Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
8zyfXqDPaT.exe

Overview

General Information

Sample name:8zyfXqDPaT.exe
renamed because original name is a hash value
Original sample name:f61a7fa3ca28133a6fcefa0e04b0de4dc1e4020a87388b4b3a315dc8dc18194e.exe
Analysis ID:1447648
MD5:a37c6527cabbbaf1e4aa9674b0476069
SHA1:32ce4f91b5ab0da2e1d290164636b2a0dfb46523
SHA256:f61a7fa3ca28133a6fcefa0e04b0de4dc1e4020a87388b4b3a315dc8dc18194e
Tags:exeNetWire
Infos:

Detection

NetWire
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected NetWire RAT
Yara detected Netwire RAT
C2 URLs / IPs found in malware configuration
Contains functionality to log keystrokes
Found evasive API chain (may stop execution after checking mutex)
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality to dynamically determine API calls
Contains functionality to record screenshots
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Detected potential crypto function
Found decision node followed by non-executed suspicious APIs
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Installs a raw input device (often for capturing keystrokes)
One or more processes crash
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • 8zyfXqDPaT.exe (PID: 7564 cmdline: "C:\Users\user\Desktop\8zyfXqDPaT.exe" MD5: A37C6527CABBBAF1E4AA9674B0476069)
    • WerFault.exe (PID: 8084 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7564 -s 392 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
NetWire RC, NetWireNetwire is a RAT, its functionality seems focused on password stealing and keylogging, but includes remote control capabilities as well.Keylog files are stored on the infected machine in an obfuscated form. The algorithm is: for i in range(0,num_read): buffer[i] = ((buffer[i]-0x24)^0x9D)&0xFF
  • APT33
https://malpedia.caad.fkie.fraunhofer.de/details/win.netwire
{"C2 list": ["23.95.88.13:3360"], "Password": "doctor", "Host ID": "HostId-yaq2Oq", "Mutex": "-", "Install Path": "%AppData%\\Install\\Host.exe", "Startup Name": "system", "ActiveX Key": "{3GYL0VK1-5SB1-4X20-W6B8-PQP7L2B50166}", "KeyLog Directory": "C:\\Documents and Settings\\Administrator\\Application Data\\Logs\\"}
SourceRuleDescriptionAuthorStrings
8zyfXqDPaT.exeJoeSecurity_NetWire_1Yara detected NetWire RATJoe Security
    8zyfXqDPaT.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      8zyfXqDPaT.exeJoeSecurity_NetwireYara detected Netwire RATJoe Security
        8zyfXqDPaT.exeWindows_Trojan_Netwire_6a7df287unknownunknown
        • 0x472d:$a: 0F B6 74 0C 10 89 CF 29 C7 F7 C6 DF 00 00 00 74 09 41 89 F3 88 5C
        8zyfXqDPaT.exeWindows_Trojan_Netwire_1b43df38unknownunknown
        • 0x13874:$a1: [%.2d/%.2d/%d %.2d:%.2d:%.2d]
        • 0x134b6:$a2: \Login Data
        • 0x134e1:$a2: \Login Data
        • 0x1350e:$a2: \Login Data
        Click to see the 5 entries
        SourceRuleDescriptionAuthorStrings
        00000000.00000000.1308808326.0000000000401000.00000020.00000001.01000000.00000003.sdmpWindows_Trojan_Netwire_6a7df287unknownunknown
        • 0x432d:$a: 0F B6 74 0C 10 89 CF 29 C7 F7 C6 DF 00 00 00 74 09 41 89 F3 88 5C
        00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_NetWire_1Yara detected NetWire RATJoe Security
          00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpMAL_unspecified_Jan18_1Detects unspecified malware sampleFlorian Roth
          • 0x677:$s2: ping 192.0.2.2 -n 1 -w %d >nul 2>&1
          • 0x6da:$s4: start /b "" cmd /c del "%%~f0"&exit /b
          • 0x69c:$s7: DEL /s "%s" >nul 2>&1
          00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpWindows_Trojan_Netwire_1b43df38unknownunknown
          • 0x674:$a1: [%.2d/%.2d/%d %.2d:%.2d:%.2d]
          • 0x2b6:$a2: \Login Data
          • 0x2e1:$a2: \Login Data
          • 0x30e:$a2: \Login Data
          00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpMAL_unspecified_Jan18_1Detects unspecified malware sampleFlorian Roth
          • 0x66d:$s5: [%s] - [%.2d/%.2d/%d %.2d:%.2d:%.2d]
          • 0x4e5:$s6: %s\%s.bat
          Click to see the 18 entries
          SourceRuleDescriptionAuthorStrings
          0.0.8zyfXqDPaT.exe.400000.0.unpackJoeSecurity_NetWire_1Yara detected NetWire RATJoe Security
            0.0.8zyfXqDPaT.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.0.8zyfXqDPaT.exe.400000.0.unpackJoeSecurity_NetwireYara detected Netwire RATJoe Security
                0.0.8zyfXqDPaT.exe.400000.0.unpackWindows_Trojan_Netwire_6a7df287unknownunknown
                • 0x472d:$a: 0F B6 74 0C 10 89 CF 29 C7 F7 C6 DF 00 00 00 74 09 41 89 F3 88 5C
                0.0.8zyfXqDPaT.exe.400000.0.unpackWindows_Trojan_Netwire_1b43df38unknownunknown
                • 0x13874:$a1: [%.2d/%.2d/%d %.2d:%.2d:%.2d]
                • 0x134b6:$a2: \Login Data
                • 0x134e1:$a2: \Login Data
                • 0x1350e:$a2: \Login Data
                Click to see the 15 entries
                No Sigma rule has matched
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 8zyfXqDPaT.exeAvira: detected
                Source: 0.2.8zyfXqDPaT.exe.400000.0.unpackMalware Configuration Extractor: NetWire {"C2 list": ["23.95.88.13:3360"], "Password": "doctor", "Host ID": "HostId-yaq2Oq", "Mutex": "-", "Install Path": "%AppData%\\Install\\Host.exe", "Startup Name": "system", "ActiveX Key": "{3GYL0VK1-5SB1-4X20-W6B8-PQP7L2B50166}", "KeyLog Directory": "C:\\Documents and Settings\\Administrator\\Application Data\\Logs\\"}
                Source: 8zyfXqDPaT.exeReversingLabs: Detection: 97%
                Source: 8zyfXqDPaT.exeVirustotal: Detection: 90%Perma Link
                Source: 8zyfXqDPaT.exeJoe Sandbox ML: detected
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_004080D4 RegOpenKeyExA,RegOpenKeyExA,CryptUnprotectData,LocalFree,RegCloseKey,RegEnumKeyExA,RegCloseKey,0_2_004080D4
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_0040A0DE CryptUnprotectData,LocalFree,0_2_0040A0DE
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_00408D46 LoadLibraryA,GetProcAddress,GetProcAddress,CryptUnprotectData,strlen,0_2_00408D46
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_00408971 RegQueryValueExA,CryptUnprotectData,LocalFree,0_2_00408971
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_004087B6 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_004087B6
                Source: 8zyfXqDPaT.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_0040947B SetErrorMode,FindFirstFileA,strlen,FindNextFileA,FindClose,0_2_0040947B
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_00404C1F SetErrorMode,FindFirstFileA,FindClose,FindNextFileA,0_2_00404C1F
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_0040D088 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,0_2_0040D088
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_004045AC SetErrorMode,FindFirstFileA,FindClose,FindNextFileA,0_2_004045AC
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_00404305 SetErrorMode,FindFirstFileA,FileTimeToSystemTime,FindNextFileA,FindClose,0_2_00404305
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_00412598 SetErrorMode,GetLogicalDriveStringsA,GetVolumeInformationA,GetDiskFreeSpaceExA,GetDriveTypeA,0_2_00412598

                Networking

                barindex
                Source: Malware configuration extractorURLs: 23.95.88.13:3360
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_00403877 send,recv,htons,send,recv,0_2_00403877
                Source: Amcache.hve.7.drString found in binary or memory: http://upx.sf.net

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_0040FD55 GetKeyState,GetKeyState,GetKeyState,GetKeyboardState,MapVirtualKeyA,ToAscii,GetKeyState,MapVirtualKeyA,GetKeyNameTextA,GetKeyState,0_2_0040FD55
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_004061D0 GetSystemMetrics,GetSystemMetrics,GetDesktopWindow,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,GetDIBits,malloc,GetDIBits,ReleaseDC,DeleteDC,DeleteObject,0_2_004061D0
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_0040FD55 GetKeyState,GetKeyState,GetKeyState,GetKeyboardState,MapVirtualKeyA,ToAscii,GetKeyState,MapVirtualKeyA,GetKeyNameTextA,GetKeyState,0_2_0040FD55
                Source: 8zyfXqDPaT.exe, 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: RegisterRawInputDevicesmemstr_27dd094b-6
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_0040FD55 GetKeyState,GetKeyState,GetKeyState,GetKeyboardState,MapVirtualKeyA,ToAscii,GetKeyState,MapVirtualKeyA,GetKeyNameTextA,GetKeyState,0_2_0040FD55

