2b-504e4a CreateFileA 923->925 926 504ee7-504ee9 924->926 927 504ed0-504ed2 925->927 928 504e50-504e53 925->928 930 504ed3-504ee6 GetProcessHeap RtlFreeHeap 927->930 928->927 929 504e55-504e71 928->929 931 504eb6-504ec0 ReadFile 929->931 930->926 932 504ec2-504ece FindCloseChangeNotification 931->932 933 504e73-504e75 931->933 932->930 934 504e77-504e79 933->934 935 504e7c-504e9f call 504c29 call 504d0c 933->935 934->935 940 504ea1-504ea8 935->940 941 504eaa-504eb3 935->941 940->932 940->941 941->931
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00008010,?,?,?,0TP,00505299,0TP,?,?,00505430,?), ref: 00504E0F
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00504E16
                                      • CreateFileA.KERNELBASE(00505299,80000000,00000003,00000000,00000003,00000080,00000000,00000010,?,?,0TP,00505299,0TP,?,?,00505430), ref: 00504E3F
                                      • ReadFile.KERNELBASE(00000000,00505299,00008000,?,00000000,00000001,?,?,0TP,00505299,0TP,?,?,00505430,?), ref: 00504EB9
                                      • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,0TP,00505299,0TP,?,?,00505430,?), ref: 00504EC5
                                      • GetProcessHeap.KERNEL32(00000000,00505299,?,?,0TP,00505299,0TP,?,?,00505430,?), ref: 00504ED7
                                      • RtlFreeHeap.NTDLL(00000000,?,?,0TP,00505299,0TP,?,?,00505430,?), ref: 00504EDE
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$FileProcess$AllocateChangeCloseCreateFindFreeNotificationRead
                                      • String ID: 0TP
                                      • API String ID: 3486390565-1855386918
                                      • Opcode ID: 428cdfe4e4e56a777748bbb5e178a34146adc0e2ef22d4898716c37ae4cd4343
                                      • Instruction ID: cde6f649d8a6e970d913e8d6152b8159acc1393c7919c2b618bcbc601deb3034
                                      • Opcode Fuzzy Hash: 428cdfe4e4e56a777748bbb5e178a34146adc0e2ef22d4898716c37ae4cd4343
                                      • Instruction Fuzzy Hash: 8A216BB5D00208FBDF119FA4DD48AAEBFBDFB04394F204469F642A2190D3304E54AF66

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 942 502d8e-502ddb memset gethostname lstrcat 943 502e0b-502e4f lstrcat * 2 CreateMutexA GetLastError 942->943 944 502ddd 942->944 945 502dde-502dec 944->945 946 502dee-502df0 945->946 947 502dff-502e08 945->947 946->947 948 502df2-502dfd 946->948 947->945 949 502e0a 947->949 948->947 949->943
                                      APIs
                                      • memset.MSVCRT ref: 00502DA8
                                      • gethostname.WS2_32(?,00000100), ref: 00502DB8
                                      • lstrcat.KERNEL32(?,root), ref: 00502DD0
                                      • lstrcat.KERNEL32(00000000,00000000), ref: 00502E19
                                      • lstrcat.KERNEL32(00000000,00000000), ref: 00502E29
                                      • CreateMutexA.KERNELBASE(00000000,00000001,00000000), ref: 00502E36
                                      • GetLastError.KERNEL32 ref: 00502E3C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$CreateErrorLastMutexgethostnamememset
                                      • String ID: root
                                      • API String ID: 3016363891-385153371
                                      • Opcode ID: 8a72bc0ed65294613998b6506ccfb39ae7e57c9a2bb16a50c2e50e91b418762a
                                      • Instruction ID: f5e5deb4a2873d9f3c4a82aa4f30ac048af43ff210c46692099915afef873f95
                                      • Opcode Fuzzy Hash: 8a72bc0ed65294613998b6506ccfb39ae7e57c9a2bb16a50c2e50e91b418762a
                                      • Instruction Fuzzy Hash: 1511E67794025C6BDB229B74EC49FEE3B6CBB69300F0401D6E585E20C1D6B49ACB8B65

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 950 502fb0-5030ab RegOpenKeyExA 951 5030c2-5030e5 lstrlen RegSetValueExA RegCloseKey 950->951 952 5030ad-5030c0 RegOpenKeyExA 950->952 953 5030eb-5030ef 951->953 952->951 952->953
                                      APIs
                                      • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,00020006,?), ref: 005030A7
                                      • RegOpenKeyExA.ADVAPI32(80000001,Software\Microsoft\Windows\CurrentVersion\Run,00000000,00020006,?), ref: 005030BC
                                      • lstrlen.KERNEL32(00000052), ref: 005030C9
                                      • RegSetValueExA.KERNELBASE(?,JavaVM,00000000,00000001,00000052,00000001), ref: 005030DC
                                      • RegCloseKey.KERNELBASE(?), ref: 005030E5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Open$CloseValuelstrlen
                                      • String ID: JavaVM$Software\Microsoft\Windows\CurrentVersion\Run
                                      • API String ID: 1812710942-1525231178
                                      • Opcode ID: e7c4ab6b2f41031e5725f1ab95989c2709ffec37f0edb752e120a5812798a4be
                                      • Instruction ID: cd70c8d2d714d64a17d00ab414c80a8edff05e1f62e6019a642830455d294362
                                      • Opcode Fuzzy Hash: e7c4ab6b2f41031e5725f1ab95989c2709ffec37f0edb752e120a5812798a4be
                                      • Instruction Fuzzy Hash: 6241BC10D0C2C9EDFB02C2A8D8487DEBFB65B26748F084099D5847A292C2FF1658C77A

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 954 503697-5036ce SetFilePointer ReadFile 955 5036d4-5036e1 SetFilePointer 954->955 956 503776 954->956 955->956 958 5036e7-5036fb ReadFile 955->958 957 503778-50377c 956->957 958->956 959 5036fd-50370f 958->959 959->956 960 503711-503715 959->960 960->956 961 503717-50371c 960->961 961->956 962 50371e-50373d SetFilePointer 961->962 963 503772-503774 962->963 964 50373f-503756 ReadFile 962->964 963->957 964->956 965 503758-503762 964->965 966 503764 965->966 967 503766-503770 965->967 966->967 967->963 967->964
                                      APIs
                                      • SetFilePointer.KERNELBASE(00000000,0000003C,00000000,00000000,00000100,00000000,75573130), ref: 005036AF
                                      • ReadFile.KERNELBASE(00000000,00000000,00000004,?,00000000), ref: 005036C8
                                      • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000), ref: 005036DC
                                      • ReadFile.KERNELBASE(00000000,?,00000016,00000004,00000000), ref: 005036F5
                                      • SetFilePointer.KERNELBASE(00000000,00000018,00000000,00000000), ref: 00503732
                                      • ReadFile.KERNEL32(00000000,?,00000028,00000500,00000000), ref: 00503750
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$PointerRead
                                      • String ID: (
                                      • API String ID: 3154509469-3887548279
                                      • Opcode ID: 8d052d63ba2457e03fe9d7e8e13cec42e15aac050f382052b2be9159c5306ec8
                                      • Instruction ID: f73d0bf622d8b4d7441a19c50e1fac5286902f701a87a8b44225c7f7ee392bb3
                                      • Opcode Fuzzy Hash: 8d052d63ba2457e03fe9d7e8e13cec42e15aac050f382052b2be9159c5306ec8
                                      • Instruction Fuzzy Hash: 8C3106B6901118FBDF21DF95CE849EEBFBDFF04790F108065E905A2190E6319B81DBA0

                                      Control-flow Graph

                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000100,00000000,?), ref: 00507487
                                      • CreateFileA.KERNELBASE(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 005074AA
                                        • Part of subcall function 005073E8: GetTempPathA.KERNEL32(00000104,?), ref: 005073FD
                                        • Part of subcall function 005073E8: lstrlen.KERNEL32(?), ref: 0050740A
                                        • Part of subcall function 005073E8: lstrcat.KERNEL32(?,zincite), ref: 00507448
                                        • Part of subcall function 005073E8: lstrcat.KERNEL32(?,.log), ref: 00507456
                                        • Part of subcall function 005073E8: lstrcpy.KERNEL32(?,?), ref: 00507462
                                      • CreateFileA.KERNELBASE(?,C0000000,00000003,00000000,00000002,00000080,00000000), ref: 005074DC
                                        • Part of subcall function 00503697: SetFilePointer.KERNELBASE(00000000,0000003C,00000000,00000000,00000100,00000000,75573130), ref: 005036AF
                                        • Part of subcall function 00503697: ReadFile.KERNELBASE(00000000,00000000,00000004,?,00000000), ref: 005036C8
                                        • Part of subcall function 00503697: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000), ref: 005036DC
                                        • Part of subcall function 00503697: ReadFile.KERNELBASE(00000000,?,00000016,00000004,00000000), ref: 005036F5
                                        • Part of subcall function 00503697: SetFilePointer.KERNELBASE(00000000,00000018,00000000,00000000), ref: 00503732
                                        • Part of subcall function 00503697: ReadFile.KERNEL32(00000000,?,00000028,00000500,00000000), ref: 00503750
                                      • SetFilePointer.KERNELBASE(?,00000000,00000000,00000000), ref: 005074F5
                                      • WriteFile.KERNELBASE(00000000,?,?,?,00000000), ref: 00507515
                                      • ReadFile.KERNELBASE(?,?,00000100,?,00000000), ref: 0050752E
                                      • FindCloseChangeNotification.KERNELBASE(00000000), ref: 0050753E
                                      • CloseHandle.KERNEL32(?), ref: 00507543
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$PointerRead$CloseCreatelstrcat$ChangeFindHandleModuleNameNotificationPathTempWritelstrcpylstrlen
                                      • String ID:
                                      • API String ID: 3217969230-0
                                      • Opcode ID: 945720a1fce9431e2360ffcd8314ee30a754bd9a45bede0f71f403d5586aa745
                                      • Instruction ID: 3ee29f7f2fe5b884bcaff3a16fbbd882d52692b313de89af8fed5149c55411fd
                                      • Opcode Fuzzy Hash: 945720a1fce9431e2360ffcd8314ee30a754bd9a45bede0f71f403d5586aa745
                                      • Instruction Fuzzy Hash: 1521F875D00128BBDB219BA1DC48FDEBF7CEF15360F104292B654A2090D6706B84DFA4

