Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
GdsGKfLRby.exe

Overview

General Information

Sample name:GdsGKfLRby.exe
renamed because original name is a hash value
Original sample name:b437936e1752bd430545f30ba5223fabe413dc39ec2a82f437d11fd857dcede8.exe
Analysis ID:1447645
MD5:48e6ba377d90401cee819471fcea38b9
SHA1:0f6f6ef2b5691946703d37a6316452dda6d5eab5
SHA256:b437936e1752bd430545f30ba5223fabe413dc39ec2a82f437d11fd857dcede8
Tags:exeNetWire
Infos:

Detection

NetWire
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected NetWire RAT
C2 URLs / IPs found in malware configuration
Contains functionality to log keystrokes
Found evasive API chain (may stop execution after checking mutex)
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality to dynamically determine API calls
Contains functionality to record screenshots
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Detected potential crypto function
Found decision node followed by non-executed suspicious APIs
Found evasive API chain (may stop execution after accessing registry keys)
Found large amount of non-executed APIs
One or more processes crash
PE file contains an invalid checksum
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • GdsGKfLRby.exe (PID: 6496 cmdline: "C:\Users\user\Desktop\GdsGKfLRby.exe" MD5: 48E6BA377D90401CEE819471FCEA38B9)
    • WerFault.exe (PID: 3140 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6496 -s 400 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
NetWire RC, NetWireNetwire is a RAT, its functionality seems focused on password stealing and keylogging, but includes remote control capabilities as well.Keylog files are stored on the infected machine in an obfuscated form. The algorithm is: for i in range(0,num_read): buffer[i] = ((buffer[i]-0x24)^0x9D)&0xFF
  • APT33
https://malpedia.caad.fkie.fraunhofer.de/details/win.netwire
{"C2 list": ["netwire2021.duckdns.org:7929"], "Password": "Password", "Host ID": "HostId-yISsE2", "Mutex": "qFlJFfII", "Install Path": "-", "Startup Name": "-", "ActiveX Key": "-", "KeyLog Directory": "C:\\Users\\Administrator\\AppData\\Roaming\\Logs\\"}
SourceRuleDescriptionAuthorStrings
GdsGKfLRby.exeJoeSecurity_NetWire_1Yara detected NetWire RATJoe Security
    GdsGKfLRby.exeWindows_Trojan_Netwire_6a7df287unknownunknown
    • 0x724e:$a: 0F B6 74 0C 10 89 CF 29 C7 F7 C6 DF 00 00 00 74 09 41 89 F3 88 5C
    GdsGKfLRby.exeWindows_Trojan_Netwire_1b43df38unknownunknown
    • 0x21be5:$a1: [%.2d/%.2d/%d %.2d:%.2d:%.2d]
    • 0x2247b:$a2: \Login Data
    • 0x224f4:$a2: \Login Data
    • 0x22572:$a2: \Login Data
    • 0x22603:$a2: \Login Data
    • 0x2266d:$a2: \Login Data
    • 0x226d3:$a2: \Login Data
    • 0x22701:$a2: \Login Data
    • 0x21a4d:$a3: SOFTWARE\NetWire
    GdsGKfLRby.exeMALWARE_Win_NetWireDetects NetWire RATditekSHen
    • 0x21a4d:$x1: SOFTWARE\NetWire
    • 0x21a34:$x2: 4E 65 74 57 69 72 65 00 53 4F 46 54 57 41 52 45 5C 00
    • 0x21ae0:$s1: User-Agent: Mozilla/4.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
    • 0x2191e:$s2: filenames.txt
    • 0x21ac4:$s3: GET %s HTTP/1.1
    • 0x21be5:$s4: [%.2d/%.2d/%d %.2d:%.2d:%.2d]
    • 0x25e28:$s5: Host.exe
    • 0x21a72:$s6: -m "%s"
    • 0x20f80:$g1: HostId
    • 0x21a46:$g1: HostId
    • 0x223b0:$g2: History
    • 0x22410:$g3: encrypted_key
    • 0x21a65:$g4: Install Date
    • 0x21ffd:$g5: hostname
    • 0x22006:$g6: encryptedUsername
    • 0x22018:$g7: encryptedPassword
    SourceRuleDescriptionAuthorStrings
    00000001.00000000.2103922275.0000000000401000.00000020.00000001.01000000.00000003.sdmpWindows_Trojan_Netwire_6a7df287unknownunknown
    • 0x6e4e:$a: 0F B6 74 0C 10 89 CF 29 C7 F7 C6 DF 00 00 00 74 09 41 89 F3 88 5C
    00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpJoeSecurity_NetWire_1Yara detected NetWire RATJoe Security
      00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpWindows_Trojan_Netwire_1b43df38unknownunknown
      • 0x1e5:$a1: [%.2d/%.2d/%d %.2d:%.2d:%.2d]
      • 0xa7b:$a2: \Login Data
      • 0xaf4:$a2: \Login Data
      • 0xb72:$a2: \Login Data
      • 0xc03:$a2: \Login Data
      • 0xc6d:$a2: \Login Data
      • 0xcd3:$a2: \Login Data
      • 0xd01:$a2: \Login Data
      • 0x4d:$a3: SOFTWARE\NetWire
      00000001.00000000.2103948547.0000000000422000.00000008.00000001.01000000.00000003.sdmpJoeSecurity_NetWire_1Yara detected NetWire RATJoe Security
        00000001.00000000.2103948547.0000000000422000.00000008.00000001.01000000.00000003.sdmpWindows_Trojan_Netwire_1b43df38unknownunknown
        • 0x11e5:$a1: [%.2d/%.2d/%d %.2d:%.2d:%.2d]
        • 0x1a7b:$a2: \Login Data
        • 0x1af4:$a2: \Login Data
        • 0x1b72:$a2: \Login Data
        • 0x1c03:$a2: \Login Data
        • 0x1c6d:$a2: \Login Data
        • 0x1cd3:$a2: \Login Data
        • 0x1d01:$a2: \Login Data
        • 0x104d:$a3: SOFTWARE\NetWire
        Click to see the 3 entries
        SourceRuleDescriptionAuthorStrings
        1.0.GdsGKfLRby.exe.400000.0.unpackJoeSecurity_NetWire_1Yara detected NetWire RATJoe Security
          1.0.GdsGKfLRby.exe.400000.0.unpackWindows_Trojan_Netwire_6a7df287unknownunknown
          • 0x724e:$a: 0F B6 74 0C 10 89 CF 29 C7 F7 C6 DF 00 00 00 74 09 41 89 F3 88 5C
          1.0.GdsGKfLRby.exe.400000.0.unpackWindows_Trojan_Netwire_1b43df38unknownunknown
          • 0x21be5:$a1: [%.2d/%.2d/%d %.2d:%.2d:%.2d]
          • 0x2247b:$a2: \Login Data
          • 0x224f4:$a2: \Login Data
          • 0x22572:$a2: \Login Data
          • 0x22603:$a2: \Login Data
          • 0x2266d:$a2: \Login Data
          • 0x226d3:$a2: \Login Data
          • 0x22701:$a2: \Login Data
          • 0x21a4d:$a3: SOFTWARE\NetWire
          1.0.GdsGKfLRby.exe.400000.0.unpackMALWARE_Win_NetWireDetects NetWire RATditekSHen
          • 0x21a4d:$x1: SOFTWARE\NetWire
          • 0x21a34:$x2: 4E 65 74 57 69 72 65 00 53 4F 46 54 57 41 52 45 5C 00
          • 0x21ae0:$s1: User-Agent: Mozilla/4.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
          • 0x2191e:$s2: filenames.txt
          • 0x21ac4:$s3: GET %s HTTP/1.1
          • 0x21be5:$s4: [%.2d/%.2d/%d %.2d:%.2d:%.2d]
          • 0x21a72:$s6: -m "%s"
          • 0x20f80:$g1: HostId
          • 0x21a46:$g1: HostId
          • 0x223b0:$g2: History
          • 0x22410:$g3: encrypted_key
          • 0x21a65:$g4: Install Date
          • 0x21ffd:$g5: hostname
          • 0x22006:$g6: encryptedUsername
          • 0x22018:$g7: encryptedPassword
          1.2.GdsGKfLRby.exe.400000.0.unpackJoeSecurity_NetWire_1Yara detected NetWire RATJoe Security
            Click to see the 3 entries
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: GdsGKfLRby.exeAvira: detected
            Source: netwire2021.duckdns.org:7929Avira URL Cloud: Label: malware
            Source: 1.2.GdsGKfLRby.exe.400000.0.unpackMalware Configuration Extractor: NetWire {"C2 list": ["netwire2021.duckdns.org:7929"], "Password": "Password", "Host ID": "HostId-yISsE2", "Mutex": "qFlJFfII", "Install Path": "-", "Startup Name": "-", "ActiveX Key": "-", "KeyLog Directory": "C:\\Users\\Administrator\\AppData\\Roaming\\Logs\\"}
            Source: netwire2021.duckdns.org:7929Virustotal: Detection: 5%Perma Link
            Source: GdsGKfLRby.exeReversingLabs: Detection: 97%
            Source: GdsGKfLRby.exeVirustotal: Detection: 87%Perma Link
            Source: GdsGKfLRby.exeJoe Sandbox ML: detected
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_0040C4B7 RegOpenKeyExA,RegEnumKeyExA,RegOpenKeyExA,RegCloseKey,RegOpenKeyExA,RegEnumKeyExA,RegOpenKeyExA,RegCloseKey,RegCloseKey,CryptUnprotectData,LocalFree,CryptUnprotectData,LocalFree,1_2_0040C4B7
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_0040E511 CryptUnprotectData,LocalFree,1_2_0040E511
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_0040EDD6 fopen,malloc,fclose,fread,fclose,CryptUnprotectData,sprintf,strcmp,strcmp,1_2_0040EDD6
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_0040D290 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,1_2_0040D290
            Source: GdsGKfLRby.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_00406453 MultiByteToWideChar,SetErrorMode,FindFirstFileW,FileTimeToSystemTime,WideCharToMultiByte,WideCharToMultiByte,FindNextFileW,FindClose,1_2_00406453
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_0040680D SetErrorMode,MultiByteToWideChar,wcscat,FindFirstFileW,FindClose,WideCharToMultiByte,FindNextFileW,1_2_0040680D
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_0040753D MultiByteToWideChar,SetErrorMode,MultiByteToWideChar,wcscat,FindFirstFileW,FindClose,WideCharToMultiByte,MultiByteToWideChar,wcscat,WideCharToMultiByte,FindNextFileW,1_2_0040753D
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_00413A85 SetErrorMode,MultiByteToWideChar,FindFirstFileW,WideCharToMultiByte,WideCharToMultiByte,FindNextFileW,FindClose,1_2_00413A85
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_0040DB1C SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,1_2_0040DB1C
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_00406F83 SetErrorMode,FindFirstFileA,strcmp,strcmp,strcat,fopen,strncpy,fclose,strcpy,FindNextFileA,FindClose,1_2_00406F83
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_00406390 FindFirstFileW,fopen,_snwprintf,fwprintf,_snwprintf,FindNextFileW,FindClose,fclose,1_2_00406390
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_00406084 SetErrorMode,GetLogicalDriveStringsA,GetVolumeInformationA,GetDiskFreeSpaceExA,GetDriveTypeA,1_2_00406084

            Networking

            barindex
            Source: Malware configuration extractorURLs: netwire2021.duckdns.org:7929
            Source: unknownDNS traffic detected: query: 171.39.242.20.in-addr.arpa replaycode: Name error (3)
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_00405811 send,recv,1_2_00405811
            Source: global trafficDNS traffic detected: DNS query: 171.39.242.20.in-addr.arpa
            Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
            Source: GdsGKfLRby.exeString found in binary or memory: http://www.yandex.com
            Source: GdsGKfLRby.exeString found in binary or memory: http://www.yandex.comsocks=

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_00409953 GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyboardState,MapVirtualKeyW,ToUnicode,WideCharToMultiByte,GetKeyState,MapVirtualKeyW,GetKeyNameTextW,GetKeyState,WideCharToMultiByte,1_2_00409953
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_00411D8C GetSystemMetrics,GetSystemMetrics,GetDesktopWindow,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,GetDIBits,calloc,GetDIBits,ReleaseDC,DeleteDC,DeleteObject,free,1_2_00411D8C
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_00409953 GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyboardState,MapVirtualKeyW,ToUnicode,WideCharToMultiByte,GetKeyState,MapVirtualKeyW,GetKeyNameTextW,GetKeyState,WideCharToMultiByte,1_2_00409953
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_00409953 GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyboardState,MapVirtualKeyW,ToUnicode,WideCharToMultiByte,GetKeyState,MapVirtualKeyW,GetKeyNameTextW,GetKeyState,WideCharToMultiByte,1_2_00409953