                System Summary

                barindex
                Source: 8zyfXqDPaT.exe, type: SAMPLEMatched rule: Windows_Trojan_Netwire_6a7df287 Author: unknown
                Source: 8zyfXqDPaT.exe, type: SAMPLEMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
                Source: 8zyfXqDPaT.exe, type: SAMPLEMatched rule: Detects credential stealer byed on many strings that indicate password store access Author: Florian Roth
                Source: 8zyfXqDPaT.exe, type: SAMPLEMatched rule: Detects unspecified malware sample Author: Florian Roth
                Source: 8zyfXqDPaT.exe, type: SAMPLEMatched rule: Detects NetWire RAT Author: Kevin Breen <kevin@techanarchy.net> & David Cannings
                Source: 8zyfXqDPaT.exe, type: SAMPLEMatched rule: NetWiredRC Author: Jean-Philippe Teissier / @Jipe_
                Source: 8zyfXqDPaT.exe, type: SAMPLEMatched rule: detect netwire in memory Author: JPCERT/CC Incident Response Group
                Source: 0.0.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_6a7df287 Author: unknown
                Source: 0.0.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
                Source: 0.0.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects credential stealer byed on many strings that indicate password store access Author: Florian Roth
                Source: 0.0.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects unspecified malware sample Author: Florian Roth
                Source: 0.0.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NetWire RAT Author: Kevin Breen <kevin@techanarchy.net> & David Cannings
                Source: 0.0.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NetWiredRC Author: Jean-Philippe Teissier / @Jipe_
                Source: 0.0.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect netwire in memory Author: JPCERT/CC Incident Response Group
                Source: 0.2.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_6a7df287 Author: unknown
                Source: 0.2.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
                Source: 0.2.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects credential stealer byed on many strings that indicate password store access Author: Florian Roth
                Source: 0.2.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects unspecified malware sample Author: Florian Roth
                Source: 0.2.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NetWire RAT Author: Kevin Breen <kevin@techanarchy.net> & David Cannings
                Source: 0.2.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NetWiredRC Author: Jean-Philippe Teissier / @Jipe_
                Source: 0.2.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect netwire in memory Author: JPCERT/CC Incident Response Group
                Source: 00000000.00000000.1308808326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_6a7df287 Author: unknown
                Source: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects unspecified malware sample Author: Florian Roth
                Source: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
                Source: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects unspecified malware sample Author: Florian Roth
                Source: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: NetWiredRC Author: Jean-Philippe Teissier / @Jipe_
                Source: 00000000.00000000.1308838540.0000000000413000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
                Source: 00000000.00000000.1308838540.0000000000413000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects unspecified malware sample Author: Florian Roth
                Source: 00000000.00000000.1308838540.0000000000413000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects NetWire RAT Author: Kevin Breen <kevin@techanarchy.net> & David Cannings
                Source: 00000000.00000000.1308838540.0000000000413000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: NetWiredRC Author: Jean-Philippe Teissier / @Jipe_
                Source: 00000000.00000000.1308838540.0000000000413000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detect netwire in memory Author: JPCERT/CC Incident Response Group
                Source: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_6a7df287 Author: unknown
                Source: Process Memory Space: 8zyfXqDPaT.exe PID: 7564, type: MEMORYSTRMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
                Source: Process Memory Space: 8zyfXqDPaT.exe PID: 7564, type: MEMORYSTRMatched rule: Detects unspecified malware sample Author: Florian Roth
                Source: Process Memory Space: 8zyfXqDPaT.exe PID: 7564, type: MEMORYSTRMatched rule: Detects NetWire RAT Author: Kevin Breen <kevin@techanarchy.net> & David Cannings
                Source: Process Memory Space: 8zyfXqDPaT.exe PID: 7564, type: MEMORYSTRMatched rule: NetWiredRC Author: Jean-Philippe Teissier / @Jipe_
                Source: Process Memory Space: 8zyfXqDPaT.exe PID: 7564, type: MEMORYSTRMatched rule: detect netwire in memory Author: JPCERT/CC Incident Response Group
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeMemory allocated: 70E50000 page read and writeJump to behavior
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeMemory allocated: 71E20000 page read and writeJump to behavior
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeMemory allocated: 72DF0000 page read and writeJump to behavior
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeMemory allocated: 740D0000 page read and writeJump to behavior
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeMemory allocated: 77680000 page read and writeJump to behavior
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeMemory allocated: 76390000 page read and writeJump to behavior
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeMemory allocated: 73DC0000 page read and writeJump to behavior
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeMemory allocated: 750A0000 page read and writeJump to behavior
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeMemory allocated: 75870000 page read and writeJump to behavior
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeMemory allocated: 77060000 page read and writeJump to behavior
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeMemory allocated: 752A0000 page read and writeJump to behavior
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeMemory allocated: 75A70000 page read and writeJump to behavior
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeMemory allocated: 75D30000 page read and writeJump to behavior
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeMemory allocated: 75760000 page read and writeJump to behavior
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeMemory allocated: 75B70000 page read and writeJump to behavior
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeMemory allocated: 75F70000 page read and writeJump to behavior
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeMemory allocated: 760B0000 page read and writeJump to behavior
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeMemory allocated: 76EE0000 page read and writeJump to behavior
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeMemory allocated: 77260000 page read and writeJump to behavior
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeMemory allocated: 77400000 page read and writeJump to behavior
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeMemory allocated: 73FC0000 page read and writeJump to behavior
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeMemory allocated: 757E0000 page read and writeJump to behavior
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeMemory allocated: 75E30000 page read and writeJump to behavior
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeMemory allocated: 76130000 page read and writeJump to behavior
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeMemory allocated: 76790000 page read and writeJump to behavior
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeMemory allocated: 77480000 page read and writeJump to behavior
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeMemory allocated: 74000000 page read and writeJump to behavior
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeMemory allocated: 76170000 page read and writeJump to behavior
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_00411CE70_2_00411CE7
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_0040E4F80_2_0040E4F8
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_0041156C0_2_0041156C
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_0040E1C40_2_0040E1C4
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_0040E6D70_2_0040E6D7
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_00402BE60_2_00402BE6
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_0040EBAA0_2_0040EBAA
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7564 -s 392
                Source: 8zyfXqDPaT.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                Source: 8zyfXqDPaT.exe, type: SAMPLEMatched rule: Windows_Trojan_Netwire_6a7df287 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 85051a0b94da4388eaead4c4f4b2d16d4a5eb50c3c938b3daf5c299c9c12f1e6, id = 6a7df287-1656-4779-9a96-c0ab536ae86a, last_modified = 2021-08-23
                Source: 8zyfXqDPaT.exe, type: SAMPLEMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
                Source: 8zyfXqDPaT.exe, type: SAMPLEMatched rule: CredentialStealer_Generic_Backdoor date = 2017-06-07, hash1 = edb2d039a57181acf95bd91b2a20bd9f1d66f3ece18506d4ad870ab65e568f2c, author = Florian Roth, description = Detects credential stealer byed on many strings that indicate password store access, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 8zyfXqDPaT.exe, type: SAMPLEMatched rule: MAL_unspecified_Jan18_1 date = 2018-01-19, hash1 = f87879b29ff83616e9c9044bd5fb847cf5d2efdd2f01fc284d1a6ce7d464a417, author = Florian Roth, description = Detects unspecified malware sample, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 8zyfXqDPaT.exe, type: SAMPLEMatched rule: RAT_NetWire date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net> & David Cannings, maltype = Remote Access Trojan, description = Detects NetWire RAT, reference = http://malwareconfig.com/stats/NetWire
                Source: 8zyfXqDPaT.exe, type: SAMPLEMatched rule: NetWiredRC_B date = 2014-12-23, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = NetWiredRC, version = 1.1
                Source: 8zyfXqDPaT.exe, type: SAMPLEMatched rule: netwire author = JPCERT/CC Incident Response Group, description = detect netwire in memory, rule_usage = memory scan, reference = internal research
                Source: 0.0.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_6a7df287 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 85051a0b94da4388eaead4c4f4b2d16d4a5eb50c3c938b3daf5c299c9c12f1e6, id = 6a7df287-1656-4779-9a96-c0ab536ae86a, last_modified = 2021-08-23
                Source: 0.0.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
                Source: 0.0.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: CredentialStealer_Generic_Backdoor date = 2017-06-07, hash1 = edb2d039a57181acf95bd91b2a20bd9f1d66f3ece18506d4ad870ab65e568f2c, author = Florian Roth, description = Detects credential stealer byed on many strings that indicate password store access, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.0.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_unspecified_Jan18_1 date = 2018-01-19, hash1 = f87879b29ff83616e9c9044bd5fb847cf5d2efdd2f01fc284d1a6ce7d464a417, author = Florian Roth, description = Detects unspecified malware sample, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.0.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: RAT_NetWire date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net> & David Cannings, maltype = Remote Access Trojan, description = Detects NetWire RAT, reference = http://malwareconfig.com/stats/NetWire
                Source: 0.0.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NetWiredRC_B date = 2014-12-23, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = NetWiredRC, version = 1.1
                Source: 0.0.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: netwire author = JPCERT/CC Incident Response Group, description = detect netwire in memory, rule_usage = memory scan, reference = internal research
                Source: 0.2.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_6a7df287 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 85051a0b94da4388eaead4c4f4b2d16d4a5eb50c3c938b3daf5c299c9c12f1e6, id = 6a7df287-1656-4779-9a96-c0ab536ae86a, last_modified = 2021-08-23
                Source: 0.2.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
                Source: 0.2.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: CredentialStealer_Generic_Backdoor date = 2017-06-07, hash1 = edb2d039a57181acf95bd91b2a20bd9f1d66f3ece18506d4ad870ab65e568f2c, author = Florian Roth, description = Detects credential stealer byed on many strings that indicate password store access, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_unspecified_Jan18_1 date = 2018-01-19, hash1 = f87879b29ff83616e9c9044bd5fb847cf5d2efdd2f01fc284d1a6ce7d464a417, author = Florian Roth, description = Detects unspecified malware sample, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: RAT_NetWire date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net> & David Cannings, maltype = Remote Access Trojan, description = Detects NetWire RAT, reference = http://malwareconfig.com/stats/NetWire
                Source: 0.2.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NetWiredRC_B date = 2014-12-23, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = NetWiredRC, version = 1.1
                Source: 0.2.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: netwire author = JPCERT/CC Incident Response Group, description = detect netwire in memory, rule_usage = memory scan, reference = internal research
                Source: 00000000.00000000.1308808326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_6a7df287 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 85051a0b94da4388eaead4c4f4b2d16d4a5eb50c3c938b3daf5c299c9c12f1e6, id = 6a7df287-1656-4779-9a96-c0ab536ae86a, last_modified = 2021-08-23
                Source: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MAL_unspecified_Jan18_1 date = 2018-01-19, hash1 = f87879b29ff83616e9c9044bd5fb847cf5d2efdd2f01fc284d1a6ce7d464a417, author = Florian Roth, description = Detects unspecified malware sample, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
                Source: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MAL_unspecified_Jan18_1 date = 2018-01-19, hash1 = f87879b29ff83616e9c9044bd5fb847cf5d2efdd2f01fc284d1a6ce7d464a417, author = Florian Roth, description = Detects unspecified malware sample, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: NetWiredRC_B date = 2014-12-23, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = NetWiredRC, version = 1.1
                Source: 00000000.00000000.1308838540.0000000000413000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
                Source: 00000000.00000000.1308838540.0000000000413000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MAL_unspecified_Jan18_1 date = 2018-01-19, hash1 = f87879b29ff83616e9c9044bd5fb847cf5d2efdd2f01fc284d1a6ce7d464a417, author = Florian Roth, description = Detects unspecified malware sample, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000000.00000000.1308838540.0000000000413000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: RAT_NetWire date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net> & David Cannings, maltype = Remote Access Trojan, description = Detects NetWire RAT, reference = http://malwareconfig.com/stats/NetWire
                Source: 00000000.00000000.1308838540.0000000000413000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: NetWiredRC_B date = 2014-12-23, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = NetWiredRC, version = 1.1
                Source: 00000000.00000000.1308838540.0000000000413000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: netwire author = JPCERT/CC Incident Response Group, description = detect netwire in memory, rule_usage = memory scan, reference = internal research
                Source: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_6a7df287 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 85051a0b94da4388eaead4c4f4b2d16d4a5eb50c3c938b3daf5c299c9c12f1e6, id = 6a7df287-1656-4779-9a96-c0ab536ae86a, last_modified = 2021-08-23
                Source: Process Memory Space: 8zyfXqDPaT.exe PID: 7564, type: MEMORYSTRMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
                Source: Process Memory Space: 8zyfXqDPaT.exe PID: 7564, type: MEMORYSTRMatched rule: MAL_unspecified_Jan18_1 date = 2018-01-19, hash1 = f87879b29ff83616e9c9044bd5fb847cf5d2efdd2f01fc284d1a6ce7d464a417, author = Florian Roth, description = Detects unspecified malware sample, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: Process Memory Space: 8zyfXqDPaT.exe PID: 7564, type: MEMORYSTRMatched rule: RAT_NetWire date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net> & David Cannings, maltype = Remote Access Trojan, description = Detects NetWire RAT, reference = http://malwareconfig.com/stats/NetWire
                Source: Process Memory Space: 8zyfXqDPaT.exe PID: 7564, type: MEMORYSTRMatched rule: NetWiredRC_B date = 2014-12-23, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = NetWiredRC, version = 1.1
                Source: Process Memory Space: 8zyfXqDPaT.exe PID: 7564, type: MEMORYSTRMatched rule: netwire author = JPCERT/CC Incident Response Group, description = detect netwire in memory, rule_usage = memory scan, reference = internal research
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@2/5@0/0
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_00412598 SetErrorMode,GetLogicalDriveStringsA,GetVolumeInformationA,GetDiskFreeSpaceExA,GetDriveTypeA,0_2_00412598
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_00412014 CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,0_2_00412014
                Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7564
                Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\a284f0a2-2a2a-4ec7-b037-2fbb953032fcJump to behavior
                Source: 8zyfXqDPaT.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: 8zyfXqDPaT.exeReversingLabs: Detection: 97%
                Source: 8zyfXqDPaT.exeVirustotal: Detection: 90%
                Source: unknownProcess created: C:\Users\user\Desktop\8zyfXqDPaT.exe "C:\Users\user\Desktop\8zyfXqDPaT.exe"
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7564 -s 392
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_00408D46 LoadLibraryA,GetProcAddress,GetProcAddress,CryptUnprotectData,strlen,0_2_00408D46
                Source: 8zyfXqDPaT.exeStatic PE information: real checksum: 0x1bdad should be: 0x159a1
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_0040FD55 push ecx; mov dword ptr [esp], 00000091h0_2_0040FD70
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_0040FD55 push eax; mov dword ptr [esp], esi0_2_0040FD90
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_00411154 push ecx; mov dword ptr [esp], eax0_2_00411343
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_0040491C push edi; mov dword ptr [esp], eax0_2_004049DB
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_00410936 push ecx; mov dword ptr [esp], eax0_2_0041098B
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_004061D0 push edx; mov dword ptr [esp], eax0_2_00406464
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_004049EC push ecx; mov dword ptr [esp], ebx0_2_00404A1A
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_0040D9F6 push ecx; mov dword ptr [esp], ebx0_2_0040DA22
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_004101B6 push eax; mov dword ptr [esp], ebx0_2_00410316
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_0040FACC push eax; mov dword ptr [esp], 004186C0h0_2_0040FB7A
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_0-4777
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-6312
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_0-4722
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeAPI coverage: 0.8 %
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_0040947B SetErrorMode,FindFirstFileA,strlen,FindNextFileA,FindClose,0_2_0040947B
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_00404C1F SetErrorMode,FindFirstFileA,FindClose,FindNextFileA,0_2_00404C1F
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_0040D088 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,0_2_0040D088
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_004045AC SetErrorMode,FindFirstFileA,FindClose,FindNextFileA,0_2_004045AC
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_00404305 SetErrorMode,FindFirstFileA,FileTimeToSystemTime,FindNextFileA,FindClose,0_2_00404305
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_00412598 SetErrorMode,GetLogicalDriveStringsA,GetVolumeInformationA,GetDiskFreeSpaceExA,GetDriveTypeA,0_2_00412598
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_0040B904 GetVersionExA,GetVersionExA,GetSystemInfo,GetSystemMetrics,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,0_2_0040B904
                Source: Amcache.hve.7.drBinary or memory string: VMware
                Source: Amcache.hve.7.drBinary or memory string: VMware Virtual USB Mouse
                Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin
                Source: Amcache.hve.7.drBinary or memory string: VMware, Inc.
                Source: Amcache.hve.7.drBinary or memory string: VMware20,1hbin@
                Source: Amcache.hve.7.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                Source: Amcache.hve.7.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: Amcache.hve.7.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                Source: Amcache.hve.7.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: Amcache.hve.7.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                Source: Amcache.hve.7.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                Source: Amcache.hve.7.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: Amcache.hve.7.drBinary or memory string: vmci.sys
                Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin`
                Source: Amcache.hve.7.drBinary or memory string: \driver\vmci,\driver\pci
                Source: Amcache.hve.7.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: Amcache.hve.7.drBinary or memory string: VMware20,1
                Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Generation Counter
                Source: Amcache.hve.7.drBinary or memory string: NECVMWar VMware SATA CD00
                Source: Amcache.hve.7.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                Source: Amcache.hve.7.drBinary or memory string: VMware-42 27 c7 3b 45 a3 e4 a4-61 bc 19 7c 28 5c 10 19
                Source: Amcache.hve.7.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                Source: Amcache.hve.7.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                Source: Amcache.hve.7.drBinary or memory string: VMware PCI VMCI Bus Device
                Source: Amcache.hve.7.drBinary or memory string: VMware VMCI Bus Device
                Source: Amcache.hve.7.drBinary or memory string: VMware Virtual RAM
                Source: Amcache.hve.7.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                Source: 8zyfXqDPaT.exe, 00000000.00000002.1718483530.00000000006BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllA
                Source: Amcache.hve.7.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeAPI call chain: ExitProcess graph end nodegraph_0-4666
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeAPI call chain: ExitProcess graph end nodegraph_0-4983
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeAPI call chain: ExitProcess graph end nodegraph_0-4640
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_00408D46 LoadLibraryA,GetProcAddress,GetProcAddress,CryptUnprotectData,strlen,0_2_00408D46
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_0040658F keybd_event,0_2_0040658F
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_004065ED SetCursorPos,mouse_event,0_2_004065ED
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_0041044B GetLocalTime,0_2_0041044B
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_0040B8A9 getenv,GetUserNameA,0_2_0040B8A9
                Source: C:\Users\user\Desktop\8zyfXqDPaT.exeCode function: 0_2_0040B904 GetVersionExA,GetVersionExA,GetSystemInfo,GetSystemMetrics,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,0_2_0040B904
                Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                Source: Amcache.hve.7.drBinary or memory string: msmpeng.exe
                Source: Amcache.hve.7.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                Source: Amcache.hve.7.drBinary or memory string: MsMpEng.exe
                Source: Yara matchFile source: 8zyfXqDPaT.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1308838540.0000000000413000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 8zyfXqDPaT.exe PID: 7564, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 8zyfXqDPaT.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.1308838540.0000000000413000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 8zyfXqDPaT.exe PID: 7564, type: MEMORYSTR
                Source: Yara matchFile source: 8zyfXqDPaT.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.8zyfXqDPaT.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1308838540.0000000000413000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 8zyfXqDPaT.exe PID: 7564, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                Native API
                1
                DLL Side-Loading
                1
                Process Injection
                1
                Process Injection
                131
                Input Capture
                1
                System Time Discovery
                Remote Services1
                Screen Capture
                2
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                1
                Obfuscated Files or Information
                LSASS Memory11
                Security Software Discovery
                Remote Desktop Protocol131
                Input Capture
                1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                DLL Side-Loading
                Security Account Manager1
                Process Discovery
                SMB/Windows Admin Shares1
                Archive Collected Data
                1
                Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
                Account Discovery
                Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
                System Owner/User Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials2
                File and Directory Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync5
                System Information Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                8zyfXqDPaT.exe97%ReversingLabsWin32.Backdoor.NetWiredRc
                8zyfXqDPaT.exe91%VirustotalBrowse
                8zyfXqDPaT.exe100%AviraTR/Spy.Gen
                8zyfXqDPaT.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://upx.sf.net0%URL Reputationsafe
                23.95.88.13:33600%Avira URL Cloudsafe
                23.95.88.13:33600%VirustotalBrowse
                No contacted domains info
                NameMaliciousAntivirus DetectionReputation
                23.95.88.13:3360true
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://upx.sf.netAmcache.hve.7.drfalse
                • URL Reputation: safe
                unknown
                No contacted IP infos
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1447648
                Start date and time:2024-05-26 09:56:08 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 5m 14s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:12
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:8zyfXqDPaT.exe
                renamed because original name is a hash value
                Original Sample Name:f61a7fa3ca28133a6fcefa0e04b0de4dc1e4020a87388b4b3a315dc8dc18194e.exe
                Detection:MAL
                Classification:mal100.troj.spyw.evad.winEXE@2/5@0/0
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 3
                • Number of non-executed functions: 79
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                • Excluded IPs from analysis (whitelisted): 20.42.73.29
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                TimeTypeDescription
                03:57:36API Interceptor1x Sleep call for process: WerFault.exe modified
                No context
                No context
                No context
                No context
                No context
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):65536
                Entropy (8bit):0.734898219434203
                Encrypted:false
                SSDEEP:96:3dFZolgzCsgheK7LfNQXIDcQnc6ucEhcw3l+K+HbHg/oJAnQO3q8PCFDbOyWZAXg:NTolUC005qrR+TjYqzuiFGZ24IO8C9
                MD5:AE25B85AE8B6F92C0CE68CD3749D66D3
                SHA1:D95ECDC6856C8B875369874DCB4E5C22EA60BD1A
                SHA-256:E202E22046FCADC7ADB56CFA9AC8C712AF668E2A14718F031E18CE62A5F3E2EC
                SHA-512:36725D2B429275952448C0963A2B3D96A848710620AB8F336E9AFCFD33636A7CBB124F0DA6F16CA238068E9D10703A36FBB977B8132461B176BE1EEC0D49C680
                Malicious:false
                Reputation:low
                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.1.1.8.3.8.4.7.7.3.9.9.6.9.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.1.1.8.3.8.5.2.1.1.4.9.8.7.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.6.2.2.6.c.9.2.-.4.c.2.2.-.4.8.1.a.-.a.4.0.3.-.2.6.9.a.0.1.3.e.e.b.f.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.1.d.2.e.4.c.d.-.d.5.5.0.-.4.d.0.c.-.b.2.a.f.-.c.0.4.3.5.6.4.4.1.0.e.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.8.z.y.f.X.q.D.P.a.T...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.8.c.-.0.0.0.1.-.0.0.1.4.-.e.2.a.0.-.3.a.4.7.4.2.a.f.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.7.9.9.f.d.5.d.4.d.9.3.b.5.3.3.4.e.0.a.c.9.3.7.1.c.1.4.5.6.9.4.0.0.0.0.f.f.f.f.!.0.0.0.0.3.2.c.e.4.f.9.1.b.5.a.b.0.d.a.2.e.1.d.2.9.0.1.6.4.6.3.6.b.2.a.0.d.f.b.4.6.5.2.3.!.8.z.y.f.X.q.D.P.a.T...e.x.e.....T.a.r.g.e.t.A.p.p.
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:Mini DuMP crash report, 14 streams, Sun May 26 07:57:28 2024, 0x1205a4 type
                Category:dropped
                Size (bytes):23136
                Entropy (8bit):2.3297942351123364
                Encrypted:false
                SSDEEP:96:5u8gnl+N1P8d3nsTBX/jOfqKC3Li7W5lwlrliM+YAV9zU74OC5TXrWIkWIJ4I0TB:nhhEC3LOswlrliMMXzUcF5Tdou3bv/L
                MD5:F8B8B8BC5CBE3F0B4E9BABD07FECAC4E
                SHA1:5E3C790CD7A2F98B134C10DE12C9765592F7A77B
                SHA-256:6C3694CAA48972160135D368CF630310A833C1E2E2AC5B9C861F957FBF6F1651
                SHA-512:4C5704B9A8E8C58787D4D53E96E8BF83D612FC82A940F3BA67DB050A9AFE9C0CD614D8C0D443C1BBC06D9D2EADFFDD4080989DBD214366F10E9FE4B83F90F2BD
                Malicious:false
                Reputation:low
                Preview:MDMP..a..... .......h.Rf............4...........t...<.......T...............T.......8...........T...........`....K......................................................................................................eJ......4.......GenuineIntel............T...........G.Rf.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):8364
                Entropy (8bit):3.7039497090002556
                Encrypted:false
                SSDEEP:192:R6l7wVeJ0WA62Eex6YcDbSUUKgmfENpDx89bwVsfJwm:R6lXJi62Eex6YcSUUKgmfEGwufr
                MD5:293C78FC463913F794E1A3BB4D9B1F67
                SHA1:A236BF3108C28EE4F60C6CAD923BCB9C4C487D3C
                SHA-256:6A03D086E307A742418C4D4CBDDA987DC1167FB4F5CD43E9B850359F41BDA0FD
                SHA-512:3BB75EA4B2060F120916AA40DC116817DDBB8F26AEA5E9A17DE0E25F40221793657FE4CC9A9C8A7F3D8E2E67A693EEF4FCFEAE89BBAFFBDD6073479002DEC586
                Malicious:false
                Reputation:low
                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.5.6.4.<./.P.i.
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):4583
                Entropy (8bit):4.480612914521914
                Encrypted:false
                SSDEEP:48:cvIwWl8zsQJg77aI96tWpW8VYLPYm8M4JvdFBa+q8IDE50hUAVd:uIjfWI78c7V6SJk9e0hFVd
                MD5:0A13065459DFD4DCA298ABE23F398045
                SHA1:F687BCE694A5B41A5AF20642782473799AAE243A
                SHA-256:AACA71560266DE6A2A95F79773FD892268901AAA6F7416B580E477BB6C9F68B0
                SHA-512:FE6118059B7329377B79CE3B81A1F45917FDE0FEB7C6E643225A7A0CAD839D0FC194CA32B42842C337FBF0494CE35D66A761441203637438DCE8CFBA508F73D7
                Malicious:false
                Reputation:low
                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="339780" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:MS Windows registry file, NT/2000 or above
                Category:dropped
                Size (bytes):1835008
                Entropy (8bit):4.39380717142474
                Encrypted:false
                SSDEEP:6144:Nl4fiJoH0ncNXiUjt10q0G/gaocYGBoaUMMhA2NX4WABlBuNzROBSqa:D4vF0MYQUMM6VFY1RU
                MD5:BC34FF97F5B050848D182BC80444601B
                SHA1:0AD73D9090106C512407E8E73FA9FD98D92C2485
                SHA-256:A5B8FCF8F5B650F2950E816CD258E5C3C5636616C97F359F266D76692B3DD9AC
                SHA-512:46E6D1DAE305A6232CD510AA70C03A9ECE54B95BD2582F1FFB7A7FD368614437D6D5E2C3A8E56870C48FF26C80321D6BE852884CA0BAF47491170336B05A79A7
                Malicious:false
                Reputation:low
                Preview:regfG...G....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..*ZB...............................................................................................................................................................................................................................................................................................................................................J.<n........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                Entropy (8bit):6.175709067906287
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.94%
                • Win16/32 Executable Delphi generic (2074/23) 0.02%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:8zyfXqDPaT.exe
                File size:86'016 bytes
                MD5:a37c6527cabbbaf1e4aa9674b0476069
                SHA1:32ce4f91b5ab0da2e1d290164636b2a0dfb46523
                SHA256:f61a7fa3ca28133a6fcefa0e04b0de4dc1e4020a87388b4b3a315dc8dc18194e
                SHA512:cdbe9010ef3cf60e065dea9684b650cdfb8164c59f50c7c01dae0824abeb161e18f270b29ec3c1d678106d1a5c3ac9d1f08f7f17b337d749679a09aeec903379
                SSDEEP:1536:Jr/zIEc9uQ1q1vD9qrPP+r4MrdN/F+Xs6ibNqiRGWkxuATdWTza:Jr/zIEyQIrPP+r4MrdN/086ibgqGWkzR
                TLSH:F483C719FA0BE0F2EE4E1D7162CBF6AF0B786920D864CE41DF840D43EA53D576219B94
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......U...............8.........d...!.......0....@........................................... ............................
                Icon Hash:00928e8e8686b000
                Entrypoint:0x4021da
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                DLL Characteristics:NX_COMPAT
                Time Stamp:0x551FFBB3 [Sat Apr 4 14:56:51 2015 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:eaf9915d2b5730c3717ea003bd93404a
                Instruction
                push ebp
                mov eax, 0000103Ch
                push edi
                push esi
                push ebx
                call 00007F1E3C553101h
                sub esp, eax
                call 00007F1E3C5443FAh
                lea ebp, dword ptr [esp+28h]
                call 00007F1E3C5501EDh
                lea ebx, dword ptr [esp+2Ch]
                call 00007F1E3C54F940h
                call 00007F1E3C54D88Bh
                call 00007F1E3C54CFE9h
                call 00007F1E3C54D46Dh
                mov dword ptr [esp+2Ch], FFFFFFFFh
                mov eax, dword ptr [esp+2Ch]
                mov dword ptr [esp+08h], 00000004h
                mov dword ptr [esp+04h], ebp
                mov dword ptr [esp+28h], 00000000h
                mov dword ptr [esp], eax
                call 00007F1E3C544A79h
                test al, al
                je 00007F1E3C542B3Fh
                mov edi, dword ptr [esp+28h]
                mov esi, dword ptr [esp+2Ch]
                mov dword ptr [esp+04h], edi
                mov dword ptr [esp], esi
                call 00007F1E3C5429D7h
                test al, al
                je 00007F1E3C542A52h
                lea eax, dword ptr [esp+30h]
                mov dword ptr [esp+08h], edi
                mov dword ptr [esp+04h], eax
                mov dword ptr [esp], esi
                call 00007F1E3C544A45h
                test al, al
                je 00007F1E3C542AFAh
                mov esi, dword ptr [esp+28h]
                cmp esi, 00000FFFh
                jnbe 00007F1E3C542A97h
                mov byte ptr [esp+esi+30h], 00000000h
                movzx edx, byte ptr [esp+30h]
                mov edi, dword ptr [esp+2Ch]
                mov dword ptr [esp+04h], edx
                mov dword ptr [esp], edi
                mov dword ptr [esp+1Ch], edx
                call 00007F1E3C5429B8h
                mov edx, dword ptr [esp+1Ch]
                test al, al
                jne 00007F1E3C542AABh
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x1c0000x10fc.idata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x1c30c0x258.idata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x11d000x11e00d75a0d3817837e7fb6193b32beab0173False0.4841701267482518data5.968281013830461IMAGE_SCN_CNT_CODE, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .data0x130000x1a7c0x1c00f45ebb6f426d4298e94dfaa93da8bac8False0.5784040178571429data6.345204422487129IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .bss0x150000x63f00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .idata0x1c0000x10fc0x12001c5eecb94befaaec442aaa260dde1560False0.5158420138888888data5.623593330498326IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                DLLImport
                ADVAPI32.DLLCryptAcquireContextA, CryptCreateHash, CryptDestroyHash, CryptGetHashParam, CryptHashData, CryptReleaseContext, GetUserNameA, RegCloseKey, RegCreateKeyExA, RegDeleteKeyA, RegDeleteValueA, RegEnumKeyExA, RegEnumValueA, RegOpenKeyExA, RegQueryValueExA, RegSetValueExA
                CRYPT32.DLLCryptUnprotectData
                GDI32.dllBitBlt, CreateCompatibleBitmap, CreateCompatibleDC, DeleteDC, DeleteObject, GetDIBits, SelectObject
                KERNEL32.dllCloseHandle, CreateDirectoryA, CreateFileA, CreateMutexA, CreatePipe, CreateProcessA, CreateToolhelp32Snapshot, DeleteFileA, EnterCriticalSection, ExitProcess, FileTimeToSystemTime, FindClose, FindFirstFileA, FindNextFileA, FreeLibrary, GetCommandLineA, GetComputerNameA, GetCurrentProcessId, GetCurrentThreadId, GetDiskFreeSpaceExA, GetDriveTypeA, GetFileAttributesA, GetFileAttributesExA, GetLastError, GetLocalTime, GetLogicalDriveStringsA, GetModuleFileNameA, GetProcAddress, GetProcessTimes, GetStartupInfoA, GetSystemInfo, GetSystemTime, GetTickCount, GetVersionExA, GetVolumeInformationA, InitializeCriticalSection, LeaveCriticalSection, LoadLibraryA, LocalFree, MoveFileA, OpenProcess, PeekNamedPipe, Process32First, Process32Next, ReadFile, ReleaseMutex, ResumeThread, SetErrorMode, SetFileAttributesA, SetFilePointer, Sleep, TerminateProcess, WideCharToMultiByte, WriteFile
                msvcrt.dll_beginthreadex, _filelengthi64, _vscprintf, _vsnprintf, fclose, fflush, fgetpos, fgets, fopen, fread, free, fsetpos, fwrite, getenv, malloc, realloc, strlen
                SHELL32.DLLSHGetPathFromIDListA, SHGetSpecialFolderLocation
                USER32.dllCreateWindowExA, DefWindowProcA, DispatchMessageA, EnumWindows, GetDC, GetDesktopWindow, GetForegroundWindow, GetKeyNameTextA, GetKeyState, GetKeyboardState, GetMessageA, GetSystemMetrics, GetWindowTextA, IsWindowVisible, MapVirtualKeyA, PostQuitMessage, RegisterClassExA, ReleaseDC, SendMessageA, SetCursorPos, SetWindowTextA, ShowWindow, ToAscii, TranslateMessage, keybd_event, mouse_event
                WS2_32.dllWSACleanup, WSAGetLastError, WSAIoctl, WSAStartup, __WSAFDIsSet, closesocket, connect, gethostbyname, gethostname, htons, inet_ntoa, ioctlsocket, ntohs, recv, select, send, setsockopt, shutdown, socket
                No network behavior found