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 979 5055b4-505605 memset GetWindowsDirectoryA lstrcpy call 5052ad 981 50560a-505612 979->981 982 505613-505619 981->982 983 505648-505655 982->983 984 50561b-50562b GetDriveTypeA 982->984 983->982 985 505657-50565a 983->985 984->983 986 50562d-505647 Sleep call 5052ad 984->986 986->983
                                      APIs
                                      • memset.MSVCRT ref: 005055CE
                                      • GetWindowsDirectoryA.KERNEL32(?,00000104,?,75570F10,75570F00), ref: 005055DE
                                      • lstrcpy.KERNEL32(?,00501888), ref: 005055F6
                                      • GetDriveTypeA.KERNEL32(00000043,?,75570F10,75570F00), ref: 00505622
                                      • Sleep.KERNEL32(00001194,?,75570F10,75570F00), ref: 00505632
                                        • Part of subcall function 005052AD: Sleep.KERNEL32(00000800,75568A60,00000184), ref: 005052D7
                                        • Part of subcall function 005052AD: lstrcpy.KERNEL32(?,?), ref: 005052F4
                                        • Part of subcall function 005052AD: lstrlen.KERNEL32(?), ref: 00505304
                                        • Part of subcall function 005052AD: lstrcat.KERNEL32(?,00501190), ref: 0050531C
                                        • Part of subcall function 005052AD: lstrcat.KERNEL32(?,*.*), ref: 0050532E
                                        • Part of subcall function 005052AD: memset.MSVCRT ref: 00505341
                                        • Part of subcall function 005052AD: FindFirstFileA.KERNELBASE(?,00000010), ref: 0050535F
                                        • Part of subcall function 005052AD: FindNextFileA.KERNELBASE(?,?), ref: 0050537E
                                        • Part of subcall function 005052AD: lstrcpy.KERNEL32(?,?), ref: 005053BA
                                        • Part of subcall function 005052AD: lstrlen.KERNEL32(?), ref: 005053C3
                                        • Part of subcall function 005052AD: lstrcat.KERNEL32(?,00501190), ref: 005053DB
                                        • Part of subcall function 005052AD: lstrcat.KERNEL32(?,0000002E), ref: 005053EF
                                        • Part of subcall function 005052AD: Sleep.KERNELBASE(0000004B), ref: 00505400
                                        • Part of subcall function 005052AD: FindClose.KERNELBASE(?), ref: 0050543B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$FindSleeplstrcpy$Filelstrlenmemset$CloseDirectoryDriveFirstNextTypeWindows
                                      • String ID: Z
                                      • API String ID: 798667630-1505515367
                                      • Opcode ID: c6931e2ca908d11bfe10dd74d10df2d0473876e0ea701a3d5757cf76e3dc8de0
                                      • Instruction ID: c2197e004829da8253717f8257516700dd35be32272eb9ca971d862e6122c766
                                      • Opcode Fuzzy Hash: c6931e2ca908d11bfe10dd74d10df2d0473876e0ea701a3d5757cf76e3dc8de0
                                      • Instruction Fuzzy Hash: B5016DB5D046AA6BDB2093609D89BDE7B6CAB21314F0404D1E389E20C1E6B49AC88F55

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 989 503620-503662 GetModuleHandleA 990 503672-503680 GetProcAddress 989->990 991 503664-503670 LoadLibraryA 989->991 992 503682-503686 990->992 993 503687-503696 InternetGetConnectedState 990->993 991->990 991->992
                                      APIs
                                      • GetModuleHandleA.KERNEL32(?), ref: 0050365A
                                      • LoadLibraryA.KERNELBASE(wininet.dll), ref: 00503668
                                      • GetProcAddress.KERNEL32(00000000,InternetGetConnectedState), ref: 00503678
                                      • InternetGetConnectedState.WININET(?,00000000), ref: 0050368D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressConnectedHandleInternetLibraryLoadModuleProcState
                                      • String ID: InternetGetConnectedState$wininet.dll
                                      • API String ID: 1505668628-596207600
                                      • Opcode ID: 383ecea641d6cbcfcb23eacf179140b95e1886bb47d9fb192bb945b850ba0d9a
                                      • Instruction ID: 2b294e7ad4bcb9401aef01a1c95623af15c32a98deb04781e5990a6f2b8114d4
                                      • Opcode Fuzzy Hash: 383ecea641d6cbcfcb23eacf179140b95e1886bb47d9fb192bb945b850ba0d9a
                                      • Instruction Fuzzy Hash: 5F011620A083C9E9EF11D7F8D81DBAD7FA91B21748F0485D89185E61C1D7BB8358C776

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 994 502c90-502d0a 997 502d0f-502d2f RegOpenKeyExA 994->997 998 502d31-502d38 997->998 999 502d83-502d8c RegCloseKey 997->999 998->997 1000 502d3a-502d40 998->1000 1001 502d7e-502d82 999->1001 1002 502d43-502d6a RegCreateKeyExA 1000->1002 1003 502d75-502d7c 1002->1003 1004 502d6c-502d6f RegCloseKey 1002->1004 1003->1001 1003->1002 1004->1003
                                      APIs
                                      • RegOpenKeyExA.KERNELBASE(?,Software\Microsoft\Daemon,00000000,00020019,?), ref: 00502D27
                                      • RegCreateKeyExA.ADVAPI32(00000002,00000053,00000000,00000000,00000000,00020006,00000000,?,?), ref: 00502D62
                                      • RegCloseKey.ADVAPI32(?), ref: 00502D6F
                                      • RegCloseKey.ADVAPI32(?), ref: 00502D86
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Close$CreateOpen
                                      • String ID: Software\Microsoft\Daemon
                                      • API String ID: 1299239824-1912283813
                                      • Opcode ID: dca647fb5f665cc76b449c390acf53b1ca5190e4f5961b617e44826d8c6e7f19
                                      • Instruction ID: a7eee4beb99658644a23fa6dbb2239ba827f2e479c7b42f201d4ea8a8906cff2
                                      • Opcode Fuzzy Hash: dca647fb5f665cc76b449c390acf53b1ca5190e4f5961b617e44826d8c6e7f19
                                      • Instruction Fuzzy Hash: 033168519082CDEDEF02C7A8C94C7DEBFB95F22748F084099D584BA182D3BA4B58C776

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1005 505131-50513b 1006 505141-505149 1005->1006 1007 5052ab-5052ac 1005->1007 1008 505167-50516c 1006->1008 1009 50514b-505150 1006->1009 1012 50518c-505198 1008->1012 1010 505152-505157 1009->1010 1011 505163-505165 1009->1011 1013 505159 1010->1013 1014 50515b-505161 1010->1014 1011->1008 1015 50516e-505189 lstrcpyn CharLowerA 1011->1015 1016 5051a4-5051a9 1012->1016 1017 50519a-50519f 1012->1017 1013->1014 1014->1009 1014->1011 1015->1012 1019 5051ab-5051ae 1016->1019 1020 5051bd-5051c2 1016->1020 1018 50525f-505266 1017->1018 1021 505271-505274 1018->1021 1022 505268-50526d 1018->1022 1019->1018 1023 5051b4-5051b7 1019->1023 1024 5051c4-5051c7 1020->1024 1025 5051de-5051e0 1020->1025 1029 505276 1021->1029 1030 5052a9-5052aa 1021->1030 1022->1021 1028 50526f 1022->1028 1023->1018 1023->1020 1031 5051d3-5051d6 1024->1031 1032 5051c9-5051ce 1024->1032 1026 5051e2-5051e5 1025->1026 1027 5051e7-5051e9 1025->1027 1026->1018 1026->1027 1035 5051f5-5051f7 1027->1035 1036 5051eb-5051ee 1027->1036 1028->1021 1037 505283-50528a 1029->1037 1030->1007 1033 5051d8-5051da 1031->1033 1034 50521f-505224 1031->1034 1032->1018 1033->1034 1040 5051dc 1033->1040 1041 505226-505229 1034->1041 1042 505237-50523e 1034->1042 1045 505203-505205 1035->1045 1046 5051f9-5051fc 1035->1046 1043 5051f0-5051f3 1036->1043 1044 505207-50520a 1036->1044 1038 505278-50527d Sleep 1037->1038 1039 50528c-50528f 1037->1039 1038->1037 1047 505291-505294 call 504e00 1039->1047 1048 50529b-50529e 1039->1048 1049 505230-505235 1040->1049 1041->1042 1050 50522b-50522e 1041->1050 1042->1030 1051 505240-505251 call 5033b4 1042->1051 1043->1018 1043->1035 1044->1034 1054 50520c-50520f 1044->1054 1045->1044 1053 505211-505213 1045->1053 1046->1034 1052 5051fe-505201 1046->1052 1059 505299 1047->1059 1048->1030 1056 5052a0-5052a3 call 504eea 1048->1056 1049->1018 1050->1042 1050->1049 1051->1030 1064 505253-50525c 1051->1064 1052->1018 1052->1045 1053->1034 1058 505215-505218 1053->1058 1054->1018 1054->1053 1063 5052a8 1056->1063 1058->1034 1062 50521a-50521d 1058->1062 1059->1063 1062->1018 1062->1034 1063->1030 1064->1018
                                      APIs
                                      • lstrcpyn.KERNEL32(?,00000070,0000000F,?,?,00505430,?), ref: 00505179
                                      • CharLowerA.USER32(?,?,?,00505430,?), ref: 00505183
                                      • Sleep.KERNEL32(00000800,?,755683C0,?,?,00505430,?), ref: 0050527D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CharLowerSleeplstrcpyn
                                      • String ID: 0TP
                                      • API String ID: 267381043-1855386918
                                      • Opcode ID: 4c4262fc3f357f56790469f5bcd8f260bb87dcdde8b9baaae796f5d7a357dbdc
                                      • Instruction ID: 8274f9cbfd694f8c2d5fe74a321f0c892786a0426ba65b7b33d98da66336cf23
                                      • Opcode Fuzzy Hash: 4c4262fc3f357f56790469f5bcd8f260bb87dcdde8b9baaae796f5d7a357dbdc
                                      • Instruction Fuzzy Hash: 2841C168A44E4A4EFF344624C9497BF2F5B7FB2314F98491BD193420D3FA264C8ACE16

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1065 504ae2-504af0 1066 504b06-504b0d call 503620 1065->1066 1069 504af2-504af9 call 505127 1066->1069 1070 504b0f-504b2f call 505127 1066->1070 1075 504b00 Sleep 1069->1075 1076 504b31-504b36 1070->1076 1077 504b7a 1070->1077 1075->1066 1079 504b45-504b4c 1076->1079 1080 504b38-504b3b 1076->1080 1078 504b7c-504b80 1077->1078 1081 504b82-504b84 1078->1081 1082 504bd6-504be3 call 505127 1078->1082 1085 504b52-504b57 1079->1085 1086 504b4e 1079->1086 1083 504b43 1080->1083 1084 504b3d-504b41 1080->1084 1081->1082 1088 504b86-504b8d 1081->1088 1095 504be5-504bea 1082->1095 1096 504bcc-504bd1 1082->1096 1083->1079 1084->1079 1084->1083 1085->1076 1089 504b59-504b5f 1085->1089 1086->1085 1092 504b99-504bb3 CreateThread 1088->1092 1093 504b8f-504b94 1088->1093 1089->1077 1090 504b61-504b6e call 504a85 1089->1090 1090->1078 1102 504b70-504b78 call 505127 1090->1102 1097 504bb5-504bb8 1092->1097 1098 504bc8 1092->1098 1093->1075 1095->1096 1100 504bec-504bfb GetTickCount 1095->1100 1096->1075 1097->1098 1101 504bba-504bc3 CloseHandle 1097->1101 1098->1096 1100->1096 1103 504bfd-504c04 call 5047b7 1100->1103 1101->1075 1102->1078 1103->1075
                                      APIs
                                        • Part of subcall function 00503620: GetModuleHandleA.KERNEL32(?), ref: 0050365A