            System Summary

            barindex
            Source: GdsGKfLRby.exe, type: SAMPLEMatched rule: Windows_Trojan_Netwire_6a7df287 Author: unknown
            Source: GdsGKfLRby.exe, type: SAMPLEMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
            Source: GdsGKfLRby.exe, type: SAMPLEMatched rule: Detects NetWire RAT Author: ditekSHen
            Source: 1.0.GdsGKfLRby.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_6a7df287 Author: unknown
            Source: 1.0.GdsGKfLRby.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
            Source: 1.0.GdsGKfLRby.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NetWire RAT Author: ditekSHen
            Source: 1.2.GdsGKfLRby.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_6a7df287 Author: unknown
            Source: 1.2.GdsGKfLRby.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
            Source: 1.2.GdsGKfLRby.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NetWire RAT Author: ditekSHen
            Source: 00000001.00000000.2103922275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_6a7df287 Author: unknown
            Source: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
            Source: 00000001.00000000.2103948547.0000000000422000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
            Source: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_6a7df287 Author: unknown
            Source: Process Memory Space: GdsGKfLRby.exe PID: 6496, type: MEMORYSTRMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeMemory allocated: 703D0000 page read and writeJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeMemory allocated: 713A0000 page read and writeJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeMemory allocated: 72370000 page read and writeJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeMemory allocated: 73AE0000 page read and writeJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeMemory allocated: 77030000 page read and writeJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeMemory allocated: 78000000 page read and writeJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeMemory allocated: 73340000 page read and writeJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeMemory allocated: 763B0000 page read and writeJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeMemory allocated: 73740000 page read and writeJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeMemory allocated: 74AB0000 page read and writeJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeMemory allocated: 76080000 page read and writeJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeMemory allocated: 76BF0000 page read and writeJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeMemory allocated: 74CB0000 page read and writeJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeMemory allocated: 75BF0000 page read and writeJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeMemory allocated: 767B0000 page read and writeJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeMemory allocated: 73940000 page read and writeJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeMemory allocated: 74DB0000 page read and writeJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeMemory allocated: 750F0000 page read and writeJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeMemory allocated: 75280000 page read and writeJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeMemory allocated: 768B0000 page read and writeJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeMemory allocated: 76DF0000 page read and writeJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeMemory allocated: 73A80000 page read and writeJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeMemory allocated: 75170000 page read and writeJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeMemory allocated: 759F0000 page read and writeJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeMemory allocated: 75CF0000 page read and writeJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeMemory allocated: 75F80000 page read and writeJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeMemory allocated: 76280000 page read and writeJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeMemory allocated: 76930000 page read and writeJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeMemory allocated: 76B70000 page read and writeJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeMemory allocated: 75D30000 page read and writeJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeMemory allocated: 762C0000 page read and writeJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_004030471_2_00403047
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_0041D0491_2_0041D049
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_004194631_2_00419463
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_004150791_2_00415079
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_004204201_2_00420420
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_004208C01_2_004208C0
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_004034D31_2_004034D3
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_004149761_2_00414976
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_00402E681_2_00402E68
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_004166191_2_00416619
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_0040AEC61_2_0040AEC6
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_00402AFC1_2_00402AFC
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_00415ABF1_2_00415ABF
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_00420F401_2_00420F40
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_0041FF501_2_0041FF50
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_0040A7281_2_0040A728
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6496 -s 400
            Source: GdsGKfLRby.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
            Source: GdsGKfLRby.exe, type: SAMPLEMatched rule: Windows_Trojan_Netwire_6a7df287 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 85051a0b94da4388eaead4c4f4b2d16d4a5eb50c3c938b3daf5c299c9c12f1e6, id = 6a7df287-1656-4779-9a96-c0ab536ae86a, last_modified = 2021-08-23
            Source: GdsGKfLRby.exe, type: SAMPLEMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
            Source: GdsGKfLRby.exe, type: SAMPLEMatched rule: MALWARE_Win_NetWire author = ditekSHen, description = Detects NetWire RAT
            Source: 1.0.GdsGKfLRby.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_6a7df287 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 85051a0b94da4388eaead4c4f4b2d16d4a5eb50c3c938b3daf5c299c9c12f1e6, id = 6a7df287-1656-4779-9a96-c0ab536ae86a, last_modified = 2021-08-23
            Source: 1.0.GdsGKfLRby.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
            Source: 1.0.GdsGKfLRby.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NetWire author = ditekSHen, description = Detects NetWire RAT
            Source: 1.2.GdsGKfLRby.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_6a7df287 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 85051a0b94da4388eaead4c4f4b2d16d4a5eb50c3c938b3daf5c299c9c12f1e6, id = 6a7df287-1656-4779-9a96-c0ab536ae86a, last_modified = 2021-08-23
            Source: 1.2.GdsGKfLRby.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
            Source: 1.2.GdsGKfLRby.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NetWire author = ditekSHen, description = Detects NetWire RAT
            Source: 00000001.00000000.2103922275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_6a7df287 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 85051a0b94da4388eaead4c4f4b2d16d4a5eb50c3c938b3daf5c299c9c12f1e6, id = 6a7df287-1656-4779-9a96-c0ab536ae86a, last_modified = 2021-08-23
            Source: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
            Source: 00000001.00000000.2103948547.0000000000422000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
            Source: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_6a7df287 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 85051a0b94da4388eaead4c4f4b2d16d4a5eb50c3c938b3daf5c299c9c12f1e6, id = 6a7df287-1656-4779-9a96-c0ab536ae86a, last_modified = 2021-08-23
            Source: Process Memory Space: GdsGKfLRby.exe PID: 6496, type: MEMORYSTRMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@2/5@1/0
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_00406084 SetErrorMode,GetLogicalDriveStringsA,GetVolumeInformationA,GetDiskFreeSpaceExA,GetDriveTypeA,1_2_00406084
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_00402570 CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,1_2_00402570
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6496
            Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\3ab78efb-164e-430d-a63c-7038e90018f3Jump to behavior
            Source: GdsGKfLRby.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: GdsGKfLRby.exeReversingLabs: Detection: 97%
            Source: GdsGKfLRby.exeVirustotal: Detection: 87%
            Source: unknownProcess created: C:\Users\user\Desktop\GdsGKfLRby.exe "C:\Users\user\Desktop\GdsGKfLRby.exe"
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6496 -s 400
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeSection loaded: netapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_00408417 LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,malloc,malloc,malloc,LoadLibraryA,GetProcAddress,malloc,malloc,malloc,malloc,1_2_00408417
            Source: GdsGKfLRby.exeStatic PE information: real checksum: 0x2be0d should be: 0x307b4
            Source: GdsGKfLRby.exeStatic PE information: section name: .eh_fram
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_0040DCE9 push ecx; mov dword ptr [esp], 00423976h1_2_0040DD9F
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_0040DCE9 push ebp; mov dword ptr [esp], 0042398Ah1_2_0040DDD9
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_0040DCE9 push edx; mov dword ptr [esp], 00423997h1_2_0040DDF7
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_0040DCE9 push edx; mov dword ptr [esp], esi1_2_0040E394
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_0040A4BC push esi; mov dword ptr [esp], 00423347h1_2_0040A543
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_00409953 push edi; mov dword ptr [esp], 00000091h1_2_00409980
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_00409953 push ebp; mov dword ptr [esp], 00000090h1_2_0040998D
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_00411D8C push edx; mov dword ptr [esp], edi1_2_00412058
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_00409E61 push eax; mov dword ptr [esp], ebx1_2_00409FDE
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_00406E04 push ecx; mov dword ptr [esp], ebx1_2_00406E69
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_0040262F push edx; mov dword ptr [esp], edi1_2_004027C8
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_0040262F push edx; mov dword ptr [esp], edi1_2_00402815
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_0040262F push edx; mov dword ptr [esp], edi1_2_004029B2
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_004146E1 push eax; mov dword ptr [esp], ebx1_2_0041470B
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_0040970C push eax; mov dword ptr [esp], 0042B4A0h1_2_004097B9
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_1-8686
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_1-8830
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_1-8763
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeAPI coverage: 0.6 %
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_00406453 MultiByteToWideChar,SetErrorMode,FindFirstFileW,FileTimeToSystemTime,WideCharToMultiByte,WideCharToMultiByte,FindNextFileW,FindClose,1_2_00406453
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_0040680D SetErrorMode,MultiByteToWideChar,wcscat,FindFirstFileW,FindClose,WideCharToMultiByte,FindNextFileW,1_2_0040680D
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_0040753D MultiByteToWideChar,SetErrorMode,MultiByteToWideChar,wcscat,FindFirstFileW,FindClose,WideCharToMultiByte,MultiByteToWideChar,wcscat,WideCharToMultiByte,FindNextFileW,1_2_0040753D
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_00413A85 SetErrorMode,MultiByteToWideChar,FindFirstFileW,WideCharToMultiByte,WideCharToMultiByte,FindNextFileW,FindClose,1_2_00413A85
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_0040DB1C SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,1_2_0040DB1C
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_00406F83 SetErrorMode,FindFirstFileA,strcmp,strcmp,strcat,fopen,strncpy,fclose,strcpy,FindNextFileA,FindClose,1_2_00406F83
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_00406390 FindFirstFileW,fopen,_snwprintf,fwprintf,_snwprintf,FindNextFileW,FindClose,fclose,1_2_00406390
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_00406084 SetErrorMode,GetLogicalDriveStringsA,GetVolumeInformationA,GetDiskFreeSpaceExA,GetDriveTypeA,1_2_00406084
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_004132E6 GetVersionExA,GetVersionExA,GetSystemInfo,GetSystemMetrics,1_2_004132E6
            Source: Amcache.hve.5.drBinary or memory string: VMware
            Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
            Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
            Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
            Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
            Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
            Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
            Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
            Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
            Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: GdsGKfLRby.exe, 00000001.00000002.2548942981.000000000064E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: Amcache.hve.5.drBinary or memory string: vmci.sys
            Source: Amcache.hve.5.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
            Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
            Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
            Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: Amcache.hve.5.drBinary or memory string: VMware20,1
            Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
            Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
            Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
            Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
            Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
            Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
            Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
            Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
            Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
            Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
            Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeAPI call chain: ExitProcess graph end nodegraph_1-8573
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeAPI call chain: ExitProcess graph end nodegraph_1-8546
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_00408417 LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,malloc,malloc,malloc,LoadLibraryA,GetProcAddress,malloc,malloc,malloc,malloc,1_2_00408417
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_004121C0 keybd_event,1_2_004121C0
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_004121EF SetCursorPos,mouse_event,1_2_004121EF
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_0040A115 GetLocalTime,1_2_0040A115
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_004130E8 GetUserNameW,WideCharToMultiByte,1_2_004130E8
            Source: C:\Users\user\Desktop\GdsGKfLRby.exeCode function: 1_2_004132E6 GetVersionExA,GetVersionExA,GetSystemInfo,GetSystemMetrics,1_2_004132E6
            Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
            Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
            Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
            Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: GdsGKfLRby.exe, type: SAMPLE
            Source: Yara matchFile source: 1.0.GdsGKfLRby.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.GdsGKfLRby.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000000.2103948547.0000000000422000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: GdsGKfLRby.exe PID: 6496, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
            Native API
            1
            DLL Side-Loading
            1
            Process Injection
            1
            Process Injection
            121
            Input Capture
            1
            System Time Discovery
            Remote Services1
            Screen Capture
            2
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            DLL Side-Loading
            1
            Obfuscated Files or Information
            LSASS Memory11
            Security Software Discovery
            Remote Desktop Protocol121
            Input Capture
            1
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
            DLL Side-Loading
            Security Account Manager1
            Process Discovery
            SMB/Windows Admin Shares1
            Archive Collected Data
            1
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
            Account Discovery
            Distributed Component Object ModelInput Capture11
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
            System Owner/User Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials2
            File and Directory Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync5
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            GdsGKfLRby.exe97%ReversingLabsWin32.Backdoor.NetWired
            GdsGKfLRby.exe88%VirustotalBrowse
            GdsGKfLRby.exe100%AviraTR/Spy.Gen
            GdsGKfLRby.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            171.39.242.20.in-addr.arpa1%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://upx.sf.net0%URL Reputationsafe
            netwire2021.duckdns.org:79296%VirustotalBrowse
            http://www.yandex.comsocks=0%Avira URL Cloudsafe
            http://www.yandex.com0%Avira URL Cloudsafe
            http://www.yandex.com0%VirustotalBrowse
            netwire2021.duckdns.org:7929100%Avira URL Cloudmalware
            NameIPActiveMaliciousAntivirus DetectionReputation
            171.39.242.20.in-addr.arpa
            unknown
            unknowntrueunknown
            NameMaliciousAntivirus DetectionReputation
            netwire2021.duckdns.org:7929true
            • 6%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://upx.sf.netAmcache.hve.5.drfalse
            • URL Reputation: safe
            unknown
            http://www.yandex.comGdsGKfLRby.exefalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.yandex.comsocks=GdsGKfLRby.exefalse
            • Avira URL Cloud: safe
            unknown
            No contacted IP infos
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1447645
            Start date and time:2024-05-26 09:55:12 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 5m 22s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:9
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:GdsGKfLRby.exe
            renamed because original name is a hash value
            Original Sample Name:b437936e1752bd430545f30ba5223fabe413dc39ec2a82f437d11fd857dcede8.exe
            Detection:MAL
            Classification:mal100.troj.spyw.evad.winEXE@2/5@1/0
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 2
            • Number of non-executed functions: 105
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
            • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 52.168.117.173
            • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
            TimeTypeDescription
            03:56:56API Interceptor1x Sleep call for process: WerFault.exe modified
            No context
            No context
            No context
            No context
            No context
            Process:C:\Windows\SysWOW64\WerFault.exe
            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
            Category:dropped
            Size (bytes):65536
            Entropy (8bit):0.749604798589042
            Encrypted:false
            SSDEEP:96:idgFl+MsChaY7vfNQXIDcQ2c6YcEfcw3x+HbHg/oJAnQO3q8PCFDbEgOyWZAX/di:V2Mk0YcFijkqzuiF0Z24IO8bi
            MD5:C77C9EBA5FE661A17F07D842EF1CE5AF
            SHA1:77BD272A442ACDAC02984E92630AF339D92B9079
            SHA-256:BF7E0AEA29CF7C2C216E8BA91C1FD8AAC2705BB29F737735108D88CBA14B2288
            SHA-512:C901944C93FDB86DA7202CF50969622EB90663DF88C40CAE03EA2720F24566F83DC84D01B063D4D997A5D158F51319D989421397C972C03D0FF1FE3C777EAFF6
            Malicious:false
            Reputation:low
            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.1.1.8.3.8.0.0.8.5.3.5.2.5.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.1.1.8.3.8.0.2.1.0.3.5.2.8.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.b.6.5.c.f.d.7.-.6.5.d.8.-.4.1.0.0.-.8.a.9.c.-.2.d.3.f.d.4.3.9.3.b.a.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.a.3.4.a.4.8.8.-.0.5.a.8.-.4.f.b.f.-.a.f.a.c.-.c.c.d.3.9.d.6.6.e.d.9.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.G.d.s.G.K.f.L.R.b.y...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.6.0.-.0.0.0.1.-.0.0.1.4.-.3.1.b.0.-.1.e.2.d.4.2.a.f.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.2.3.b.7.3.1.2.0.3.6.d.1.1.6.f.4.3.a.c.2.a.4.1.5.e.8.f.5.0.4.9.d.0.0.0.0.f.f.f.f.!.0.0.0.0.0.f.6.f.6.e.f.2.b.5.6.9.1.9.4.6.7.0.3.d.3.7.a.6.3.1.6.4.5.2.d.d.a.6.d.5.e.a.b.5.!.G.d.s.G.K.f.L.R.b.y...e.x.e.....T.a.r.g.e.t.A.p.p.
            Process:C:\Windows\SysWOW64\WerFault.exe
            File Type:Mini DuMP crash report, 14 streams, Sun May 26 07:56:40 2024, 0x1205a4 type
            Category:dropped
            Size (bytes):63556
            Entropy (8bit):1.6148188550427234
            Encrypted:false
            SSDEEP:192:3M3tX7Z5mOWF2QC8PCn3uNTWvkxSxAFOQcXyGC2W39o3KDNi+GIkzJckUi:GRxWFsmTWvkxSxAoQcCP2WN8R5Ik9
            MD5:8F194E5A0044726B1FE2EFBE015991BA
            SHA1:79A593995BE9290490F53DBCFFE70739CD84963C
            SHA-256:2BB73E7FFB4E56A9BF3C7960C264F2AD94B38E010ED3E575A1B44273207F3B85
            SHA-512:001B1FE0C47C17308790EA8935A4596043EE53173A5D8F452DB01671E66111C39F411AD18F4EE5326A9A928973D8CA6F16F9226F7F0DF48059E43ED646BB5150
            Malicious:false
            Reputation:low
            Preview:MDMP..a..... .......8.Rf........................L...........4....!..........T.......8...........T.......................................................................................................................eJ......l.......GenuineIntel............T.......`.....Rf.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Windows\SysWOW64\WerFault.exe
            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
            Category:dropped
            Size (bytes):8366
            Entropy (8bit):3.701478425040177
            Encrypted:false
            SSDEEP:192:R6l7wVeJzu6cQD6YEIYSU9yBgmfUpWyBpDx89b2ZsfSSm:R6lXJ66cQD6YE3SU9yBgmfU1K2yfO
            MD5:2938181CCA175503916E413BFC7362FF
            SHA1:2FC65C6B4BEA4EB472D657EBCC1EB66DB54E02FA
            SHA-256:DC2D3E760EBD093F989BD2B9B420516DDE8239BA8BE2B464004B609F037EF5D6
            SHA-512:793DC6FDC330A2BC86DA9DC3892246771528287BDC2F8F81922F2AB01A62A45D475F319BEDB2437810F8297256AD5C5FE99B1E5BF41C861FC1725DFAF9598E69
            Malicious:false
            Reputation:low
            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.4.9.6.<./.P.i.
            Process:C:\Windows\SysWOW64\WerFault.exe
            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):4583
            Entropy (8bit):4.474369752148524
            Encrypted:false
            SSDEEP:48:cvIwWl8zscJg77aI9JeWpW8VYuYm8M4JgoRFOy+q88uc5rsCJ6vnMd:uIjfaI7rf7VaJgXyYWrsCEvnMd
            MD5:E9113B4E99B49F6DBB8983CDE3EF3713
            SHA1:87E006AFC3809171E1724A74950F15171CCA8258
            SHA-256:C1B18ED805EA1D878F1AF3FEB9D951D929BF05E70C9C730C68063DBFE405C69C
            SHA-512:F80956FFFE08F21EA83B3900CA80B307C91F66071A970AE4A1BDCD09C56F6ADAE330023258F43AA5A38952C1FF957B26BECD5679BB1600AA93300EC153E0D326
            Malicious:false
            Reputation:low
            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="339779" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
            Process:C:\Windows\SysWOW64\WerFault.exe
            File Type:MS Windows registry file, NT/2000 or above
            Category:dropped
            Size (bytes):1835008
            Entropy (8bit):4.4215813472971135
            Encrypted:false
            SSDEEP:6144:WSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnN10uhiTw:1vloTMW+EZMM6DFyb03w
            MD5:992E757362D3A5D078E92824678CC5EA
            SHA1:E0461E52932010E78D16F3FB8DC37AB3DD83D78A
            SHA-256:87956B76A3EA6A3DDB6AA8D05DAB190965A58146CB76FC6FF42AB0B459CA288B
            SHA-512:589134A880600220943A6CF59FF31F404F450974E8F97F70C21013DED0398276CC0B07D77A77E2690D9B1632831FF70D64E5E24FF161791843EF4B15CD5E1D58
            Malicious:false
            Reputation:low
            Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm:.;>B.................................................................................................................................................................................................................................................................................................................................................-.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
            Entropy (8bit):6.334530398909801
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.96%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:GdsGKfLRby.exe
            File size:164'352 bytes
            MD5:48e6ba377d90401cee819471fcea38b9
            SHA1:0f6f6ef2b5691946703d37a6316452dda6d5eab5
            SHA256:b437936e1752bd430545f30ba5223fabe413dc39ec2a82f437d11fd857dcede8
            SHA512:caf22b64bf47f6515d7f75dbfc8605ce85a3248188d61049f1cd54ce0b6cbb441fd1005333464f66a95d990e2f912d4b60e5418a4d7b14fd4f115e156cbf307f
            SSDEEP:3072:jOzPcXa+ND32eioGHlz8rnAE0HCXh0edLvGdYMjMqqDL0Ff:jOTcK+NrRioGHlz8rz0i/8zQqqDwFf
            TLSH:84F31718FA87A4F6FE4B1D31919BF33F0B757A01C130CE92EF141E85EA23D26151AA59
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Fy.^.....................x...h..-$....... ....@..........................0................ .........................1..
            Icon Hash:00928e8e8686b000
            Entrypoint:0x40242d
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
            DLL Characteristics:NX_COMPAT
            Time Stamp:0x5ECA7946 [Sun May 24 13:40:22 2020 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:4563c74acbd357d386b177e402b96ce4
            Instruction
            push ebp
            push edi
            mov eax, 0000802Ch
            push esi
            push ebx
            call 00007FE2E86E8F4Ah
            sub esp, eax
            lea esi, dword ptr [esp+18h]
            lea ebx, dword ptr [esp+1Ch]
            call 00007FE2E86CF4A4h
            call 00007FE2E86D9D7Ch
            call 00007FE2E86CD4CAh
            call 00007FE2E86DD534h
            call 00007FE2E86D279Ch
            call 00007FE2E86D2B12h
            mov dword ptr [esp+1Ch], FFFFFFFFh
            mov eax, dword ptr [esp+1Ch]
            mov dword ptr [esp+08h], 00000004h
            mov dword ptr [esp+04h], esi
            mov dword ptr [esp+18h], 00000000h
            mov dword ptr [esp], eax
            call 00007FE2E86CFB30h
            test al, al
            je 00007FE2E86CC037h
            mov ecx, dword ptr [esp+1Ch]
            mov edi, dword ptr [esp+18h]
            mov dword ptr [esp], ecx
            mov dword ptr [esp+04h], edi
            call 00007FE2E86CBED8h
            test al, al
            je 00007FE2E86CBF52h
            lea eax, dword ptr [esp+20h]
            mov dword ptr [esp+08h], edi
            mov dword ptr [esp], ecx
            mov dword ptr [esp+04h], eax
            call 00007FE2E86CFAFCh
            test al, al
            je 00007FE2E86CBFF2h
            mov ecx, dword ptr [esp+18h]
            cmp ecx, 00007FFFh
            jnbe 00007FE2E86CBF97h
            mov byte ptr [esp+ecx+20h], 00000000h
            movzx ebp, byte ptr [esp+20h]
            mov edi, dword ptr [esp+1Ch]
            mov dword ptr [esp], edi
            mov dword ptr [esp+04h], ebp
            call 00007FE2E86CBEBCh
            test al, al
            jne 00007FE2E86CBFABh
            mov dword ptr [esp], 00002710h
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x2f0000x31.edata
            IMAGE_DIRECTORY_ENTRY_IMPORT0x300000x13e8.idata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x320000xdac.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x3039c0x2d4.idata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x205780x20600099fef7ea3c54ecba263d6dbc96a6e54False0.5099164454633205data6.008927586791251IMAGE_SCN_CNT_CODE, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .data0x220000x4c7c0x4e0034a0f70f7abfe596c8fc6c4117276fcaFalse0.5350060096153846data6.994056753742937IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .eh_fram0x270000x5d80x600ee3526956133654d2a7c0bf23fe30087False0.375data4.5721581531990685IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
            .bss0x280000x66840x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .edata0x2f0000x310x2004fca42e2045a6ebca8ded8b2c6d69815False0.08203125data0.45736744622245973IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
            .idata0x300000x13e80x140055b497ca7a3116d1f5cafda7acbac460False0.5333984375data5.67472061943603IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .reloc0x320000xdac0xe00ac467d2463f31d21d99a47c4563bad8aFalse0.8348214285714286data6.5719134371915IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            DLLImport
            ADVAPI32.DLLCryptAcquireContextA, CryptCreateHash, CryptDestroyHash, CryptGetHashParam, CryptHashData, CryptReleaseContext, GetUserNameW, RegCloseKey, RegCreateKeyExA, RegDeleteKeyA, RegDeleteValueA, RegEnumKeyExA, RegEnumValueA, RegOpenKeyExA, RegQueryValueExA, RegSetValueExA
            CRYPT32.DLLCryptUnprotectData
            GDI32.dllBitBlt, CreateCompatibleBitmap, CreateCompatibleDC, DeleteDC, DeleteObject, GetDIBits, SelectObject
            KERNEL32.dllCloseHandle, CreateDirectoryW, CreateFileW, CreateMutexA, CreatePipe, CreateProcessA, CreateToolhelp32Snapshot, DeleteFileW, EnterCriticalSection, ExitProcess, FileTimeToSystemTime, FindClose, FindFirstFileA, FindFirstFileW, FindNextFileA, FindNextFileW, FreeLibrary, GetCommandLineA, GetComputerNameW, GetCurrentProcessId, GetCurrentThreadId, GetDiskFreeSpaceExA, GetDriveTypeA, GetFileAttributesExW, GetFileAttributesW, GetLastError, GetLocalTime, GetLogicalDriveStringsA, GetModuleFileNameW, GetProcAddress, GetProcessTimes, GetStartupInfoA, GetSystemInfo, GetSystemTime, GetTickCount, GetVersionExA, GetVolumeInformationA, InitializeCriticalSection, LeaveCriticalSection, LoadLibraryA, LocalFree, MoveFileW, MultiByteToWideChar, OpenProcess, PeekNamedPipe, Process32First, Process32Next, ReadFile, ReleaseMutex, ResumeThread, SetErrorMode, SetFileAttributesW, SetFilePointer, Sleep, TerminateProcess, WideCharToMultiByte, WriteFile
            msvcrt.dll_assert, _beginthreadex, _errno, _filelengthi64, _mkdir, _snwprintf, _stat, _vscprintf, _vsnprintf, _wfopen, calloc, fclose, fflush, fgetpos, fgets, fopen, fread, free, freopen, fseek, fsetpos, ftell, fwprintf, fwrite, getenv, localtime, malloc, memcmp, mktime, realloc, remove, sprintf, strcat, strchr, strcmp, strcpy, strncpy, time, utime, wcscat
            NETAPI32.DLLNetApiBufferFree, NetWkstaGetInfo
            SHELL32.DLLSHFileOperationW, ShellExecuteA, ShellExecuteW
            USER32.dllCreateWindowExW, DefWindowProcW, DispatchMessageA, EnumWindows, GetDC, GetDesktopWindow, GetForegroundWindow, GetKeyNameTextW, GetKeyState, GetKeyboardState, GetLastInputInfo, GetMessageW, GetSystemMetrics, GetWindowTextW, IsWindowVisible, MapVirtualKeyW, PostQuitMessage, RegisterClassExW, ReleaseDC, SendMessageA, SendMessageW, SetCursorPos, SetWindowTextW, ShowWindow, ToUnicode, TranslateMessage, keybd_event, mouse_event
            WS2_32.dllWSACleanup, WSAGetLastError, WSAIoctl, WSAStartup, __WSAFDIsSet, closesocket, connect, gethostbyname, htons, inet_ntoa, ioctlsocket, ntohs, recv, select, send, setsockopt, shutdown, socket
            TimestampSource PortDest PortSource IPDest IP
            May 26, 2024 09:56:50.959733963 CEST5353445162.159.36.2192.168.2.5
            May 26, 2024 09:56:51.481959105 CEST5610653192.168.2.51.1.1.1
            May 26, 2024 09:56:51.559561968 CEST53561061.1.1.1192.168.2.5
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            May 26, 2024 09:56:51.481959105 CEST192.168.2.51.1.1.10x4504Standard query (0)171.39.242.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            May 26, 2024 09:56:51.559561968 CEST1.1.1.1192.168.2.50x4504Name error (3)171.39.242.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:1
            Start time:03:56:12
            Start date:26/05/2024
            Path:C:\Users\user\Desktop\GdsGKfLRby.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\GdsGKfLRby.exe"
            Imagebase:0x400000
            File size:164'352 bytes
            MD5 hash:48E6BA377D90401CEE819471FCEA38B9
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: Windows_Trojan_Netwire_6a7df287, Description: unknown, Source: 00000001.00000000.2103922275.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
            • Rule: JoeSecurity_NetWire_1, Description: Yara detected NetWire RAT, Source: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Netwire_1b43df38, Description: unknown, Source: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmp, Author: unknown
            • Rule: JoeSecurity_NetWire_1, Description: Yara detected NetWire RAT, Source: 00000001.00000000.2103948547.0000000000422000.00000008.00000001.01000000.00000003.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Netwire_1b43df38, Description: unknown, Source: 00000001.00000000.2103948547.0000000000422000.00000008.00000001.01000000.00000003.sdmp, Author: unknown
            • Rule: Windows_Trojan_Netwire_6a7df287, Description: unknown, Source: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
            Reputation:low
            Has exited:true