                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:03:56:55
                Start date:26/05/2024
                Path:C:\Users\user\Desktop\8zyfXqDPaT.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\8zyfXqDPaT.exe"
                Imagebase:0x400000
                File size:86'016 bytes
                MD5 hash:A37C6527CABBBAF1E4AA9674B0476069
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: Windows_Trojan_Netwire_6a7df287, Description: unknown, Source: 00000000.00000000.1308808326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                • Rule: JoeSecurity_NetWire_1, Description: Yara detected NetWire RAT, Source: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                • Rule: MAL_unspecified_Jan18_1, Description: Detects unspecified malware sample, Source: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmp, Author: Florian Roth
                • Rule: Windows_Trojan_Netwire_1b43df38, Description: unknown, Source: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmp, Author: unknown
                • Rule: MAL_unspecified_Jan18_1, Description: Detects unspecified malware sample, Source: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmp, Author: Florian Roth
                • Rule: NetWiredRC_B, Description: NetWiredRC, Source: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                • Rule: JoeSecurity_NetWire_1, Description: Yara detected NetWire RAT, Source: 00000000.00000000.1308838540.0000000000413000.00000008.00000001.01000000.00000003.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000000.1308838540.0000000000413000.00000008.00000001.01000000.00000003.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Netwire, Description: Yara detected Netwire RAT, Source: 00000000.00000000.1308838540.0000000000413000.00000008.00000001.01000000.00000003.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Netwire_1b43df38, Description: unknown, Source: 00000000.00000000.1308838540.0000000000413000.00000008.00000001.01000000.00000003.sdmp, Author: unknown
                • Rule: MAL_unspecified_Jan18_1, Description: Detects unspecified malware sample, Source: 00000000.00000000.1308838540.0000000000413000.00000008.00000001.01000000.00000003.sdmp, Author: Florian Roth
                • Rule: RAT_NetWire, Description: Detects NetWire RAT, Source: 00000000.00000000.1308838540.0000000000413000.00000008.00000001.01000000.00000003.sdmp, Author: Kevin Breen <kevin@techanarchy.net> & David Cannings
                • Rule: NetWiredRC_B, Description: NetWiredRC, Source: 00000000.00000000.1308838540.0000000000413000.00000008.00000001.01000000.00000003.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                • Rule: netwire, Description: detect netwire in memory, Source: 00000000.00000000.1308838540.0000000000413000.00000008.00000001.01000000.00000003.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: Windows_Trojan_Netwire_6a7df287, Description: unknown, Source: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                Reputation:low
                Has exited:true

                Target ID:7
                Start time:03:57:27
                Start date:26/05/2024
                Path:C:\Windows\SysWOW64\WerFault.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7564 -s 392
                Imagebase:0x780000
                File size:483'680 bytes
                MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Reset < >