                                        • Part of subcall function 00503620: LoadLibraryA.KERNELBASE(wininet.dll), ref: 00503668
                                        • Part of subcall function 00503620: GetProcAddress.KERNEL32(00000000,InternetGetConnectedState), ref: 00503678
                                      • Sleep.KERNELBASE(00000001,?,?,?,?,?,?,00504C20), ref: 00504B00
                                      • CreateThread.KERNEL32(00000000,00000000,00504A37,00000000,00000000,?), ref: 00504BAB
                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,00504C20), ref: 00504BBB
                                      • GetTickCount.KERNEL32 ref: 00504BEC
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Handle$AddressCloseCountCreateLibraryLoadModuleProcSleepThreadTick
                                      • String ID:
                                      • API String ID: 50151514-0
                                      • Opcode ID: 7bd039e2053160122893935ea775d366336ab228428e61975a78905543a36c9c
                                      • Instruction ID: ab1ee794b50bf540a74e33d7e95b3844ad5376a59cf73203d230b0ff36f6ead8
                                      • Opcode Fuzzy Hash: 7bd039e2053160122893935ea775d366336ab228428e61975a78905543a36c9c
                                      • Instruction Fuzzy Hash: 2331BFF06047829AEB24AF749C9DF7FBED9BB90301F114A19F695C61D1EB60C844CE62
                                      APIs
                                        • Part of subcall function 00502C90: RegOpenKeyExA.KERNELBASE(?,Software\Microsoft\Daemon,00000000,00020019,?), ref: 00502D27
                                        • Part of subcall function 00502C90: RegCreateKeyExA.ADVAPI32(00000002,00000053,00000000,00000000,00000000,00020006,00000000,?,?), ref: 00502D62
                                        • Part of subcall function 00502C90: RegCloseKey.ADVAPI32(?), ref: 00502D6F
                                      • CreateThread.KERNEL32(00000000,00000000,0050311C,00000000,00000000,?), ref: 00503239
                                      • Sleep.KERNEL32 ref: 00503253
                                      • CreateThread.KERNELBASE(00000000,00000000,Function_00004C1B,00000000,00000000,?), ref: 00503267
                                      • Sleep.KERNEL32(000003E8), ref: 00503278
                                        • Part of subcall function 00502D8E: memset.MSVCRT ref: 00502DA8
                                        • Part of subcall function 00502D8E: gethostname.WS2_32(?,00000100), ref: 00502DB8
                                        • Part of subcall function 00502D8E: lstrcat.KERNEL32(?,root), ref: 00502DD0
                                        • Part of subcall function 00502D8E: lstrcat.KERNEL32(00000000,00000000), ref: 00502E19
                                        • Part of subcall function 00502D8E: lstrcat.KERNEL32(00000000,00000000), ref: 00502E29
                                        • Part of subcall function 00502D8E: CreateMutexA.KERNELBASE(00000000,00000001,00000000), ref: 00502E36
                                        • Part of subcall function 00502D8E: GetLastError.KERNEL32 ref: 00502E3C
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Create$lstrcat$SleepThread$CloseErrorLastMutexOpengethostnamememset
                                      • String ID:
                                      • API String ID: 2995464708-0
                                      • Opcode ID: 58e6200d095d99c6a0f707e4882eb2ab6617829862c6a38cba8fcaa906b38ddc
                                      • Instruction ID: c3a13703e42c1b4ec363eec73e7dae4186dad5f565332290872ed40493be106c
                                      • Opcode Fuzzy Hash: 58e6200d095d99c6a0f707e4882eb2ab6617829862c6a38cba8fcaa906b38ddc
                                      • Instruction Fuzzy Hash: B701B13A14065676D71177729C4FDAF6F6CFFC6B11B10041AFA44920C2DE349A4589B9
                                      APIs
                                      • WSAStartup.WS2_32(00000101,?), ref: 00503295
                                        • Part of subcall function 005033A8: GetTickCount.KERNEL32 ref: 005033A8
                                      • memset.MSVCRT ref: 005032AE
                                        • Part of subcall function 005031E4: CreateThread.KERNEL32(00000000,00000000,0050311C,00000000,00000000,?), ref: 00503239
                                        • Part of subcall function 005031E4: Sleep.KERNEL32 ref: 00503253
                                        • Part of subcall function 005031E4: CreateThread.KERNELBASE(00000000,00000000,Function_00004C1B,00000000,00000000,?), ref: 00503267
                                        • Part of subcall function 005031E4: Sleep.KERNEL32(000003E8), ref: 00503278
                                      • ExitProcess.KERNEL32 ref: 005032C4
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CreateSleepThread$CountExitProcessStartupTickmemset
                                      • String ID:
                                      • API String ID: 3857727052-0
                                      • Opcode ID: 88d01b5b5f6c5010676a2a66d5ceb351fe4fc908ad08d7981e774765898afe9f
                                      • Instruction ID: e6c800b91a5105f6af05a8ed022c94dfcb71a2cb97930a29ec3ddceb2131e2e1
                                      • Opcode Fuzzy Hash: 88d01b5b5f6c5010676a2a66d5ceb351fe4fc908ad08d7981e774765898afe9f
                                      • Instruction Fuzzy Hash: 93E08C309442086BEB50B7A0CC0EFDD7B2CAB14701F8008A1B284950D2EEA166C88AA6
                                      APIs
                                      • GetCurrentThread.KERNEL32 ref: 0050565D
                                      • SetThreadPriority.KERNELBASE(00000000), ref: 00505664
                                        • Part of subcall function 00504FF8: RegOpenKeyExA.KERNELBASE(80000001,?,00000000,00020019,?,75570F00), ref: 005050BE
                                        • Part of subcall function 00504FF8: memset.MSVCRT ref: 005050D5
                                        • Part of subcall function 00504FF8: RegQueryValueExA.KERNELBASE(?,00000000,00000000,00000000,?,?), ref: 005050F5
                                        • Part of subcall function 00504FF8: RegCloseKey.KERNELBASE(?), ref: 005050FE
                                        • Part of subcall function 00505449: memset.MSVCRT ref: 0050550C
                                        • Part of subcall function 00505449: GetWindowsDirectoryA.KERNEL32(?,00000184,00000000,75570F10,75570F00), ref: 00505521
                                        • Part of subcall function 00505449: lstrlen.KERNEL32(?), ref: 00505543
                                        • Part of subcall function 00505449: lstrcat.KERNEL32(?,00501190), ref: 00505562
                                        • Part of subcall function 00505449: lstrcat.KERNEL32(?,Local Settings), ref: 00505575
                                        • Part of subcall function 00505449: lstrcat.KERNEL32(?,00501190), ref: 00505583
                                        • Part of subcall function 00505449: lstrcat.KERNEL32(?,Temporary Internet Files), ref: 00505590
                                        • Part of subcall function 005055B4: memset.MSVCRT ref: 005055CE
                                        • Part of subcall function 005055B4: GetWindowsDirectoryA.KERNEL32(?,00000104,?,75570F10,75570F00), ref: 005055DE
                                        • Part of subcall function 005055B4: lstrcpy.KERNEL32(?,00501888), ref: 005055F6
                                        • Part of subcall function 005055B4: GetDriveTypeA.KERNEL32(00000043,?,75570F10,75570F00), ref: 00505622
                                        • Part of subcall function 005055B4: Sleep.KERNEL32(00001194,?,75570F10,75570F00), ref: 00505632
                                      • Sleep.KERNEL32(000061A8), ref: 00505684
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$memset$DirectorySleepThreadWindows$CloseCurrentDriveOpenPriorityQueryTypeValuelstrcpylstrlen
                                      • String ID:
                                      • API String ID: 1200182354-0
                                      • Opcode ID: d3dfe3ca985f4e689f16a7144f6eb9c4b7e5f550bcfda9f1fc34b3dd57ffe1dd
                                      • Instruction ID: a00bd4ce691c911287dc50f1ec9ddfcc97e79f3b0b06d643ae5355c187a33e16
                                      • Opcode Fuzzy Hash: d3dfe3ca985f4e689f16a7144f6eb9c4b7e5f550bcfda9f1fc34b3dd57ffe1dd
                                      • Instruction Fuzzy Hash: 94C0123100098687DF043BF49C1E49E3E21BFA13623384701F263840E3DF2004C86E2B
                                      APIs
                                      • WriteFile.KERNELBASE(00000000,?,00000001,?,00000000,00000000,75568A60), ref: 005073BD
                                      • WriteFile.KERNEL32(00000000,?,00000001,?,00000000,00000000,75568A60), ref: 005073E2
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: FileWrite
                                      • String ID:
                                      • API String ID: 3934441357-0
                                      • Opcode ID: 3c2d70d6b2ebeca3607b6924ad4f9547b586735f7dfb2575c4133ed41483a66d
                                      • Instruction ID: 22b37714542d64fe014a8661f32d504f0c3aa166d1667109d1551e00d35c67e0
                                      • Opcode Fuzzy Hash: 3c2d70d6b2ebeca3607b6924ad4f9547b586735f7dfb2575c4133ed41483a66d
                                      • Instruction Fuzzy Hash: DAF0C8B2D0025DBEEB00DB65CD49BEF7BACFB48300F1044B5AA15E3182E230AE449B90
                                      APIs
                                      Strings
                                      • &n=%d, xrefs: 005078D8
                                      • &num=%d, xrefs: 00507895
                                      • mail, xrefs: 005077F4
                                      • contact+, xrefs: 005077B3
                                      • &nbq=%d, xrefs: 0050791B
                                      • mailto, xrefs: 00507771
                                      • http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=%s, xrefs: 0050784D
                                      • w, xrefs: 005077E9
                                      • http://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s, xrefs: 0050792F
                                      • reply, xrefs: 00507793
                                      • http://search.yahoo.com/search?p=%s&ei=UTF-8&fr=fp-tab-web-t&cop=mss&tab=, xrefs: 005078A7
                                      • http://www.altavista.com/web/results?q=%s&kgs=0&kls=0, xrefs: 005078E7
                                      • %s+%s, xrefs: 00507825
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: wsprintf$lstrcat$memset$lstrcpylstrlen