            Target ID:5
            Start time:03:56:40
            Start date:26/05/2024
            Path:C:\Windows\SysWOW64\WerFault.exe
            Wow64 process (32bit):true
            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6496 -s 400
            Imagebase:0xfa0000
            File size:483'680 bytes
            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Reset < >

              Execution Graph

              Execution Coverage:0.8%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:13%
              Total number of Nodes:261
              Total number of Limit Nodes:2
              execution_graph 8528 40242d 8529 40243b 8528->8529 8544 405959 WSAStartup 8529->8544 8531 40244a 8558 410236 GetTickCount GetCurrentProcessId GetCurrentThreadId 8531->8558 8533 40244f 8547 408c65 8533->8547 8538 406026 16 API calls 8541 402463 8538->8541 8541->8538 8542 407ef4 Sleep 8541->8542 8543 405999 shutdown closesocket 8541->8543 8611 401000 8541->8611 8617 405c70 8541->8617 8624 40a2c3 8541->8624 8542->8541 8543->8541 8545 405985 InitializeCriticalSection 8544->8545 8546 405979 ExitProcess 8544->8546 8545->8531 8631 408b1a 8547->8631 8549 408c76 malloc 8550 408ca4 8549->8550 8551 408d22 malloc 8550->8551 8551->8550 8552 408d48 8551->8552 8633 407f59 8552->8633 8554 408d57 8555 40245e 8554->8555 8556 408d89 malloc 8554->8556 8560 408fe0 8555->8560 8557 408dbf 8556->8557 8557->8554 8559 410259 8558->8559 8559->8533 8636 407c77 GetModuleFileNameW WideCharToMultiByte 8560->8636 8562 408ffd 8563 4092a8 8562->8563 8638 412d73 8562->8638 8563->8541 8565 409024 8566 4090ff 8565->8566 8576 409074 8565->8576 8642 406e04 MultiByteToWideChar GetFileAttributesW 8565->8642 8646 406f1a MultiByteToWideChar GetFileAttributesW 8565->8646 8648 407ef4 Sleep 8565->8648 8567 409114 8566->8567 8671 408950 8566->8671 8686 408ab3 CreateMutexA 8567->8686 8571 409119 8573 40912d ExitProcess 8571->8573 8574 409139 8571->8574 8580 40914e 8574->8580 8689 408417 8574->8689 8649 407b16 8576->8649 8585 40918e 8580->8585 8724 4081aa 8580->8724 8584 40921c 8591 40922c fopen 8584->8591 8595 409241 8584->8595 8585->8584 8587 4081aa _vsnprintf 8585->8587 8588 4091b8 8587->8588 8589 4127a8 _vsnprintf 8588->8589 8592 4091d4 8589->8592 8590 40908c 8590->8566 8598 4090c3 8590->8598 8668 4127a8 _vsnprintf 8590->8668 8591->8595 8593 4127a8 _vsnprintf 8592->8593 8597 4091f0 8593->8597 8596 40929c 8595->8596 8600 412d73 getenv 8595->8600 8733 408e7f 8596->8733 8601 4081aa _vsnprintf 8597->8601 8599 406f1a 2 API calls 8598->8599 8603 4090e5 8599->8603 8604 409270 8600->8604 8605 4091fc 8601->8605 8603->8566 8606 4090e9 8603->8606 8730 407f08 _beginthreadex 8604->8730 8607 410608 3 API calls 8605->8607 8670 406c2a MultiByteToWideChar MultiByteToWideChar ShellExecuteW 8606->8670 8607->8584 8609 4090fd 8609->8573 8612 40101d 8611->8612 8614 40105e 8612->8614 8777 413a29 8612->8777 8615 40106e 8614->8615 8781 407ef4 Sleep 8614->8781 8615->8541 8623 405c73 8617->8623 8619 405ca8 8802 405214 8619->8802 8623->8619 8782 4059d3 8623->8782 8801 407ef4 Sleep 8623->8801 8625 40a2ec 8624->8625 8626 40a330 8625->8626 8629 40a380 8625->8629 8627 405999 2 API calls 8626->8627 8628 40a33a 8627->8628 8628->8541 8818 405d7d 8629->8818 8632 408b3d 8631->8632 8632->8549 8634 407f67 free 8633->8634 8635 407f6f 8633->8635 8634->8635 8635->8554 8637 407cef 8636->8637 8637->8562 8639 412f38 8638->8639 8641 412d93 8638->8641 8639->8565 8640 412ec3 getenv 8640->8641 8641->8639 8641->8640 8643 406e53 8642->8643 8644 406e69 DeleteFileW 8642->8644 8643->8644 8645 406e57 SetFileAttributesW 8643->8645 8644->8565 8645->8644 8647 406f6b 8646->8647 8647->8565 8648->8565 8650 407b3a 8649->8650 8651 407b3e 8649->8651 8650->8566 8654 407302 MultiByteToWideChar _wfopen 8650->8654 8651->8650 8745 40729c MultiByteToWideChar GetFileAttributesW 8651->8745 8747 407ab6 MultiByteToWideChar CreateDirectoryW 8651->8747 8655 407461 8654->8655 8656 407365 MultiByteToWideChar _wfopen 8654->8656 8655->8590 8657 407444 fclose 8656->8657 8658 4073bb 8656->8658 8657->8655 8659 407452 8657->8659 8660 4073c5 malloc 8658->8660 8663 40743a 8658->8663 8661 406e04 4 API calls 8659->8661 8660->8658 8662 4073db fread 8660->8662 8661->8655 8664 407405 fwrite 8662->8664 8667 4073f7 free 8662->8667 8665 40743c fclose 8663->8665 8664->8662 8664->8667 8665->8657 8667->8665 8669 4127da 8668->8669 8669->8598 8670->8609 8673 40895e 8671->8673 8674 4089bb 8673->8674 8675 408995 8673->8675 8748 407d7f 8673->8748 8674->8567 8676 407d7f GetCommandLineA 8675->8676 8677 4089b0 8676->8677 8677->8674 8678 406f1a 2 API calls 8677->8678 8679 4089c5 8678->8679 8680 4089d3 8679->8680 8681 4089cc 8679->8681 8683 40729c 2 API calls 8680->8683 8682 406e04 4 API calls 8681->8682 8682->8674 8684 4089d8 8683->8684 8684->8674 8752 407ba7 strcpy MultiByteToWideChar SHFileOperationW 8684->8752 8687 408ae0 GetLastError 8686->8687 8688 408aed 8686->8688 8687->8688 8688->8571 8690 408425 8689->8690 8691 4081aa _vsnprintf 8690->8691 8692 408433 LoadLibraryA GetProcAddress 8691->8692 8693 4081aa _vsnprintf 8692->8693 8694 40845e LoadLibraryA GetProcAddress 8693->8694 8698 408483 8694->8698 8723 4086dd 8694->8723 8695 4081aa _vsnprintf 8696 408727 LoadLibraryA GetProcAddress 8695->8696 8697 40874e malloc 8696->8697 8722 408907 8696->8722 8699 408761 8697->8699 8701 4127a8 _vsnprintf 8698->8701 8698->8723 8700 4127a8 _vsnprintf 8699->8700 8699->8722 8702 40879b 8700->8702 8703 408577 8701->8703 8704 408306 2 API calls 8702->8704 8756 408306 8703->8756 8706 4087f7 8704->8706 8708 4087fb malloc 8706->8708 8719 408820 8706->8719 8708->8719 8709 4085d7 malloc 8718 4085fc 8709->8718 8710 408306 2 API calls 8711 408893 8710->8711 8714 40889b malloc 8711->8714 8711->8722 8712 408306 2 API calls 8713 408669 8712->8713 8715 408671 malloc 8713->8715 8713->8723 8716 4088c0 8714->8716 8717 408696 8715->8717 8720 4088ce malloc 8716->8720 8721 4086a4 malloc 8717->8721 8718->8712 8719->8710 8720->8722 8721->8723 8722->8580 8723->8695 8725 4127a8 _vsnprintf 8724->8725 8726 4081e3 8725->8726 8727 410608 RegCreateKeyExA 8726->8727 8728 410662 RegSetValueExA RegCloseKey 8727->8728 8729 4106b5 8727->8729 8728->8729 8729->8585 8731 407f53 8730->8731 8732 407f45 CloseHandle 8730->8732 8731->8596 8732->8731 8734 408ea7 8733->8734 8762 4106bd RegOpenKeyExA 8734->8762 8737 408ed3 8740 408f52 8737->8740 8770 408218 8737->8770 8738 4106bd 6 API calls 8738->8737 8740->8563 8741 408eef 8742 410608 3 API calls 8741->8742 8743 408fab 8742->8743 8743->8740 8744 410608 3 API calls 8743->8744 8744->8740 8746 4072ed 8745->8746 8746->8651 8747->8651 8749 407da5 8748->8749 8750 407dc7 GetCommandLineA 8749->8750 8751 407de0 8750->8751 8751->8673 8753 407c62 8752->8753 8754 407c5a 8752->8754 8753->8674 8755 40729c 2 API calls 8754->8755 8755->8753 8759 408330 8756->8759 8757 408368 8757->8709 8757->8718 8758 407f59 free 8758->8757 8759->8757 8760 408376 malloc 8759->8760 8761 408334 8759->8761 8760->8757 8760->8761 8761->8757 8761->8758 8763 410748 RegOpenKeyExA 8762->8763 8764 4106fb RegQueryValueExA 8762->8764 8766 410775 RegQueryValueExA 8763->8766 8767 408ecf 8763->8767 8765 4107ec RegCloseKey 8764->8765 8768 410738 8764->8768 8765->8767 8766->8765 8766->8768 8767->8737 8767->8738 8768->8765 8769 4107b6 RegQueryValueExA 8768->8769 8769->8765 8771 408248 8770->8771 8772 408255 GetSystemTime 8771->8772 8773 40825c GetLocalTime 8771->8773 8774 408261 8772->8774 8773->8774 8775 4127a8 _vsnprintf 8774->8775 8776 4082bc 8775->8776 8776->8741 8778 413a3a 8777->8778 8779 413a54 8778->8779 8780 413a4c fclose 8778->8780 8779->8612 8780->8779 8781->8615 8783 4059ef 8782->8783 8784 405b30 8783->8784 8795 4059f8 8783->8795 8785 405c00 8784->8785 8786 405b3e 8784->8786 8787 4051b5 2 API calls 8785->8787 8793 4051b5 2 API calls 8786->8793 8797 405b80 socket connect 8786->8797 8798 405999 2 API calls 8786->8798 8799 405b04 8786->8799 8789 405c14 8787->8789 8791 405c1d socket 8789->8791 8789->8799 8790 405a3e socket connect 8790->8795 8792 405c45 connect 8791->8792 8791->8799 8792->8799 8800 405aae 8792->8800 8793->8786 8794 405999 2 API calls 8794->8795 8795->8790 8795->8794 8795->8799 8795->8800 8810 4051b5 gethostbyname 8795->8810 8797->8786 8798->8786 8799->8623 8800->8799 8814 405999 8800->8814 8801->8623 8803 40522a ioctlsocket 8802->8803 8804 40524d 8802->8804 8803->8804 8805 405259 setsockopt 8804->8805 8806 4052ec 8804->8806 8805->8806 8807 40528d WSAIoctl 8805->8807 8808 405321 8806->8808 8809 4052f1 setsockopt 8806->8809 8807->8806 8808->8541 8809->8808 8811 4051d3 8810->8811 8812 40520e 8810->8812 8813 4051eb htons 8811->8813 8812->8795 8813->8812 8815 4059a5 8814->8815 8816 4059c8 8814->8816 8815->8816 8817 4059ab shutdown closesocket 8815->8817 8816->8799 8817->8816 8819 405d90 EnterCriticalSection 8818->8819 8832 405cc4 8819->8832 8822 405dcb 8823 405ec5 LeaveCriticalSection 8822->8823 8826 405ed6 8823->8826 8824 405df5 malloc 8830 405e08 8824->8830 8826->8628 8827 407f59 free 8827->8824 8828 405e78 send 8829 405ea5 WSAGetLastError 8828->8829 8828->8830 8829->8823 8829->8830 8830->8822 8830->8823 8830->8828 8839 407ef4 Sleep 8830->8839 8833 405ce3 8832->8833 8834 405d2c select 8833->8834 8835 405cff select 8833->8835 8836 405d2a 8834->8836 8837 405d57 8834->8837 8835->8833 8835->8836 8836->8837 8838 405d5f __WSAFDIsSet 8836->8838 8837->8822 8837->8824 8837->8827 8837->8830 8838->8837 8839->8830

              Control-flow Graph

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: malloc
              • String ID: :$@
              • API String ID: 2803490479-1367939426
              • Opcode ID: 49f5d5e5c66d449692c97e5cfd2201180b6792fa2bdc3c508c2aecf96e8573c9
              • Instruction ID: ef4ad269280774ff2184a95f10acb59d81b6a7d54bd4368cac39de452cc0daf6
              • Opcode Fuzzy Hash: 49f5d5e5c66d449692c97e5cfd2201180b6792fa2bdc3c508c2aecf96e8573c9
              • Instruction Fuzzy Hash: 975128B05087009FD310EF29D58425ABBE0FF88718F41892EF5D887291D7B8958ACF8A

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: CriticalExitInitializeProcessSectionStartup
              • String ID:
              • API String ID: 3456047655-0
              • Opcode ID: 586562ab7f660d792621f7f3ff03a76942849b748750d6b5247e0080a37609ce
              • Instruction ID: 24ad92727fe000e7c60640d94de1f7f21ee868b5df478abe0a14dc0806b9406b
              • Opcode Fuzzy Hash: 586562ab7f660d792621f7f3ff03a76942849b748750d6b5247e0080a37609ce
              • Instruction Fuzzy Hash: A4D012F0504301AEE710BF51D4057BA7AE8AB41310F41483EA8D086242D77D448D4AA7

              Control-flow Graph

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: malloc$AddressLibraryLoadProc$_vsnprintf
              • String ID: =$=$@$InternetProxy$h$h$http://www.yandex.com$p$p$p/B$socks=$t$t$t$t
              • API String ID: 3272051020-3390938176
              • Opcode ID: 2a297506814e41453f0cb424917c6166d847a589c1b2d897310f0baa7ccc6c15
              • Instruction ID: 129794d27e18b5d836c16bc2de0120feea3297db44a07732c008f05b0d4f5d07
              • Opcode Fuzzy Hash: 2a297506814e41453f0cb424917c6166d847a589c1b2d897310f0baa7ccc6c15
              • Instruction Fuzzy Hash: 09D1F5B0508740AFD710EF25C68479ABBF0BF84744F418C2EE5C897351EBB99989CB5A

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 103 411d8c-411de9 GetSystemMetrics * 2 GetDesktopWindow 104 411deb-411ded 103->104 105 411def-411df1 103->105 104->105 106 411df6-411e36 GetDC CreateCompatibleDC CreateCompatibleBitmap 104->106 107 4120b9-4120c3 105->107 108 412039-412067 ReleaseDC DeleteDC DeleteObject 106->108 109 411e3c-411e3e 106->109 108->105 111 41206d-412077 108->111 109->108 110 411e44-411e9b SelectObject BitBlt 109->110 110->108 112 411ea1-411f21 call 4129e4 * 2 GetDIBits 110->112 111->105 113 41207d-4120b7 call 4049cf free 111->113 112->108 120 411f27-411fa7 calloc 112->120 113->107 120->108 121 411fad-411fe1 GetDIBits 120->121 122 412020-412033 call 407f59 121->122 123 411fe3-41201e call 412aa3 * 2 121->123 122->108 123->108
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: BitsCompatibleCreateDeleteMetricsObjectSystem$BitmapDesktopReleaseSelectWindowcallocfree
              • String ID: $($($6$BM
              • API String ID: 3075093512-2637400849
              • Opcode ID: d7d7e5d3c01187142e8c43228c98c6042b0c96f3a722dfa341cae57414d2b9e1
              • Instruction ID: c42d9fa6f562a18c3eedbb1c72d559f421865ac330c7369b2ec7bacda9b62638
              • Opcode Fuzzy Hash: d7d7e5d3c01187142e8c43228c98c6042b0c96f3a722dfa341cae57414d2b9e1
              • Instruction Fuzzy Hash: 4781BDB05093409FD310EF6AD68475BBBE4AF88744F40892EF58887351E7B9D8888B5B

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 260 409953-4099ad GetKeyState * 4 GetKeyboardState 261 409ac0-409ac7 260->261 262 4099b3 260->262 265 409afd-409b1d call 4081aa call 4127a8 261->265 263 4099b5-4099b8 262->263 264 409a17-409a1a 262->264 269 4099ea-4099ed 263->269 270 4099ba-4099bd 263->270 267 409a20 264->267 268 409aa5-409aac 264->268 303 409ccc-409cce 265->303 274 409a22-409a25 267->274 275 409a4b-409a4e 267->275 268->265 271 4099f3 269->271 272 409aed-409af4 269->272 276 4099c3-4099c6 270->276 277 409cee-409cf8 270->277 282 409ad2-409ad9 271->282 283 4099f9-4099fc 271->283 272->265 285 409ab7-409abe 274->285 286 409a2b 274->286 278 409ae4-409aeb 275->278 279 409a54 275->279 280 409a93-409a9a 276->280 281 4099cc-4099cf 276->281 278->265 287 409a70-409a73 279->287 288 409a56-409a59 279->288 280->265 289 4099d5-4099d8 281->289 290 409a8a-409a91 281->290 282->265 291 409a02-409a05 283->291 292 409af6 283->292 285->265 294 409a31-409a34 286->294 295 409ac9-409ad0 286->295 300 409a75-409a7b 287->300 301 409adb-409ae2 287->301 296 409a5b-409a5e 288->296 297 409aae-409ab5 288->297 298 409b22-409b69 MapVirtualKeyW ToUnicode 289->298 299 4099de-4099e5 289->299 290->265 291->298 302 409a0b-409a12 291->302 292->265 304 409a36-409a39 294->304 305 409a9c-409aa3 294->305 295->265 296->298 306 409a64-409a6b 296->306 297->265 308 409bf6-409c2b MapVirtualKeyW GetKeyNameTextW 298->308 309 409b6f-409bcc WideCharToMultiByte GetKeyState 298->309 299->265 300->298 307 409a81-409a88 300->307 301->265 302->265 303->277 310 409cd0-409ce2 call 40970c 303->310 304->298 311 409a3f-409a46 304->311 305->265 306->265 307->265 308->277 312 409c31-409c47 GetKeyState 308->312 313 409bde 309->313 314 409bce-409bd2 309->314 310->277 323 409ce4 310->323 311->265 316 409c49-409c4d 312->316 317 409c6d-409cb4 WideCharToMultiByte 312->317 320 409be6-409bf1 313->320 314->313 318 409bd4-409bdc 314->318 316->317 321 409c4f-409c55 316->321 322 409cbc-409cc4 317->322 318->320 324 409cc7 call 4127a8 320->324 321->317 325 409c57-409c6b call 4081aa 321->325 322->324 323->277 324->303 325->322
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: State$ByteCharMultiVirtualWide$KeyboardNameTextUnicode
              • String ID: @$@$@
              • API String ID: 284565539-1177533131
              • Opcode ID: a7201299a71ac298b4eb1a048ca88babafc008e2bbcecdb455fdf88870e38ce2
              • Instruction ID: 165817b8f912d8248abf4659c11c564849502453b133aa370f8f06421a69fc02
              • Opcode Fuzzy Hash: a7201299a71ac298b4eb1a048ca88babafc008e2bbcecdb455fdf88870e38ce2
              • Instruction Fuzzy Hash: 5D815AB0608351DAD720AF59D4C436FBAF4FB81304F51892FE4D566282C3BD49859F6B