                  Execution Graph

                  Execution Coverage:1.5%
                  Dynamic/Decrypted Code Coverage:0%
                  Signature Coverage:10.8%
                  Total number of Nodes:1613
                  Total number of Limit Nodes:2
                  execution_graph 4913 4064c2 4922 4061d0 GetSystemMetrics GetSystemMetrics GetDesktopWindow 4913->4922 4916 4064f5 4918 403f73 10 API calls 4916->4918 4917 406517 malloc 4919 406515 4917->4919 4920 406527 4917->4920 4918->4919 4921 4053e4 2 API calls 4920->4921 4921->4919 4923 406220 4922->4923 4924 40621c 4922->4924 4923->4916 4923->4917 4924->4923 4925 40622b GetDC CreateCompatibleDC CreateCompatibleBitmap 4924->4925 4926 406263 4925->4926 4927 406444 ReleaseDC DeleteDC DeleteObject 4925->4927 4926->4927 4929 406275 SelectObject BitBlt 4926->4929 4927->4923 4928 406478 4927->4928 4928->4923 4940 402be6 4928->4940 4929->4927 4933 4062d0 4929->4933 4931 4064ab 4932 405434 free 4931->4932 4932->4923 4934 406306 GetDIBits 4933->4934 4934->4927 4935 406354 malloc 4934->4935 4935->4927 4936 4063bf GetDIBits 4935->4936 4937 406430 4936->4937 4939 4063f7 4936->4939 4938 405434 free 4937->4938 4938->4939 4939->4927 4944 402c08 4940->4944 4941 402c39 malloc 4942 402c55 4941->4942 4950 402c4e 4941->4950 4943 402c68 malloc 4942->4943 4945 402c7d 4942->4945 4943->4945 4943->4950 4944->4941 4944->4942 4946 402dcc malloc 4945->4946 4947 405434 free 4945->4947 4949 402d7e malloc 4945->4949 4945->4950 4946->4949 4946->4950 4947->4946 4949->4950 4950->4931 4951 401342 4962 40c4a1 4951->4962 4954 403b94 2 API calls 4955 401352 4954->4955 4956 401000 2 API calls 4955->4956 4957 401357 4956->4957 4982 40c5ec 4957->4982 4963 40c4b4 4962->4963 4965 40c4d4 4963->4965 5001 410936 RegOpenKeyExA 4963->5001 4967 40c500 4965->4967 5004 41099b 4965->5004 4968 40c521 4967->4968 4969 40c519 fclose 4967->4969 4970 4051fb GetModuleFileNameA 4968->4970 4969->4968 4971 40c538 4970->4971 4972 401347 4971->4972 4973 40b003 _vsnprintf 4971->4973 4972->4954 4974 40c564 4973->4974 4975 404a4e GetFileAttributesA 4974->4975 4976 40c56c 4975->4976 4977 40c578 4976->4977 4978 4049ec 3 API calls 4976->4978 4979 4051a9 GetModuleFileNameA 4977->4979 4978->4977 4980 40c58f 4979->4980 4980->4972 5015 40c2ae 4980->5015 4983 40135c WSACleanup ExitProcess 4982->4983 4984 40c5f5 ReleaseMutex CloseHandle 4982->4984 4985 40ce8b 4983->4985 4984->4983 4986 4051fb GetModuleFileNameA 4985->4986 4987 40cead 4986->4987 4988 40137d 4987->4988 4989 40b003 _vsnprintf 4987->4989 4990 40cee1 4989->4990 4991 404a4e GetFileAttributesA 4990->4991 4992 40cee9 4991->4992 4993 40ceed SetFileAttributesA 4992->4993 4994 40ceff fopen 4992->4994 4993->4994 4995 40cfcf 4994->4995 4999 40cf19 4994->4999 4996 404a4e GetFileAttributesA 4995->4996 4997 40cfdb 4996->4997 4997->4988 4998 40cfdf SetFileAttributesA 4997->4998 4998->4988 5000 40cfa1 fwrite fclose 4999->5000 5000->4995 5002 410994 5001->5002 5003 41096f RegDeleteValueA RegCloseKey 5001->5003 5002->4965 5003->5002 5005 4109b8 5004->5005 5007 4109d8 5004->5007 5006 40b003 _vsnprintf 5005->5006 5006->5007 5008 4109ee RegDeleteKeyA 5007->5008 5009 410a09 RegOpenKeyExA 5008->5009 5010 410a39 5008->5010 5009->5010 5014 410a3e 5009->5014 5010->4967 5011 410a78 RegEnumKeyExA 5012 410a99 RegCloseKey RegDeleteKeyA 5011->5012 5011->5014 5012->5010 5013 41099b _vsnprintf 5013->5014 5014->5011 5014->5012 5014->5013 5016 40c2bc 5015->5016 5017 40c301 getenv 5016->5017 5018 40b003 _vsnprintf 5017->5018 5019 40c334 5018->5019 5020 40b003 _vsnprintf 5019->5020 5021 40c362 5020->5021 5022 40c372 fopen 5021->5022 5027 40c36b 5021->5027 5023 40c388 fwrite fclose getenv 5022->5023 5022->5027 5024 40b003 _vsnprintf 5023->5024 5025 40c3db 5024->5025 5026 40491c 3 API calls 5025->5026 5026->5027 5027->4972 5033 401543 5034 40157b 5033->5034 5037 404305 SetErrorMode FindFirstFileA 5034->5037 5038 40433c 5037->5038 5039 40436d 5037->5039 5041 403f73 10 API calls 5038->5041 5062 411e38 malloc 5039->5062 5043 404368 5041->5043 5042 404383 5042->5043 5045 411e38 malloc 5042->5045 5044 4018c0 5043->5044 5046 405434 free 5043->5046 5047 4043a1 5045->5047 5046->5044 5047->5043 5048 4043a9 FileTimeToSystemTime 5047->5048 5049 40b003 _vsnprintf 5048->5049 5051 404429 5049->5051 5050 40b003 _vsnprintf 5050->5051 5051->5050 5052 4044f0 FindNextFileA 5051->5052 5064 411f24 5051->5064 5052->5048 5053 404506 FindClose 5052->5053 5068 411f85 5053->5068 5056 404521 5057 403f73 10 API calls 5056->5057 5058 40457d 5057->5058 5071 411e7d 5058->5071 5061 411e7d free 5061->5043 5063 411e53 5062->5063 5063->5042 5065 411f44 5064->5065 5066 411f50 5064->5066 5065->5066 5074 411ee1 realloc 5065->5074 5066->5052 5069 411f24 realloc 5068->5069 5070 411fa5 5069->5070 5070->5056 5072 404585 5071->5072 5073 411e8b free 5071->5073 5072->5061 5073->5072 5075 411f05 5074->5075 5075->5066 5076 4018c5 5079 410333 5076->5079 5080 410356 5079->5080 5081 410422 5080->5081 5082 40b003 _vsnprintf 5080->5082 5083 403f73 10 API calls 5081->5083 5084 41038d 5082->5084 5089 4018d4 5083->5089 5090 405524 fopen 5084->5090 5087 4103b2 malloc 5088 4053e4 2 API calls 5087->5088 5088->5089 5091 40555c 5090->5091 5092 405644 5090->5092 5093 40549d 4 API calls 5091->5093 5092->5081 5092->5087 5094 40557c 5093->5094 5095 405584 fgetpos 5094->5095 5096 405629 fclose 5094->5096 5095->5096 5098 4055a6 fsetpos 5095->5098 5096->5092 5097 405638 5096->5097 5099 405434 free 5097->5099 5098->5096 5101 4055d6 malloc 5098->5101 5099->5092 5101->5096 5102 4055e6 fread 5101->5102 5103 405604 realloc 5102->5103 5104 405618 fclose 5102->5104 5103->5104 5104->5092 5105 401847 5106 401853 5105->5106 5107 40b003 _vsnprintf 5106->5107 5108 4018b8 5107->5108 5109 404305 19 API calls 5108->5109 5110 4018c0 5109->5110 5111 401b51 malloc 5112 401b67 5111->5112 5114 401bdf 5111->5114 5113 4053e4 2 API calls 5112->5113 5113->5114 5115 40da55 5116 40da66 5115->5116 5117 40da8c 5116->5117 5118 40da80 ShowWindow 5116->5118 5118->5117 5119 4017d7 5120 4017f1 5119->5120 5123 40669f 5120->5123 5124 4066ac 5123->5124 5125 406731 mouse_event 5124->5125 5126 40180a 5124->5126 5125->5126 5127 405dd8 getenv 5128 40b003 _vsnprintf 5127->5128 5129 405e15 5128->5129 5130 404a4e GetFileAttributesA 5129->5130 5131 405e1d 5130->5131 5132 405e21 getenv 5131->5132 5133 405e49 5131->5133 5134 40b003 _vsnprintf 5132->5134 5135 404a4e GetFileAttributesA 5133->5135 5134->5133 5138 405e51 5135->5138 5136 405fa6 5137 403f73 10 API calls 5136->5137 5139 405fc8 5137->5139 5138->5136 5140 405ea9 CreatePipe 5138->5140 5140->5136 5141 405ef2 CreatePipe 5140->5141 5141->5136 5142 405f17 GetStartupInfoA CreateProcessA 5141->5142 5142->5136 5143 405fcd CloseHandle CloseHandle 5142->5143 5144 403f73 10 API calls 5143->5144 5145 40601b PeekNamedPipe 5144->5145 5152 406062 5145->5152 5146 406110 CloseHandle CloseHandle TerminateProcess 5147 403f73 10 API calls 5146->5147 5151 406167 5147->5151 5149 4060a1 ReadFile 5149->5152 5150 406081 malloc 5150->5152 5151->5139 5154 405434 free 5151->5154 5152->5145 5152->5146 5152->5149 5152->5150 5153 403f73 10 API calls 5152->5153 5155 4053d0 Sleep 5152->5155 5153->5152 5154->5139 5155->5152 5156 401a59 5157 401a83 5156->5157 5160 404a2d MoveFileA 5157->5160 5159 401ac5 5160->5159 5161 4018d9 5164 41044b 5161->5164 5165 410465 5164->5165 5166 4018e1 5165->5166 5167 41046d GetLocalTime 5165->5167 5168 40b003 _vsnprintf 5167->5168 5169 4104bb 5168->5169 5170 4104df 5169->5170 5175 40facc 5169->5175 5172 40b003 _vsnprintf 5170->5172 5173 410503 5172->5173 5174 4049ec 3 API calls 5173->5174 5174->5166 5176 40fae4 GetLocalTime 5175->5176 5177 40fc16 5175->5177 5178 40fb63 5176->5178 5179 40fb03 5176->5179 5177->5170 5182 40fb71 CloseHandle 5178->5182 5183 40fb7a 5178->5183 5188 40fb57 5178->5188 5179->5178 5180 40fb07 5179->5180 5181 40b003 _vsnprintf 5180->5181 5185 40fb44 5181->5185 5182->5183 5187 4049ec 3 API calls 5183->5187 5184 404a77 GetFileAttributesA 5189 40fbbd 5184->5189 5185->5188 5190 40fb4e CloseHandle 5185->5190 5186 40fc45 5186->5177 5192 40fc55 WriteFile 5186->5192 5187->5188 5188->5184 5188->5186 5191 40fbcd CreateFileA 5189->5191 5193 405072 2 API calls 5189->5193 5190->5188 5191->5177 5194 40fc22 SetFilePointer 5191->5194 5192->5177 5193->5191 5194->5186 4622 4021da 4623 4021e8 4622->4623 4638 403b54 WSAStartup 4623->4638 4625 4021ef 4652 40f950 GetTickCount GetCurrentProcessId GetCurrentThreadId 4625->4652 4627 4021f8 4641 40c75f 4627->4641 4632 40421c 16 API calls 4636 402210 4632->4636 4635 4053d0 Sleep 4635->4636 4636->4632 4636->4635 4637 403b94 shutdown closesocket 4636->4637 4697 401000 4636->4697 4703 403e63 4636->4703 4710 40f719 4636->4710 4637->4636 4639 403b85 InitializeCriticalSection 4638->4639 4640 403b79 ExitProcess 4638->4640 4639->4625 4717 40c614 4641->4717 4643 40c770 malloc 4644 40c79e 4643->4644 4645 40c81c malloc 4644->4645 4645->4644 4646 40c842 4645->4646 4719 405434 4646->4719 4648 40c84d 4649 40220b 4648->4649 4650 40c87f malloc 4648->4650 4654 40cbe8 4649->4654 4651 40c8b2 4650->4651 4651->4648 4653 40f97f 4652->4653 4653->4627 4722 4051a9 GetModuleFileNameA 4654->4722 4656 40cc0a 4657 40ce83 4656->4657 4724 40b5cd 4656->4724 4657->4636 4659 40cd0a 4660 40cd1f 4659->4660 4762 40c400 4659->4762 4777 40c5ab CreateMutexA 4660->4777 4664 40cd24 4666 40cd38 ExitProcess 4664->4666 4667 40cd44 4664->4667 4675 40cd7c 4667->4675 4780 4107c4 RegCreateKeyExA 4667->4780 4668 40cc30 4668->4659 4669 40cc80 4668->4669 4728 4049ec GetFileAttributesA 4668->4728 4732 404a4e GetFileAttributesA 4668->4732 4734 4053d0 Sleep 4668->4734 4735 405072 4669->4735 4674 40cdf8 4679 40ce08 fopen 4674->4679 4681 40ce1d 4674->4681 4675->4674 4676 40b003 _vsnprintf 4675->4676 4678 40cdb8 4676->4678 4680 40b003 _vsnprintf 4678->4680 4679->4681 4682 40cdd4 4680->4682 4684 40ce77 4681->4684 4685 40b5cd getenv 4681->4685 4683 4107c4 3 API calls 4682->4683 4683->4674 4786 40c975 4684->4786 4688 40ce4b 4685->4688 4686 40cc98 4686->4659 4690 40ccce 4686->4690 4755 40b003 _vsnprintf 4686->4755 4783 4053e4 _beginthreadex 4688->4783 4691 404a4e GetFileAttributesA 4690->4691 4692 40ccf0 4691->4692 4692->4659 4694 40ccf4 4692->4694 4757 40491c 4694->4757 4699 40101d 4697->4699 4700 40105e 4699->4700 4838 40d02c 4699->4838 4701 40106e 4700->4701 4842 4053d0 Sleep 4700->4842 4701->4636 4706 403e66 4703->4706 4705 403e9b 4867 403403 4705->4867 4706->4705 4843 403bd0 4706->4843 4866 4053d0 Sleep 4706->4866 4713 40f742 4710->4713 4711 40f786 4712 403b94 2 API calls 4711->4712 4714 40f790 4712->4714 4713->4711 4715 40f7d6 4713->4715 4714->4636 4891 403f73 4715->4891 4718 40c637 4717->4718 4718->4643 4720 405442 free 4719->4720 4721 40544a 4719->4721 4720->4721 4721->4648 4723 4051d2 4722->4723 4723->4656 4725 40b620 4724->4725 4727 40b5eb 4724->4727 4725->4668 4726 40b719 getenv 4726->4727 4727->4725 4727->4726 4729 404a04 4728->4729 4730 404a1a DeleteFileA 4728->4730 4729->4730 4731 404a08 SetFileAttributesA 4729->4731 4730->4668 4731->4730 4733 404a65 4732->4733 4733->4668 4734->4668 4736 405096 4735->4736 4738 40509a 4735->4738 4736->4659 4740 404a9d fopen 4736->4740 4738->4736 4807 404a77 GetFileAttributesA 4738->4807 4809 405050 CreateDirectoryA 4738->4809 4741 404ac2 fopen 4740->4741 4742 404b87 4740->4742 4743 404ae0 4741->4743 4744 404b6b 4741->4744 4742->4686 4746 404aea malloc 4743->4746 4749 404b5f 4743->4749 4745 404b6d fclose 4744->4745 4745->4742 4747 404b7b 4745->4747 4746->4743 4748 404b00 fread 4746->4748 4750 4049ec 3 API calls 4747->4750 4751 404b2a fwrite 4748->4751 4752 404b1c free 4748->4752 4753 404b61 fclose 4749->4753 4750->4742 4751->4748 4751->4752 4752->4753 4753->4745 4756 40b030 4755->4756 4756->4690 4758 404945 4757->4758 4759 40497f CreateProcessA 4758->4759 4760 4049e4 4759->4760 4761 4049cc CloseHandle CloseHandle 4759->4761 4760->4666 4761->4760 4764 40c40f 4762->4764 4765 40c46e 4764->4765 4766 40c446 4764->4766 4810 40525e 4764->4810 4765->4660 4767 40525e GetCommandLineA 4766->4767 4768 40c461 4767->4768 4768->4765 4769 404a4e GetFileAttributesA 4768->4769 4770 40c478 4769->4770 4771 40c486 4770->4771 4772 40c47f 4770->4772 4774 404a77 GetFileAttributesA 4771->4774 4773 4049ec 3 API calls 4772->4773 4773->4765 4775 40c48b 4774->4775 4775->4765 4814 405105 4775->4814 4778 40c5e8 4777->4778 4779 40c5db GetLastError 4777->4779 4778->4664 4779->4778 4781 41086b 4780->4781 4782 41081e RegSetValueExA RegCloseKey 4780->4782 4781->4675 4782->4781 4784 405430 4783->4784 4785 405420 CloseHandle 4783->4785 4784->4684 4785->4784 4787 40c9a2 4786->4787 4820 4051fb 4787->4820 4789 40c9b2 4790 40c9b6 4789->4790 4791 40b003 _vsnprintf 4789->4791 4790->4657 4792 40c9e7 4791->4792 4793 404a4e GetFileAttributesA 4792->4793 4794 40c9ef fopen 4793->4794 4794->4790 4796 40ca13 fread 4794->4796 4797 40ca34 4796->4797 4799 40cbaa fclose 4797->4799 4824 40564e 4797->4824 4800 404a4e GetFileAttributesA 4799->4800 4801 40cbc0 4800->4801 4801->4790 4802 40cbcc SetFileAttributesA 4801->4802 4802->4790 4803 40ca52 4831 40549d 4803->4831 4805 40cb32 4806 40cb82 fwrite 4805->4806 4806->4799 4808 404a8e 4807->4808 4808->4738 4809->4738 4811 405284 4810->4811 4812 4052a6 GetCommandLineA 4811->4812 4813 4052bf 4812->4813 4813->4764 4815 405124 4814->4815 4816 405127 LoadLibraryA GetProcAddress 4814->4816 4815->4816 4817 40514a 4816->4817 4819 405193 4816->4819 4818 404a77 GetFileAttributesA 4817->4818 4817->4819 4818->4819 4819->4765 4821 40522b 4820->4821 4822 4051a9 GetModuleFileNameA 4821->4822 4823 40523b 4822->4823 4823->4789 4825 405674 4824->4825 4826 405680 GetSystemTime 4825->4826 4827 405687 GetLocalTime 4825->4827 4828 40568c 4826->4828 4827->4828 4829 40b003 _vsnprintf 4828->4829 4830 4056d1 4829->4830 4830->4803 4832 4054b8 fgetpos 4831->4832 4833 4054db 4831->4833 4835 4054d1 4832->4835 4836 4054cc 4832->4836 4834 4054e0 fflush _filelengthi64 4833->4834 4833->4835 4837 40550d fsetpos 4834->4837 4835->4836 4835->4837 4836->4805 4837->4836 4839 40d03d 4838->4839 4840 40d057 4839->4840 4841 40d04f fclose 4839->4841 4840->4699 4841->4840 4842->4701 4844 403be8 4843->4844 4845 403d24 4844->4845 4854 403bf1 4844->4854 4846 403df3 4845->4846 4864 403d32 4845->4864 4848 4033a1 2 API calls 4846->4848 4849 403e09 4848->4849 4850 403e12 socket 4849->4850 4860 403cf5 4849->4860 4852 403e39 connect 4850->4852 4850->4860 4851 403c35 socket connect 4851->4854 4855 403cea 4852->4855 4852->4860 4853 4033a1 2 API calls 4853->4864 4854->4851 4856 403b94 2 API calls 4854->4856 4854->4860 4863 403ca2 4854->4863 4875 4033a1 gethostbyname 4854->4875 4879 403ae4 4854->4879 4887 403b94 4855->4887 4856->4854 4859 403d72 socket connect 4859->4864 4860->4706 4861 403b94 2 API calls 4861->4864 4862 403ae4 3 API calls 4862->4864 4863->4855 4863->4860 4865 403ae4 3 API calls 4863->4865 4864->4853 4864->4859 4864->4860 4864->4861 4864->4862 4865->4863 4866->4706 4868 40341a ioctlsocket 4867->4868 4869 40343b 4867->4869 4868->4869 4870 4034d4 4869->4870 4871 403447 setsockopt 4869->4871 4873 403507 4870->4873 4874 4034d9 setsockopt 4870->4874 4871->4870 4872 403479 WSAIoctl 4871->4872 4872->4870 4873->4636 4874->4873 4876 4033fa 4875->4876 4877 4033be 4875->4877 4876->4854 4878 4033d6 htons 4877->4878 4878->4876 4880 403a1d 4879->4880 4881 403b1a 4879->4881 4880->4881 4882 40b003 _vsnprintf 4880->4882 4881->4854 4883 403a60 send 4882->4883 4884 403a85 4883->4884 4886 403a81 4883->4886 4885 403a9d recv 4884->4885 4885->4886 4886->4854 4888 403ba2 4887->4888 4889 403bc5 4887->4889 4888->4889 4890 403ba8 shutdown closesocket 4888->4890 4889->4860 4890->4889 4892 403f86 EnterCriticalSection 4891->4892 4905 403eb7 4892->4905 4895 403fc0 4896 4040bc LeaveCriticalSection 4895->4896 4899 4040cd 4896->4899 4898 403fea malloc 4903 403ffd 4898->4903 4899->4714 4900 405434 free 4900->4898 4901 40406c send 4902 40409b WSAGetLastError 4901->4902 4901->4903 4902->4896 4902->4903 4903->4895 4903->4896 4903->4901 4912 4053d0 Sleep 4903->4912 4906 403ecf 4905->4906 4907 403f23 select 4906->4907 4908 403ef6 select 4906->4908 4909 403f21 4907->4909 4910 403f50 4907->4910 4908->4906 4908->4909 4909->4910 4911 403f58 __WSAFDIsSet 4909->4911 4910->4895 4910->4898 4910->4900 4910->4903 4911->4910 4912->4903 5195 4010db 5196 4011b2 5195->5196 5197 403f73 10 API calls 5196->5197 5198 4011bd 5197->5198 5199 401d5c 5202 40d9f6 5199->5202 5203 411e38 malloc 5202->5203 5204 40da10 EnumWindows 5203->5204 5205 40da2a 5204->5205 5206 403f73 10 API calls 5205->5206 5207 40da48 5206->5207 5208 411e7d free 5207->5208 5209 401d67 5208->5209 5210 4011de malloc 5211 40152e 5210->5211 5212 4011f4 5210->5212 5213 40129e getenv 5212->5213 5214 40b003 _vsnprintf 5213->5214 5215 4012d0 5214->5215 5216 4053e4 2 API calls 5215->5216 5216->5211 5217 40a8e1 5226 40a764 5217->5226 5220 40a8f2 strlen 5221 40a907 5220->5221 5222 403f73 10 API calls 5221->5222 5223 40abdb 5222->5223 5224 40abef 5223->5224 5225 405434 free 5223->5225 5225->5224 5231 40a3ff malloc 5226->5231 5229 40a79e 5229->5220 5229->5221 5232 40a428 malloc 5231->5232 5234 40a41f 5231->5234 5233 40a446 SHGetSpecialFolderLocation 5232->5233 5232->5234 5235 40a479 5233->5235 5236 40a46c 5233->5236 5234->5229 5249 40a534 5234->5249 5237 405434 free 5235->5237 5238 40a474 5236->5238 5239 40a47e SHGetPathFromIDListA 5236->5239 5240 40a51c 5237->5240 5238->5235 5241 40a4c8 SHGetPathFromIDListA 5238->5241 5239->5235 5242 40a4a3 5239->5242 5243 405434 free 5240->5243 5241->5235 5245 40a4ed 5241->5245 5244 40b003 _vsnprintf 5242->5244 5246 40a527 5243->5246 