                                      • String ID: %s+%s$&n=%d$&nbq=%d$&num=%d$contact+$http://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s$http://search.yahoo.com/search?p=%s&ei=UTF-8&fr=fp-tab-web-t&cop=mss&tab=$http://www.altavista.com/web/results?q=%s&kgs=0&kls=0$http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=%s$mail$mailto$reply$w
                                      • API String ID: 3204893122-2625203255
                                      • Opcode ID: 635e0927980e0d4f1e152389c1cd3419be9ed90e47190587e3b17e1ee343d797
                                      • Instruction ID: ded823d3f8bc32eef99a2724958b2501f44dba1139f3c98e25ba8aed4e19c952
                                      • Opcode Fuzzy Hash: 635e0927980e0d4f1e152389c1cd3419be9ed90e47190587e3b17e1ee343d797
                                      • Instruction Fuzzy Hash: D551E430F4450C7AEF08A6669D8EEEE3E5FBBDCB10F18C827F105610D6DDB0AA158525
                                      APIs
                                      • FindWindowA.USER32(rctrl_renwnd32,00000000), ref: 0050312A
                                        • Part of subcall function 005030F0: PostMessageA.USER32(?,00000012,00000000,00000000), ref: 00503108
                                        • Part of subcall function 005030F0: PostMessageA.USER32(?,00000010,00000000,00000000), ref: 0050310F
                                        • Part of subcall function 005030F0: PostMessageA.USER32(?,00000002,00000000,00000000), ref: 00503116
                                      • FindWindowA.USER32(ATH_Note,00000000), ref: 0050313A
                                      • FindWindowA.USER32(IEFrame,00000000), ref: 0050314A
                                      • RtlExitUserThread.NTDLL(00000000), ref: 00503155
                                      • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 005031C3
                                      • GetProcAddress.KERNEL32(00000000,RegisterServiceProcess), ref: 005031D2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: FindMessagePostWindow$AddressExitHandleModuleProcThreadUser
                                      • String ID: ATH_Note$IEFrame$RegisterServiceProcess$kernel32.dll$rctrl_renwnd32
                                      • API String ID: 104824008-672394068
                                      • Opcode ID: 0e403a32e1aee024a8ab39fe307f344bc474e0f0a24a2a0af902c9252800bb10
                                      • Instruction ID: ca8937058ee0a95befedaf0986bb5ec46897f89f1bd3759e6bbb064e7f8aa431
                                      • Opcode Fuzzy Hash: 0e403a32e1aee024a8ab39fe307f344bc474e0f0a24a2a0af902c9252800bb10
                                      • Instruction Fuzzy Hash: C7211210D4C7C9A9FB1197F88C1E79EAEA95F22749F1440C8A1846A1C3CAFB5718C3B7
                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,00000000), ref: 00506002
                                      • GetTempPathA.KERNEL32(00000104,?,?,00000000), ref: 00506023
                                      • GetTempFileNameA.KERNEL32(00000000,tmp,00000000,?), ref: 0050604C
                                      • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 0050605B
                                      • CopyFileA.KERNEL32(00000000,?,00000000), ref: 00506070
                                        • Part of subcall function 00505EE3: CreateFileA.KERNEL32(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,?,00506082,?), ref: 00505EFA
                                        • Part of subcall function 00505EE3: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00505F14
                                        • Part of subcall function 00505EE3: CloseHandle.KERNEL32(00000000), ref: 00505F22
                                      • GetTempPathA.KERNEL32(00000104,00000000), ref: 00506094
                                      • GetTempFileNameA.KERNEL32(00000000,tmp,00000000,?), ref: 005060A9
                                      • lstrcpy.KERNEL32(?,?), ref: 005060FD
                                      • lstrcat.KERNEL32(?,00501830), ref: 00506115
                                      • lstrcat.KERNEL32(?,doc), ref: 00506156
                                      • lstrcat.KERNEL32(?,00501870), ref: 0050617E
                                      • lstrcat.KERNEL32(?,00501830), ref: 00506191
                                      • lstrcat.KERNEL32(?,00502734), ref: 005061B8
                                      • lstrcat.KERNEL32(?,0050272C), ref: 005061CE
                                      • lstrcat.KERNEL32(?,00502724), ref: 005061DD
                                      • lstrcat.KERNEL32(?,00502720), ref: 005061EB
                                      • DeleteFileA.KERNEL32(?), ref: 00506219
                                      • wsprintfA.USER32 ref: 00506232
                                      • GetTempPathA.KERNEL32(00000104,?), ref: 00506265
                                      • GetTempFileNameA.KERNEL32(?,tmp,00000000,00000000), ref: 0050627F
                                      • DeleteFileA.KERNEL32(00000000), ref: 005062AD
                                      • DeleteFileA.KERNEL32(?), ref: 005062B6
                                      • lstrcpy.KERNEL32(?,00000000), ref: 005062C4
                                      • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 005062EA
                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 00506304
                                      • CloseHandle.KERNEL32( jP), ref: 0050630F
                                      • DeleteFileA.KERNEL32(?), ref: 00506339
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$lstrcat$Temp$Name$Delete$Path$CloseCreateHandleModulelstrcpy$CopyPointerSizewsprintf
                                      • String ID: jP$%s.zip$com$doc$htm$html$tmp$txt
                                      • API String ID: 3181343175-3074387375
                                      • Opcode ID: 76520017ec6ed50961b68fbee113b7f8b3f6c410c8adcc7e41595a1847f51ff8
                                      • Instruction ID: 215d56b1a9a915398b7b7de64b2b15009c2de42112ae2f90419e4ee996d24c39
                                      • Opcode Fuzzy Hash: 76520017ec6ed50961b68fbee113b7f8b3f6c410c8adcc7e41595a1847f51ff8
                                      • Instruction Fuzzy Hash: 54A1B4B1940659AEDB209760CC8DFEF7FADFB51300F04085AF296D20C1D6B49A98DB66
                                      APIs
                                      • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000,75568A60,?,00000104), ref: 0050580E
                                      • CreateFileA.KERNEL32(?,40000000,00000003,00000000,00000002,00000080,00000000), ref: 00505833
                                      • memset.MSVCRT ref: 00505852
                                      • memset.MSVCRT ref: 0050585E
                                      • memset.MSVCRT ref: 0050586A
                                        • Part of subcall function 00505717: GetSystemTime.KERNEL32(0000002E,0000002E,?,00000000,0000001E), ref: 00505721
                                        • Part of subcall function 00505772: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,75573130), ref: 00505786
                                        • Part of subcall function 00505772: ReadFile.KERNEL32(00000000,?,00000400,0000001E,00000000), ref: 005057CC
                                        • Part of subcall function 00505772: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 005057D8
                                      • GetFileSize.KERNEL32(?,00000000), ref: 005058CA
                                      • GetFileSize.KERNEL32(?,00000000), ref: 005058D6
                                      • lstrlen.KERNEL32(00506207), ref: 005058E7
                                      • WriteFile.KERNEL32(00000000,04034B50,0000001E,?,00000000), ref: 0050590E
                                      • lstrlen.KERNEL32(00506207,?,00000000), ref: 00505918
                                      • WriteFile.KERNEL32(?,00506207,00000000), ref: 00505921
                                      • lstrlen.KERNEL32(00506207), ref: 00505926
                                      • SetFilePointer.KERNEL32(?,00000000,00000000,00000000), ref: 00505934
                                      • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00505953
                                      • ReadFile.KERNEL32(?,?,00000400,?,00000000), ref: 00505972
                                      • WriteFile.KERNEL32(?,?,0000002E,?,00000000), ref: 005059A8
                                      • lstrlen.KERNEL32(00506207,?,00000000), ref: 005059B2
                                      • WriteFile.KERNEL32(?,00506207,00000000), ref: 005059BB
                                      • lstrlen.KERNEL32(00506207), ref: 005059C0
                                      • WriteFile.KERNEL32(?,06054B50,00000016,?,00000000), ref: 005059FC
                                      • CloseHandle.KERNEL32(?), ref: 00505A01
                                      • CloseHandle.KERNEL32(?), ref: 00505A0A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$Write$lstrlen$Pointermemset$CloseCreateHandleReadSize$SystemTime
                                      • String ID:
                                      • API String ID: 2136260124-3916222277
                                      • Opcode ID: d3892d766c3aa4be7e112a987401fd98666d2ac7ac1380c23e6cc41f9b4c72c6
                                      • Instruction ID: 773f872c4516b25f3d46c8f58171cf100fa68b818a43c43766e7d6fd81e4158a
                                      • Opcode Fuzzy Hash: d3892d766c3aa4be7e112a987401fd98666d2ac7ac1380c23e6cc41f9b4c72c6
                                      • Instruction Fuzzy Hash: F0710275D1125CAADF21DFA4DD88ADFBBB8FF08350F10011AF514A6260E7319A44DBA9
                                      APIs
                                      • lstrcpy.KERNEL32(?,"Postmaster"), ref: 00505AB8
                                      • lstrcat.KERNEL32(?,00502644), ref: 00505ACA
                                      • lstrcat.KERNEL32(?,postmaster), ref: 00505AF6
                                      • lstrcat.KERNEL32(?,00501868), ref: 00505AFE
                                      • lstrcat.KERNEL32(?,?), ref: 00505B05
                                      • lstrcpy.KERNEL32(?,?), ref: 00505B12
                                      • lstrcat.KERNEL32(?,0050261C), ref: 00505B1E
                                      • lstrcat.KERNEL32(?,yahoo.com), ref: 00505BA4
                                      • lstrcpy.KERNEL32(?,yahoo.com), ref: 00505BB2
                                      • lstrcpy.KERNEL32(?,0000000A), ref: 00505BBF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$lstrcpy