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 415 40c4b7-40c50d RegOpenKeyExA 416 40c513-40c51b 415->416 417 40c9f6-40ca26 RegOpenKeyExA 415->417 420 40c51d-40c56c RegEnumKeyExA 416->420 418 40cf1c-40cf2a 417->418 419 40ca2c-40ca34 417->419 423 40ca36-40ca85 RegEnumKeyExA 419->423 421 40c572-40c5d8 call 4127a8 RegOpenKeyExA 420->421 422 40cf0f-40cf1b RegCloseKey 420->422 428 40c9e9-40c9f1 421->428 429 40c5de-40c617 call 4081aa call 40c46e 421->429 422->418 423->422 425 40ca8b-40caf1 call 4127a8 RegOpenKeyExA 423->425 432 40cf02-40cf0a 425->432 433 40caf7-40cb30 call 4081aa call 40c46e 425->433 428->420 441 40c9dc-40c9e8 RegCloseKey 429->441 442 40c61d-40c64f call 4081aa call 40c46e 429->442 432->423 443 40cef5-40cf01 RegCloseKey 433->443 444 40cb36-40cb68 call 4081aa call 40c46e 433->444 441->428 453 40c6c1-40c6ef call 4081aa call 40c46e 442->453 454 40c651-40c6bc call 4081aa call 40c46e call 4081aa call 40c46e 442->454 443->432 455 40cbda-40cc08 call 4081aa call 40c46e 444->455 456 40cb6a-40cbd5 call 4081aa call 40c46e call 4081aa call 40c46e 444->456 474 40c761-40c78f call 4081aa call 40c46e 453->474 475 40c6f1-40c75c call 4081aa call 40c46e call 4081aa call 40c46e 453->475 495 40c940-40c942 454->495 477 40cc7a-40cca8 call 4081aa call 40c46e 455->477 478 40cc0a-40cc75 call 4081aa call 40c46e call 4081aa call 40c46e 455->478 500 40ce59-40ce5b 456->500 504 40c801-40c82f call 4081aa call 40c46e 474->504 505 40c791-40c7fc call 4081aa call 40c46e call 4081aa call 40c46e 474->505 475->495 510 40cd1a-40cd48 call 4081aa call 40c46e 477->510 511 40ccaa-40cd15 call 4081aa call 40c46e call 4081aa call 40c46e 477->511 478->500 506 40c952-40c996 495->506 507 40c944-40c94c 495->507 513 40ce6b-40ceaf 500->513 514 40ce5d-40ce65 500->514 555 40c8a1-40c8cf call 4081aa call 40c46e 504->555 556 40c831-40c89c call 4081aa call 40c46e call 4081aa call 40c46e 504->556 505->495 508 40c99a call 412755 506->508 507->506 517 40cf2b-40cf87 CryptUnprotectData 507->517 518 40c99f-40c9ae 508->518 560 40cdba-40cde8 call 4081aa call 40c46e 510->560 561 40cd4a-40cdb5 call 4081aa call 40c46e call 4081aa call 40c46e 510->561 511->500 524 40ceb3 call 412755 513->524 514->513 523 40d020-40d07c CryptUnprotectData 514->523 517->506 522 40cf8d-40cfb2 call 412aa3 LocalFree 517->522 528 40c9b4-40c9d8 call 412abf 518->528 529 40cfb7-40cfe2 518->529 522->506 523->513 537 40d082-40d0a7 call 412aa3 LocalFree 523->537 534 40ceb8-40cec7 524->534 528->441 543 40cfe5 call 412755 529->543 544 40d0ac-40d0d7 534->544 545 40cecd-40cef1 call 412abf 534->545 537->513 557 40cfea-40cfef 543->557 552 40d0da call 412755 544->552 545->443 563 40d0df-40d0e4 552->563 555->441 592 40c8d5-40c93b call 4081aa call 40c46e call 4081aa call 40c46e 555->592 556->495 557->441 566 40cff5-40d01b call 412abf 557->566 560->443 598 40cdee-40ce54 call 4081aa call 40c46e call 4081aa call 40c46e 560->598 561->500 563->443 572 40d0ea-40d110 call 412abf 563->572 566->441 572->443 592->495 598->500
              APIs
              • RegOpenKeyExA.ADVAPI32 ref: 0040C503
              • RegEnumKeyExA.ADVAPI32 ref: 0040C55F
              • RegOpenKeyExA.ADVAPI32 ref: 0040C5CE
              • RegCloseKey.ADVAPI32 ref: 0040C9E3
                • Part of subcall function 0040C46E: RegQueryValueExA.ADVAPI32(?,?,?,?,?,?,?,?,?,?,0040CB2E), ref: 0040C4A6
              • RegOpenKeyExA.ADVAPI32 ref: 0040CA1C
              • RegEnumKeyExA.ADVAPI32 ref: 0040CA78
              • RegOpenKeyExA.ADVAPI32 ref: 0040CAE7
              • RegCloseKey.ADVAPI32 ref: 0040CF16
                • Part of subcall function 004127A8: _vsnprintf.MSVCRT ref: 004127CC
              • RegCloseKey.ADVAPI32 ref: 0040CEFC
              • CryptUnprotectData.CRYPT32 ref: 0040CF7D
              • LocalFree.KERNEL32 ref: 0040CFAC
              • CryptUnprotectData.CRYPT32 ref: 0040D072
              • LocalFree.KERNEL32 ref: 0040D0A1
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: Open$Close$CryptDataEnumFreeLocalUnprotect$QueryValue_vsnprintf
              • String ID: ?$~7B
              • API String ID: 1208127340-2629379569
              • Opcode ID: f100039afa170a0f1c15f42b57fe66f6d4ca87e9390f3ad64929befda264930a
              • Instruction ID: c2d439ac8c23cb570df0ab79087284893563063e171fb1edf2eb3d6011b472d7
              • Opcode Fuzzy Hash: f100039afa170a0f1c15f42b57fe66f6d4ca87e9390f3ad64929befda264930a
              • Instruction Fuzzy Hash: DA726BB0408345AFD710EF6AC58525EFBF0BF88748F408E2EE4D897291D7B995498F46

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 617 41d049-41d082 618 41d084 617->618 619 41d089-41d08b 617->619 618->619 620 41d091-41d095 619->620 621 41d249-41d24b 619->621 620->621 623 41d09b-41d09f 620->623 622 41d7dd-41d7e9 621->622 623->621 624 41d0a5-41d0ad 623->624 624->621 625 41d0b3-41d0ce 624->625 625->621 626 41d0d4-41d0da 625->626 626->621 627 41d0e0-41d0e3 626->627 627->621 628 41d0e9-41d0f7 call 414919 627->628 628->621 631 41d0fd-41d119 628->631 631->621 632 41d11f-41d12f call 41493a 631->632 632->621 635 41d135-41d186 632->635 635->621 636 41d18c-41d1a8 _stat 635->636 636->621 637 41d1ae-41d1e5 call 415fc6 fopen 636->637 637->621 640 41d1e7-41d23b fseek ftell fseek 637->640 641 41d250-41d255 640->641 642 41d23d-41d244 fclose 640->642 643 41d257 641->643 644 41d259-41d272 call 414dc1 641->644 642->621 643->644 647 41d285-41d28f 644->647 648 41d274-41d280 fclose 644->648 649 41d291-41d2a1 647->649 650 41d2bf-41d315 647->650 648->622 649->650 651 41d2a3-41d2ba _assert 649->651 650->642 653 41d31b-41d33b 650->653 651->650 654 41d341-41d35e 653->654 655 41d5f2-41d608 653->655 654->642 659 41d364-41d366 654->659 656 41d60c-41d61d fclose 655->656 656->621 657 41d623-41d628 656->657 657->621 660 41d62e-41d735 call 414900 * 3 657->660 661 41d43c-41d459 659->661 662 41d36c-41d380 659->662 660->621 689 41d73b-41d7c2 call 416311 660->689 670 41d5a0-41d5ad 661->670 671 41d45f-41d4cb call 41a99e call 41a64c 661->671 664 41d384-41d389 662->664 667 41d39b 664->667 668 41d38b-41d393 664->668 673 41d3a0-41d3be fread 667->673 668->667 672 41d395-41d399 668->672 670->642 686 41d4cd-41d4da 671->686 687 41d4df-41d4f3 671->687 672->673 673->670 676 41d3c4-41d3e7 673->676 676->670 684 41d3ed-41d41f call 4171da 676->684 684->664 696 41d425-41d437 684->696 686->670 690 41d4f7-41d4fc 687->690 689->621 698 41d7c8-41d7da 689->698 694 41d50e 690->694 695 41d4fe-41d506 690->695 700 41d513-41d531 fread 694->700 695->694 699 41d508-41d50c 695->699 701 41d5e3-41d5f0 696->701 698->622 699->700 702 41d533-41d57c call 4171da call 41a5f0 700->702 703 41d586-41d588 700->703 701->656 712 41d58a 702->712 713 41d57e-41d580 702->713 706 41d58f-41d59e 703->706 706->670 711 41d5b2-41d5df 706->711 711->701 712->706 713->690 713->703
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: fseek$_statfclosefopenftell
              • String ID: FB$K$P
              • API String ID: 2614710449-1627385504
              • Opcode ID: 54049fe808654b227bba1578e1d34335061ffaf98f8a99cde8e77accde8bca1c
              • Instruction ID: 2f0101dfcf5e0978000162e92f0ac79abf139ad8f29847253f420d5a98adee70
              • Opcode Fuzzy Hash: 54049fe808654b227bba1578e1d34335061ffaf98f8a99cde8e77accde8bca1c
              • Instruction Fuzzy Hash: 67229FB4A087818FD720DF69C18479BFBE1AF89744F10892EE9D887350E779D885CB46

              Control-flow Graph

              APIs
              • MultiByteToWideChar.KERNEL32 ref: 004075C4
              • SetErrorMode.KERNEL32 ref: 004076EB
              • MultiByteToWideChar.KERNEL32 ref: 0040771F
              • wcscat.MSVCRT ref: 00407732
              • FindFirstFileW.KERNEL32 ref: 00407745
              • FindClose.KERNEL32(?,?), ref: 00407775
              • WideCharToMultiByte.KERNEL32 ref: 00407809
              • MultiByteToWideChar.KERNEL32 ref: 00407932
              • wcscat.MSVCRT ref: 00407948
                • Part of subcall function 00406B2B: _wfopen.MSVCRT ref: 00406B69
                • Part of subcall function 00406B2B: fread.MSVCRT ref: 00406BA2
                • Part of subcall function 00406B2B: fclose.MSVCRT ref: 00406C1A
              • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 004079AB
                • Part of subcall function 004127A8: _vsnprintf.MSVCRT ref: 004127CC
                • Part of subcall function 00405D7D: EnterCriticalSection.KERNEL32 ref: 00405DAD
                • Part of subcall function 00405D7D: LeaveCriticalSection.KERNEL32 ref: 00405ECC
              • FindNextFileW.KERNEL32(?,?), ref: 00407A42
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: ByteCharMultiWide$Find$CriticalFileSectionwcscat$CloseEnterErrorFirstLeaveModeNext_vsnprintf_wfopenfclosefread
              • String ID: !$8/B$;/B
              • API String ID: 1195691543-3428488148
              • Opcode ID: 0db96d41e41699db9f656d7569e1933fb0474d28dc8816ba95a9ce2816225d2e
              • Instruction ID: 2942108eb55d8b4688eca57bfe31ed8b2614f53b08094f2a7ccf2ab1801ba34f
              • Opcode Fuzzy Hash: 0db96d41e41699db9f656d7569e1933fb0474d28dc8816ba95a9ce2816225d2e
              • Instruction Fuzzy Hash: 5DE1B0B09097819FD320EF25C58879FBBE0BF84744F41892EE4D897291D7B895898F87