5244->5235 5247 40b003 _vsnprintf 5245->5247 5248 404a4e GetFileAttributesA 5246->5248 5247->5235 5248->5234 5250 405524 13 API calls 5249->5250 5254 40a55c 5250->5254 5251 40a570 5251->5229 5252 40a5ac 5253 405434 free 5252->5253 5253->5251 5254->5251 5254->5252 5257 40a0de 5254->5257 5264 40b32b 5254->5264 5261 40a10a 5257->5261 5258 40a3ef 5258->5254 5259 40a1df CryptUnprotectData 5259->5261 5260 40a2fb LocalFree 5260->5261 5261->5258 5261->5259 5261->5260 5263 40b32b 2 API calls 5261->5263 5275 40afb0 _vscprintf 5261->5275 5263->5261 5265 40b348 5264->5265 5266 40b38c 5265->5266 5267 40b3b1 5265->5267 5268 40b39a 5265->5268 5266->5254 5269 40b3b8 5267->5269 5270 40b3cf realloc 5267->5270 5268->5266 5271 405434 free 5268->5271 5269->5266 5272 405434 free 5269->5272 5270->5266 5273 40b3e4 5270->5273 5271->5266 5272->5266 5273->5266 5274 405434 free 5273->5274 5274->5266 5276 40afd3 malloc 5275->5276 5277 40afce 5275->5277 5276->5277 5278 40afe8 _vsnprintf 5276->5278 5277->5261 5278->5277 5279 401ae2 5280 4049ec 3 API calls 5279->5280 5281 401aea 5280->5281 5282 410065 5283 410178 PostQuitMessage 5282->5283 5284 41007f 5282->5284 5288 41008f 5283->5288 5285 4100e6 5284->5285 5286 410086 5284->5286 5285->5288 5289 410114 malloc 5285->5289 5287 410193 DefWindowProcA 5286->5287 5286->5288 5287->5288 5289->5288 5291 410126 5289->5291 5290 41016b 5292 405434 free 5290->5292 5291->5290 5294 40fd55 GetKeyState GetKeyState GetKeyState GetKeyboardState 5291->5294 5292->5288 5295 40fdcd 5294->5295 5297 40fda2 5294->5297 5296 40b003 _vsnprintf 5295->5296 5299 40ff32 5296->5299 5297->5295 5298 410050 5297->5298 5300 40ff37 MapVirtualKeyA ToAscii 5297->5300 5298->5290 5299->5298 5309 40fc8c GetForegroundWindow 5299->5309 5302 40ff71 GetKeyState 5300->5302 5303 40ffab MapVirtualKeyA GetKeyNameTextA 5300->5303 5307 40ff94 5302->5307 5303->5298 5306 40ffe1 GetKeyState 5303->5306 5305 40facc 12 API calls 5305->5298 5306->5307 5308 40b003 _vsnprintf 5307->5308 5308->5299 5310 40fd50 5309->5310 5311 40fca7 GetLocalTime GetWindowTextA 5309->5311 5310->5305 5311->5310 5312 40fce1 5311->5312 5313 40b003 _vsnprintf 5312->5313 5314 40fd45 5313->5314 5315 40facc 12 API calls 5314->5315 5315->5310 5316 401f65 5319 4120d4 5316->5319 5320 411e38 malloc 5319->5320 5321 4120f6 5320->5321 5364 405455 LoadLibraryA 5321->5364 5323 412102 5365 405469 GetProcAddress 5323->5365 5325 412112 5366 405455 LoadLibraryA 5325->5366 5327 412120 5367 405469 GetProcAddress 5327->5367 5329 412130 5368 405455 LoadLibraryA 5329->5368 5331 412142 5369 405469 GetProcAddress 5331->5369 5333 412152 5337 412172 5333->5337 5370 405455 LoadLibraryA 5333->5370 5335 412162 5371 405469 GetProcAddress 5335->5371 5338 412447 5337->5338 5341 4121d8 malloc 5337->5341 5342 41223f 5337->5342 5339 403f73 10 API calls 5338->5339 5340 412586 5339->5340 5343 411e7d free 5340->5343 5341->5338 5344 4121f4 5341->5344 5342->5338 5346 4123dc malloc 5342->5346 5345 401f70 5343->5345 5347 412224 5344->5347 5348 412250 htons inet_ntoa 5344->5348 5360 40b003 _vsnprintf 5344->5360 5362 411f24 realloc 5344->5362 5372 412014 5344->5372 5346->5338 5358 4123f8 5346->5358 5347->5342 5349 405434 free 5347->5349 5350 40b003 _vsnprintf 5348->5350 5349->5342 5351 4122a3 htons inet_ntoa 5350->5351 5353 40b003 _vsnprintf 5351->5353 5352 41242c 5352->5338 5354 405434 free 5352->5354 5353->5344 5354->5338 5355 41245e htons inet_ntoa 5356 40b003 _vsnprintf 5355->5356 5356->5358 5358->5352 5358->5355 5359 412014 4 API calls 5358->5359 5361 40b003 _vsnprintf 5358->5361 5363 411f24 realloc 5358->5363 5359->5358 5360->5344 5361->5358 5362->5344 5363->5358 5364->5323 5365->5325 5366->5327 5367->5329 5368->5331 5369->5333 5370->5335 5371->5337 5373 41203a 5372->5373 5374 412051 CreateToolhelp32Snapshot 5373->5374 5375 41206d Process32First 5374->5375 5376 4120cc 5374->5376 5377 412089 5375->5377 5376->5344 5378 4120c3 CloseHandle 5377->5378 5379 4120b5 Process32Next 5377->5379 5380 41209a 5377->5380 5378->5376 5379->5377 5380->5378 5381 4018e6 5386 410512 5381->5386 5384 40b003 _vsnprintf 5385 401914 5384->5385 5387 410525 5386->5387 5388 4018ee 5387->5388 5389 40b003 _vsnprintf 5387->5389 5388->5384 5390 41055d 5389->5390 5392 404be8 GetFileAttributesExA 5390->5392 5393 404c0f 5392->5393 5393->5388 5394 401ee6 5395 401eee 5394->5395 5398 40acb7 5395->5398 5399 40acf3 5398->5399 5400 40acdc 5398->5400 5504 408620 5399->5504 5401 40ace1 5400->5401 5402 40acfe 5400->5402 5417 406e5a 5401->5417 5406 406e5a 38 API calls 5402->5406 5405 40aced 5408 40ad68 5405->5408 5409 40ad58 strlen 5405->5409 5407 40ad0a 5406->5407 5410 408620 16 API calls 5407->5410 5412 403f73 10 API calls 5408->5412 5409->5408 5411 40ad13 5410->5411 5413 40b32b 2 API calls 5411->5413 5414 40ad8d 5412->5414 5413->5405 5415 401f09 5414->5415 5416 405434 free 5414->5416 5416->5415 5418 406e80 5417->5418 5419 406f53 5417->5419 5421 407014 5418->5421 5422 406e89 5418->5422 5420 406a02 11 API calls 5419->5420 5424 406f6a 5420->5424 5423 406a02 11 API calls 5421->5423 5456 406f49 5422->5456 5515 406a02 5422->5515 5427 40702b 5423->5427 5428 406f7b getenv 5424->5428 5453 406eb0 5424->5453 5426 40b003 _vsnprintf 5431 4070fc 5426->5431 5432 40703c getenv 5427->5432 5427->5453 5430 40b003 _vsnprintf 5428->5430 5434 406faa 5430->5434 5435 40b003 _vsnprintf 5431->5435 5436 40b003 _vsnprintf 5432->5436 5433 406eba getenv 5438 40b003 _vsnprintf 5433->5438 5437 406764 3 API calls 5434->5437 5439 407126 5435->5439 5440 40706b 5436->5440 5442 406fcc 5437->5442 5443 406ee9 5438->5443 5533 405469 GetProcAddress 5439->5533 5441 406764 3 API calls 5440->5441 5445 40708d 5441->5445 5446 406fd0 getenv 5442->5446 5447 406f4e 5442->5447 5526 406764 5443->5526 5445->5447 5450 407091 getenv 5445->5450 5451 40b003 _vsnprintf 5446->5451 5545 4069c9 5447->5545 5449 40713d 5449->5453 5534 405469 GetProcAddress 5449->5534 5455 40b003 _vsnprintf 5450->5455 5451->5456 5453->5405 5455->5456 5456->5426 5457 406f0f getenv 5460 40b003 _vsnprintf 5457->5460 5459 40716f 5459->5453 5535 405469 GetProcAddress 5459->5535 5460->5456 5462 4071a1 5462->5453 5536 405469 GetProcAddress 5462->5536 5464 4071d3 5464->5453 5537 405469 GetProcAddress 5464->5537 5466 407205 5466->5453 5538 405469 GetProcAddress 5466->5538 5468 407237 5468->5453 5539 405469 GetProcAddress 5468->5539 5470 407269 5470->5453 5540 405469 GetProcAddress 5470->5540 5472 40729b 5472->5453 5541 405469 GetProcAddress 5472->5541 5474 4072cd 5474->5453 5542 405469 GetProcAddress 5474->5542 5476 4072ff 5476->5453 5543 405469 GetProcAddress 5476->5543 5478 407331 5478->5453 5544 405469 GetProcAddress 5478->5544 5480 407363 5480->5453 5481 404a4e GetFileAttributesA 5480->5481 5497 40738d 5481->5497 5482 4076f4 5483 404a4e GetFileAttributesA 5482->5483 5484 40772f 5483->5484 5484->5447 5485 407737 fopen 5484->5485 5485->5447 5486 407764 5485->5486 5487 404be8 GetFileAttributesExA 5486->5487 5488 407773 malloc 5487->5488 5489 407795 fclose 5488->5489 5490 4077a9 fread fclose 5488->5490 5489->5447 5495 4077f5 5490->5495 5491 405434 free 5491->5447 5492 4074d0 strlen 5492->5497 5493 4078a5 5493->5491 5494 406d6d strlen 5494->5495 5495->5493 5495->5494 5496 407923 strlen 5495->5496 5499 4079c9 strlen 5495->5499 5502 40afb0 3 API calls 5495->5502 5503 40b32b 2 API calls 5495->5503 5496->5495 5497->5453 5497->5482 5497->5492 5498 4075a6 strlen 5497->5498 5500 40afb0 3 API calls 5497->5500 5501 40b32b 2 API calls 5497->5501 5498->5497 5499->5495 5500->5497 5501->5497 5502->5495 5503->5495 5571 4080d4 RegOpenKeyExA 5504->5571 5507 408697 5509 4080d4 14 API calls 5507->5509 5508 40865b strlen 5510 40b32b 2 API calls 5508->5510 5511 4086af 5509->5511 5510->5507 5512 4086bb strlen 5511->5512 5514 4086f7 5511->5514 5513 40b32b 2 API calls 5512->5513 5513->5514 5514->5405 5549 4068db 5515->5549 5517 406a30 5518 406ac0 LoadLibraryA 5517->5518 5520 40b003 _vsnprintf 5517->5520 5521 406a37 5517->5521 5522 406b0b LoadLibraryA 5517->5522 5523 406b56 LoadLibraryA 5517->5523 5524 406ba1 LoadLibraryA 5517->5524 5525 404a4e GetFileAttributesA 5517->5525 5559 405455 LoadLibraryA 5517->5559 5518->5517 5520->5517 5521->5433 5521->5453 5522->5517 5523->5517 5524->5517 5525->5517 5566 40b24e 5526->5566 5529 4067c0 fread 5531 4068bd fclose 5529->5531 5532 4067ef 5529->5532 5530 4068cc 5530->5447 5530->5457 5531->5530 5532->5531 5533->5449 5534->5459 5535->5462 5536->5464 5537->5466 5538->5468 5539->5470 5540->5472 5541->5474 5542->5476 5543->5478 5544->5480 5546 4069d6 5545->5546 5547 4069fd 5546->5547 5568 405485 5546->5568 5547->5453 5550 406903 5549->5550 5551 40b003 _vsnprintf 5550->5551 5552 40692a 5551->5552 5560 410874 RegOpenKeyExA 5552->5560 5555 4069bb 5555->5517 5556 40b003 _vsnprintf 5557 406989 5556->5557 5558 410874 4 API calls 5557->5558 5558->5555 5559->5517 5561 4108b2 RegQueryValueExA 5560->5561 5562 406956 5560->5562 5563 410920 RegCloseKey 5561->5563 5564 4108e7 5561->5564 5562->5555 5562->5556 5563->5562 5564->5563 5565 4108ef RegQueryValueExA 5564->5565 5565->5563 5567 406794 fopen 5566->5567 5567->5529 5567->5530 5569 405492 FreeLibrary 5568->5569 5570 40549b 5568->5570 5569->5570 5570->5546 5572 40861b 5571->5572 5580 408143 5571->5580 5572->5507 5572->5508 5573 4085b9 RegEnumKeyExA 5574 40860d RegCloseKey 5573->5574 5573->5580 5574->5572 5575 40b003 _vsnprintf 5576 40817b RegOpenKeyExA 5575->5576 5576->5580 5577 4085a1 RegCloseKey 5577->5580 5578 407eec RegQueryValueExA 5578->5580 5579 40847a CryptUnprotectData 5579->5580 5580->5573 5580->5575 5580->5577 5580->5578 5580->5579 5581 40afb0 3 API calls 5580->5581 5582 408501 LocalFree 5580->5582 5583 40b32b 2 API calls 5580->5583 5581->5580 5582->5580 5583->5580 5587 40d3e7 5588 40d3f5 5587->5588 5589 40d56a 5588->5589 5590 40d40c 5588->5590 5591 40d6b4 fopen 5589->5591 5592 40d577 5589->5592 5593 40d413 fopen 5590->5593 5625 40d67e 5590->5625 5594 40d6ce 5591->5594 5599 40d545 5591->5599 5595 40b003 _vsnprintf 5592->5595 5596 40d429 5593->5596 5597 40d47f fopen 5593->5597 5601 40d02c fclose 5594->5601 5602 40d5a7 5595->5602 5603 40549d 4 API calls 5596->5603 5597->5599 5600 40d469 5597->5600 5598 405434 free 5604 40d8aa 5598->5604 5611 403f73 10 API calls 5599->5611 5605 40d02c fclose 5600->5605 5606 40d6e8 5601->5606 5607 403f73 10 API calls 5602->5607 5608 40d449 fgetpos 5603->5608 5609 40d4d1 5605->5609 5610 40b003 _vsnprintf 5606->5610 5621 40d5cf 5607->5621 5608->5600 5612 40549d 4 API calls 5609->5612 5613 40d72d 5610->5613 5611->5625 5614 40d507 5612->5614 5615 403f73 10 API calls 5613->5615 5618 40b003 _vsnprintf 5614->5618 5620 40d755 5615->5620 5616 40d63a 5619 403f73 10 API calls 5616->5619 5617 403f73 10 API calls 5617->5621 5618->5599 5622 40d66a 5619->5622 5623 40549d 4 API calls 5620->5623 5621->5616 5621->5617 5633 4053d0 Sleep 5621->5633 5624 405434 free 5622->5624 5630 40d784 5623->5630 5624->5625 5625->5598 5626 40d79f 5628 40d02c fclose 5626->5628 5628->5599 5629 40d7e1 fread 5629->5626 5629->5630 5630->5626 5630->5629 5631 403f73 10 API calls 5630->5631 5634 4053d0 Sleep 5630->5634 5631->5630 5633->5621 5634->5630 5635 401d6c 5638 40dab0 5635->5638 5639 40db62 5638->5639 5640 40dacc 5638->5640 5642 40db84 ShowWindow 5639->5642 5641 40dae8 5640->5641 5643 40dace 5640->5643 5641->5639 5646 40daf0 5641->5646 5644 401d74 5642->5644 5643->5644 5648 40d9cb SendMessageA 5643->5648 5646->5644 5647 40db54 SetWindowTextA 5646->5647 5647->5644 5648->5644 5649 4065ed SetCursorPos 5650 406610 5649->5650 5651 406695 mouse_event 5650->5651 5652 40669d 5650->5652 5651->5652 5653 4012f3 5654 40b5cd getenv 5653->5654 5655 40130d 5654->5655 5658 40c118 5655->5658 5659 404a4e GetFileAttributesA 5658->5659 5660 40c12f 5659->5660 5661 40c1fc 5660->5661 5675 40536b fopen 5660->5675 5663 403f73 10 API calls 5661->5663 5664 40131c 5663->5664 5665 40c13f 5665->5661 5666 40c17d CreateProcessA 5665->5666 5666->5661 5667 40c1cc 5666->5667 5668 40c5ec 2 API calls 5667->5668 5669 40c1d1 5668->5669 5670 403b94 2 API calls 5669->5670 5671 40c1dc ResumeThread 5670->5671 5672 40c1f7 5671->5672 5673 40c1eb ExitProcess 5671->5673 5674 40c5ab 2 API calls 5672->5674 5674->5661 5676 4053c9 5675->5676 5677 405389 fread 5675->5677 5676->5665 5678 4053b1 fclose 5677->5678 5679 4053b8 fclose 5677->5679 5678->5676 5679->5676 5680 401f75 5681 401f92 5680->5681 5684 411053 5681->5684 5685 40b003 _vsnprintf 5684->5685 5686 411098 5685->5686 5687 411e38 malloc 5686->5687 5688 4110ac 5687->5688 5689 411f24 realloc 5688->5689 5690 4110c0 5689->5690 5701 410b14 RegOpenKeyExA 5690->5701 5693 411f24 realloc 5694 4110ec 5693->5694 5708 410c22 5694->5708 5695 403f73 10 API calls 5697 411141 5695->5697 5699 411e7d free 5697->5699 5698 4110fc 5698->5695 5700 401fab 5699->5700 5702 410c18 5701->5702 5706 410b59 5701->5706 5702->5693 5702->5698 5703 410b71 RegEnumKeyExA 5704 410c07 RegCloseKey 5703->5704 5703->5706 5704->5702 5705 40b003 _vsnprintf 5705->5706 5706->5703 5706->5705 5707 411f24 realloc 5706->5707 5707->5706 5726 412854 5708->5726 5710 410c32 RegOpenKeyExA 5711 410c77 5710->5711 5712 411049 5710->5712 5713 410c87 RegEnumValueA 5711->5713 5715 410eeb RegQueryValueExA 5711->5715 5716 410dba RegQueryValueExA 5711->5716 5717 410e3e RegQueryValueExA 5711->5717 5720 410d25 RegQueryValueExA 5711->5720 5721 405434 free 5711->5721 5722 40b003 _vsnprintf 5711->5722 5724 40afb0 3 API calls 5711->5724 5725 411f24 realloc 5711->5725 5728 40b7b6 5711->5728 5712->5698 5713->5711 5714 411038 RegCloseKey 5713->5714 5714->5712 5715->5711 5718 410f24 malloc 5715->5718 5716->5711 5717->5711 5718->5711 5719 410f40 RegQueryValueExA 5718->5719 5719->5711 5720->5711 5721->5711 5722->5711 5724->5711 5725->5711 5727 412861 5726->5727 5727->5710 5727->5727 5729 40b7cd malloc 5728->5729 5730 40b7c9 5728->5730 5729->5730 5730->5711 5731 401cf6 5734 406199 WriteFile 5731->5734 5733 401d02 5734->5733 5735 403877 send 5736 4038d5 5735->5736 5743 4038ce 5735->5743 5737 4038f3 recv 5736->5737 5738 403917 5737->5738 5737->5743 5739 40397a htons 5738->5739 5738->5743 5744 40b30f 5739->5744 5742 4039d2 recv 5742->5743 5745 4039af send 5744->5745 5745->5742 5745->5743 5746 4010f8 5764 40f834 5746->5764 5748 40110e 5749 4011c2 5748->5749 5750 401116 5748->5750 5784 4053d0 Sleep 5749->5784 5771 40b8a9 getenv 5750->5771 5753 401138 5774 40b840 5753->5774 5754 4011ce 5755 403b94 2 API calls 5754->5755 5757 4011bd 5755->5757 5758 401148 5779 40bc50 5758->5779 5761 40b003 _vsnprintf 5762 4011a2 5761->5762 5763 403f73 10 API calls 5762->5763 5763->5757 5765 40f859 5764->5765 5766 40f875 5765->5766 5768 40f886 5765->5768 5767 403b94 2 API calls 5766->5767 5769 40f881 5767->5769 5768->5769 5770 403f73 10 API calls 5768->5770 5769->5748 5770->5769 5772 40b8c7 GetUserNameA 5771->5772 5773 40b8df 5771->5773 5772->5773 5773->5753 5775 40b24e 5774->5775 5776 40b862 gethostname 5775->5776 5777 40b88e 5776->5777 5778 40b876 GetComputerNameA 5776->5778 5777->5758 5778->5777 5785 40b904 5779->5785 5781 40bc58 5782 40b003 _vsnprintf 5781->5782 5783 401158 5782->5783 5783->5761 5784->5754 5786 40b24e 5785->5786 5787 40b92d GetVersionExA 5786->5787 5788 40b974 GetVersionExA 5787->5788 5789 40b947 5787->5789 5788->5789 5798 40b9b4 5788->5798 5801 405455 LoadLibraryA 5789->5801 5791 40b953 5802 405469 GetProcAddress 5791->5802 5793 40b963 5794 40b991 GetSystemInfo 5793->5794 5795 40b96d 5793->5795 5794->5795 5796 40bb1b RegOpenKeyExA 5795->5796 5799 40b9a2 5795->5799 5797 40bb5e RegQueryValueExA RegCloseKey 5796->5797 5796->5798 5797->5798 5798->5781 5799->5798 5800 40baa7 GetSystemMetrics 5799->5800 5800->5798 5801->5791 5802->5793 5807 401d79 malloc 5808 401d8f 5807->5808 5810 401e21 5807->5810 5809 40b5cd getenv 5808->5809 5809->5810 5811 4056fc 5812 40b003 _vsnprintf 5811->5812 5813 405748 5812->5813 5814 40576a 5813->5814 5815 403f73 10 API calls 5813->5815 5815->5814 5816 401580 malloc 5817 401596 5816->5817 5824 40164e 5816->5824 5818 401688 5817->5818 5819 4015db 5817->5819 5822 404be8 GetFileAttributesExA 5818->5822 5820 40b5cd getenv 5819->5820 5819->5824 5821 401620 5820->5821 5823 405072 2 API calls 5821->5823 5822->5824 5823->5824 5825 40d282 5826 40d2a0 5825->5826 5827 40d294 5825->5827 5829 40d02c fclose 5826->5829 5828 40d29b 5827->5828 5859 405050 CreateDirectoryA 5827->5859 5833 405434 free 5828->5833 5831 40d2af 5829->5831 5834 411e38 malloc 5831->5834 5832 40d390 5835 404a77 GetFileAttributesA 5832->5835 5836 40d3e2 5833->5836 5837 40d2ce 5834->5837 5838 40d39c 5835->5838 5839 411f24 realloc 5837->5839 5842 403f73 10 API calls 5838->5842 5840 40d2eb 5839->5840 5847 40d088 SetErrorMode 5840->5847 5842->5828 5843 403f73 10 API calls 5845 40d37e 5843->5845 5844 40d306 5844->5843 5846 411e7d free 5845->5846 5846->5828 5848 40b003 _vsnprintf 5847->5848 5849 40d0cf 5848->5849 5850 40d0d6 FindFirstFileA 5849->5850 5851 40d27a 5849->5851 5850->5851 5854 40d0f5 5850->5854 5851->5844 5852 40d243 FindNextFileA 5853 40d271 FindClose 5852->5853 5852->5854 5853->5851 5854->5852 5854->5853 5855 411f24 realloc 5854->5855 5856 40b003 _vsnprintf 5854->5856 5857 411f24 realloc 5854->5857 5858 40d088 2 API calls 5854->5858 5855->5854 5856->5854 5857->5852 5858->5854 5859->5832 5860 401382 malloc 5861 401398 5860->5861 5868 40152e 5860->5868 5862 401473 getenv 5861->5862 5863 4014aa getenv 5861->5863 5864 40b003 _vsnprintf 5862->5864 5865 40b003 _vsnprintf 5863->5865 5866 4014a8 5864->5866 5865->5866 5867 4053e4 2 API calls 5866->5867 5867->5868 5869 402183 5870 40218e 5869->5870 5872 412598 5869->5872 5873 411e38 malloc 5872->5873 5874 4125c0 SetErrorMode