                                      • String ID: "Automatic Email Delivery Software"$"Bounced mail"$"MAILER-DAEMON"$"Mail Administrator"$"Mail Delivery Subsystem"$"Post Office"$"Postmaster"$"Returned mail"$"The Post Office"$MAILER-DAEMON$noreply$postmaster$yahoo.com
                                      • API String ID: 2482611188-423193620
                                      • Opcode ID: 99017f8d5db1c9b028b0b62ddde965297cb8a3f076705d33c8caa08b3d858c23
                                      • Instruction ID: a9b0a225ccebaa74ed32a98531ce4ef3425950baae9838941721c6dfd1e2a18b
                                      • Opcode Fuzzy Hash: 99017f8d5db1c9b028b0b62ddde965297cb8a3f076705d33c8caa08b3d858c23
                                      • Instruction Fuzzy Hash: D8417771340B11A7E71097259CCEBBF7E9CFB91B01F144016F982960C2FEE59845AEB6
                                      APIs
                                        • Part of subcall function 00506B89: lstrlen.KERNEL32(00000000,00000000,00000000), ref: 00506C46
                                        • Part of subcall function 00506B89: lstrlen.KERNEL32(00000000), ref: 00506C55
                                        • Part of subcall function 00506B89: CharLowerA.USER32(00000000), ref: 00506C74
                                        • Part of subcall function 00506B89: lstrcmpiA.KERNEL32(00000000,?), ref: 00506C84
                                      • lstrcpy.KERNEL32(?,?), ref: 00506E94
                                      • socket.WS2_32(00000002,00000001,00000006), ref: 00506EA0
                                      • connect.WS2_32(00000000,00000002,00000010), ref: 00506EBF
                                      • send.WS2_32(00000000,00501830,00000001,00000000), ref: 00507023
                                      • send.WS2_32(00000000,005071AD,00000002,00000000), ref: 00507034
                                      • send.WS2_32(00000000,.,00000005,00000000), ref: 0050704E
                                      • closesocket.WS2_32(00000000), ref: 00507086
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: send$lstrlen$CharLowerclosesocketconnectlstrcmpilstrcpysocket
                                      • String ID: .$%sO %s$DATA$E%s %s$From$HEL$HLO$IL F$MA%sROM:<%s>$PT T$QUIT$RC%sO:<%s>
                                      • API String ID: 461202756-3815809343
                                      • Opcode ID: 137dcdbcc398edce13df37ae931c225a0fe07400167ff2055b513371b32ddfb0
                                      • Instruction ID: 33585215259ea1a97b37e4a6d099c67cd5c3f73b094bdd9841701b712144618c
                                      • Opcode Fuzzy Hash: 137dcdbcc398edce13df37ae931c225a0fe07400167ff2055b513371b32ddfb0
                                      • Instruction Fuzzy Hash: 31611936F0421D6FDB309BA4CC5DBEE7FACBB58710F204562F644E22C1D6B09A948B50
                                      APIs
                                      • lstrlen.KERNEL32(?,?,?,?,005045DC,?,75570440,?,?,00504669), ref: 00504039
                                      • isspace.MSVCRT ref: 0050405A
                                      • isalnum.MSVCRT ref: 0050406A
                                      • lstrlen.KERNEL32(?,005045DC,?,75570440,?,?,00504669), ref: 00504110
                                      • lstrlen.KERNEL32(?), ref: 005041CD
                                      • lstrlen.KERNEL32(?), ref: 0050422A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrlen$isalnumisspace
                                      • String ID: _-!.$_-!.@
                                      • API String ID: 942633883-1107819772
                                      • Opcode ID: 13f1972239871b3c44236b19c0e3c7acdde54ddd6e475e0e74b5625e8a80bea5
                                      • Instruction ID: 46a4e0ed4f2d23864a61de77937e1c011c01544acd97643bc178da60782ba0d3
                                      • Opcode Fuzzy Hash: 13f1972239871b3c44236b19c0e3c7acdde54ddd6e475e0e74b5625e8a80bea5
                                      • Instruction Fuzzy Hash: FA61F6F5908B925EEB255BB06C5833F7F98BF62312F28045EEBC1C90C2E668C481CE15
                                      APIs
                                      • wsprintfA.USER32 ref: 00506807
                                      • wsprintfA.USER32 ref: 00506816
                                      • lstrlen.KERNEL32(?,To: %s,?), ref: 0050682D
                                      • wsprintfA.USER32 ref: 00506832
                                      • lstrlen.KERNEL32(?,Subject: %s,?), ref: 00506844
                                      • wsprintfA.USER32 ref: 00506849
                                      • lstrcat.KERNEL32(?,Date: ), ref: 0050685A
                                      • lstrlen.KERNEL32(?), ref: 0050685D
                                        • Part of subcall function 005032CB: GetLocalTime.KERNEL32(?), ref: 005032E0
                                        • Part of subcall function 005032CB: GetTimeZoneInformation.KERNEL32(?), ref: 0050330B
                                        • Part of subcall function 005032CB: wsprintfA.USER32 ref: 00503399
                                      • lstrcat.KERNEL32(?,MIME-Version: 1.0), ref: 00506871
                                      • lstrlen.KERNEL32(?,Content-Type: multipart/mixed;boundary="%s",?), ref: 0050687D
                                      • wsprintfA.USER32 ref: 00506882
                                      • lstrcat.KERNEL32(?,X-Priority: 3X-MSMail-Priority: NormalX-Mailer: Microsoft Outlook Express 6.00.2600.0000X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600.0000), ref: 0050688D
                                      Strings
                                      • NextPart, xrefs: 005067F6
                                      • To: %s, xrefs: 00506827
                                      • ----=_%s_%.3u_%.4u_%.8X.%.8X, xrefs: 005067FB
                                      • Subject: %s, xrefs: 0050683E
                                      • Date: , xrefs: 00506854
                                      • From: %s, xrefs: 00506810
                                      • Content-Type: multipart/mixed;boundary="%s", xrefs: 00506877
                                      • MIME-Version: 1.0, xrefs: 0050686B
                                      • X-Priority: 3X-MSMail-Priority: NormalX-Mailer: Microsoft Outlook Express 6.00.2600.0000X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600.0000, xrefs: 00506887
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: wsprintf$lstrlen$lstrcat$Time$InformationLocalZone
                                      • String ID: MIME-Version: 1.0$----=_%s_%.3u_%.4u_%.8X.%.8X$Content-Type: multipart/mixed;boundary="%s"$Date: $From: %s$NextPart$Subject: %s$To: %s$X-Priority: 3X-MSMail-Priority: NormalX-Mailer: Microsoft Outlook Express 6.00.2600.0000X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
                                      • API String ID: 1752939335-3336112092
                                      • Opcode ID: f1705c0d99e4e0fb48939a6c59a97f8a8d2cb7014e8666a8354d8be893f81f71
                                      • Instruction ID: 516944fcafe1d406c4de45a34c5fbbf3ebfe04e920b5b8b11edbf61359fe2e0a
                                      • Opcode Fuzzy Hash: f1705c0d99e4e0fb48939a6c59a97f8a8d2cb7014e8666a8354d8be893f81f71
                                      • Instruction Fuzzy Hash: E111BF767817153AD2047721AC8FFAFBE4CFF81B20F040425F908A21C2DAA9B61995BD
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00001000,00000000), ref: 00503B9D
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00503BA0
                                      • socket.WS2_32(00000002,00000002,00000011), ref: 00503BBA
                                      • htons.WS2_32(00000000), ref: 00503BF5
                                      • select.WS2_32 ref: 00503C3F
                                      • memset.MSVCRT ref: 00503C51
                                      • recv.WS2_32(?,00000000,00001000,00000000), ref: 00503C61
                                      • htons.WS2_32(?), ref: 00503C88
                                      • htons.WS2_32(?), ref: 00503CA3
                                      • GetProcessHeap.KERNEL32(00000000,00000108), ref: 00503D10
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heaphtons$Process$Allocatememsetrecvselectsocket
                                      • String ID:
                                      • API String ID: 1083883850-0
                                      • Opcode ID: 2774ab65e68e478f934b67ed2fed43b34ffd1c969f5f9ebea79d8cc2d8644057
                                      • Instruction ID: 407117dfceaa818f317e20e129298f2efd80ccf421d121f9015e9229cc58b6dd
                                      • Opcode Fuzzy Hash: 2774ab65e68e478f934b67ed2fed43b34ffd1c969f5f9ebea79d8cc2d8644057
                                      • Instruction Fuzzy Hash: 8F61D2769047069FD720AF64DC48B6FBFECFF94784F100809F98997290D7709A489BA2
                                      APIs
                                      • wsprintfA.USER32 ref: 005070BC
                                      • wsprintfA.USER32 ref: 005070D4
                                      • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 005070F1
                                      • RegEnumKeyA.ADVAPI32(?,00000000,?,00000100), ref: 005071D8
                                      • RegCloseKey.ADVAPI32(?), ref: 005071E5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: wsprintf$CloseEnumOpen
                                      • String ID: %s %s$Account$Internet$SMTP$Server$Software\Microsoft\%s %s Manager\%ss
                                      • API String ID: 1693054222-1692917665
                                      • Opcode ID: d5346e02a52f48e42c981e2d26ebe83a68710e29bf017808395a5baaf78aa8eb
                                      • Instruction ID: 919e163466d9f41961a9d57fd17da3ca6bbeb631558065ae4de98a1fa7a4ba0d
                                      • Opcode Fuzzy Hash: d5346e02a52f48e42c981e2d26ebe83a68710e29bf017808395a5baaf78aa8eb
                                      • Instruction Fuzzy Hash: 7641F671E0021DABDB21DBA1DD49EEFBBBCFF88741F0000A5A905E2090E774AA44DB61
                                      APIs
                                      • lstrlen.KERNEL32(?,This is a multi-part message in MIME format.,?,?,00000000,?,?,00506A70,?), ref: 005068B1
                                      • wsprintfA.USER32 ref: 005068BC
                                      • lstrlen.KERNEL32(?,--%sContent-Type: text/plain;charset=us-asciiContent-Transfer-Encoding: 7bit,?,?,?,00506A70,?), ref: 005068D2
                                      • wsprintfA.USER32 ref: 005068D7
                                      • lstrlen.KERNEL32(?,?,?,?,?,?), ref: 005068DD