              Control-flow Graph

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: Find$Filestrcmp$CloseErrorFirstModeNextfclosefopenstrcatstrcpystrncpy
              • String ID: ;/B$X/B
              • API String ID: 1295692060-619761068
              • Opcode ID: cc94f65e219aa78bc87248342c53200a3b884502bad93e8bca9f56ca5310b663
              • Instruction ID: 6627613b86e129a79f3514e70df2e2269c09e6d90b38cf378645e3f88cd6e25a
              • Opcode Fuzzy Hash: cc94f65e219aa78bc87248342c53200a3b884502bad93e8bca9f56ca5310b663
              • Instruction Fuzzy Hash: 28811CB44087459FC710EF25C2846AEBBE4BF84318F45892EF9D89B342D7789486DF1A
              APIs
              • MultiByteToWideChar.KERNEL32 ref: 00406492
              • SetErrorMode.KERNEL32 ref: 004064A1
              • FindFirstFileW.KERNEL32 ref: 004064B5
              • FileTimeToSystemTime.KERNEL32 ref: 00406547
              • WideCharToMultiByte.KERNEL32 ref: 00406617
              • FindNextFileW.KERNEL32 ref: 00406745
              • FindClose.KERNEL32 ref: 00406757
                • Part of subcall function 00405D7D: EnterCriticalSection.KERNEL32 ref: 00405DAD
                • Part of subcall function 00405D7D: LeaveCriticalSection.KERNEL32 ref: 00405ECC
                • Part of subcall function 00407F59: free.MSVCRT ref: 00407F6A
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: FileFind$ByteCharCriticalMultiSectionTimeWide$CloseEnterErrorFirstLeaveModeNextSystemfree
              • String ID: $%.2d/%.2d/%d %.2d:%.2d:%.2d$"B
              • API String ID: 2473485750-57038091
              • Opcode ID: 3a87355c9401e98f2b6dd8472ebd5ff4394208b68e8698201d5d1cc5e3771088
              • Instruction ID: 4c70007c882a7ce573aae617e01390b0b466164858f4fbbb4a898ac5e72415b9
              • Opcode Fuzzy Hash: 3a87355c9401e98f2b6dd8472ebd5ff4394208b68e8698201d5d1cc5e3771088
              • Instruction Fuzzy Hash: 36A1B2B48087459FD710EF25C18469BBBE4BF84714F01892EF8D897391D7789589CF86
              APIs
                • Part of subcall function 00408042: MultiByteToWideChar.KERNEL32 ref: 00408094
                • Part of subcall function 00408042: _wfopen.MSVCRT ref: 004080AE
                • Part of subcall function 00408042: fgetpos.MSVCRT ref: 004080F0
                • Part of subcall function 00408042: fsetpos.MSVCRT ref: 00408126
                • Part of subcall function 00408042: malloc.MSVCRT ref: 00408132
                • Part of subcall function 00408042: fread.MSVCRT ref: 00408152
                • Part of subcall function 00408042: realloc.MSVCRT ref: 00408168
                • Part of subcall function 00408042: fclose.MSVCRT ref: 00408174
              • fopen.MSVCRT ref: 0040EE98
                • Part of subcall function 004074C5: MultiByteToWideChar.KERNEL32 ref: 004074FE
                • Part of subcall function 004074C5: GetFileAttributesExW.KERNEL32 ref: 00407519
              • malloc.MSVCRT ref: 0040EEB4
              • fclose.MSVCRT ref: 0040EEC8
              • fread.MSVCRT ref: 0040EEE7
              • fclose.MSVCRT ref: 0040EEEF
              • CryptUnprotectData.CRYPT32 ref: 0040EFBC
              • sprintf.MSVCRT ref: 0040F036
              • strcmp.MSVCRT ref: 0040F046
              • strcmp.MSVCRT ref: 0040F05A
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: fclose$ByteCharMultiWidefreadmallocstrcmp$AttributesCryptDataFileUnprotect_wfopenfgetposfopenfsetposreallocsprintf
              • String ID: !
              • API String ID: 2596569898-2657877971
              • Opcode ID: c147f44153b1e83bce3759e73796935fe42ee2f7056049f32318ccd0c49cd86e
              • Instruction ID: 786053efb03fb7134250340436023ef553204ed8f41ee6c066ba5e47f52fe47d
              • Opcode Fuzzy Hash: c147f44153b1e83bce3759e73796935fe42ee2f7056049f32318ccd0c49cd86e
              • Instruction Fuzzy Hash: FEC1EAB1A053198FDB50DF25C844B9EBBF0BF45308F0588AEE489E7681D7789A84CF46
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: Find$ByteCharFileMultiWide$CloseErrorFirstModeNextwcscat
              • String ID: 8/B$;/B$"B
              • API String ID: 1999808103-785463125
              • Opcode ID: f1dd5b59dd90e2cd6b86d21233615770f5833fe61e03e8d61d53419095457b90
              • Instruction ID: 3ec7505ef3af3f69d728aa0d249a2e56fce710592115df83b66c59d2158606e8
              • Opcode Fuzzy Hash: f1dd5b59dd90e2cd6b86d21233615770f5833fe61e03e8d61d53419095457b90
              • Instruction Fuzzy Hash: CB8102B06093419FD320EF25C18469BBBE4BF85348F45882EE4C997381D7B89589CF87
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: Find$File_snwprintf$CloseFirstNextfclosefopenfwprintf
              • String ID: ,/B
              • API String ID: 4215708556-1155038791
              • Opcode ID: 8a012b87caedc31829cbf4f9110065dd04a3999989f632e85736f7b71116f674
              • Instruction ID: 110ac6783a2aa76cc845fc41d9c104154397b4f26a6f194d14aa4f1c43fee32b
              • Opcode Fuzzy Hash: 8a012b87caedc31829cbf4f9110065dd04a3999989f632e85736f7b71116f674
              • Instruction Fuzzy Hash: 7E115BB0509701AEC710AF25898459FFBE4AF80718F018D2EF4D497281D778848A8B6A
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID: +$-$8
              • API String ID: 0-3055312362
              • Opcode ID: f26fa2f78899781a49932aac13294cfda41e400e31aa373076b0278284c81065
              • Instruction ID: d0e530c000626a38c585737fd68ea07c8af64da2075d248bad87d4caaf24723a
              • Opcode Fuzzy Hash: f26fa2f78899781a49932aac13294cfda41e400e31aa373076b0278284c81065
              • Instruction Fuzzy Hash: 3F723975908351CFCB24CF19C0806AABBF1FF88314F168A1EE89597355D379E985CB8A
              APIs
              • SetErrorMode.KERNEL32 ref: 00413AA4
                • Part of subcall function 004127A8: _vsnprintf.MSVCRT ref: 004127CC
              • MultiByteToWideChar.KERNEL32 ref: 00413B02
              • FindFirstFileW.KERNEL32 ref: 00413B18
              • WideCharToMultiByte.KERNEL32 ref: 00413BB1
              • WideCharToMultiByte.KERNEL32 ref: 00413CA7
              • FindNextFileW.KERNEL32 ref: 00413D1B
              • FindClose.KERNEL32 ref: 00413D3D
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: ByteCharFindMultiWide$File$CloseErrorFirstModeNext_vsnprintf
              • String ID:
              • API String ID: 2650927523-0
              • Opcode ID: 334888fa3b4434e061fa7b69daef3cafc177c312af5b0b50911e5eeb64500dc7
              • Instruction ID: f6b2b9afb8f28ceff06ae1ca88c29ba9ed65548566ee5afaf2077295461a783a
              • Opcode Fuzzy Hash: 334888fa3b4434e061fa7b69daef3cafc177c312af5b0b50911e5eeb64500dc7
              • Instruction Fuzzy Hash: 0971AFB44093459BD320EF6AD18469FBBE0AF84758F008E1EE4D887391D7B89689CF57
              APIs
                • Part of subcall function 0041236C: malloc.MSVCRT ref: 0041237C
              • SetErrorMode.KERNEL32 ref: 004060A9
              • GetLogicalDriveStringsA.KERNEL32 ref: 004060C1
              • GetVolumeInformationA.KERNEL32 ref: 0040617C
              • GetDiskFreeSpaceExA.KERNEL32 ref: 004061D3
              • GetDriveTypeA.KERNEL32 ref: 00406250
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: Drive$DiskErrorFreeInformationLogicalModeSpaceStringsTypeVolumemalloc
              • String ID: @
              • API String ID: 4103324456-2766056989
              • Opcode ID: 6e05202e2b6317dcf9b285d138a61c7554b9cffc0ce9619bb66956b9d9d47aae
              • Instruction ID: 7bbe8d17847550f4164a14e3f7f2cb4162b00115eb79a228a3fcc10edc21327c
              • Opcode Fuzzy Hash: 6e05202e2b6317dcf9b285d138a61c7554b9cffc0ce9619bb66956b9d9d47aae
              • Instruction Fuzzy Hash: EF61ABB0509741AEE300AF26C59435FFBE4BF84748F01882EE4D897251E7B985898F86
              APIs
              • SetErrorMode.KERNEL32 ref: 0040DB2D
                • Part of subcall function 004127A8: _vsnprintf.MSVCRT ref: 004127CC
              • FindFirstFileA.KERNEL32 ref: 0040DB6F
              • FindNextFileA.KERNEL32 ref: 0040DCC6
              • FindClose.KERNEL32 ref: 0040DCD8
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: Find$File$CloseErrorFirstModeNext_vsnprintf
              • String ID: 49B$=9B
              • API String ID: 3730131509-1437851871
              • Opcode ID: 614e9fffcf9219516c0050d8f59d1067c41d6f899a0319c1393b422afb48b831
              • Instruction ID: d2bbd74eba1eaf649f0bd4c37a8a6416b9e5ed0152e307ea26bcf85ad81135cc
              • Opcode Fuzzy Hash: 614e9fffcf9219516c0050d8f59d1067c41d6f899a0319c1393b422afb48b831
              • Instruction Fuzzy Hash: 064108B09083459AD720AF66C58455AFBE4FF85318F00892EA4DCD7381D7B8958ACF4A
              APIs
              • CryptAcquireContextA.ADVAPI32 ref: 0040D2E2
              • CryptCreateHash.ADVAPI32 ref: 0040D31C
              • CryptHashData.ADVAPI32 ref: 0040D34B
              • CryptGetHashParam.ADVAPI32 ref: 0040D38A
                • Part of subcall function 004127A8: _vsnprintf.MSVCRT ref: 004127CC
              • CryptDestroyHash.ADVAPI32 ref: 0040D3F7
              • CryptReleaseContext.ADVAPI32 ref: 0040D40D
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: Crypt$Hash$Context$AcquireCreateDataDestroyParamRelease_vsnprintf
              • String ID:
              • API String ID: 3013291059-0
              • Opcode ID: 39854ef80ab4a7fbc3dc680ded39b80eed89874fe177f232a89a79b64462ce99
              • Instruction ID: 943cf95f321e7325facb401f71863eb3bfed9abde62d642a269049118650948e
              • Opcode Fuzzy Hash: 39854ef80ab4a7fbc3dc680ded39b80eed89874fe177f232a89a79b64462ce99
              • Instruction Fuzzy Hash: 7441F5B05083019FD700EF2AC58935FBBE4AF88718F01892EE8C897381D779C5498F96
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: _assert
              • String ID: jB$o
              • API String ID: 1222420520-209914815
              • Opcode ID: c778598c57938beeda3a03c633ed9cdd53ae4a03349816565a6a334ef414175d
              • Instruction ID: 3ee2903d3d2c0e63440c59b9d95d43c21fe2c472ea4d5dc2fd0c85ac53de4ac0
              • Opcode Fuzzy Hash: c778598c57938beeda3a03c633ed9cdd53ae4a03349816565a6a334ef414175d
              • Instruction Fuzzy Hash: BB919E72A083628FC714CF29D48051AFBE2BFD8314F498A2EE8D59B355D735E945CB82
              APIs
              • _assert.MSVCRT ref: 00419926
                • Part of subcall function 00415ABF: _assert.MSVCRT ref: 00415ED2
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: _assert
              • String ID: FB$j
              • API String ID: 1222420520-2384955494
              • Opcode ID: b3fe8b43fc6bca3c0a33ffa51e4bd9a6c448f1523a39c18d1db3d81232f94cc6
              • Instruction ID: 85f7a6da2dcfde57a4cfc22b025c18cb3d8a1a973eabce23ce6fb58419e1cbaa
              • Opcode Fuzzy Hash: b3fe8b43fc6bca3c0a33ffa51e4bd9a6c448f1523a39c18d1db3d81232f94cc6
              • Instruction Fuzzy Hash: A3B28071909341CFCB54CF28C0906AABBE1FF88304F1585AEE8999B346D778DD85CB96
              APIs
              • GetVersionExA.KERNEL32 ref: 00413325
              • GetVersionExA.KERNEL32(?), ref: 00413379
              • GetSystemInfo.KERNEL32(?,?), ref: 0041338C
                • Part of subcall function 0041328F: NetWkstaGetInfo.NETAPI32 ref: 004132B1
                • Part of subcall function 0041328F: NetApiBufferFree.NETAPI32 ref: 004132D8
              • GetSystemMetrics.USER32 ref: 004133FA
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: InfoSystemVersion$BufferFreeMetricsWksta
              • String ID:
              • API String ID: 1266462847-0
              • Opcode ID: a2f5e60309e9ea63997a5f63661c2a67e865f2bf7c7b30ca2f3ef5845b7a97e1
              • Instruction ID: aea862b3450ebf307a16053a8a3fc20b1df094ade6bc7c343729d6a33193dea1
              • Opcode Fuzzy Hash: a2f5e60309e9ea63997a5f63661c2a67e865f2bf7c7b30ca2f3ef5845b7a97e1
              • Instruction Fuzzy Hash: D7418E7040C7419AEB21AF21C5457AFBAE0AF81759F148E2FE4C487281D37D8AC98B5B
              APIs
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
              • String ID:
              • API String ID: 420147892-0
              • Opcode ID: 8705725f05fe9afeeedec4a0c2d3b20b049fa06699c5a5ff1e195fb4d0e9f0db
              • Instruction ID: dbb4d6dc22455ac6b6b4c8bb6317d27c69ec59bbf57194761826882fdadde184
              • Opcode Fuzzy Hash: 8705725f05fe9afeeedec4a0c2d3b20b049fa06699c5a5ff1e195fb4d0e9f0db
              • Instruction Fuzzy Hash: EB1119B0409701AAD710AF15CA856AFFBE8EF80718F008D2FF4C893252D3B99485CB5A
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: _assert
              • String ID: HjB
              • API String ID: 1222420520-2248713979
              • Opcode ID: f62c3d4576d8ad505b0a81f0fa83231c5cc89cc9aafe5267dd7225276671c9f6
              • Instruction ID: a3441135aa71a6079429eef520cd0e1a6c464effaa05f67e07f9da83f6d0b88a
              • Opcode Fuzzy Hash: f62c3d4576d8ad505b0a81f0fa83231c5cc89cc9aafe5267dd7225276671c9f6
              • Instruction Fuzzy Hash: 222288716083A18FC724CF29D49052ABBE1BFC9314F448A6EF9E597356D234EA05CF92
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: CryptDataFreeLocalUnprotect
              • String ID: 5B
              • API String ID: 1561624719-3738334870
              • Opcode ID: c63f1e79abc16ef90ff5286a14a4e2a9458261c6144f1dd153b029fa06e06a91
              • Instruction ID: 6f154d43ee89b411a9f17fea58252a0a0f24be58a4641eb8c9eefda1aa91bd9a
              • Opcode Fuzzy Hash: c63f1e79abc16ef90ff5286a14a4e2a9458261c6144f1dd153b029fa06e06a91
              • Instruction Fuzzy Hash: 3171BFB05083449FC710DF2AC18475BFBE0BB89348F448D2EE99897391E779D999CB86
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: _vsnprintfrecvsend
              • String ID: .B
              • API String ID: 2169655391-2011479308
              • Opcode ID: 2ec24ba702f98473ee5d9a715ab26bdcf3092223efe4a5c028eb6e3fbd3b2434
              • Instruction ID: 44476910b367cb1c2704fc52ca41c1ffc0a5ae24bf239666488ca44df54fa44d
              • Opcode Fuzzy Hash: 2ec24ba702f98473ee5d9a715ab26bdcf3092223efe4a5c028eb6e3fbd3b2434
              • Instruction Fuzzy Hash: 4111E2B1409301AED310AF29D58935FFBE0FF84354F51882EE4D897251D7788989DF96
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: ByteCharMultiNameUserWide
              • String ID: @
              • API String ID: 2949824840-2766056989
              • Opcode ID: 09c9c0a9f06fa941f3f5a46c28196dba5f2fafc07f774812d3ae38cfce7fc380
              • Instruction ID: 75a62b7ad59212d7e7d3757252a2119b8f15ada3fb68da9ed8f134ad780259a0
              • Opcode Fuzzy Hash: 09c9c0a9f06fa941f3f5a46c28196dba5f2fafc07f774812d3ae38cfce7fc380
              • Instruction Fuzzy Hash: 830108B0409341AED320AF26D94479BFBE4BBD4714F008A1EE49847290D37985498B97
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: _assert
              • String ID: FB
              • API String ID: 1222420520-4194129869
              • Opcode ID: 46893e09e37b25dd200b0db0f7321bbeb65247fb8bfb45dea1f34a14322b6770
              • Instruction ID: 8934405eb0176573ac8fe7b21ac65539928ae6525602ef26ebf357b260492e82
              • Opcode Fuzzy Hash: 46893e09e37b25dd200b0db0f7321bbeb65247fb8bfb45dea1f34a14322b6770
              • Instruction Fuzzy Hash: 7712B131508741CBCB15CF28C0842EABBE2FFD5304F5849AED8994B346E779D989CB96
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: _assert
              • String ID: FB
              • API String ID: 1222420520-4194129869
              • Opcode ID: 8ddbe3c9850994fc0d72c42226f444b701068ab875a1f9731f5df1535297b31b
              • Instruction ID: a7d617267acf3779656a729e3d165d253c0adcf1a2096d40c2f4e68e066cb6e0
              • Opcode Fuzzy Hash: 8ddbe3c9850994fc0d72c42226f444b701068ab875a1f9731f5df1535297b31b
              • Instruction Fuzzy Hash: 5C02F370505601CFCB58CF28C5C46957BA2FF95304F5886AADD4A8F34AE339E8C9CB99
              APIs
              • GetLocalTime.KERNEL32 ref: 0040A13F
                • Part of subcall function 004127A8: _vsnprintf.MSVCRT ref: 004127CC
                • Part of subcall function 0040970C: GetLocalTime.KERNEL32 ref: 00409733
                • Part of subcall function 0040970C: CloseHandle.KERNEL32 ref: 0040979A
                • Part of subcall function 0040970C: MultiByteToWideChar.KERNEL32 ref: 0040982A
                • Part of subcall function 0040970C: CreateFileW.KERNEL32 ref: 00409865
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: LocalTime$ByteCharCloseCreateFileHandleMultiWide_vsnprintf
              • String ID: 3B
              • API String ID: 1146952123-2602569677
              • Opcode ID: 5591ed2e94f3fe8972e20bad9ffc4cb21d90fde9e93a0863d429b9defc772554
              • Instruction ID: 34f9120a3e00634d565d7763f47cba82c7014e7225e68866d6d8ccf2245a1495
              • Opcode Fuzzy Hash: 5591ed2e94f3fe8972e20bad9ffc4cb21d90fde9e93a0863d429b9defc772554
              • Instruction Fuzzy Hash: FC11FAB4418311ABD710EF21D58426FBBE4BF84308F418D2EF8D89B281D7BC8985DB4A
              APIs
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: Cursormouse_event
              • String ID:
              • API String ID: 1102576784-0
              • Opcode ID: 02aa775cd51f21a886bada7529a77aa4c4527e8a93dc87a2c038cd1471ca5427
              • Instruction ID: 2d8ae4a002b4347ec37d14b3ea5e3552e9b4ec24971f98579b9e90b097ea308f
              • Opcode Fuzzy Hash: 02aa775cd51f21a886bada7529a77aa4c4527e8a93dc87a2c038cd1471ca5427
              • Instruction Fuzzy Hash: B70184B4009350AAE744AF15C11936FBFE1BB80708F408C5EF4D44A290D3BD8599DB97
              APIs
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: keybd_event
              • String ID:
              • API String ID: 2665452162-0
              • Opcode ID: fc0e2f1ce52b91d2f25bab5800c9da4a646e5a4d84648ec4c398f99e0da44be8
              • Instruction ID: c3d59fdb0b4da9d538631368c5f777f5d3843ca3ad337a3792014ed51d975762
              • Opcode Fuzzy Hash: fc0e2f1ce52b91d2f25bab5800c9da4a646e5a4d84648ec4c398f99e0da44be8
              • Instruction Fuzzy Hash: 55D0E9B58087545AD7007F29C15A32ABEE0BB85308F84899DE8D846256E37D82589F97
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c64fd2081e40542ec24b5bab1fe1992d84aed860da4e2f42b8fc7b43fd1c603b
              • Instruction ID: 3df998bb04c351a582b34812b499681519a7d1f8fe80b65cb1d05d8504fcfd5d
              • Opcode Fuzzy Hash: c64fd2081e40542ec24b5bab1fe1992d84aed860da4e2f42b8fc7b43fd1c603b
              • Instruction Fuzzy Hash: F92230B7F443214BC71CCE55C890596B393BBD822071FD66D8C46AB719DAB8BD0A8AC0
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ac6db6ac2926072ef1bc6234f6135838dcb1d9f06ecfca5c34d07e106ff1408f
              • Instruction ID: 0afe2eb6dae3cd22a8d80e04e73e90d298cf68a03aa805315aad90411e67708f
              • Opcode Fuzzy Hash: ac6db6ac2926072ef1bc6234f6135838dcb1d9f06ecfca5c34d07e106ff1408f
              • Instruction Fuzzy Hash: F6D1BC75508352CFC720DF58D0806ABB7E1FFC5354F16896ED48A8B351E738A886CB8A
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 51fff2553cdd902432e618f4e3bbb8c487e60df0bcc975cc7b3d7c1c351fff24
              • Instruction ID: 8797af91ac4715f1fb2e54a80d0cb35914c2db1e63e77e2d212aaf63986e366c
              • Opcode Fuzzy Hash: 51fff2553cdd902432e618f4e3bbb8c487e60df0bcc975cc7b3d7c1c351fff24
              • Instruction Fuzzy Hash: 11D1C7316082904FC364DF2ED8D047AF7E2EBC9301B99C66EE5D5473A6CA34E512DBA4
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 27fca94041a9df32a14316a36e9a12f077d164a7417f38a532b740c9282b2453
              • Instruction ID: 2765ddb06063666b79bad2b3ff5c0cc9fb0e1b865b8642978e654f5c271af5cc
              • Opcode Fuzzy Hash: 27fca94041a9df32a14316a36e9a12f077d164a7417f38a532b740c9282b2453
              • Instruction Fuzzy Hash: 3BD1EA31A042A58FC314DF2DD8D157AF7E0EB49301F86856EE5D6573A2CB34A811DBD4
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c3fcca1c993dc30e769f274d1395556741c4fbbbb2cde2ff695ebfbbd3511dcc
              • Instruction ID: b015c0dcccaa6a010ea3fa599d91632165f755c2c91e9af8a801e1c9d75bd2f2
              • Opcode Fuzzy Hash: c3fcca1c993dc30e769f274d1395556741c4fbbbb2cde2ff695ebfbbd3511dcc
              • Instruction Fuzzy Hash: 1AA17472A241714BD31D8F2D98A453ABBE0BF0920174B46EFD896EB293CA74DC41DBD4
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2d356f27bb473633d8b53949ddcdb445a6e1839317b6b1b33dede28864bd044b
              • Instruction ID: 0f5424987ccef4c18d47929a767011605ba0901791081486b192bd6b24ef0d2b
              • Opcode Fuzzy Hash: 2d356f27bb473633d8b53949ddcdb445a6e1839317b6b1b33dede28864bd044b
              • Instruction Fuzzy Hash: C9717C33C047359BD3108F26D8402AABBE1AF98318F8B8969EC9963341C674AD029BD5
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 84f8c30ec476356e5b62ab59b84050d130f009497b096a1606cb89d09e085b6b
              • Instruction ID: e819e0456b28a7b1ad2ee4cb1be710d210eb08b349be8c4b8c9e5110c3859625
              • Opcode Fuzzy Hash: 84f8c30ec476356e5b62ab59b84050d130f009497b096a1606cb89d09e085b6b
              • Instruction Fuzzy Hash: 1C518E71A042988FD7149F1AEC94075BBE1F78D311B8A45BEEA84173A1D734F402DBE8
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a92d4ecba4161925266479d0afbb402e3def9d4cd15aad5feb47486b5a973f05
              • Instruction ID: 86110b307b21d8af55dc1a997a8f43314d6b7871475df1e76ed2e41889e1307b
              • Opcode Fuzzy Hash: a92d4ecba4161925266479d0afbb402e3def9d4cd15aad5feb47486b5a973f05
              • Instruction Fuzzy Hash: 6E4152B2A14B058FD304CF69C88471AF7E1FB98324F59C56CE6598B392D675E847CB80
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0c45a9dc0c36618680e4bd6899bb43762db179e5c9582f89233faa09b195c5ab
              • Instruction ID: c8ef6340a37f776bde53b87d3697213aec168059dab6d3096e9a931dd9a6e3bf
              • Opcode Fuzzy Hash: 0c45a9dc0c36618680e4bd6899bb43762db179e5c9582f89233faa09b195c5ab
              • Instruction Fuzzy Hash: CA4119752093C08ECB15CF6D84C055ABFE1AFA6200B08C99EE8D99F74BD638D949C762

              Control-flow Graph

              APIs
                • Part of subcall function 0041236C: malloc.MSVCRT ref: 0041237C
                • Part of subcall function 00407F7A: LoadLibraryA.KERNEL32 ref: 00407F84
                • Part of subcall function 00407F8E: GetProcAddress.KERNEL32 ref: 00407FA0
              • malloc.MSVCRT ref: 00402760
              • htons.WS2_32 ref: 004027C2
              • htons.WS2_32 ref: 0040280F
              • htons.WS2_32 ref: 004029AC
              • inet_ntoa.WS2_32 ref: 004029BA
              • inet_ntoa.WS2_32 ref: 0040281D
                • Part of subcall function 00402570: CreateToolhelp32Snapshot.KERNEL32 ref: 004025BF
                • Part of subcall function 00402570: Process32First.KERNEL32 ref: 004025DF
                • Part of subcall function 00402570: CloseHandle.KERNEL32 ref: 0040261E
              • inet_ntoa.WS2_32 ref: 004027D0
                • Part of subcall function 004127A8: _vsnprintf.MSVCRT ref: 004127CC
              • malloc.MSVCRT ref: 00402948
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: htonsinet_ntoamalloc$AddressCloseCreateFirstHandleLibraryLoadProcProcess32SnapshotToolhelp32_vsnprintf
              • String ID: %s:%d$%s:%u$@$Ed590WYd66XlCnd_4idLCldD$Ed5jf5dRSdSqYsqCVid$Ed5jf5dRSdSuSsqCVid$iphlpapi.dll$kernel32.dll$psapi.dll$+B
              • API String ID: 3806733647-2364278594
              • Opcode ID: e5527e295c1d145b3a1be5e2b79c9850e15ab6488274ec27ffee1723177acfe5
              • Instruction ID: 64c6eb304da1bd60933a222d55b1bae016526deff2b752f498ff56c04a6099ea
              • Opcode Fuzzy Hash: e5527e295c1d145b3a1be5e2b79c9850e15ab6488274ec27ffee1723177acfe5
              • Instruction Fuzzy Hash: 28D1A3B4908341ABC710AF65C58965EFBF0BF84748F418C2EF8C897291D7B9D988CB56

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 217 410fc4-410fee 218 410ff4 217->218 219 4113a8 217->219 218->219 220 411112-411126 call 41086b 218->220 221 411169-411192 RegOpenKeyExA 218->221 222 410ffb-411044 RegCreateKeyExA 218->222 223 41121b-411244 RegOpenKeyExA 218->223 224 41105f-411088 RegOpenKeyExA 218->224 225 4113aa-4113b6 219->225 220->219 241 41112c-41115e call 4127a8 220->241 221->219 226 411198-4111bb RegDeleteValueA RegCloseKey 221->226 222->219 227 41104a-41105a 222->227 223->219 229 41124a-411281 RegQueryValueExA 223->229 224->219 228 41108e-4110db RegSetValueExA RegCloseKey 224->228 226->219 231 4111c1-4111ec call 4127a8 226->231 232 4110f1-41110d call 4127a8 227->232 228->219 233 4110e1-4110e9 228->233 234 411337-411346 RegCloseKey 229->234 235 411287-411299 malloc 229->235 243 4111f1-4111f3 231->243 232->243 233->232 234->225 237 411348-411385 call 4127a8 234->237 235->234 240 41129f-4112d0 RegQueryValueExA 235->240 237->225 256 411387-4113a6 call 405d7d 237->256 245 4112d2-4112d4 240->245 246 4112d6-411312 RegSetValueExA 240->246 252 411214-411216 241->252 254 411164 241->254 251 4111f5-41120f call 405d7d 243->251 243->252 253 41132b-411332 call 407f59 245->253 246->245 248 411314-411328 RegDeleteValueA 246->248 248->253 251->252 252->225 253->234 254->256 256->225
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: Value$CloseOpen$DeleteQuery$Createmalloc
              • String ID: <DB$?
              • API String ID: 2456196832-2182478021
              • Opcode ID: 2a6c15e5110915527470d0c5e75be917cad7f867061e65323b0ccb08af8f21c4
              • Instruction ID: 5e49c9d9379b1dd87b15daa38270e0e0a3fc6f91244b4719e2a77dc22190009b
              • Opcode Fuzzy Hash: 2a6c15e5110915527470d0c5e75be917cad7f867061e65323b0ccb08af8f21c4
              • Instruction Fuzzy Hash: DAB1CFB0909345AFD700EF69D18469FFBE4BF84744F40892EF99887311D7B8D5898B46