GetLogicalDriveStringsA 5873->5874 5875 41261c 5874->5875 5876 4125e3 5874->5876 5875->5876 5878 41265d GetVolumeInformationA 5875->5878 5880 4126d8 GetDiskFreeSpaceExA 5875->5880 5883 41274c GetDriveTypeA 5875->5883 5885 411f24 realloc 5875->5885 5877 403f73 10 API calls 5876->5877 5879 412842 5877->5879 5878->5875 5878->5880 5881 411e7d free 5879->5881 5880->5875 5882 41284a 5881->5882 5882->5870 5884 40b003 _vsnprintf 5883->5884 5884->5875 5885->5875 5886 401786 5887 40d02c fclose 5886->5887 5888 401791 5887->5888 5889 401d07 5892 40be82 5889->5892 5893 40b8a9 2 API calls 5892->5893 5894 40beaa 5893->5894 5895 40b840 2 API calls 5894->5895 5896 40bec1 5895->5896 5919 40bd0e 5896->5919 5899 40bc50 10 API calls 5900 40beef 5899->5900 5923 40bc7c GetTickCount 5900->5923 5903 4051a9 GetModuleFileNameA 5904 40bf0e 5903->5904 5905 40564e 3 API calls 5904->5905 5906 40bf50 5905->5906 5907 40bf9c getenv getenv 5906->5907 5928 40bd59 5907->5928 5910 40afb0 3 API calls 5911 40c0b1 5910->5911 5912 40c0e6 5911->5912 5913 40c0b6 5911->5913 5915 403f73 10 API calls 5912->5915 5914 403f73 10 API calls 5913->5914 5916 40c0dc 5914->5916 5917 401d12 5915->5917 5918 405434 free 5916->5918 5918->5917 5920 40bd2f 5919->5920 5921 410874 4 API calls 5920->5921 5922 40bd53 5921->5922 5922->5899 5941 405455 LoadLibraryA 5923->5941 5925 40bcc9 5942 405469 GetProcAddress 5925->5942 5927 40bcd9 5927->5903 5943 405455 LoadLibraryA 5928->5943 5930 40bd86 5944 405469 GetProcAddress 5930->5944 5932 40bd96 5945 405455 LoadLibraryA 5932->5945 5934 40bda4 5946 405469 GetProcAddress 5934->5946 5936 40bdb4 5947 405455 LoadLibraryA 5936->5947 5938 40bdc2 5948 405469 GetProcAddress 5938->5948 5940 40bdd2 5940->5910 5941->5925 5942->5927 5943->5930 5944->5932 5945->5934 5946->5936 5947->5938 5948->5940 5949 401b07 5952 405050 CreateDirectoryA 5949->5952 5951 401b0f 5952->5951 5953 40a90c 5962 40a7ac 5953->5962 5956 40a932 5958 403f73 10 API calls 5956->5958 5957 40a91d strlen 5957->5956 5959 40abdb 5958->5959 5960 40abef 5959->5960 5961 405434 free 5959->5961 5961->5960 5963 40a3ff 8 API calls 5962->5963 5964 40a7ce 5963->5964 5965 40a7e6 5964->5965 5966 40a534 19 API calls 5964->5966 5965->5956 5965->5957 5966->5965 5969 40350f 5970 4033a1 2 API calls 5969->5970 5971 40353a 5970->5971 5972 4035b1 send 5971->5972 5977 40353e 5971->5977 5973 4035e0 5972->5973 5972->5977 5974 403604 select 5973->5974 5975 403646 __WSAFDIsSet 5974->5975 5974->5977 5976 40365c recv 5975->5976 5975->5977 5976->5977 5978 404b91 5979 404a9d 11 API calls 5978->5979 5980 404baa 5979->5980 5981 404bc3 5980->5981 5983 4049ec 3 API calls 5980->5983 5982 404be0 5981->5982 5984 405434 free 5981->5984 5983->5981 5984->5982 5985 40da94 SetWindowTextA 5986 401e96 5987 401e9e 5986->5987 5990 40a858 5987->5990 5991 40a891 5990->5991 5992 406e5a 38 API calls 5991->5992 5993 40a9e0 5992->5993 5994 40a764 26 API calls 5993->5994 5995 40a9e9 5994->5995 5996 40aa21 5995->5996 5997 40b32b 2 API calls 5995->5997 5998 40a7ac 26 API calls 5996->5998 5997->5996 5999 40aa2a 5998->5999 6000 40aa62 5999->6000 6001 40b32b 2 API calls 5999->6001 6002 406e5a 38 API calls 6000->6002 6001->6000 6003 40aa72 6002->6003 6004 40aaaa 6003->6004 6005 40b32b 2 API calls 6003->6005 6024 40a7f4 getenv 6004->6024 6005->6004 6008 40aaeb 6010 40ab07 6008->6010 6011 40aaf7 strlen 6008->6011 6009 40b32b 2 API calls 6009->6008 6031 407b77 getenv 6010->6031 6011->6010 6014 40ab4b 6050 409e36 6014->6050 6016 40b32b 2 API calls 6016->6014 6018 40aba1 6020 403f73 10 API calls 6018->6020 6019 40b32b 2 API calls 6019->6018 6021 40abdb 6020->6021 6022 401eb9 6021->6022 6023 405434 free 6021->6023 6023->6022 6025 40b003 _vsnprintf 6024->6025 6026 40a826 6025->6026 6027 404a4e GetFileAttributesA 6026->6027 6028 40a832 6027->6028 6029 40a84a 6028->6029 6030 40a534 19 API calls 6028->6030 6029->6008 6029->6009 6030->6029 6032 40b003 _vsnprintf 6031->6032 6033 407bb6 6032->6033 6034 404a4e GetFileAttributesA 6033->6034 6035 407bc2 6034->6035 6036 407bf5 fopen 6035->6036 6037 407bc9 getenv 6035->6037 6039 407c24 6036->6039 6040 407c1a 6036->6040 6038 40b003 _vsnprintf 6037->6038 6038->6036 6041 404be8 GetFileAttributesExA 6039->6041 6040->6014 6040->6016 6042 407c38 6041->6042 6043 407d10 fclose 6042->6043 6044 407c4d malloc 6042->6044 6043->6040 6044->6043 6045 407c6f fread 6044->6045 6046 407d04 6045->6046 6047 407cb4 6045->6047 6048 405434 free 6046->6048 6049 407cdc fclose 6047->6049 6048->6043 6049->6040 6067 408d46 LoadLibraryA GetProcAddress GetProcAddress 6050->6067 6053 409e80 strlen 6055 40b32b 2 API calls 6053->6055 6054 409ece 6056 410874 4 API calls 6054->6056 6055->6054 6057 409f17 6056->6057 6058 409f37 6057->6058 6074 40947b SetErrorMode 6057->6074 6059 409f3f strlen 6058->6059 6063 409f87 6058->6063 6061 40b32b 2 API calls 6059->6061 6061->6063 6087 409681 LoadLibraryA 6063->6087 6065 409fec 6065->6018 6065->6019 6066 40b32b 2 API calls 6066->6065 6072 408da3 6067->6072 6068 408f7d 6068->6053 6068->6054 6069 408e53 CryptUnprotectData 6070 408ec3 strlen 6069->6070 6069->6072 6070->6072 6071 40afb0 3 API calls 6071->6072 6072->6068 6072->6069 6072->6071 6073 40b32b 2 API calls 6072->6073 6073->6072 6075 40b003 _vsnprintf 6074->6075 6076 4094b8 6075->6076 6077 4094c2 FindFirstFileA 6076->6077 6078 4094bd 6076->6078 6077->6078 6079 4094ea 6077->6079 6078->6058 6080 409650 FindNextFileA 6079->6080 6082 40947b 26 API calls 6079->6082 6083 40b003 _vsnprintf 6079->6083 6085 4095fd strlen 6079->6085 6107 408f96 fopen 6079->6107 6080->6079 6081 409670 FindClose 6080->6081 6081->6078 6082->6079 6083->6079 6086 40b32b 2 API calls 6085->6086 6086->6079 6088 409773 6087->6088 6089 40977d 6 API calls 6087->6089 6088->6065 6088->6066 6090 40985a 6089->6090 6092 40985f 6089->6092 6090->6088 6091 409e16 FreeLibrary 6090->6091 6091->6088 6092->6090 6093 40b904 9 API calls 6092->6093 6094 4098cd 6093->6094 6095 40b904 9 API calls 6094->6095 6101 4098e0 6094->6101 6096 4098d7 6095->6096 6096->6101 6105 409b6f 6096->6105 6097 409927 WideCharToMultiByte WideCharToMultiByte WideCharToMultiByte 6097->6101 6098 409a6e WideCharToMultiByte 6100 40afb0 3 API calls 6098->6100 6099 409bab WideCharToMultiByte WideCharToMultiByte WideCharToMultiByte 6099->6105 6100->6101 6101->6090 6101->6097 6101->6098 6103 40b32b 2 API calls 6101->6103 6102 409cea WideCharToMultiByte 6104 40afb0 3 API calls 6102->6104 6103->6101 6104->6105 6105->6090 6105->6099 6105->6102 6106 40b32b 2 API calls 6105->6106 6106->6105 6108 408fd3 6107->6108 6109 408fc9 6107->6109 6126 408758 6108->6126 6109->6079 6111 408ff5 6111->6109 6112 408758 5 API calls 6111->6112 6113 40903e 6112->6113 6113->6109 6114 409062 RegOpenKeyExA 6113->6114 6114->6109 6122 4090a1 6114->6122 6115 4090db 6116 409465 6115->6116 6117 409457 RegCloseKey 6115->6117 6116->6109 6118 40946b fclose 6116->6118 6117->6116 6118->6109 6119 408758 fgetpos fflush _filelengthi64 fsetpos fread 6119->6122 6122->6115 6122->6119 6123 40afb0 _vscprintf malloc _vsnprintf 6122->6123 6124 408971 10 API calls 6122->6124 6125 40b32b free realloc 6122->6125 6131 408bb7 6122->6131 6138 408b3b 6122->6138 6123->6122 6124->6122 6125->6122 6127 40549d 4 API calls 6126->6127 6128 40877c 6127->6128 6129 408780 6128->6129 6130 408787 fread 6128->6130 6129->6111 6130->6129 6132 408758 5 API calls 6131->6132 6134 408bea 6132->6134 6133 408758 5 API calls 6133->6134 6134->6133 6136 408bf1 6134->6136 6137 408c6f 6134->6137 6135 408758 5 API calls 6135->6137 6136->6122 6137->6135 6137->6136 6139 40b24e 6138->6139 6140 408b5a strlen 6139->6140 6141 408ba0 strlen 6140->6141 6142 408bb2 6141->6142 6143 408b7c 6141->6143 6142->6122 6143->6141 6144 401d17 6147 410570 6144->6147 6148 411e38 malloc 6147->6148 6149 410592 6148->6149 6150 410596 6149->6150 6151 4105be LoadLibraryA 6149->6151 6152 403f73 10 API calls 6150->6152 6153 4105d5 GetProcAddress GetProcAddress GetProcAddress 6151->6153 6155 410766 6151->6155 6154 401d22 6152->6154 6153->6155 6161 410621 6153->6161 6156 403f73 10 API calls 6155->6156 6157 4107b2 6156->6157 6158 411e7d free 6157->6158 6158->6154 6159 41067d FileTimeToSystemTime 6160 40b003 _vsnprintf 6159->6160 6160->6161 6161->6155 6161->6159 6162 411f24 realloc 6161->6162 6162->6161 6163 40a89a 6164 409e36 67 API calls 6163->6164 6165 40a8a6 6164->6165 6166 403f73 10 API calls 6165->6166 6167 40abdb 6166->6167 6168 40abef 6167->6168 6169 405434 free 6167->6169 6169->6168 6170 401321 6171 403b94 2 API calls 6170->6171 6172 40132c 6171->6172 6173 401000 2 API calls 6172->6173 6174 401331 6173->6174 6177 4053d0 Sleep 6174->6177 6176 40133d 6177->6176 6187 4036a6 6188 4036d3 6187->6188 6196 4036cc 6187->6196 6189 4036f7 htons 6188->6189 6190 403739 6189->6190 6191 403790 send 6190->6191 6192 4037c1 6191->6192 6191->6196 6193 4037e5 select 6192->6193 6194 403827 __WSAFDIsSet 6193->6194 6193->6196 6195 40383d recv 6194->6195 6194->6196 6195->6196 6197 401726 malloc 6198 40173c 6197->6198 6199 40c227 6209 40578a 6199->6209 6202 40c258 6205 403f73 10 API calls 6202->6205 6203 40c23e 6204 40c118 24 API calls 6203->6204 6206 40c256 6204->6206 6205->6206 6207 405434 free 6206->6207 6208 40c28a 6207->6208 6210 40579a 6209->6210 6211 4057d4 socket 6210->6211 6212 4033a1 2 API calls 6211->6212 6213 405817 6212->6213 6214 40581f connect 6213->6214 6217 405840 6213->6217 6215 40584c 6214->6215 6214->6217 6216 40b003 _vsnprintf 6215->6216 6218 40587b send 6216->6218 6219 405434 free 6217->6219 6218->6217 6220 4058a2 6218->6220 6221 405a40 6219->6221 6222 4058ba recv 6220->6222 6223 403b94 2 API calls 6221->6223 6222->6217 6225 4058f1 6222->6225 6224 405a4e 6223->6224 6224->6202 6224->6203 6225->6217 6226 405934 fopen 6225->6226 6226->6217 6227 405960 fwrite 6226->6227 6228 405982 recv 6227->6228 6229 4059da fclose 6228->6229 6230 4059ad fwrite 6228->6230 6229->6217 6231 4059ee 6229->6231 6230->6228 6232 4059c9 fclose 6230->6232 6233 40491c 3 API calls 6231->6233 6232->6217 6233->6217 6234 401d27 6237 405a58 CreateToolhelp32Snapshot 6234->6237 6238 405a81 Process32First 6237->6238 6239 405aac 6237->6239 6240 405aa3 CloseHandle 6238->6240 6241 405ad4 6238->6241 6242 403f73 10 API calls 6239->6242 6240->6239 6244 411e38 malloc 6241->6244 6243 401d32 6242->6243 6245 405aea 6244->6245 6267 405455 LoadLibraryA 6245->6267 6247 405af6 6268 405469 GetProcAddress 6247->6268 6249 405b06 6250 405b2a OpenProcess 6249->6250 6269 405455 LoadLibraryA 6249->6269 6259 405b28 6250->6259 6252 405b18 6270 405469 GetProcAddress 6252->6270 6253 405ba0 GetProcessTimes 6253->6259 6255 405bdd FileTimeToSystemTime 6256 40b003 _vsnprintf 6255->6256 6256->6259 6257 405c80 CloseHandle 6257->6259 6258 40b003 _vsnprintf 6258->6259 6259->6250 6259->6253 6259->6255 6259->6257 6259->6258 6260 405ce9 Process32Next 6259->6260 6261 411f24 realloc 6259->6261 6260->6250 6262 405d05 CloseHandle 6260->6262 6261->6260 6263 405d1d 6262->6263 6264 403f73 10 API calls 6263->6264 6265 405d60 6264->6265 6266 411e7d free 6265->6266 6266->6243 6267->6247 6268->6249 6269->6252 6270->6259 6273 40e12a 6274 403bd0 13 API calls 6273->6274 6275 40e148 6274->6275 6276 40e1b2 6275->6276 6278 40e173 send 6275->6278 6277 405434 free 6276->6277 6279 40e1bd 6277->6279 6280 40e1a7 6278->6280 6281 40e19c 6278->6281 6283 403b94 2 API calls 6280->6283 6284 40de75 select 6281->6284 6283->6276 6285 40def6 __WSAFDIsSet 6284->6285 6306 40e0ba 6284->6306 6286 40df0e recv 6285->6286 6285->6306 6287 40df3d 6286->6287 6286->6306 6288 40dfe0 recv 6287->6288 6289 40df5a recv 6287->6289 6290 40dfff 6288->6290 6288->6306 6293 40df7a 6289->6293 6289->6306 6291 40e041 htons 6290->6291 6292 4033a1 2 API calls 6291->6292 6292->6293 6294 40e074 6293->6294 6295 40e07e socket 6293->6295 6307 40de3e send 6294->6307 6295->6294 6296 40e0bc connect 6295->6296 6298 40e104 6296->6298 6299 40e0de 6296->6299 6328 40de3e send 6298->6328 6308 40de3e send 6299->6308 6302 40e114 6304 403b94 2 API calls 6302->6304 6303 40e0ee 6309 40db98 malloc 6303->6309 6304->6306 6306->6280 6307->6306 6308->6303 6310 40dc7a 6309->6310 6312 40dbbe 6309->6312 6310->6306 6311 40dc1f select 6311->6312 6312->6310 6312->6311 6313 40dc56 6312->6313 6314 40dc7f __WSAFDIsSet 6312->6314 6320 40dcbe __WSAFDIsSet 6312->6320 6323 40dd7e recv 6312->6323 6324 40dd18 send 6312->6324 6326 40ddb2 send 6312->6326 6327 4053d0 Sleep 6312->6327 6316 405434 free 6313->6316 6314->6313 6315 40dc94 __WSAFDIsSet 6314->6315 6315->6313 6317 40dca9 __WSAFDIsSet 6315->6317 6318 40dc64 6316->6318 6319 40dcdc recv 6317->6319 6317->6320 6321 403b94 2 API calls 6318->6321 6319->6312 6319->6313 6320->6312 6322 40dc6f 6321->6322 6325 403b94 2 API calls 6322->6325 6323->6312 6323->6313 6324->6312 6325->6310 6326->6312 6327->6312 6328->6302 6329 401b2c 6330 405105 3 API calls 6329->6330 6331 401b34 6330->6331 6336 4017ad 6337 4017b5 6336->6337 6340 4065be keybd_event 6337->6340 6339 4017bd 6340->6339 6341 4113af RegOpenKeyExA 6342 4113e0 RegQueryValueExA 6341->6342 6354 41155c 6341->6354 6343 411426 malloc 6342->6343 6344 4114ee RegCloseKey 6342->6344 6343->6344 6345 411442 RegQueryValueExA 6343->6345 6346 411501 6344->6346 6344->6354 6347 411482 RegSetValueExA 6345->6347 6349 41147e 6345->6349 6348 40b003 _vsnprintf 6346->6348 6347->6349 6350 4114c4 RegDeleteValueA 6347->6350 6351 41153d 6348->6351 6352 405434 free 6349->6352 6350->6349 6353 403f73 10 API calls 6351->6353 6351->6354 6352->6344 6353->6354 6355 40a8af 6356 406e5a 38 API calls 6355->6356 6357 40a8bb 6356->6357 6358 40a8c7 strlen 6357->6358 6359 40a8dc 6357->6359 6358->6359 6360 403f73 10 API calls 6359->6360 6361 40abdb 6360->6361 6362 40abef 6361->6362 6363 405434 free 6361->6363 6363->6362 6364 401fb0 6365 401fd9 6364->6365 6368 411154 6365->6368 6369 411173 6368->6369 6385 402181 6368->6385 6370 4112f3 RegOpenKeyExA 6369->6370 6371 4111e2 RegOpenKeyExA 6369->6371 6372 411294 6369->6372 6373 41117a RegCreateKeyExA 6369->6373 6374 411324 RegDeleteValueA RegCloseKey 6370->6374 6370->6385 6376 411213 RegSetValueExA RegCloseKey 6371->6376 6371->6385 6377 41099b 6 API calls 6372->6377 6375 4111cd 6373->6375 6373->6385 6378 411354 6374->6378 6374->6385 6381 40b003 _vsnprintf 6375->6381 6376->6375 6376->6385 6379 4112a7 6377->6379 6380 40b003 _vsnprintf 6378->6380 6382 40b003 _vsnprintf 6379->6382 6379->6385 6383 41128f 6380->6383 6381->6383 6384 4112e6 6382->6384 6383->6385 6386 403f73 10 API calls 6383->6386 6384->6385 6387 403f73 10 API calls 6384->6387 6386->6385 6387->6385 6388 4019b2 6389 4019e2 6388->6389 6390 40491c 3 API calls 6389->6390 6391 401a54 6390->6391 6392 401533 6395 404278 6392->6395 6396 412854 6395->6396 6397 404288 GetLogicalDriveStringsA 6396->6397 6398 4042a9 6397->6398 6399 4042ad 6397->6399 6398->6399 6400 4042d0 GetDriveTypeA 6398->6400 6401 403f73 10 API calls 6399->6401 6400->6398 6402 40153e 6401->6402 6403 40d8b5 6404 40d8d0 6403->6404 6405 40d8d4 fwrite 6404->6405 6406 40d90c 6404->6406 6408 40d930 6405->6408 6409 40d8ff 6405->6409 6407 403f73 10 API calls 6406->6407 6407->6408 6410 40d02c fclose 6409->6410 6410->6406 6411 401d37 6414 405d70 6411->6414 6419 40ae8b 6414->6419 6417 405da4 TerminateProcess CloseHandle 6418 401d3f 6417->6418 6420 405d83 OpenProcess 6419->6420 6420->6417 6420->6418 6421 40a937 6422 407b77 11 API calls 6421->6422 6423 40a943 6422->6423 6424 40a7f4 22 API calls 6423->6424 6425 40a94c 6424->6425 6426 40a994 6425->6426 6427 40b32b 2 API calls 6425->6427 6428 403f73 10 API calls 6426->6428 6427->6426 6429 40abdb 6428->6429 6430 40abef 6429->6430 6431 405434 free 6429->6431 6431->6430 6432 4101b6 6447 405455 LoadLibraryA 6432->6447 6434 4101e0 6448 405469 GetProcAddress 6434->6448 6436 4101f0 6445 41021e 6436->6445 6449 405455 LoadLibraryA 6436->6449 6438 410205 6450 405469 GetProcAddress 6438->6450 6440 410215 6441 410248 RegisterClassExA 6440->6441 6440->6445 6442 41026e CreateWindowExA 6441->6442 6441->6445 6443 4102d5 6442->6443 6442->6445 6444 4102e6 GetMessageA 6443->6444 6444->6445 6446 41030d TranslateMessage DispatchMessageA 6444->6446 6446->6444 6447->6434 6448->6436 6449->6438 6450->6440 6451 40d938 6452 40d94a IsWindowVisible 6451->6452 6453 40d9bd 6451->6453 6452->6453 6454 40d957 SendMessageA 6452->6454 6454->6453 6455 40d980 6454->6455 6456 40b003 _vsnprintf 6455->6456 6457 40d9a6 6456->6457 6457->6453 6458 411f24 realloc 6457->6458 6458->6453 6459 40673b SetCursorPos 6460 401ebe 6461 401ec6 6460->6461 6464 40abf4 6461->6464 6465 40ac20 6464->6465 6466 40ac19 6464->6466 6481 407f34 6465->6481 6467 40ac2b 6466->6467 6468 40ac1e 6466->6468 6493 407d2b getenv 6467->6493 6472 407f34 8 API calls 6468->6472 6470 40ac25 6473 403f73 10 API calls 6470->6473 6474 40ac3b 6472->6474 6475 40ac9e 6473->6475 6476 407d2b 10 API calls 6474->6476 6477 401ee1 6475->6477 6479 405434 free 6475->6479 6478 40ac44 6476->6478 6480 40b32b 2 API calls 6478->6480 6479->6477 6480->6470 6502 405455 LoadLibraryA 6481->6502 6483 407f7e 6491 407f87 6483->6491 6503 405469 GetProcAddress 6483->6503 6485 407f9f 6485->6491 6504 405469 GetProcAddress 6485->6504 6486 405485 FreeLibrary 6487 4080cf 6486->6487 6487->6470 6489 407fc0 6490 40afb0 3 API calls 6489->6490 6489->6491 6492 40b32b 2 API calls 6489->6492 6490->6489 6491->6486 6492->6489 6494 40b003 _vsnprintf 6493->6494 6495 407d65 fopen 6494->6495 6498 407d8e 6495->6498 6501 407df3 6495->6501 6496 407ea8 fgets 6497 407ed2 fclose 6496->6497 6496->6498 6497->6501 6498->6496 6499 40afb0 _vscprintf malloc _vsnprintf 6498->6499 6500 40b32b 2 API calls 6498->6500 6498->6501 6499->6498 6500->6498 6501->6470 6502->6483 6503->6485 6504->6489