                                      • lstrcat.KERNEL32(?,), ref: 005068F2
                                      • lstrlen.KERNEL32(?,--%sContent-Type: application/octet-stream;name="%s"Content-Transfer-Encoding: base64Content-Disposition: %s;filename="%s",?,?,attachment,?,?,?,?,?,?), ref: 00506929
                                      • wsprintfA.USER32 ref: 0050692E
                                      • lstrlen.KERNEL32(?,?), ref: 00506937
                                      • lstrlen.KERNEL32(?,--%s--,?), ref: 00506955
                                      • wsprintfA.USER32 ref: 0050695A
                                      Strings
                                      • , xrefs: 005068EC
                                      • This is a multi-part message in MIME format., xrefs: 005068AB
                                      • --%sContent-Type: text/plain;charset=us-asciiContent-Transfer-Encoding: 7bit, xrefs: 005068C9
                                      • --%s--, xrefs: 0050694F
                                      • --%sContent-Type: application/octet-stream;name="%s"Content-Transfer-Encoding: base64Content-Disposition: %s;filename="%s", xrefs: 00506923
                                      • inline, xrefs: 00506910, 0050691E
                                      • attachment, xrefs: 00506906
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrlen$wsprintf$lstrcat
                                      • String ID: $--%s--$--%sContent-Type: application/octet-stream;name="%s"Content-Transfer-Encoding: base64Content-Disposition: %s;filename="%s"$--%sContent-Type: text/plain;charset=us-asciiContent-Transfer-Encoding: 7bit$This is a multi-part message in MIME format.$attachment$inline
                                      • API String ID: 3012818462-48772991
                                      • Opcode ID: dbbe79eee2d05a8a4cacd9978d854f5b984f80410594373b787ab4cacb30c3d2
                                      • Instruction ID: 3fdca0e5f0ffa1fa4bef71aa3ca571d11d6ceae177e96fc01e7fdd5b86b94422
                                      • Opcode Fuzzy Hash: dbbe79eee2d05a8a4cacd9978d854f5b984f80410594373b787ab4cacb30c3d2
                                      • Instruction Fuzzy Hash: 2B11E472A402047BDB04A769DC8EDBF3FADEFC1720F180426F904D61C1DA39D95066B5
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$CharUpper$Buffstrstrwsprintf
                                      • String ID: %s.%s$.com$com
                                      • API String ID: 1204462619-569357965
                                      • Opcode ID: 17c0ba7b0b3aac3361d27fb4f703e2cd78242a6193b6fc7738e9caef17ac9273
                                      • Instruction ID: 2a81d91e2002685be900b6559790254c352ea299669c914cf5c60e1db04ad5da
                                      • Opcode Fuzzy Hash: 17c0ba7b0b3aac3361d27fb4f703e2cd78242a6193b6fc7738e9caef17ac9273
                                      • Instruction Fuzzy Hash: FF414BB7340B425AE7046326AC8DBBF3A9AFBD0711F11041AF781C20C1EE758A469E35
                                      APIs
                                      • GetModuleHandleA.KERNEL32(iphlpapi.dll), ref: 00503F02
                                      • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 00503F12
                                      • GetProcAddress.KERNEL32(00000000,GetNetworkParams), ref: 00503F2F
                                      • GetProcessHeap.KERNEL32(00000000,00004000), ref: 00503F4D
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00503F50
                                      • htons.WS2_32(00000035), ref: 00503F88
                                      • inet_addr.WS2_32(?), ref: 00503F93
                                      • gethostbyname.WS2_32(?), ref: 00503FA6
                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00503FE3
                                      • HeapFree.KERNEL32(00000000), ref: 00503FE6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$Process$AddressAllocateFreeHandleLibraryLoadModuleProcgethostbynamehtonsinet_addr
                                      • String ID: GetNetworkParams$iphlpapi.dll
                                      • API String ID: 2899438970-2099955842
                                      • Opcode ID: e30f29e266a04806bc51eef7561a6e33902f13042b838279bdac54ccba920e99
                                      • Instruction ID: acfe8a1e42ac83ed393b8fa399d380572ad7b045617876d8cdea66422d8a7479
                                      • Opcode Fuzzy Hash: e30f29e266a04806bc51eef7561a6e33902f13042b838279bdac54ccba920e99
                                      • Instruction Fuzzy Hash: C5319F35E00A07AFDF109BB89C49AAE7FBCBF14361B140115F914E32D0DB38DA459BA5
                                      APIs
                                        • Part of subcall function 00506B89: lstrlen.KERNEL32(00000000,00000000,00000000), ref: 00506C46
                                        • Part of subcall function 00506B89: lstrlen.KERNEL32(00000000), ref: 00506C55
                                        • Part of subcall function 00506B89: CharLowerA.USER32(00000000), ref: 00506C74
                                        • Part of subcall function 00506B89: lstrcmpiA.KERNEL32(00000000,?), ref: 00506C84
                                      • lstrcpy.KERNEL32(?,?), ref: 0050726A
                                      • htons.WS2_32(00000019), ref: 00507288
                                      • lstrcpy.KERNEL32(00000000,mx.), ref: 005072D4
                                      • lstrcat.KERNEL32(00000000,?), ref: 005072E4
                                      • lstrcpy.KERNEL32(?,?), ref: 0050730B
                                      • htons.WS2_32(00000019), ref: 00507330
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$htonslstrlen$CharLowerlstrcatlstrcmpi
                                      • String ID: mail.$mx.$smtp.
                                      • API String ID: 3218502294-1213875280
                                      • Opcode ID: deb5a6bdf32b85df91d8192008c1bb3ab088c9fe72f370ad9399c5990ba9e44f
                                      • Instruction ID: 61d13515a21d5bbe502a9dd85473b184d0e7fa3ad14d9318c08b4ea8da931990
                                      • Opcode Fuzzy Hash: deb5a6bdf32b85df91d8192008c1bb3ab088c9fe72f370ad9399c5990ba9e44f
                                      • Instruction Fuzzy Hash: 7B417076E0821E9BDF25DBA0DD49BEE7BB8BF48300F100496F905E61C1DB70AA449B61
                                      APIs
                                      • GetModuleHandleA.KERNEL32(dnsapi.dll,?,?,?,?,00504001,?,0050498D,?,?,?,00504A02,?), ref: 00503E3F
                                      • LoadLibraryA.KERNEL32(dnsapi.dll,?,?,?,00504001,?,0050498D,?,?,?,00504A02,?), ref: 00503E4C
                                      • GetProcAddress.KERNEL32(00000000,DnsQuery_A), ref: 00503E5C
                                      • GetProcessHeap.KERNEL32(00000000,00000108,?,?,?,?,?,00504001,?,0050498D,?,?,?,00504A02,?), ref: 00503E9B
                                      • RtlAllocateHeap.NTDLL(00000000,?,?), ref: 00503EA2
                                      • memset.MSVCRT ref: 00503EB2
                                      • lstrcpyn.KERNEL32(00000008,0027D9E8,000000FF,?), ref: 00503ECD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AddressAllocateHandleLibraryLoadModuleProcProcesslstrcpynmemset
                                      • String ID: DnsQuery_A$dnsapi.dll
                                      • API String ID: 979329682-3847274415
                                      • Opcode ID: dca0aab8c91f9d596bb827dcb1b0edf6cee5f3e290248c7e98bdbcda5f02536a
                                      • Instruction ID: 40075319653eeb29a435cd9483c3460f96daf6c4fdfe13ee8d6bb4df6979a84e
                                      • Opcode Fuzzy Hash: dca0aab8c91f9d596bb827dcb1b0edf6cee5f3e290248c7e98bdbcda5f02536a
                                      • Instruction Fuzzy Hash: 09210276504B0AABC7209F52DC08A3FBFACFF54780F104A29F145D2180DBB1E98897A5
                                      APIs
                                      • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?), ref: 0050668E
                                      • ReadFile.KERNEL32(?,?,00000400,?,00000000,?,75570440,76C08400), ref: 005066CF
                                      • memset.MSVCRT ref: 0050676E
                                      • CloseHandle.KERNEL32(?,?,75570440,76C08400), ref: 005067B5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$CloseCreateHandleReadmemset
                                      • String ID: =$AiP$AiP$L
                                      • API String ID: 1934991721-3068730819
                                      • Opcode ID: 7f15d75550ffad2b531f58218fefd286902095e9832a3eefb16d44d18fb3ac1a
                                      • Instruction ID: 75c36a7ddd45a5937c5c7dc736fdda1d92c830406bf875cefc640d4579443e51
                                      • Opcode Fuzzy Hash: 7f15d75550ffad2b531f58218fefd286902095e9832a3eefb16d44d18fb3ac1a
                                      • Instruction Fuzzy Hash: 24418034900299EBDF11CF98C884AEEBFB9FF46304F1045A5E991A7182D3709A51CBA1
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$PathTemplstrcpylstrlen
                                      • String ID: .log$\$zincite
                                      • API String ID: 1195028341-2520228640
                                      • Opcode ID: 9b8db98ae055c8dff7040cdb26ef09709199bca6636e77b7a4b7fff887e6c2cb
                                      • Instruction ID: b4afade12c0fc9fcd69d2ee1c841bfa627f913ce1fee5f64901a70284f785ff6
                                      • Opcode Fuzzy Hash: 9b8db98ae055c8dff7040cdb26ef09709199bca6636e77b7a4b7fff887e6c2cb
                                      • Instruction Fuzzy Hash: B70186B180455D9BDF109F74DD9DFDE7FBCAB24300F5000A1A6C4D2091D6B0AAC88F51
                                      APIs
                                      • CreateFileA.KERNEL32(00000020,80000000,00000003,00000000,00000003,00000080,00000000,75570F10,00000000), ref: 00504F0C
                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 00504F2A
                                      • CreateFileMappingA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000000), ref: 00504F3A
                                      • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000,00000000), ref: 00504F5B
                                      • memset.MSVCRT ref: 00504F89
                                      • UnmapViewOfFile.KERNEL32(00000000), ref: 00504FCC
                                      • CloseHandle.KERNEL32(?), ref: 00504FD5
                                      • CloseHandle.KERNEL32(?), ref: 00504FDF
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$CloseCreateHandleView$MappingSizeUnmapmemset