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 329 4113b8-411402 getenv call 4127a8 call 406f1a 334 411404-411431 getenv call 4081aa call 4127a8 329->334 335 411436-411440 call 406f1a 329->335 334->335 340 411446-4114c7 call 4129e4 * 2 CreatePipe 335->340 341 41157a 335->341 344 411582-41159c call 405d7d 340->344 351 4114cd-4114ea CreatePipe 340->351 341->344 350 41172d-411737 344->350 351->341 352 4114f0-411578 GetStartupInfoA CreateProcessA 351->352 352->341 353 4115a1-4115e2 CloseHandle * 2 call 405d7d 352->353 355 4115e7-411624 PeekNamedPipe 353->355 356 4116a1 355->356 357 411626-41162c 355->357 358 4116ab-4116b2 356->358 357->358 359 41162e-411635 357->359 361 4116b4-41170c CloseHandle * 2 TerminateProcess call 405d7d 358->361 362 41171c-411728 call 407ef4 358->362 359->358 360 411637-411639 359->360 364 41163b-411649 malloc 360->364 365 41164d-411676 ReadFile 360->365 361->350 372 41170e-41171a call 407f59 361->372 362->355 364->358 368 41164b 364->368 365->358 369 411678-41169b call 405d7d 365->369 368->365 369->355 369->356 372->350
              APIs
              • getenv.MSVCRT ref: 004113D7
                • Part of subcall function 004127A8: _vsnprintf.MSVCRT ref: 004127CC
                • Part of subcall function 00406F1A: MultiByteToWideChar.KERNEL32 ref: 00406F53
                • Part of subcall function 00406F1A: GetFileAttributesW.KERNEL32 ref: 00406F5E
              • getenv.MSVCRT ref: 0041140B
              • CreatePipe.KERNEL32 ref: 004114B1
              • CreatePipe.KERNEL32 ref: 004114E0
              • GetStartupInfoA.KERNEL32 ref: 004114F3
              • CreateProcessA.KERNEL32 ref: 0041156E
              • CloseHandle.KERNEL32 ref: 004115A8
              • CloseHandle.KERNEL32(?), ref: 004115B7
                • Part of subcall function 00405D7D: EnterCriticalSection.KERNEL32 ref: 00405DAD
                • Part of subcall function 00405D7D: LeaveCriticalSection.KERNEL32 ref: 00405ECC
              • PeekNamedPipe.KERNEL32 ref: 0041161A
              • malloc.MSVCRT ref: 0041163E
              • ReadFile.KERNEL32 ref: 0041166C
              • CloseHandle.KERNEL32 ref: 004116BB
              • CloseHandle.KERNEL32(00000000), ref: 004116C9
              • TerminateProcess.KERNEL32(?,00000000), ref: 004116DE
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: CloseHandle$CreatePipe$CriticalFileProcessSectiongetenv$AttributesByteCharEnterInfoLeaveMultiNamedPeekReadStartupTerminateWide_vsnprintfmalloc
              • String ID: D$lDB
              • API String ID: 875277771-151759108
              • Opcode ID: ca23d0f52e549a3f760370a8f3994d7dd9e6cb6ea0e7ea4ebefd2ad8d4038f33
              • Instruction ID: c0a2dff8ecfd3ca449ec7184aa16f3f0f3f293b9e2d18e22baf8a99b3bb4e763
              • Opcode Fuzzy Hash: ca23d0f52e549a3f760370a8f3994d7dd9e6cb6ea0e7ea4ebefd2ad8d4038f33
              • Instruction Fuzzy Hash: F4919EB05087419FD710AF65C18875FBBE4AF84748F01892EE5D88B3A1D7B99489CF8A

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 376 41ac15-41ac4f malloc 377 41af93-41af9a 376->377 378 41ac55-41ac7a 376->378 379 41ac81-41ac96 malloc 378->379 380 41ac7c 378->380 381 41ac98-41aca8 free 379->381 382 41acad-41acb5 379->382 380->379 381->377 383 41acbd-41acc2 382->383 384 41acc4-41acdc call 414fef 383->384 385 41acde-41ace8 383->385 384->383 387 41acea 385->387 388 41acef-41ad23 call 41a64c 385->388 387->388 392 41ad27-41ad2e 388->392 393 41ad30-41ad56 call 41a5f0 392->393 394 41ad87-41ada8 call 41a5f0 392->394 399 41ad58-41ad5c 393->399 400 41ad5e-41ad85 call 41a5f0 393->400 401 41af29-41af3f free * 2 394->401 402 41adae-41af20 call 4171da call 414fef 394->402 399->400 400->392 401->377 409 41af41-41af64 call 4171da 402->409 410 41af22 402->410 413 41af66-41af81 409->413 410->401 413->413 414 41af83-41af8f free 413->414 414->377
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: free$malloc$realloc
              • String ID: )$A$D$D$G$H$I$I$N$P$R$T
              • API String ID: 10190057-4026286603
              • Opcode ID: 25416bb5c249f3873459c7c3242fdf6bd4d75fafb1925d00441d8b37c87fa026
              • Instruction ID: 7b50295ee95f3483ab7dff93a2a89c17451d79e52031df4d4eaf42e24e8d509c
              • Opcode Fuzzy Hash: 25416bb5c249f3873459c7c3242fdf6bd4d75fafb1925d00441d8b37c87fa026
              • Instruction Fuzzy Hash: 14A1D27110D3809ED311DB69C48438FFFE1ABA6308F44895EE5C89B382D7B99989CB57