                  Control-flow Graph

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: malloc
                  • String ID: :$@$l4A
                  • API String ID: 2803490479-2178790103
                  • Opcode ID: c01c6b881d9ac8b8470f24fb6952675bd9f1e5112ccef34727350d73c34c12fb
                  • Instruction ID: 1f3f5613ae46a8fda796ca92018459f23373324c68ac89057e72aaf1bbb21938
                  • Opcode Fuzzy Hash: c01c6b881d9ac8b8470f24fb6952675bd9f1e5112ccef34727350d73c34c12fb
                  • Instruction Fuzzy Hash: 1D5114B04087049FD711EF26C48425EBBE0FB84748F01C92EE4989B391DBB99549CF8A

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: CriticalExitInitializeProcessSectionStartup
                  • String ID:
                  • API String ID: 3456047655-0
                  • Opcode ID: b51da93ac2a35c519dff18cf7ed19e3aece5704c1db06d64c1cbb7900f679ce5
                  • Instruction ID: 53df392e27ab82d9e8ba401a77cb8ecfe333a1067f07abb08f20a48212b1c3a9
                  • Opcode Fuzzy Hash: b51da93ac2a35c519dff18cf7ed19e3aece5704c1db06d64c1cbb7900f679ce5
                  • Instruction Fuzzy Hash: 41D012B01043045AE7507F69CA067AFB6FC9B42708F40455E68C492242EBBC9495466B

                  Control-flow Graph

                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: Processmalloc$CurrentExit$CountCriticalInitializeSectionStartupThreadTick
                  • String ID:
                  • API String ID: 1809231239-0
                  • Opcode ID: d202bfaaa0f7395042a077b510aef5d9797f00c4ba5a181acd34e80ca12bcee5
                  • Instruction ID: 05636aa61a430d8ec963152c9417be72b9cbf6e83dd1949a670395452f5e5270
                  • Opcode Fuzzy Hash: d202bfaaa0f7395042a077b510aef5d9797f00c4ba5a181acd34e80ca12bcee5
                  • Instruction Fuzzy Hash: E23109B04087408AC710BFA6818521EFBE4AF84758F418A7FF8D8772D2C7BC95468B5B