                                      • String ID:
                                      • API String ID: 3315828190-0
                                      • Opcode ID: 7e733e8b6656e491e5cc5b129c739a4ba9456ed613a90e9081407e8c797c4359
                                      • Instruction ID: 0ab0f1c3a718459e2b74eb1b04299cdf3ef3ce68078fedbeea16834dce009e45
                                      • Opcode Fuzzy Hash: 7e733e8b6656e491e5cc5b129c739a4ba9456ed613a90e9081407e8c797c4359
                                      • Instruction Fuzzy Hash: 1D31D5F190438AAFDB206F649C88EAE7FACFB04359F100529FB92D22D1D7209C45CB61
                                      APIs
                                      • lstrlen.KERNEL32(?,00000000), ref: 00504652
                                      • lstrcmpiA.KERNEL32(0000000A,?), ref: 00504689
                                      • lstrlen.KERNEL32(?), ref: 005046A1
                                      • GetProcessHeap.KERNEL32(?,-0000000F), ref: 005046AA
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 005046B1
                                      • memset.MSVCRT ref: 005046C9
                                      • GetTickCount.KERNEL32 ref: 005046D5
                                      • lstrcpy.KERNEL32(0000000A,?), ref: 005046EE
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heaplstrlen$AllocateCountProcessTicklstrcmpilstrcpymemset
                                      • String ID:
                                      • API String ID: 518059893-0
                                      • Opcode ID: 1daf1c05f38e62147fa237e0655a6596e761156900e08a1e520a1545e835069c
                                      • Instruction ID: 707180101a398f47e83f4d7edf7de099827023ee405d7e436c1cd2a4ce101803
                                      • Opcode Fuzzy Hash: 1daf1c05f38e62147fa237e0655a6596e761156900e08a1e520a1545e835069c
                                      • Instruction Fuzzy Hash: E2212676800655ABC7219F64DC08BDF7BE8FB19350F004865EA86D3290E770E9489FA1
                                      APIs
                                      • isdigit.MSVCRT ref: 005034F2
                                      • memset.MSVCRT ref: 00503548
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000014,00000000,00000000,?,?,00000000), ref: 00503572
                                      • lstrlen.KERNEL32(00000000,?,?,00000000), ref: 0050358E
                                      • lstrlen.KERNEL32(?,?,?,00000000), ref: 005035A9
                                      • lstrlen.KERNEL32(00000000,?,?,00000000), ref: 005035F0
                                      • memcpy.MSVCRT ref: 00503602
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrlen$ByteCharMultiWideisdigitmemcpymemset
                                      • String ID:
                                      • API String ID: 3478709927-0
                                      • Opcode ID: 20185cf25f03a19cac97d795cc106f02322d58cc053b962646699da87d9d3388
                                      • Instruction ID: 23a442e20ae22f83cb2f45545b469242e3b658874f908f9248848cc5510e9995
                                      • Opcode Fuzzy Hash: 20185cf25f03a19cac97d795cc106f02322d58cc053b962646699da87d9d3388
                                      • Instruction Fuzzy Hash: BE41B471804299AFDB25CFA4C988AEE7FACAF19344F14019DD882A7191D6719F49CB60
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4b01e0d636c3c5e7f2603455e11ec21e70862c83b27c4529908b2baa5dc44e6a
                                      • Instruction ID: 1af87907bf89bedeb0649b551357384cbbe48afd0fdc4005cd780a5b5450faca
                                      • Opcode Fuzzy Hash: 4b01e0d636c3c5e7f2603455e11ec21e70862c83b27c4529908b2baa5dc44e6a
                                      • Instruction Fuzzy Hash: 7841B039A00219ABCB00DFA5CC84AEEBBF8FF48715F104456E959E7291E3749A41CB64
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000090,00000000,?,?,005049A9,?,00000000,?,?,00504A02,?), ref: 005048E1
                                      • RtlAllocateHeap.NTDLL(00000000,?,005049A9), ref: 005048E8
                                      • memset.MSVCRT ref: 005048FC
                                      • lstrcpyn.KERNEL32(00000010,?,0000007F,?), ref: 00504915
                                      • GetTickCount.KERNEL32 ref: 0050491B
                                      • GetTickCount.KERNEL32 ref: 00504942
                                      • lstrcpyn.KERNEL32(00000010,?,0000007F,?,005049A9,?,00000000,?,?,00504A02,?), ref: 0050495B
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CountHeapTicklstrcpyn$AllocateProcessmemset
                                      • String ID:
                                      • API String ID: 2696074827-0
                                      • Opcode ID: 1c86731311e4b75f3192dccd85ac791b4297224c5a05b58980cdcf0866b5c10e
                                      • Instruction ID: 703d1ba90af1539a1c1e71d69a92d341ab7fc86eaf6e4218c2875852d7dfb891
                                      • Opcode Fuzzy Hash: 1c86731311e4b75f3192dccd85ac791b4297224c5a05b58980cdcf0866b5c10e
                                      • Instruction Fuzzy Hash: A0214AB2900B919FD730DF64D98896FBBE4FF54700B108D2DE69AD3691D334A8489F51
                                      APIs
                                      • GetLocalTime.KERNEL32(?), ref: 005032E0
                                      • FileTimeToLocalFileTime.KERNEL32(00000000,?), ref: 005032EF
                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 005032FD
                                      • GetTimeZoneInformation.KERNEL32(?), ref: 0050330B
                                      • wsprintfA.USER32 ref: 00503399
                                      Strings
                                      • %s, %u %s %u %.2u:%.2u:%.2u %c%.2u%.2u, xrefs: 00503391
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Time$File$Local$InformationSystemZonewsprintf
                                      • String ID: %s, %u %s %u %.2u:%.2u:%.2u %c%.2u%.2u
                                      • API String ID: 4026320513-1580571061
                                      • Opcode ID: 3a7b98e65f6c78f5d9b51af2aadc7aef16cb77ea1e4a24cd175063a99b3a5637
                                      • Instruction ID: a724780acf2ae77f2b438354054414b458c2743b998ef78bcc664df01f72aa73
                                      • Opcode Fuzzy Hash: 3a7b98e65f6c78f5d9b51af2aadc7aef16cb77ea1e4a24cd175063a99b3a5637
                                      • Instruction Fuzzy Hash: 7921287290024CAADF24DF99DC59AFE3BBDBF08705F10441AF956C2090E778CA88DB65
                                      APIs
                                        • Part of subcall function 005073E8: GetTempPathA.KERNEL32(00000104,?), ref: 005073FD
                                        • Part of subcall function 005073E8: lstrlen.KERNEL32(?), ref: 0050740A
                                        • Part of subcall function 005073E8: lstrcat.KERNEL32(?,zincite), ref: 00507448
                                        • Part of subcall function 005073E8: lstrcat.KERNEL32(?,.log), ref: 00507456
                                        • Part of subcall function 005073E8: lstrcpy.KERNEL32(?,?), ref: 00507462
                                      • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000,00000104), ref: 0050757A
                                      • WriteFile.KERNEL32( _P,?,00000000,00000000,00000000), ref: 005075B7
                                      • ReadFile.KERNEL32(00000000,?,00000100,00000000,00000000,00000000,00000000), ref: 005075D0
                                      • CloseHandle.KERNEL32(?), ref: 005075DA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$lstrcat$CloseCreateHandlePathReadTempWritelstrcpylstrlen
                                      • String ID: _P$ _P
                                      • API String ID: 285733917-3595566573
                                      • Opcode ID: a1883ad2f206a693e9717ab779b99790b24625ca6c7e82073e9dc987f6aa6288
                                      • Instruction ID: 95e29d51a280f3ee1416f365a270c88ebcaea3d62707c39128d041610a3427a9
                                      • Opcode Fuzzy Hash: a1883ad2f206a693e9717ab779b99790b24625ca6c7e82073e9dc987f6aa6288
                                      • Instruction Fuzzy Hash: 3211FAB690410CFFEB11DB94DC88EEEBB7CEB58354F1001A6B681A2090DA706F84DB60
                                      APIs
                                      • GetModuleHandleA.KERNEL32(urlmon.dll,?,00000200), ref: 0050795B
                                      • LoadLibraryA.KERNEL32(urlmon.dll,?,00000200), ref: 00507966
                                      • GetProcAddress.KERNEL32(00000000,URLDownloadToCacheFileA), ref: 00507976
                                      • lstrcpy.KERNEL32(?,?), ref: 005079A8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressHandleLibraryLoadModuleProclstrcpy
                                      • String ID: URLDownloadToCacheFileA$urlmon.dll
                                      • API String ID: 1765825236-446873360
                                      • Opcode ID: 8d756ae2cdbdadfac3edac27fec9d7869389870997cdf4f7ecb942f188448ba0
                                      • Instruction ID: 185a24763c0bcb0fc453a4a8a7a4dc2d3681b975c5b2d20548b30850ca32465b
                                      • Opcode Fuzzy Hash: 8d756ae2cdbdadfac3edac27fec9d7869389870997cdf4f7ecb942f188448ba0
                                      • Instruction Fuzzy Hash: A0F0C872A0861977E7115B748C59FEF7F6CAF59B40F000424FA45D10C0EBB0E54986A5
                                      APIs
                                      • GetTempPathA.KERNEL32(00000104,?,00000000,?), ref: 00505F41
                                      • GetTempFileNameA.KERNEL32(?,tmp,00000000,?), ref: 00505F5C
                                      • CopyFileA.KERNEL32(005065B9,?,00000000), ref: 00505F75
                                        • Part of subcall function 00505EE3: CreateFileA.KERNEL32(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,?,00506082,?), ref: 00505EFA
                                        • Part of subcall function 00505EE3: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00505F14
                                        • Part of subcall function 00505EE3: CloseHandle.KERNEL32(00000000), ref: 00505F22
                                      • DeleteFileA.KERNEL32(005065B9), ref: 00505F94
                                      • lstrcpy.KERNEL32(005065B9,?), ref: 00505FA2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$Temp$CloseCopyCreateDeleteHandleNamePathPointerlstrcpy
                                      • String ID: tmp
                                      • API String ID: 2319981759-753892680
                                      • Opcode ID: edf9a31c2175ba5224d3b1140d48908c277679a7e7ee6f9f0873a1c53c273d39