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 780 40dce9-40dd63 call 4081aa LoadLibraryA 783 40dd69-40de43 call 4081aa GetProcAddress call 4081aa GetProcAddress call 4081aa GetProcAddress call 4081aa GetProcAddress call 4081aa GetProcAddress call 4081aa GetProcAddress 780->783 784 40e3aa-40e3b4 780->784 797 40de45-40de4a 783->797 798 40de4c-40de4e 783->798 797->798 800 40de53-40de71 797->800 799 40e371-40e377 798->799 801 40e381-40e386 799->801 802 40e379-40e380 799->802 800->798 806 40de73-40de99 800->806 804 40e394-40e3a6 FreeLibrary 801->804 805 40e388-40e393 801->805 802->801 804->784 805->804 806->798 810 40de9b-40dea0 806->810 810->798 811 40dea2-40deaa call 4132e6 810->811 814 40deb8-40dec0 call 4132e6 811->814 815 40deac-40deb6 811->815 814->815 822 40dec2-40deca call 4132e6 814->822 816 40df24-40df2c 815->816 818 40def9-40df1e call 4129c0 816->818 819 40df2e 816->819 826 40df20 818->826 827 40df33-40e05e WideCharToMultiByte * 3 818->827 819->799 822->815 828 40decc-40ded4 call 4132e6 822->828 826->816 832 40e120-40e126 827->832 833 40e064-40e0f8 WideCharToMultiByte call 412755 827->833 828->815 834 40ded6-40dede call 4132e6 828->834 832->826 836 40e12c-40e134 832->836 833->832 840 40e0fa-40e11c call 412abf 833->840 834->815 842 40dee0-40dee8 call 4132e6 834->842 836->826 840->832 842->815 847 40deea-40def4 842->847 848 40e164-40e16c 847->848 849 40e139-40e15e call 4129c0 848->849 850 40e16e 848->850 853 40e160 849->853 854 40e173-40e296 WideCharToMultiByte * 3 849->854 850->799 853->848 856 40e358-40e35e 854->856 857 40e29c-40e330 WideCharToMultiByte call 412755 854->857 856->853 859 40e364-40e36c 856->859 857->856 862 40e332-40e354 call 412abf 857->862 859->853 862->856
              APIs
              • LoadLibraryA.KERNEL32 ref: 0040DD57
              • GetProcAddress.KERNEL32(?), ref: 0040DD7C
              • GetProcAddress.KERNEL32 ref: 0040DD98
              • GetProcAddress.KERNEL32 ref: 0040DDB6
              • GetProcAddress.KERNEL32(?,?), ref: 0040DDD2
              • GetProcAddress.KERNEL32 ref: 0040DDF0
              • GetProcAddress.KERNEL32 ref: 0040DE0E
              • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040E397
                • Part of subcall function 004132E6: GetVersionExA.KERNEL32 ref: 00413325
                • Part of subcall function 004132E6: GetSystemMetrics.USER32 ref: 004133FA
              • WideCharToMultiByte.KERNEL32 ref: 0040DF74
              • WideCharToMultiByte.KERNEL32 ref: 0040DFC0
              • WideCharToMultiByte.KERNEL32 ref: 0040E00C
              • WideCharToMultiByte.KERNEL32 ref: 0040E0B0
              • WideCharToMultiByte.KERNEL32 ref: 0040E1B4
              • WideCharToMultiByte.KERNEL32 ref: 0040E200
              • WideCharToMultiByte.KERNEL32 ref: 0040E24C
              • WideCharToMultiByte.KERNEL32 ref: 0040E2E8
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: ByteCharMultiWide$AddressProc$Library$FreeLoadMetricsSystemVersion
              • String ID:
              • API String ID: 4051271034-0
              • Opcode ID: 87aafaf84040a22bc4a574d69e3875252030c0c31ccf32c7b5f1b702cec560f4
              • Instruction ID: 0411f2c87eaa10a6bc819440aee1928311a11f64f3fd3897648e7812cf6e01f9
              • Opcode Fuzzy Hash: 87aafaf84040a22bc4a574d69e3875252030c0c31ccf32c7b5f1b702cec560f4
              • Instruction Fuzzy Hash: 6802ADB04087419FD310EF6AC58875BBBE4BF84358F108D2EF4948B291E7B9D5898F96
              APIs
              • CreateToolhelp32Snapshot.KERNEL32 ref: 0040FEA5
              • Process32First.KERNEL32 ref: 0040FECC
              • CloseHandle.KERNEL32 ref: 0040FEDA
                • Part of subcall function 004127A8: _vsnprintf.MSVCRT ref: 004127CC
              • OpenProcess.KERNEL32 ref: 0040FF95
              • GetProcessTimes.KERNEL32 ref: 0040FFFE
              • FileTimeToSystemTime.KERNEL32 ref: 00410028
              • CloseHandle.KERNEL32(00000000,00000000), ref: 00410088
              • Process32Next.KERNEL32(00000000,00000000), ref: 004100F5
              • CloseHandle.KERNEL32(?,?,00000000,00000000), ref: 00410107
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: CloseHandle$ProcessProcess32Time$CreateFileFirstNextOpenSnapshotSystemTimesToolhelp32_vsnprintf
              • String ID: $tCB$vCB
              • API String ID: 1698657367-2528537987
              • Opcode ID: 29e0c6c4af74bcfaac4a1d46f5b8779cc5999e189975c46573ebb5cc9df879ed
              • Instruction ID: 6fadafcb3b73e839ba5121377a1d1d4624def229cb7cc3727062cbee2f3d546e
              • Opcode Fuzzy Hash: 29e0c6c4af74bcfaac4a1d46f5b8779cc5999e189975c46573ebb5cc9df879ed
              • Instruction Fuzzy Hash: BB81C3B0408741AED720AF25C54566FBBE4AF85748F018D2EF8D887351E7BDC989CB46
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: ByteCharMultiWide_wfopenfclose$freadfreefwritemalloc
              • String ID: \/B
              • API String ID: 2679953470-271128087
              • Opcode ID: 1a201ae08c697f7eeda60a02ea33dc54c079bd51e64b70313e0bd476c0a05067
              • Instruction ID: bd1c24ee40381327b35b8d10bbed57f0e5c37a6e482eaac28a171252adbfc4ce
              • Opcode Fuzzy Hash: 1a201ae08c697f7eeda60a02ea33dc54c079bd51e64b70313e0bd476c0a05067
              • Instruction Fuzzy Hash: FC3117B09097059FD710AF76D58526EBBE0BF84348F41883EE4D897382D7789489CB8B
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: CloseOpenfclosefopen
              • String ID: $/$19B$A$E$K
              • API String ID: 4197589263-888862201
              • Opcode ID: c0e3fb71f7fc6bda4d548a6fbe01f6975c31a5aa555185305a4db6e8dc71234b
              • Instruction ID: b3a366508a3bf55356eea0268f728a85e1b25c4e3c11778993a5dcbc8714eb01
              • Opcode Fuzzy Hash: c0e3fb71f7fc6bda4d548a6fbe01f6975c31a5aa555185305a4db6e8dc71234b
              • Instruction Fuzzy Hash: B2A1C2B09083419BD710EFA5C18465BBBE0AF85358F00882EF5D897391D7B9D989DF4A
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: Value$Query$CloseEnumOpen_vsnprintfmalloc
              • String ID: CB
              • API String ID: 4070552197-2813831398
              • Opcode ID: 9bee3dbd4e7d19c30e3e32ea7d95f2c090d671b3ace4d02c6f0daefd3a3cde72
              • Instruction ID: f9e542294e120a942ba3f9c894af39fbc12760f83aa3f443d205d2010ae74b6d
              • Opcode Fuzzy Hash: 9bee3dbd4e7d19c30e3e32ea7d95f2c090d671b3ace4d02c6f0daefd3a3cde72
              • Instruction Fuzzy Hash: E2B16BB45083419FD710EF6AC18479BFBE4BF88744F408D2EE89887351E7B9D5898B86
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: getenv$_vsnprintfmalloc
              • String ID: %$%$%s\%s.%s$TEMP$\$s$s
              • API String ID: 3160696619-3075679649
              • Opcode ID: 7c1266ee4a8bb0ef58b53bdb6cf553ef2235b8560277cd116898d57bbc94ea4a
              • Instruction ID: f04d716bfdf1a3b2f19b14ba05fef692e22545d8b3c1490e52eb58049ae1adaa
              • Opcode Fuzzy Hash: 7c1266ee4a8bb0ef58b53bdb6cf553ef2235b8560277cd116898d57bbc94ea4a
              • Instruction Fuzzy Hash: 435196B040C385DEE720EF25D54879EBBE0BF84348F408D2EE5D887281E7B99588DB56
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: fclosefgetpos$ByteCharMultiWide_wfopenfreadfsetposmallocrealloc
              • String ID: d/B
              • API String ID: 1812338015-978428479
              • Opcode ID: 2d6ccdd2d2fb629f81430ef7c6409be28087138821b7d1f134346664b6263e99
              • Instruction ID: cce78eb31c107fb340ace7c9921005f6624d878254cb06048c37cb8e28fe17a8
              • Opcode Fuzzy Hash: 2d6ccdd2d2fb629f81430ef7c6409be28087138821b7d1f134346664b6263e99
              • Instruction Fuzzy Hash: 6031B6B0509705ABD750AF26C68535EBBE4AF84348F01892EE8D89B281D778D54A8F4B
              APIs
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: connectgethostbynamehtonsrecvsendsocket
              • String ID:
              • API String ID: 2370112503-0
              • Opcode ID: e07faabcde73fad5de2f234cc241048b4efe75730fad398a918129e32e759b8a
              • Instruction ID: e31714b0b2c18d3bfe683e3de1011ef27751aa1e39aef002969c9c8643353b02
              • Opcode Fuzzy Hash: e07faabcde73fad5de2f234cc241048b4efe75730fad398a918129e32e759b8a
              • Instruction Fuzzy Hash: 1471E8B05087059FD710AF6AC58539ABBE0EF84348F418D2EE4D897392D7BD89898B47
              APIs
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: recvsend$mallocselect
              • String ID:
              • API String ID: 2752384660-0
              • Opcode ID: b82e8287e89736ba92eba444ea1445ecdc45d6602fffcca40b5c4f4261706058
              • Instruction ID: 396cab881292c67bc80472d702024345634477e2cb390eb29da05618a31f840e
              • Opcode Fuzzy Hash: b82e8287e89736ba92eba444ea1445ecdc45d6602fffcca40b5c4f4261706058
              • Instruction Fuzzy Hash: 5A61FCB05197419FD720BF79C5847ABBBE4AF84314F10892FE998C3351E77898858B47
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: _wfopen$ByteCharMultiWidefgetpos$fread
              • String ID: EB
              • API String ID: 938800225-4058845024
              • Opcode ID: 950e416187ae905cf82d7dafeef771dc36a792c2880a9897fab731ecdff24896
              • Instruction ID: fdcfd7fcdd99f777d3a34adf36677ce69dcc47347dc1f65e5ed97d3c26df3997
              • Opcode Fuzzy Hash: 950e416187ae905cf82d7dafeef771dc36a792c2880a9897fab731ecdff24896
              • Instruction Fuzzy Hash: 75D1E7B45087459FC310EF65C1886AABBE0BF89308F15C97EE8D897352D7789885CF46
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: File$CloseHandle$ByteCharCreateLocalMultiPointerTimeWideWrite_vsnprintf
              • String ID: 1B
              • API String ID: 1679277924-3133059986
              • Opcode ID: 4e2e8c59022566be6e83790a85539b938eb59b7fa42426b377093483d846f68c
              • Instruction ID: e376d887f57f93dc865b5eaaf6567e86db3f04f64e7ab8cebec23d02cc14b5b1
              • Opcode Fuzzy Hash: 4e2e8c59022566be6e83790a85539b938eb59b7fa42426b377093483d846f68c
              • Instruction Fuzzy Hash: E9512DB05083009BC310EF26D54426BBBF0BB85718F518A2EF4D497392D7BD9989CB9A
              APIs
                • Part of subcall function 00407F7A: LoadLibraryA.KERNEL32 ref: 00407F84
                • Part of subcall function 00407F8E: GetProcAddress.KERNEL32 ref: 00407FA0
              • RegisterClassExW.USER32 ref: 00409F29
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: AddressClassLibraryLoadProcRegister
              • String ID: 0$0$ssdaClass
              • API String ID: 3006457887-3236872048
              • Opcode ID: eed60d624a5036191c5a01f9f44c180ff77991b3a128f902be9f0c859de88d18
              • Instruction ID: dc59c3b724a470855dcc4065ae2b59d1d9b3c777af613543eb6a0d926dcb9681
              • Opcode Fuzzy Hash: eed60d624a5036191c5a01f9f44c180ff77991b3a128f902be9f0c859de88d18
              • Instruction Fuzzy Hash: 863108B05183019AE310BF25D55531FBAE0BF84348F41892EF4C4AB292D7BD8949CB9B
              APIs
              • getenv.MSVCRT ref: 0040C1B8
                • Part of subcall function 004127A8: _vsnprintf.MSVCRT ref: 004127CC
                • Part of subcall function 00406F1A: MultiByteToWideChar.KERNEL32 ref: 00406F53
                • Part of subcall function 00406F1A: GetFileAttributesW.KERNEL32 ref: 00406F5E
              • getenv.MSVCRT ref: 0040C1F6
                • Part of subcall function 00407F59: free.MSVCRT ref: 00407F6A
              • fopen.MSVCRT ref: 0040C22C
              • malloc.MSVCRT ref: 0040C259
              • fread.MSVCRT ref: 0040C27D
              • fclose.MSVCRT ref: 0040C2B0
              • fclose.MSVCRT ref: 0040C2CA
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: fclosegetenv$AttributesByteCharFileMultiWide_vsnprintffopenfreadfreemalloc
              • String ID: k6B
              • API String ID: 164930318-2852998170
              • Opcode ID: b606a953a79d5e5e18e6b6d3c7a24a57053edc5fa5b6b61cec116d80e729aa60
              • Instruction ID: 923c2ccaee423b8f51ada5992f51b5999be8c953822dc98e8fb21a0b7bf81a7a
              • Opcode Fuzzy Hash: b606a953a79d5e5e18e6b6d3c7a24a57053edc5fa5b6b61cec116d80e729aa60
              • Instruction Fuzzy Hash: 113118B05087019ED710BFA6D58526EFBE4AF94358F41883EE4D89B392D77CC4858B4A
              APIs
                • Part of subcall function 0041C5A7: fopen.MSVCRT ref: 0041C5C3
                • Part of subcall function 0041C5A7: fseek.MSVCRT ref: 0041C5E1
                • Part of subcall function 0041C5A7: ftell.MSVCRT ref: 0041C5ED
                • Part of subcall function 0041C5A7: fclose.MSVCRT ref: 0041C604
              • strcpy.MSVCRT ref: 0041F216
              • strncpy.MSVCRT ref: 0041F29A
              • _mkdir.MSVCRT ref: 0041F337
              • _errno.MSVCRT ref: 0041F33F
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: _errno_mkdirfclosefopenfseekftellstrcpystrncpy
              • String ID: $:$\
              • API String ID: 268051615-2457500751
              • Opcode ID: 9526ac459c02bb7793610bcab494c40ffb002977be289f00c765dc40185c480f
              • Instruction ID: 79c026138aa9a439cba8819bc206cad1fae7c9babfb4a3138d3d5cf70f9326d1
              • Opcode Fuzzy Hash: 9526ac459c02bb7793610bcab494c40ffb002977be289f00c765dc40185c480f
              • Instruction Fuzzy Hash: 56616E7550C7898AD7249F39C4803EFBBE1AF84304F54493FE8E883341D779898A8B4A
              APIs
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: recv$closesocketconnecthtonsselectsendshutdownsocket
              • String ID:
              • API String ID: 1430705073-0
              • Opcode ID: 7aa564cc39fd655c1c646bbf1d1799004d24cdb641ddc06cc15a049bd6b3ff1c
              • Instruction ID: 331b2ee2af7af9e314b8cfd2fab8a33ff8218399bbf528e54cfcbcff9f8d33b6
              • Opcode Fuzzy Hash: 7aa564cc39fd655c1c646bbf1d1799004d24cdb641ddc06cc15a049bd6b3ff1c
              • Instruction Fuzzy Hash: 2461D6B0509740AED710AF25C18979ABBE4FF84348F008D1EF9D887251E7B994899F47
              APIs
                • Part of subcall function 0041236C: malloc.MSVCRT ref: 0041237C
              • LoadLibraryA.KERNEL32 ref: 0040A519
              • GetProcAddress.KERNEL32 ref: 0040A53C
              • GetProcAddress.KERNEL32 ref: 0040A55A
              • GetProcAddress.KERNEL32 ref: 0040A576
              • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040A604
                • Part of subcall function 00405D7D: EnterCriticalSection.KERNEL32 ref: 00405DAD
                • Part of subcall function 00405D7D: LeaveCriticalSection.KERNEL32 ref: 00405ECC
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: AddressProc$CriticalSectionTime$EnterFileLeaveLibraryLoadSystemmalloc
              • String ID: `(B
              • API String ID: 2869995242-1914280996
              • Opcode ID: 19d6fc8c2d1306d8d053f19c73e800395e5ac708471e6663d3d13c85d9c19fe9
              • Instruction ID: 94c08b94b57df9e53fa0a2455e2e566f66701f19132ff7a1c430a127e0c0603f
              • Opcode Fuzzy Hash: 19d6fc8c2d1306d8d053f19c73e800395e5ac708471e6663d3d13c85d9c19fe9
              • Instruction Fuzzy Hash: 9761DEB44087109FD710AF26C584A6BBBF4BF88704F01892EE8D897391E7799985CF56
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: CriticalSection$EnterErrorLastLeavemallocsend
              • String ID: -
              • API String ID: 1786834168-2547889144
              • Opcode ID: 5150198c8eb0ce58f61dc6932d24a873176d766e4a27cdd26a3c85565558810d
              • Instruction ID: 542a74277ee6daf56934a715b94c3cb6415021c893f49c4910618d7e1c795e3b
              • Opcode Fuzzy Hash: 5150198c8eb0ce58f61dc6932d24a873176d766e4a27cdd26a3c85565558810d
              • Instruction Fuzzy Hash: 8B416E70608B008FC720EF69D48461BBBE4EF85324F518A3FE994A73D1C77899458F9A
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: htonsrecvselectsend
              • String ID: Z
              • API String ID: 3248711867-1505515367
              • Opcode ID: 7fdafd5f5f0b92cca46f8b9916048dc5279d19b1817b053ad7dd1c959cdc6263
              • Instruction ID: 3f3365598393d2eea2e9170436329f57a1f754e33c93ecced5829fb6f7628eb6
              • Opcode Fuzzy Hash: 7fdafd5f5f0b92cca46f8b9916048dc5279d19b1817b053ad7dd1c959cdc6263
              • Instruction Fuzzy Hash: 094117B0418744ABD321AF25C1843AFBBE4FF84758F508D2EF4D887291D7B995888B57
              APIs
              • RegDeleteKeyA.ADVAPI32 ref: 004108D0
              • RegOpenKeyExA.ADVAPI32 ref: 00410900
                • Part of subcall function 004127A8: _vsnprintf.MSVCRT ref: 004127CC
              • RegEnumKeyExA.ADVAPI32 ref: 00410958
              • RegCloseKey.ADVAPI32 ref: 0041096B
              • RegDeleteKeyA.ADVAPI32(00000000), ref: 00410978
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: Delete$CloseEnumOpen_vsnprintf
              • String ID: @
              • API String ID: 3258335120-2766056989
              • Opcode ID: c5fee486713a1e3e413a08c522e5d7fe8b5e1595fa91894b84a89dceef684568
              • Instruction ID: 9d604c6237a7cde6d8c47273939e6e17ca47206dd9184e21b4ed585c08607efa
              • Opcode Fuzzy Hash: c5fee486713a1e3e413a08c522e5d7fe8b5e1595fa91894b84a89dceef684568
              • Instruction Fuzzy Hash: FB31D2F04087059EE710EF26C59839FFBE4AF84748F00891EE4D897251D3B985898F9B
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: fclose$fopenfread
              • String ID: MZ$X/B
              • API String ID: 3873288765-3080073419
              • Opcode ID: d06aedc7c9e3b3293a92e1f957aa7035d759f161265d28a36525d5ec09abe733
              • Instruction ID: ae9e81fbcb7ca7b9316dc1c6fd5e5dd7cb62ebbbae1f2b5c39490275c7812f42
              • Opcode Fuzzy Hash: d06aedc7c9e3b3293a92e1f957aa7035d759f161265d28a36525d5ec09abe733
              • Instruction Fuzzy Hash: 81F0FEB55097419BDB00FFA6C5C515EB6E4AB44304F508C3EE49497281D778D8898B5B
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: _assertlocaltimetime
              • String ID: FB$K$P
              • API String ID: 239888755-1627385504
              • Opcode ID: cd97700670ffc604625be893ed21d500fd9a320e9f0d6e3cdad60bc31f370bed
              • Instruction ID: 8e089169dfaa1868ebee7eec05d644c009e56557b81e72ef4d504278135b65ea
              • Opcode Fuzzy Hash: cd97700670ffc604625be893ed21d500fd9a320e9f0d6e3cdad60bc31f370bed
              • Instruction Fuzzy Hash: 9222BF7494D3818FD720CF29C58579BBBE1BF88704F14892EE89887351E7B8E885CB46
              APIs
              • socket.WS2_32 ref: 00405A55
              • connect.WS2_32 ref: 00405A70
                • Part of subcall function 00405999: shutdown.WS2_32 ref: 004059B6
                • Part of subcall function 00405999: closesocket.WS2_32(00000000), ref: 004059C2
                • Part of subcall function 004051B5: gethostbyname.WS2_32 ref: 004051C5
                • Part of subcall function 004051B5: htons.WS2_32 ref: 00405202
              • socket.WS2_32 ref: 00405B97
              • connect.WS2_32 ref: 00405BB2
              • socket.WS2_32 ref: 00405C34
              • connect.WS2_32 ref: 00405C54
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: connectsocket$closesocketgethostbynamehtonsshutdown
              • String ID:
              • API String ID: 4225652895-0
              • Opcode ID: 257ab1642c2ba7176df9333284737b40def127f22e375dc60ae8d0ec264ec92a
              • Instruction ID: dc7f80c90ba20af356347f24dd4de35e54817c060e921352895bdcebc13e1e4f
              • Opcode Fuzzy Hash: 257ab1642c2ba7176df9333284737b40def127f22e375dc60ae8d0ec264ec92a
              • Instruction Fuzzy Hash: 7D71B7B0508B059FD710EF29D58465BBBE0FF84354F54893EE88897392D778A4468F4A
              APIs
              • RegOpenKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,00408ECF), ref: 004106EF
              • RegQueryValueExA.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00410728
              • RegOpenKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00410765
              • RegQueryValueExA.ADVAPI32 ref: 004107A0
              • RegQueryValueExA.ADVAPI32 ref: 004107DD
              • RegCloseKey.ADVAPI32 ref: 004107F3
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: QueryValue$Open$Close
              • String ID:
              • API String ID: 2855150075-0
              • Opcode ID: 7acb46318583f52b162adab98c30d4c4b02cafbce71d0fe327e00207db92c82c
              • Instruction ID: b9298c354bfd1ad9ab6003ea3d07812b51851590691558723ca7996c5ddaa5d6
              • Opcode Fuzzy Hash: 7acb46318583f52b162adab98c30d4c4b02cafbce71d0fe327e00207db92c82c
              • Instruction Fuzzy Hash: 8331C3B55083059BD300AF6AC54435BFBE4BB84758F40892EF89897351D7B8EA898F86
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: mallocstrcpy$freestrcat
              • String ID: .zip$w
              • API String ID: 50812093-307292267
              • Opcode ID: 78a7903171cc4c998d85c30a50b5e5ab6e43e4baaabce3d6850bd829c4cc1e8a
              • Instruction ID: b1c1002ecfc918ecf1bb7e30c12c5e9030ce2ae0e5289fadf73960591331f9fa
              • Opcode Fuzzy Hash: 78a7903171cc4c998d85c30a50b5e5ab6e43e4baaabce3d6850bd829c4cc1e8a
              • Instruction Fuzzy Hash: 3421FCF05087059FD310AF25D18839EBBE0BB84758F11CD2EE4DC87291D7BD84899B4A
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: _vsnprintffclosefgetsfopengetenv
              • String ID: x3B
              • API String ID: 3106633423-3373966710
              • Opcode ID: f5b2f3e6b188a2a81523bee3868d1dc16278d61a1535bb2d55c529db898f20e7
              • Instruction ID: 6048a10f2db6f6121dbf09b1e91f7eeb88fe885a8aaa66a3f769cde923567c5e
              • Opcode Fuzzy Hash: f5b2f3e6b188a2a81523bee3868d1dc16278d61a1535bb2d55c529db898f20e7
              • Instruction Fuzzy Hash: EC41D8B0408311DAD310AF25D58526EBAF4BF84758F50CA2FE4D897381D77C8585DB5B
              APIs
                • Part of subcall function 004051B5: gethostbyname.WS2_32 ref: 004051C5
                • Part of subcall function 004051B5: htons.WS2_32 ref: 00405202
              • send.WS2_32 ref: 004053DF
              • select.WS2_32 ref: 0040543E
              • __WSAFDIsSet.WS2_32 ref: 00405455
              • recv.WS2_32 ref: 0040547B
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: gethostbynamehtonsrecvselectsend
              • String ID: Z
              • API String ID: 3406712544-1505515367
              • Opcode ID: 449d4b15f80a29c733a493597063cfde938150944d976ecd7df47141a1def0a6
              • Instruction ID: 23d78d97f939ce5eec82cec168d6e0a92f1c2ef35d1e3e5c2e22ff38ea37f4dc
              • Opcode Fuzzy Hash: 449d4b15f80a29c733a493597063cfde938150944d976ecd7df47141a1def0a6
              • Instruction Fuzzy Hash: 7941D3B0419740AEE750EF25C58439FBBE4EF84748F409C2EF8D897241D3BA85888B57
              APIs
              • RegOpenKeyExA.ADVAPI32 ref: 00410A0F
              • RegEnumKeyExA.ADVAPI32 ref: 00410A66
              • RegCloseKey.ADVAPI32 ref: 00410AC5
                • Part of subcall function 004127A8: _vsnprintf.MSVCRT ref: 004127CC
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: CloseEnumOpen_vsnprintf
              • String ID: @$@
              • API String ID: 2247870055-149943524
              • Opcode ID: 4af8ef1c9b8c2e1b679c7896dbdc8660dbd74620ed8b4f8cb5af9a0fd6401769
              • Instruction ID: 60464b3a6ff270cdd1110ed30ec9e4aee9a85b9f4642497f56cba53994ffc826
              • Opcode Fuzzy Hash: 4af8ef1c9b8c2e1b679c7896dbdc8660dbd74620ed8b4f8cb5af9a0fd6401769
              • Instruction Fuzzy Hash: A321E3B45083019FD310EF6AC18479BBBE4BF98358F40892EE5D893340D7B895898F97
              APIs
              • strcpy.MSVCRT ref: 00407BD8
              • MultiByteToWideChar.KERNEL32 ref: 00407C04
              • SHFileOperationW.SHELL32 ref: 00407C4E
                • Part of subcall function 0040729C: MultiByteToWideChar.KERNEL32 ref: 004072D5
                • Part of subcall function 0040729C: GetFileAttributesW.KERNEL32 ref: 004072E0
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: ByteCharFileMultiWide$AttributesOperationstrcpy
              • String ID: b/B$b/B
              • API String ID: 1429716934-3141599630
              • Opcode ID: 81200923591543ee51a94f846a27d562b6fb7f64c7317926669ce86d985d9e29
              • Instruction ID: 9f716be5a706bacff7abee470f2f70c9786abf008b7cce54c5bda874f4371efe
              • Opcode Fuzzy Hash: 81200923591543ee51a94f846a27d562b6fb7f64c7317926669ce86d985d9e29
              • Instruction Fuzzy Hash: ED1125B14083109AE310EF25D48935BBBF5EFC4318F40892EF4A49B281D7BA96498B97
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: CloseHandle$CreateProcess
              • String ID: D$D
              • API String ID: 2922976086-143366177
              • Opcode ID: 210b95e98878966edea71671788c2c7d13693a52d3674cbc12837110b92085ad
              • Instruction ID: 1d5ca1a389bb095c29e0a852d1ac0a4b0f4293584b711be652509fdf01780871
              • Opcode Fuzzy Hash: 210b95e98878966edea71671788c2c7d13693a52d3674cbc12837110b92085ad
              • Instruction Fuzzy Hash: 4311A2B05087409EE710EF25C59875BBBE4BF85708F01881EF5D897291C3BA95898B87
              APIs
              • strncpy.MSVCRT ref: 0040EB64
              • strcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0040EB74
              • strcmp.MSVCRT ref: 0040EB80
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: strcmpstrcpystrncpy
              • String ID: 0$5B
              • API String ID: 2448526034-2982329479
              • Opcode ID: 462bf65ad2594f2168f17dfdeb5058b5c81af0c365ae975b7d05b17481ebe7e2
              • Instruction ID: 1815abc7d942603e6bf714ecb897f5d3e1623bfaa8687e7908f6a9e0f2ae8c78
              • Opcode Fuzzy Hash: 462bf65ad2594f2168f17dfdeb5058b5c81af0c365ae975b7d05b17481ebe7e2
              • Instruction Fuzzy Hash: 63B1BBB45093459FC750EF29C18469FBBE0FF88348F408D2EE4D897291E7B9D9898B46
              APIs
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: recvsend$htons
              • String ID:
              • API String ID: 2448738288-0
              • Opcode ID: 13adfa5ec2ebdb7ed79ded53f4b099e9918976a4c5f06ce693c8d3bcc2d3ec54
              • Instruction ID: a3ad6d79acf2e53900b9dd159f4be09f546f61b4e8b2614ee158af40ae1285e8
              • Opcode Fuzzy Hash: 13adfa5ec2ebdb7ed79ded53f4b099e9918976a4c5f06ce693c8d3bcc2d3ec54
              • Instruction Fuzzy Hash: 8A410BB141C7819AD710AF25C54939FBFE0AF94308F458D2EE4D897282D3B99688CF97
              APIs
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: QueryValue$CloseOpenmalloc
              • String ID:
              • API String ID: 3087825141-0
              • Opcode ID: bee71e2c12d8eb0ab75ad6922a777cc37da6db6440ffe5c328c79abb1217a5d5
              • Instruction ID: dddce03a098769392e7a375fb59deb789f7659c2eda9270703039da878427773
              • Opcode Fuzzy Hash: bee71e2c12d8eb0ab75ad6922a777cc37da6db6440ffe5c328c79abb1217a5d5
              • Instruction Fuzzy Hash: EC21A3B05083019FD700EF29D58465BBBE4BF88748F00892EF8C893201E778DA888F86
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: _assert
              • String ID: $c
              • API String ID: 1222420520-3797896886
              • Opcode ID: 8a585c7f6f4847e6cdab404632b1628f0989679c9260e782601c46f9716b7191
              • Instruction ID: 595662ab794f8c563696035dacf2dbdab12226766188b8df76e1304a900497cc
              • Opcode Fuzzy Hash: 8a585c7f6f4847e6cdab404632b1628f0989679c9260e782601c46f9716b7191
              • Instruction Fuzzy Hash: 1E71DDB5A083199FDB00EF69D48859EBBE0EF88354F01C92EF89997351C3389854CF96
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: _assert
              • String ID: HjB$M
              • API String ID: 1222420520-1889629911
              • Opcode ID: 389ade0749032fac037805b9abc3480a8171c3f13d13cda5c72ac285551c0497
              • Instruction ID: 88b4d72e3a3b074a803e33dc480ae7ecbd49f2114936249b734713bf6416a905
              • Opcode Fuzzy Hash: 389ade0749032fac037805b9abc3480a8171c3f13d13cda5c72ac285551c0497
              • Instruction Fuzzy Hash: 0951BB716083A28FC300CF28E59052BBBF1BFCA310F048A1EE69087645D335EA19CF92
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: _wfopenfclosefread
              • String ID: D/B
              • API String ID: 506435840-35448031
              • Opcode ID: 6e29f1c7595fdd67799a25fafd9a4aaf63ccba13522d3f48157b685555bab8a5
              • Instruction ID: deb419f91eb23376f6420ea6a160b5129c3192077bfb07f8c7133106a8e0e032
              • Opcode Fuzzy Hash: 6e29f1c7595fdd67799a25fafd9a4aaf63ccba13522d3f48157b685555bab8a5
              • Instruction Fuzzy Hash: 3D21A3701087508FD720EF29C5847AEBBE0EF85318F41892EE8D887392D7789499CB47
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: fclosefopenfread
              • String ID: z3B
              • API String ID: 2679521937-3399381272
              • Opcode ID: e2600f1d5f8662e9c392fe55e0e07e3544c7b57ce058911e094c9610cb459c02
              • Instruction ID: 2438fad20f86bae77410323f418e8e562921bdaa67428cf1c8451c05b399b209
              • Opcode Fuzzy Hash: e2600f1d5f8662e9c392fe55e0e07e3544c7b57ce058911e094c9610cb459c02
              • Instruction Fuzzy Hash: 9B213EB05493459ED310AF65C5843AFBBE0EF80348F01883EE8E887341D77C8589DB4A
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: fclosefopenfread
              • String ID: x3B
              • API String ID: 2679521937-3373966710
              • Opcode ID: cef17687d92d9b4a792fbe74fccce4ea79b1ff820fbda775a6627d7b36aa9cc9
              • Instruction ID: 8e46bd977f0b38dff8dfac3cdc2039ee507d5f54b24c6ee619e1854a5548e2c2
              • Opcode Fuzzy Hash: cef17687d92d9b4a792fbe74fccce4ea79b1ff820fbda775a6627d7b36aa9cc9
              • Instruction Fuzzy Hash: 85213EB05493059ED320AF65C59879FBBE0EF84358F00882EE8D887251D77C8588DB4A
              APIs
                • Part of subcall function 00406F1A: MultiByteToWideChar.KERNEL32 ref: 00406F53
                • Part of subcall function 00406F1A: GetFileAttributesW.KERNEL32 ref: 00406F5E
                • Part of subcall function 00407E8C: fopen.MSVCRT ref: 00407E9F
                • Part of subcall function 00407E8C: fread.MSVCRT ref: 00407EC7
                • Part of subcall function 00407E8C: fclose.MSVCRT ref: 00407ED4
              • CreateProcessA.KERNEL32 ref: 0041451B
                • Part of subcall function 00408AF3: ReleaseMutex.KERNEL32(?,?,?,?,?,?,0041452C), ref: 00408B02
                • Part of subcall function 00408AF3: CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,0041452C), ref: 00408B10
                • Part of subcall function 00405999: shutdown.WS2_32 ref: 004059B6
                • Part of subcall function 00405999: closesocket.WS2_32(00000000), ref: 004059C2
              • ResumeThread.KERNEL32 ref: 00414542
              • ExitProcess.KERNEL32 ref: 00414552
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: Process$AttributesByteCharCloseCreateExitFileHandleMultiMutexReleaseResumeThreadWideclosesocketfclosefopenfreadshutdown
              • String ID: D
              • API String ID: 3751753202-2746444292
              • Opcode ID: c255f5552f9746074c148be93691e2b4ce4c54ed22f108db594dde55dd1560b6
              • Instruction ID: 067f5d9187edf2fa4930e283bd60014924ca834b1665164d65a9df55d347b5cc
              • Opcode Fuzzy Hash: c255f5552f9746074c148be93691e2b4ce4c54ed22f108db594dde55dd1560b6
              • Instruction Fuzzy Hash: C721B0B05087419AD710AF66C59976FBBE0BF80348F01881EE5D85B382D7BD8489CF9B
              APIs
              • malloc.MSVCRT ref: 00401268
              • getenv.MSVCRT ref: 00401329
                • Part of subcall function 004127A8: _vsnprintf.MSVCRT ref: 004127CC
                • Part of subcall function 00407F08: _beginthreadex.MSVCRT ref: 00407F3A
                • Part of subcall function 00407F08: CloseHandle.KERNEL32 ref: 00407F48
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: CloseHandle_beginthreadex_vsnprintfgetenvmalloc
              • String ID: %6\%6.dfd$TEMP
              • API String ID: 32720251-3655689890
              • Opcode ID: 85d489d399a94b7e68c76b87893543c8b6f3c77dc7d3058bc08f74d1328ce92f
              • Instruction ID: 095e309c488b84dd6e8baa1bc898f34efff603a6fbd504479eb7308a9430591a
              • Opcode Fuzzy Hash: 85d489d399a94b7e68c76b87893543c8b6f3c77dc7d3058bc08f74d1328ce92f
              • Instruction Fuzzy Hash: 78218EF05087419FD310AF6AD18839AFBE0BF84358F00892EE1E987291D7BD95899F46
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: CloseCreateValue
              • String ID: ?
              • API String ID: 1818849710-1684325040
              • Opcode ID: 6f10c2fad66fb56d8a876a767705c0936c225fc18a07eb6d3c35cb31e2597923
              • Instruction ID: d7b5c200bfe116dfd6f132702afe2373019979046eeb2612c7d3539b4a1fd506
              • Opcode Fuzzy Hash: 6f10c2fad66fb56d8a876a767705c0936c225fc18a07eb6d3c35cb31e2597923
              • Instruction Fuzzy Hash: 6111B0B45083419FD340EF69D59475BFBE0BB88354F40892EF89883351E7B9D5898F86
              APIs
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: _statfclosefopenfread
              • String ID:
              • API String ID: 804335959-0
              • Opcode ID: e49dcea1558de36b6d26133dc736d865fdae275fbb071cb261454f55feb63192
              • Instruction ID: c86c0b954f8f68680828bf3fb845d0a681b1f2494741e4076b806c5f4ecabbb7
              • Opcode Fuzzy Hash: e49dcea1558de36b6d26133dc736d865fdae275fbb071cb261454f55feb63192
              • Instruction Fuzzy Hash: 68216F746083058ED760AF2AD48039BBBE4EF88754F00893EEDACC7381D67984C58B5A
              APIs
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: setsockopt$Ioctlioctlsocket
              • String ID:
              • API String ID: 1196899187-0
              • Opcode ID: 4a1ab85cae5512115fe274dc8068c955a42f4f93045ec413a8af8eb2ccab6f2b
              • Instruction ID: 20f5eab9ee5944eb72183824eaa05ad15d37d7ba85e5585d89411a70b12a9a58
              • Opcode Fuzzy Hash: 4a1ab85cae5512115fe274dc8068c955a42f4f93045ec413a8af8eb2ccab6f2b
              • Instruction Fuzzy Hash: 0221A7B1409741AED340EF59D18835BFFE0AF84748F80992EF89457251D3B999888F87
              APIs
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: fclosefopenfseekftell
              • String ID:
              • API String ID: 256789196-0
              • Opcode ID: fbcd7f8cca2f724e403eeb8c4da471501aa33c75eb168f4f61c33f7ffa932136
              • Instruction ID: bcb064d2d33ab52115c011aa6cdc5be578be0ddba1a55773f7ee6e5998b39b7e
              • Opcode Fuzzy Hash: fbcd7f8cca2f724e403eeb8c4da471501aa33c75eb168f4f61c33f7ffa932136
              • Instruction Fuzzy Hash: F211A9B09083008FC710BF2AC9C439ABAE4EF44358F45547EE884CB306E779C8858B9A
              APIs
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: _filelengthi64fflushfgetposfsetpos
              • String ID:
              • API String ID: 3378604764-0
              • Opcode ID: 5f1deec734a469d50075acdb6f3c09bf06809ba4cbfcd9c78d95f8229e1196b0
              • Instruction ID: 7f20a3f538c1e1996cb4a193f62903fdb6249973c6c490497f882466bb09f182
              • Opcode Fuzzy Hash: 5f1deec734a469d50075acdb6f3c09bf06809ba4cbfcd9c78d95f8229e1196b0
              • Instruction Fuzzy Hash: 5A010CB18087128BC710EF25958045BBBE4BE94364F51093FF8D0D3381E638D8899B97
              APIs
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: File$Attributes$ByteCharDeleteMultiWide
              • String ID:
              • API String ID: 2001991581-0
              • Opcode ID: fd15abdbbf5f5b452ff235cde9c5fc4b4f27e3640605faa86648c091e64618a3
              • Instruction ID: e573b4bf2d7f4f29660dffdf4fc2874ff46e14c0fdf453928647ba00820039fc
              • Opcode Fuzzy Hash: fd15abdbbf5f5b452ff235cde9c5fc4b4f27e3640605faa86648c091e64618a3
              • Instruction Fuzzy Hash: E1F062F00093029AD710BF39C88525FBFE4AF40354F40892EF5D456282D73C85998B57
              APIs
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: malloc
              • String ID:
              • API String ID: 2803490479-0
              • Opcode ID: d646359c60a4fd60cf4ab61131ae816c9032caada655f49a32e68425a94bf0cf
              • Instruction ID: 218a957fe30f9a24676f57bd5ffca8317da6b6ab60db8c5874b423959f2b8a8b
              • Opcode Fuzzy Hash: d646359c60a4fd60cf4ab61131ae816c9032caada655f49a32e68425a94bf0cf
              • Instruction Fuzzy Hash: F01260B05087608EC711AF62D84523ABBE0AFD5308F45497EE6D49B392EB7C8581CF5E
              APIs
                • Part of subcall function 00407C77: GetModuleFileNameW.KERNEL32 ref: 00407CA2
                • Part of subcall function 00407C77: WideCharToMultiByte.KERNEL32 ref: 00407CE3
                • Part of subcall function 00412D73: getenv.MSVCRT ref: 00412ECA
              • ExitProcess.KERNEL32 ref: 00409134
              • fopen.MSVCRT ref: 00409237
                • Part of subcall function 00406E04: MultiByteToWideChar.KERNEL32 ref: 00406E3D
                • Part of subcall function 00406E04: GetFileAttributesW.KERNEL32 ref: 00406E48
                • Part of subcall function 00406E04: SetFileAttributesW.KERNEL32 ref: 00406E62
                • Part of subcall function 00406E04: DeleteFileW.KERNEL32 ref: 00406E6C
                • Part of subcall function 00406F1A: MultiByteToWideChar.KERNEL32 ref: 00406F53
                • Part of subcall function 00406F1A: GetFileAttributesW.KERNEL32 ref: 00406F5E
                • Part of subcall function 00407EF4: Sleep.KERNEL32 ref: 00407EFE
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: File$AttributesByteCharMultiWide$DeleteExitModuleNameProcessSleepfopengetenv
              • String ID: r0B
              • API String ID: 3425440891-4020269923
              • Opcode ID: 37d0ce1561ee6bb9c701f51db275a61bfccac64f15fe3377825e8940e65bb3af
              • Instruction ID: cf1332e757baf714fb04fabdc2a14f291af18396ddc48b811abeeedaa7cc8274
              • Opcode Fuzzy Hash: 37d0ce1561ee6bb9c701f51db275a61bfccac64f15fe3377825e8940e65bb3af
              • Instruction Fuzzy Hash: 4D61C7B04087119AD710BF61D64536EBBE1AF81348F41C86EE4C86B383CBBD8985DB5B
              APIs
                • Part of subcall function 004130E8: GetUserNameW.ADVAPI32 ref: 00413112
                • Part of subcall function 004130E8: WideCharToMultiByte.KERNEL32 ref: 00413154
                • Part of subcall function 00413040: GetComputerNameW.KERNEL32 ref: 0041307E
                • Part of subcall function 00413040: WideCharToMultiByte.KERNEL32 ref: 004130C0
                • Part of subcall function 004134FD: GetTickCount.KERNEL32 ref: 0041352F
                • Part of subcall function 00407C77: GetModuleFileNameW.KERNEL32 ref: 00407CA2
                • Part of subcall function 00407C77: WideCharToMultiByte.KERNEL32 ref: 00407CE3
              • getenv.MSVCRT ref: 00413879
              • getenv.MSVCRT ref: 00413887
                • Part of subcall function 00405D7D: EnterCriticalSection.KERNEL32 ref: 00405DAD
                • Part of subcall function 00405D7D: LeaveCriticalSection.KERNEL32 ref: 00405ECC
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: ByteCharMultiNameWide$CriticalSectiongetenv$ComputerCountEnterFileLeaveModuleTickUser
              • String ID: xEB
              • API String ID: 195117172-2961144582
              • Opcode ID: fb62eb59387f53985bd42543a62e6c15600361e8d5d43dfcff879b8f1a2c93cb
              • Instruction ID: 88353113fceb9506f3b36d61bfde8eef9921c9a466ae1bfd82caa565229af05a
              • Opcode Fuzzy Hash: fb62eb59387f53985bd42543a62e6c15600361e8d5d43dfcff879b8f1a2c93cb
              • Instruction Fuzzy Hash: A2619CB49087849BD720EF65C18469EFBE0BF89348F408D2EE8D887351E7789548CF5A
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID: K$P
              • API String ID: 0-420285281
              • Opcode ID: 8a69464f70444901d772828418eb0133d86c5c4489e010a0a704677ec8438a85
              • Instruction ID: 76b3f71e46e7dd39d433d4e4d553b0a2d3546f8e99cb6a452508f90fdc663846
              • Opcode Fuzzy Hash: 8a69464f70444901d772828418eb0133d86c5c4489e010a0a704677ec8438a85
              • Instruction Fuzzy Hash: 3F51C0B09083449FCB50CF29C58468BBBE1AF98318F54892EF8988B351E379D985CF46
              APIs
                • Part of subcall function 0040D290: CryptAcquireContextA.ADVAPI32 ref: 0040D2E2
                • Part of subcall function 0040D290: CryptCreateHash.ADVAPI32 ref: 0040D31C
                • Part of subcall function 0040D290: CryptHashData.ADVAPI32 ref: 0040D34B
                • Part of subcall function 0040D290: CryptGetHashParam.ADVAPI32 ref: 0040D38A
                • Part of subcall function 00407F7A: LoadLibraryA.KERNEL32 ref: 00407F84
                • Part of subcall function 00407F8E: GetProcAddress.KERNEL32 ref: 00407FA0
              • RegQueryValueExA.ADVAPI32 ref: 0040D4EC
              • LocalFree.KERNEL32 ref: 0040D5B8
                • Part of subcall function 004127A8: _vsnprintf.MSVCRT ref: 004127CC
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: Crypt$Hash$AcquireAddressContextCreateDataFreeLibraryLoadLocalParamProcQueryValue_vsnprintf
              • String ID: 8B
              • API String ID: 2081058215-1803290843
              • Opcode ID: 5a86b60eb7b24f86e885ff524fb9dc5150f0e0451a94be218f3f5f5105dd560d
              • Instruction ID: 3ebc2064e8f7268df4b8e6a934d6e56f21a9b96c1547cc96c36b4704c4ff52fe
              • Opcode Fuzzy Hash: 5a86b60eb7b24f86e885ff524fb9dc5150f0e0451a94be218f3f5f5105dd560d
              • Instruction Fuzzy Hash: 78419CB4A083419FD710EF69C58465AFBF0BF85358F00892EE8C897351EB79D588CB86
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: _assert
              • String ID: 8$pjB
              • API String ID: 1222420520-722663410
              • Opcode ID: d0b8bfb88443995b5d46237e8dd2c2796db4cd98f11c714f3134454e1f713599
              • Instruction ID: 89e7217bd13c7babcd5adc9bb28dc37eee23235c195977e0ffb5d0d95595f474
              • Opcode Fuzzy Hash: d0b8bfb88443995b5d46237e8dd2c2796db4cd98f11c714f3134454e1f713599
              • Instruction Fuzzy Hash: E74127707082B14BE3188F1D989413EBFE1ABD6201FCA4AAFF4C5C7252D539D518CB65
              APIs
              Strings
              • %.4d-%.2d-%.2d %.2d:%.2d:%.2d, xrefs: 00408267
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: Time$LocalSystem
              • String ID: %.4d-%.2d-%.2d %.2d:%.2d:%.2d
              • API String ID: 1098363292-244208801
              • Opcode ID: 2c0d27171b227a626090942a01cb7e3bbf324c6d7aa291d0839ae4957e61f002
              • Instruction ID: 210422b194b1c769db9a9b51ef88a37ee0462c5d8974aa95260b86ae16cdeba8
              • Opcode Fuzzy Hash: 2c0d27171b227a626090942a01cb7e3bbf324c6d7aa291d0839ae4957e61f002
              • Instruction Fuzzy Hash: CC11F874809354AAC750DF26C54066FBBE4FB88B54F40882FF8C493241E73C9984DB57
              APIs
              • GetComputerNameW.KERNEL32 ref: 0041307E
              • WideCharToMultiByte.KERNEL32 ref: 004130C0
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: ByteCharComputerMultiNameWide
              • String ID: @
              • API String ID: 4013585866-2766056989
              • Opcode ID: 75619ece23197e83586e66bb1f33d7f654c3ffc02ea5a6723a4e8ea35ab2e647
              • Instruction ID: 7c038244dc2cd29586230534efa33881c9182a2f6df97460e627dabf8a714e70
              • Opcode Fuzzy Hash: 75619ece23197e83586e66bb1f33d7f654c3ffc02ea5a6723a4e8ea35ab2e647
              • Instruction Fuzzy Hash: 4F01C5B0409301AEE320AF26D99476BFBE4EF94714F10891EF49847291D3B985898B87
              APIs
              • fclose.MSVCRT ref: 00408A77
                • Part of subcall function 00410803: RegOpenKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00408A27), ref: 00410830
                • Part of subcall function 00410803: RegDeleteValueA.ADVAPI32 ref: 0041084B
                • Part of subcall function 00410803: RegCloseKey.ADVAPI32 ref: 0041085E
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: CloseDeleteOpenValuefclose
              • String ID: 40B$<0B
              • API String ID: 3171391837-2730254441
              • Opcode ID: e80744430c769008ed9aa6cab13524ccc618e940c92f136a1cd14b05883cfc76
              • Instruction ID: bb4ce6ad198e61c342c208a9868e2ee3a63cf1cfb8a338f91740164746fe8c6d
              • Opcode Fuzzy Hash: e80744430c769008ed9aa6cab13524ccc618e940c92f136a1cd14b05883cfc76
              • Instruction Fuzzy Hash: 1101B7B06087119AD700BF65D64526DBBE0AF40348F81C82FE4C86B286DBBD8485DB5F
              APIs
              • getenv.MSVCRT ref: 0040F49D
                • Part of subcall function 004127A8: _vsnprintf.MSVCRT ref: 004127CC
              • getenv.MSVCRT ref: 0040F4C5
                • Part of subcall function 00406F1A: MultiByteToWideChar.KERNEL32 ref: 00406F53
                • Part of subcall function 00406F1A: GetFileAttributesW.KERNEL32 ref: 00406F5E
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: getenv$AttributesByteCharFileMultiWide_vsnprintf
              • String ID: ~;B
              • API String ID: 2228561779-89019340
              • Opcode ID: 809e396fd2eab3f384f240020dfbce2e1602ed8e0f4d2e0b249a73290c3eb897
              • Instruction ID: d845c7456769ba672d696a4f857c2cede61afe7a33709c8199a018e4a54c7ca9
              • Opcode Fuzzy Hash: 809e396fd2eab3f384f240020dfbce2e1602ed8e0f4d2e0b249a73290c3eb897
              • Instruction Fuzzy Hash: 4B011AB4408311AAC720BF26E54515EBFE0EF90798F51C83EE4D85B282C37C9599CB4B
              APIs
              • getenv.MSVCRT ref: 0040F695
                • Part of subcall function 004127A8: _vsnprintf.MSVCRT ref: 004127CC
              • getenv.MSVCRT ref: 0040F6BD
                • Part of subcall function 00406F1A: MultiByteToWideChar.KERNEL32 ref: 00406F53
                • Part of subcall function 00406F1A: GetFileAttributesW.KERNEL32 ref: 00406F5E
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: getenv$AttributesByteCharFileMultiWide_vsnprintf
              • String ID: y<B
              • API String ID: 2228561779-1329648526
              • Opcode ID: fc2a22fba373fe480af829fa4f93533cae9eeeedbb52cd41ca872e91a74e92ad
              • Instruction ID: 8d0cb0fe6a7d44374a24ae0aebfd5b8dc36573b7fc8ec9374f5f00733d0f5b09
              • Opcode Fuzzy Hash: fc2a22fba373fe480af829fa4f93533cae9eeeedbb52cd41ca872e91a74e92ad
              • Instruction Fuzzy Hash: DF0108B5408311AAC720BF62E44515EBBE0AF80398F41C83EE4D867282C77C859ACB4B
              APIs
              • getenv.MSVCRT ref: 0040F29B
                • Part of subcall function 004127A8: _vsnprintf.MSVCRT ref: 004127CC
              • getenv.MSVCRT ref: 0040F2C3
                • Part of subcall function 00406F1A: MultiByteToWideChar.KERNEL32 ref: 00406F53
                • Part of subcall function 00406F1A: GetFileAttributesW.KERNEL32 ref: 00406F5E
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: getenv$AttributesByteCharFileMultiWide_vsnprintf
              • String ID: Y:B
              • API String ID: 2228561779-559362792
              • Opcode ID: c10aa0f72dc7a85467b9bbaedbd08abfe9db542f1f8a5a634dc962c54ce382e1
              • Instruction ID: 71a4254163051be47397212b88bd25a6cdd91ad02d264920333697808a15e276
              • Opcode Fuzzy Hash: c10aa0f72dc7a85467b9bbaedbd08abfe9db542f1f8a5a634dc962c54ce382e1
              • Instruction Fuzzy Hash: 8E0108F4408311AAC710BF62E44515EBBE0AF80398F51C83EE4D86B282C37C8599CB5A
              APIs
              • getenv.MSVCRT ref: 0040F78C
                • Part of subcall function 004127A8: _vsnprintf.MSVCRT ref: 004127CC
              • getenv.MSVCRT ref: 0040F7B4
                • Part of subcall function 00406F1A: MultiByteToWideChar.KERNEL32 ref: 00406F53
                • Part of subcall function 00406F1A: GetFileAttributesW.KERNEL32 ref: 00406F5E
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: getenv$AttributesByteCharFileMultiWide_vsnprintf
              • String ID: =B
              • API String ID: 2228561779-94577219
              • Opcode ID: 6a4f4bd4eafef27ad3c46499d4e109de9b0001956a83309dcbd02ed961f098a6
              • Instruction ID: 2c5e5b9d49c5aa29139184a809ee8efa52bd93eb3b3edc2fc8ee47fb8fc21b8d
              • Opcode Fuzzy Hash: 6a4f4bd4eafef27ad3c46499d4e109de9b0001956a83309dcbd02ed961f098a6
              • Instruction Fuzzy Hash: B4011AB4408311AAD710BF22E54515EBBE0AF80758F41C83FE4D86B282C77C8599CF5B
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: BufferFreeInfoWksta
              • String ID: f
              • API String ID: 773480902-1993550816
              • Opcode ID: adce9d268615c65e9b031c2403f5ee47e1848614fcce32b1b10be943295c3ccf
              • Instruction ID: bf6d1e5e530aa92c88c9cb547170410969f3c4ca1d96cbd027a6ecb1b54c6bd2
              • Opcode Fuzzy Hash: adce9d268615c65e9b031c2403f5ee47e1848614fcce32b1b10be943295c3ccf
              • Instruction Fuzzy Hash: 19F0F8B45083018FC704EF25C185B5BBBE1BF88304F40886DE88487354D379D58ACB96
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: _assert
              • String ID: @VB$Q
              • API String ID: 1222420520-3995936320
              • Opcode ID: 0235047f58187a39db11c12d6489f25d2d41f666815d55729f68459e28030352
              • Instruction ID: 7f8f61c8df23ecb70e93ec12a44af74537505c36dafaf849a96d6b3a763fb17d
              • Opcode Fuzzy Hash: 0235047f58187a39db11c12d6489f25d2d41f666815d55729f68459e28030352
              • Instruction Fuzzy Hash: 07F0D4B060A701AFC740DF24E59461ABBF0BB88354F809D1EF8C887341D378A8889F4B
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: _assert
              • String ID: @VB$[
              • API String ID: 1222420520-251187038
              • Opcode ID: 343805436fce073f30f9e3772ad0ce55764f1fd40facfd7e41a048709e32d194
              • Instruction ID: 7522fd779a263ea223225e18d5767f15b5394ac0b58d2b9c3ee1adf97f9dd600
              • Opcode Fuzzy Hash: 343805436fce073f30f9e3772ad0ce55764f1fd40facfd7e41a048709e32d194
              • Instruction Fuzzy Hash: 21F0DAB060E301AFC750DF24E58461ABBE0BB84354F809C1EF4C847341D378A8859F47
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: _assert
              • String ID: @VB$G
              • API String ID: 1222420520-452563729
              • Opcode ID: b3a8f99880f7f9beb1147c89cebaa8c77fdad5f330c299cffaa506392bb9eab4
              • Instruction ID: b6f19dba06b4df6abe6717679b5f2b9c21e239fc99e3fa564f48b7d25df68e10
              • Opcode Fuzzy Hash: b3a8f99880f7f9beb1147c89cebaa8c77fdad5f330c299cffaa506392bb9eab4
              • Instruction Fuzzy Hash: 6FF0D4B060A301AFC740DF24E18461EBBF0BB88354F809C1EF8C887341D37898849B47
              APIs
              • CreateMutexA.KERNEL32(?,?,?,?,?,?,?,00409119), ref: 00408ACD
              • GetLastError.KERNEL32 ref: 00408AE0
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2548478412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000001.00000002.2548453764.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548547395.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548641285.0000000000423000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548694468.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548721031.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548758466.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548819537.0000000000431000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000001.00000002.2548839613.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_400000_GdsGKfLRby.jbxd
              Yara matches
              Similarity
              • API ID: CreateErrorLastMutex
              • String ID: d%B
              • API String ID: 1925916568-3233696437
              • Opcode ID: c3194e90da334e6e38a89a9e3cd57681737c8a67fcd2182493c3a531e1f22581
              • Instruction ID: ad06f29d9f34d8de5c37fb948c6dfac14eb5c16bc83129ba4182c5028b8a9bce
              • Opcode Fuzzy Hash: c3194e90da334e6e38a89a9e3cd57681737c8a67fcd2182493c3a531e1f22581
              • Instruction Fuzzy Hash: FED05EB4504701AAD714FF2982453993EE05B40308F84843EDC88C3796E3BD81DD8B1B