                                      • Instruction ID: b6d547f1361db50440f4c558ef177c196600c1e2c9737aacd924c07538a66ded
                                      • Opcode Fuzzy Hash: edf9a31c2175ba5224d3b1140d48908c277679a7e7ee6f9f0873a1c53c273d39
                                      • Instruction Fuzzy Hash: B101A2B690065AAFDB109B60DC8DFDE7BBCAB54700F000095F6C5E2091E6B466C9CF62
                                      APIs
                                      • lstrlen.KERNEL32(?,?,00000000,?,005045EB,75570440,?,?,00504669), ref: 00504311
                                      • lstrlen.KERNEL32(?,?,005045EB,75570440,?,?,00504669), ref: 0050433A
                                      • lstrlen.KERNEL32(0050B178,?,005045EB,75570440,?,?,00504669), ref: 00504373
                                      • lstrlen.KERNEL32(0050B280,?,005045EB,75570440,?,?,00504669), ref: 0050438D
                                      • lstrlen.KERNEL32(0050B280,?,005045EB,75570440,?,?,00504669), ref: 005043A3
                                      • lstrlen.KERNEL32(0050B178,?,005045EB,75570440,?,?,00504669), ref: 005043FB
                                      • lstrlen.KERNEL32(0050B178,?,005045EB,75570440,?,?,00504669), ref: 00504410
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrlen
                                      • String ID:
                                      • API String ID: 1659193697-0
                                      • Opcode ID: 7234369e607e997fc05737b92fa64be9d20d6ac8b389998761447fe385796dbe
                                      • Instruction ID: 2d6b92822a5ce253097b69b3c07574bdd26a63d487101100c5e09b38dca8b49d
                                      • Opcode Fuzzy Hash: 7234369e607e997fc05737b92fa64be9d20d6ac8b389998761447fe385796dbe
                                      • Instruction Fuzzy Hash: CB419FF0A4564ACBFB214F34AEF836E3EE4B759705F90152ADB41C72A1E7248889DF01
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: DeleteFileGlobal$AllocFreelstrlenmemset
                                      • String ID:
                                      • API String ID: 986129705-0
                                      • Opcode ID: 4c90d994264b9204437239440c9f2a011719593cc0af8fd6ea9cc6a8c8256f8d
                                      • Instruction ID: 64ff1dbb5a700912d54094296ca3f5a4976b8a1cb91408c58090539e8bb41b0b
                                      • Opcode Fuzzy Hash: 4c90d994264b9204437239440c9f2a011719593cc0af8fd6ea9cc6a8c8256f8d
                                      • Instruction Fuzzy Hash: 6631AA72D04259DBDB10EB61DC89ADD7BB9FF85700F1044EAE109E6181D734AE948FA0
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: htons$CountTickmemsetsendto
                                      • String ID:
                                      • API String ID: 2621409306-0
                                      • Opcode ID: b3b5947bce572049420d80081d79d006cc1fcd4d3d740dc27c7c1cedb21463b1
                                      • Instruction ID: db08ba042e804f953b88991fca2d77eeadd2c4749c7c0b9e33eca97f00638003
                                      • Opcode Fuzzy Hash: b3b5947bce572049420d80081d79d006cc1fcd4d3d740dc27c7c1cedb21463b1
                                      • Instruction Fuzzy Hash: 1E312121A0025A5BDB258FB48C04BEE7BE8FF14304F1440B8EA09A7291E3B05E86CB59
                                      APIs
                                      • lstrcpyn.KERNEL32(?,-00000009,0000007F,00000000), ref: 00504824
                                      • lstrlen.KERNEL32(?), ref: 0050482E
                                      • GetProcessHeap.KERNEL32(00000000,-0000000A), ref: 0050483A
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00504841
                                      • lstrcpy.KERNEL32(00000000,?), ref: 00504852
                                      • CreateThread.KERNEL32(00000000,00000000,0050477F,00000000,00000000,?), ref: 00504868
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocateCreateProcessThreadlstrcpylstrcpynlstrlen
                                      • String ID:
                                      • API String ID: 3371211169-0
                                      • Opcode ID: b0110b9564446553085c75ac71a692edf586f148188e76fdc507fc1a0d64157a
                                      • Instruction ID: 07f746d2b3960384b515d2a8365d25916a05af25f1ccb339341a6fe92818cc76
                                      • Opcode Fuzzy Hash: b0110b9564446553085c75ac71a692edf586f148188e76fdc507fc1a0d64157a
                                      • Instruction Fuzzy Hash: AA11E2B5E00AA59BEB208BB59D5DBBE3BACFF50700F148811FB46D70D0EB20C8058B65
                                      APIs
                                      • InterlockedIncrement.KERNEL32(0050B390), ref: 00504A3F
                                      • GetCurrentThread.KERNEL32 ref: 00504A47
                                      • SetThreadPriority.KERNEL32(00000000), ref: 00504A4E
                                      • InterlockedDecrement.KERNEL32(0050B390), ref: 00504A75
                                      • RtlExitUserThread.NTDLL(00000000), ref: 00504A7D
                                        • Part of subcall function 005049C5: lstrcpyn.KERNEL32(?,?,0000007F), ref: 005049F3
                                        • Part of subcall function 005049C5: GlobalFree.KERNEL32(00000000), ref: 00504A22
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Thread$Interlocked$CurrentDecrementExitFreeGlobalIncrementPriorityUserlstrcpyn
                                      • String ID:
                                      • API String ID: 3760226487-0
                                      • Opcode ID: 4cbbf26141544510d966b90899a4a27ebab7c4cfef4a543942c3c1baaca5dbd7
                                      • Instruction ID: 59da798909faaf52fbb5bb2341fb00456894eff524a9a69de734a8fe505154a2
                                      • Opcode Fuzzy Hash: 4cbbf26141544510d966b90899a4a27ebab7c4cfef4a543942c3c1baaca5dbd7
                                      • Instruction Fuzzy Hash: 79E0E532504690DBD3105BA5AC1CB9F7FE8BB95721F05C519F19AC21D187701088AA7B
                                      APIs
                                      • GetCurrentThread.KERNEL32 ref: 00504782
                                      • SetThreadPriority.KERNEL32(00000000), ref: 00504789
                                      • RtlExitUserThread.NTDLL(00000000), ref: 005047B0
                                        • Part of subcall function 00504708: memset.MSVCRT ref: 00504721
                                        • Part of subcall function 00504708: memset.MSVCRT ref: 0050474B
                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 005047A1
                                      • HeapFree.KERNEL32(00000000), ref: 005047A8
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Thread$Heapmemset$CurrentExitFreePriorityProcessUser
                                      • String ID:
                                      • API String ID: 2017824994-0
                                      • Opcode ID: 836c254a06e8348137cac086d59406f412e6514e815de78c3af08e5fd35cbc47
                                      • Instruction ID: 134dd03ee56ed5e35b093408589009be06d3af64b950e7fdb32cbac4dc487e3d
                                      • Opcode Fuzzy Hash: 836c254a06e8348137cac086d59406f412e6514e815de78c3af08e5fd35cbc47
                                      • Instruction Fuzzy Hash: 66E0EC72545A60ABD6102BA1AD1DB8E3FA8EF15762F054101F69A960E08B6054849ABB
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: isspace$lstrcpy
                                      • String ID: EP
                                      • API String ID: 3591682678-39091752
                                      • Opcode ID: 97e05d28098dfa30c11553f396c773aa8e9dcaeee145c2bf642825238118a22f
                                      • Instruction ID: d322a60b3cd344418dea32cdce2ecae7b80887596fe3726befac56383c2b426d
                                      • Opcode Fuzzy Hash: 97e05d28098dfa30c11553f396c773aa8e9dcaeee145c2bf642825238118a22f
                                      • Instruction Fuzzy Hash: 2011E7E96087D39EEB224EB4444477E7FD87F56311F0805A9F7D0861D6C3A48885CBA1
                                      APIs
                                      • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 005031C3
                                      • GetProcAddress.KERNEL32(00000000,RegisterServiceProcess), ref: 005031D2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressHandleModuleProc
                                      • String ID: RegisterServiceProcess$kernel32.dll
                                      • API String ID: 1646373207-4020013434
                                      • Opcode ID: 88f355962e72c872d7e8e3649b1a006756f8412f5a34d5979d28c820e35911b0
                                      • Instruction ID: a02a020f7e88b2a2deb55d5915b0d8113451b0eb92c2fbf378a69a289d5184d3
                                      • Opcode Fuzzy Hash: 88f355962e72c872d7e8e3649b1a006756f8412f5a34d5979d28c820e35911b0
                                      • Instruction Fuzzy Hash: A711BF10D0C6C999FB0297B8891979EBEA61F22749F0840C894846A2D2C6FF5718D3B6
                                      APIs
                                      • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 00506C46
                                      • lstrlen.KERNEL32(00000000), ref: 00506C55
                                      • CharLowerA.USER32(00000000), ref: 00506C74
                                      • lstrcmpiA.KERNEL32(00000000,?), ref: 00506C84
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2620386663.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                      • Associated: 00000008.00000002.2620272787.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2620386663.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622374203.000000000050E000.00000080.00000001.01000000.00000007.sdmpDownload File
                                      • Associated: 00000008.00000002.2622532240.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_500000_java.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrlen$CharLowerlstrcmpi
                                      • String ID:
                                      • API String ID: 1011886143-0
                                      • Opcode ID: 1614e062b7db843fd35929ba8e3fbe92fee8bfd64a38d3db1eeeb3163424b487
                                      • Instruction ID: a780f0e17b679421bcea0a2979c9bb813d318467be715c50e32b2a5f4f05fe6d
                                      • Opcode Fuzzy Hash: 1614e062b7db843fd35929ba8e3fbe92fee8bfd64a38d3db1eeeb3163424b487
                                      • Instruction Fuzzy Hash: F351D476A481994AFF364B2C84187FC7FD6FB26340F9814AAC8C1861D6D2648CF3C75A