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 148 4061d0-40621a GetSystemMetrics * 2 GetDesktopWindow 149 406220-406222 148->149 150 40621c-40621e 148->150 152 4064ba-4064c1 149->152 150->149 151 406227-406229 150->151 151->149 153 40622b-40625d GetDC CreateCompatibleDC CreateCompatibleBitmap 151->153 154 406263-406267 153->154 155 406444-406472 ReleaseDC DeleteDC DeleteObject 153->155 154->155 156 40626d-40626f 154->156 155->149 157 406478-40647e 155->157 156->155 158 406275-4062ca SelectObject BitBlt 156->158 157->149 159 406484-4064b8 call 402be6 call 405434 157->159 158->155 160 4062d0-40634e call 40b24e * 2 GetDIBits 158->160 159->152 160->155 169 406354-4063b9 malloc 160->169 169->155 170 4063bf-4063f5 GetDIBits 169->170 171 406430-40643e call 405434 170->171 172 4063f7-40642e call 40b30f * 2 170->172 171->155 172->155
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: BitsCompatibleCreateDeleteMetricsObjectSystem$BitmapDesktopReleaseSelectWindowmalloc
                  • String ID: $($($6$BM
                  • API String ID: 3568129938-2637400849
                  • Opcode ID: daba86b0f2dceafdeb6366a63086dc36ac6efd43da1f5f8ab8dfb6b1bab28fbc
                  • Instruction ID: e333ad8c3a4b8d5fc448373892ab2bce03bccdff13a7120b062623d2927a3613
                  • Opcode Fuzzy Hash: daba86b0f2dceafdeb6366a63086dc36ac6efd43da1f5f8ab8dfb6b1bab28fbc
                  • Instruction Fuzzy Hash: 7381B6B09083059FDB00EFA9D58579EBBF4BF44344F11882EE888EB351E7789994CB56

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 535 40fd55-40fd9c GetKeyState * 3 GetKeyboardState 536 40fda2 535->536 537 40fed8-40fee0 535->537 538 40fe23-40fe26 536->538 539 40fda4-40fda7 536->539 540 40ff1c-40ff32 call 40b003 537->540 541 40feba-40fec2 538->541 542 40fe2c 538->542 543 40fda9-40fdac 539->543 544 40fdda-40fddd 539->544 553 41002c-410034 540->553 541->540 546 40fe58-40fe5b 542->546 547 40fe2e-40fe31 542->547 548 40fdb2-40fdb5 543->548 549 41005e-410064 543->549 550 40ff00-40ff08 544->550 551 40fde3 544->551 558 40fe61 546->558 559 40fef6-40fefe 546->559 554 40fe37 547->554 555 40fece-40fed6 547->555 556 40fea6-40feae 548->556 557 40fdbb-40fdbe 548->557 550->540 560 40fe04-40fe07 551->560 561 40fde5-40fde8 551->561 553->549 570 410036-410052 call 40fc8c call 40facc 553->570 562 40fee2-40feea 554->562 563 40fe3d-40fe40 554->563 555->540 556->540 564 40fdc4-40fdc7 557->564 565 40fe9c-40fea4 557->565 566 40fe63-40fe66 558->566 567 40fe7e-40fe81 558->567 559->540 571 40ff14 560->571 572 40fe0d-40fe10 560->572 568 40ff0a-40ff12 561->568 569 40fdee-40fdf1 561->569 562->540 575 40feb0-40feb8 563->575 576 40fe42-40fe45 563->576 574 40ff37-40ff6f MapVirtualKeyA ToAscii 564->574 577 40fdcd-40fdd5 564->577 565->540 578 40fec4-40fecc 566->578 579 40fe68-40fe6b 566->579 581 40fe83-40fe89 567->581 582 40feec-40fef4 567->582 568->540 569->574 580 40fdf7-40fdff 569->580 570->549 599 410054 570->599 571->540 573 40fe16-40fe1e 572->573 572->574 573->540 584 40ff71-40ff92 GetKeyState 574->584 585 40ffab-40ffdf MapVirtualKeyA GetKeyNameTextA 574->585 575->540 576->574 586 40fe4b-40fe53 576->586 577->540 578->540 579->574 587 40fe71-40fe79 579->587 580->540 581->574 588 40fe8f-40fe97 581->588 582->540 591 40ff94-40ff9b 584->591 592 40ff9d-40ffa9 584->592 585->549 593 40ffe1-40fff8 GetKeyState 585->593 586->540 587->540 588->540 595 410006-41000e 591->595 596 41001c-410027 call 40b003 592->596 597 410010-410014 593->597 598 40fffa-410000 593->598 595->596 596->553 597->596 598->597 600 410002 598->600 599->549 600->595
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: State$Virtual$AsciiKeyboardNameText
                  • String ID: $`GA
                  • API String ID: 2992186895-3733422996
                  • Opcode ID: e624c91c1352ac1d0ffe3d2a1ab7cc5330d19f4d2306831e5aaca221b6b8ff86
                  • Instruction ID: ec7ec863a881efee9634d557dad8444c6d2bebeab2fac6a038ae46ed2d98a974
                  • Opcode Fuzzy Hash: e624c91c1352ac1d0ffe3d2a1ab7cc5330d19f4d2306831e5aaca221b6b8ff86
                  • Instruction Fuzzy Hash: 986175B04083029AD7309F14D5846DFBAE4AB86348F65C43FF485A7A91D3BD84C99B9F

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 721 4080d4-40813d RegOpenKeyExA 722 408143 721->722 723 40861b-40861f 721->723 724 4085b9-408607 RegEnumKeyExA 722->724 725 408148-4081ad call 40b003 RegOpenKeyExA 724->725 726 40860d-408618 RegCloseKey 724->726 729 4081b3-4081ec call 407eec 725->729 730 4085af 725->730 726->723 733 4085a1-4085ac RegCloseKey 729->733 734 4081f2-408223 call 407eec 729->734 730->724 733->730 737 408225-40828a call 407eec * 2 734->737 738 40828f-4082c0 call 407eec 734->738 750 408461-408465 737->750 744 4082c2-408327 call 407eec * 2 738->744 745 40832c-40835d call 407eec 738->745 744->750 752 4083c9-4083fa call 407eec 745->752 753 40835f-4083c4 call 407eec * 2 745->753 755 408512-408516 750->755 756 40846b-408474 750->756 752->750 769 4083fc-40845d call 407eec * 2 752->769 753->750 755->733 759 40851c-40855f 755->759 756->755 757 40847a-4084dd CryptUnprotectData 756->757 757->755 762 4084df-40850f call 40b30f LocalFree 757->762 764 408562 call 40afb0 759->764 762->755 768 408567-40856e 764->768 768->733 772 408570-40859e call 40b32b 768->772 769->750 772->733
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: Open$CloseCryptDataEnumFreeLocalUnprotect
                  • String ID: ?$R@A$i<A
                  • API String ID: 465718330-2923574325
                  • Opcode ID: 78970c331e07176d5c66b768deb494c3e85097f8261ef9461c508ac6f1943454
                  • Instruction ID: a4ccc55f8ba981cafc44d41d19eba22a5712be1f076cbf207dd9ab87e8e57c87
                  • Opcode Fuzzy Hash: 78970c331e07176d5c66b768deb494c3e85097f8261ef9461c508ac6f1943454
                  • Instruction Fuzzy Hash: 01E19AB08093169FCB10DF55C54469EFBF4BF88314F00C96EE488A7251D7B89A89DF96

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 779 40b904-40b945 call 40b24e GetVersionExA 782 40b974-40b989 GetVersionExA 779->782 783 40b947-40b96b call 405455 call 405469 779->783 784 40bc47 782->784 785 40b98f 782->785 791 40b991-40b994 GetSystemInfo 783->791 792 40b96d-40b972 783->792 788 40bc49-40bc4f 784->788 785->783 793 40b999-40b99c 791->793 792->793 794 40b9a2-40b9ab 793->794 795 40bb1b-40bb58 RegOpenKeyExA 793->795 797 40b9c3-40b9ca 794->797 798 40b9ad 794->798 795->784 799 40bb5e-40bbae RegQueryValueExA RegCloseKey 795->799 797->784 803 40b9d0-40b9d9 797->803 800 40b9b9-40b9be 798->800 801 40b9af-40b9b2 798->801 799->784 802 40bbb4-40bbbb 799->802 800->788 804 40b9b4 801->804 805 40ba1d-40ba29 801->805 802->784 806 40bbc1-40bbd3 call 40b0b5 802->806 807 40ba09-40ba18 803->807 808 40b9db-40b9de 803->808 804->784 805->784 809 40ba2f 805->809 824 40bbe5-40bbf7 call 40b0b5 806->824 825 40bbd5-40bbdc 806->825 807->788 811 40b9e0-40b9e2 808->811 812 40b9ff-40ba04 808->812 809->784 813 40ba40-40ba45 809->813 814 40bac1-40baca 809->814 815 40ba36-40ba3b 809->815 816 40bb0a-40bb16 809->816 817 40ba5b-40ba64 809->817 811->784 819 40b9e8-40b9fa 811->819 812->788 820 40ba4b-40ba56 813->820 821 40bbde-40bbe3 813->821 826 40baf9-40bb05 814->826 827 40bacc 814->827 815->788 816->788 822 40bc40-40bc45 817->822 823 40ba6a 817->823 819->788 820->788 821->788 822->788 830 40ba76-40ba7b 823->830 831 40ba6c-40ba6f 823->831 837 40bc06-40bc18 call 40b0b5 824->837 838 40bbf9-40bc02 824->838 825->821 825->824 826->788 828 40bae8-40baf4 827->828 829 40bace-40bad1 827->829 828->788 829->784 833 40bad7-40bae3 829->833 830->788 834 40ba80-40ba8b 831->834 835 40ba71 831->835 833->788 834->788 839 40ba91-40ba95 834->839 835->784 837->838 848 40bc1a 837->848 840 40bc32-40bc35 838->840 841 40bc04-40bc25 838->841 843 40baa7-40babc GetSystemMetrics 839->843 844 40ba97-40baa1 839->844 840->821 847 40bc37 840->847 849 40bc27-40bc2e 841->849 850 40bc39-40bc3e 841->850 843->788 844->788 844->843 847->784 848->784 849->784 851 40bc30 849->851 850->788 851->788
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: Version$InfoSystem
                  • String ID: A$P$tCA
                  • API String ID: 731687086-2098838653
                  • Opcode ID: 997b671eb54fd9e5334c881dab9817cd43900668b3b596ad9c98fe6328abb985
                  • Instruction ID: 378d64a24b43e564056c130400fa8caf3615e0b4c94d831b1f9ad2040db8fdc0
                  • Opcode Fuzzy Hash: 997b671eb54fd9e5334c881dab9817cd43900668b3b596ad9c98fe6328abb985
                  • Instruction Fuzzy Hash: E771A1709082198EEB249F6588457AFB6E0EB41304F1448BFD485E6285D7BDCAC5DB8F
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressProc$CryptDataLibraryLoadUnprotectstrlen
                  • String ID: $$J$TAA$yAA
                  • API String ID: 3252690914-3341814342
                  • Opcode ID: a56ae54050f0b889f0f39ab05f7a14759ce83efdfd0daef4faf5776cb7b3ae73
                  • Instruction ID: 90e295eda4a7f6e2a6eb697774234851295af6de7a9009de0714f7da16fe82ca
                  • Opcode Fuzzy Hash: a56ae54050f0b889f0f39ab05f7a14759ce83efdfd0daef4faf5776cb7b3ae73
                  • Instruction Fuzzy Hash: 5F61E2B0D042199FDB10DF68C584B9EBBF1FF48304F1085AAE498A7351E7789A89CF56
                  APIs
                    • Part of subcall function 00411E38: malloc.MSVCRT ref: 00411E48
                  • SetErrorMode.KERNEL32 ref: 004125C7
                  • GetLogicalDriveStringsA.KERNEL32 ref: 004125D8
                  • GetVolumeInformationA.KERNEL32 ref: 0041269C
                  • GetDiskFreeSpaceExA.KERNEL32 ref: 004126F7
                  • GetDriveTypeA.KERNEL32 ref: 0041278B
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: Drive$DiskErrorFreeInformationLogicalModeSpaceStringsTypeVolumemalloc
                  • String ID: PJA$S$[JA
                  • API String ID: 4103324456-1761618106
                  • Opcode ID: cf71502f1f9646aaf85ddfddaa9ca175fb06f5c3cea1fa9df7cdbe2c8b41a5c6
                  • Instruction ID: 413dc0bdbdfc8843bafa3374f9455635723ce9e2e0ddf00b037f636cf9ca1e66
                  • Opcode Fuzzy Hash: cf71502f1f9646aaf85ddfddaa9ca175fb06f5c3cea1fa9df7cdbe2c8b41a5c6
                  • Instruction Fuzzy Hash: B471C9B08093159FD715EF15C99479EFBF4BF84344F0089AEE488A7251D7B88A858F86
                  APIs
                  • SetErrorMode.KERNEL32 ref: 0040431E
                  • FindFirstFileA.KERNEL32 ref: 0040432E
                  • FileTimeToSystemTime.KERNEL32 ref: 004043BC
                  • FindNextFileA.KERNEL32 ref: 004044F7
                  • FindClose.KERNEL32 ref: 00404509
                    • Part of subcall function 00403F73: EnterCriticalSection.KERNEL32 ref: 00403FA3
                    • Part of subcall function 00403F73: LeaveCriticalSection.KERNEL32 ref: 004040C3
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: FileFind$CriticalSectionTime$CloseEnterErrorFirstLeaveModeNextSystem
                  • String ID: $l9A
                  • API String ID: 353538454-1713450632
                  • Opcode ID: dc4e45e60ec2832ca55661bcbdc3407cc74e99ec4f026f987709e7534a1db3d7
                  • Instruction ID: 4ac5914737c352b605eb5e303c0285fe8982a0c07968ea428ecac6c9dbfaa336
                  • Opcode Fuzzy Hash: dc4e45e60ec2832ca55661bcbdc3407cc74e99ec4f026f987709e7534a1db3d7
                  • Instruction Fuzzy Hash: 5C71E4B49087149FC711DF25C5846AEBBF4AF84744F00C9AEE8D8A7351E7789A84CF86
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: Crypt$Hash$Context$AcquireCreateDataDestroyParamRelease
                  • String ID: =AA
                  • API String ID: 3186506766-994812051
                  • Opcode ID: 2f3cce49da050836fb35e52979a6b48e45b4c7f9f45a7d260789ff9d658d66fc
                  • Instruction ID: 7e8127c63c99280028c9367910d8f887cf4ee83d10da939efdfafafca6d664b7
                  • Opcode Fuzzy Hash: 2f3cce49da050836fb35e52979a6b48e45b4c7f9f45a7d260789ff9d658d66fc
                  • Instruction Fuzzy Hash: 8541E6B09083059FDB00EF69C5557AEBBF0BF84348F00C92EE89497285D7B88558CF9A
                  APIs
                  • SetErrorMode.KERNEL32 ref: 00404DA2
                  • FindFirstFileA.KERNEL32 ref: 00404DDC
                  • FindClose.KERNEL32 ref: 00404E06
                  • FindNextFileA.KERNEL32 ref: 0040500B
                    • Part of subcall function 0040B003: _vsnprintf.MSVCRT ref: 0040B027
                    • Part of subcall function 0040481E: fopen.MSVCRT ref: 0040485C
                    • Part of subcall function 0040481E: fread.MSVCRT ref: 00404895
                    • Part of subcall function 0040481E: fclose.MSVCRT ref: 0040490C
                    • Part of subcall function 00403F73: EnterCriticalSection.KERNEL32 ref: 00403FA3
                    • Part of subcall function 00403F73: LeaveCriticalSection.KERNEL32 ref: 004040C3
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: Find$CriticalFileSection$CloseEnterErrorFirstLeaveModeNext_vsnprintffclosefopenfread
                  • String ID: !$L
                  • API String ID: 2399339665-1212946904
                  • Opcode ID: 303ac60403f1f91705d5fe2428131c3c8be2549d47eb964c677c3903fc38ebad
                  • Instruction ID: 32613cd6b19a3e9dc0d81b948bfd35db3afc354c20aa5868ba069cf611b7e5a0
                  • Opcode Fuzzy Hash: 303ac60403f1f91705d5fe2428131c3c8be2549d47eb964c677c3903fc38ebad
                  • Instruction Fuzzy Hash: 07B1B3B48087159FD710EF15C58469EBBF0EF84354F40C9AEE58CA7391D3789A889F8A
                  APIs
                  • SetErrorMode.KERNEL32 ref: 0040948B
                    • Part of subcall function 0040B003: _vsnprintf.MSVCRT ref: 0040B027
                  • FindFirstFileA.KERNEL32 ref: 004094D5
                  • FindNextFileA.KERNEL32 ref: 00409660
                  • FindClose.KERNEL32 ref: 00409676
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: Find$File$CloseErrorFirstModeNext_vsnprintf
                  • String ID: i<A
                  • API String ID: 3730131509-3396280644
                  • Opcode ID: 0ca7d93dfb76f3ae88e4c69cc09b361f3d83c12c8b8bc4c9eb577a0ee70154ed
                  • Instruction ID: eef61fc1b6b849e5e93daf5940c089771de56a289e10f6167881217b47d4907e
                  • Opcode Fuzzy Hash: 0ca7d93dfb76f3ae88e4c69cc09b361f3d83c12c8b8bc4c9eb577a0ee70154ed
                  • Instruction Fuzzy Hash: 5151BAB49047099FCB50EF69C98569EBBF4AF44305F00896EE898E7341E778D984CF4A
                  APIs
                  • SetErrorMode.KERNEL32 ref: 0040D0A7
                    • Part of subcall function 0040B003: _vsnprintf.MSVCRT ref: 0040B027
                  • FindFirstFileA.KERNEL32 ref: 0040D0E3
                  • FindNextFileA.KERNEL32 ref: 0040D250
                  • FindClose.KERNEL32 ref: 0040D274
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: Find$File$CloseErrorFirstModeNext_vsnprintf
                  • String ID: EA$EA
                  • API String ID: 3730131509-2825276752
                  • Opcode ID: 9e8cf37be38c9d8b4441ebcd7269069ae4ea469994d4f8a91f2db5d2e53164e2
                  • Instruction ID: 219c57fcb171bb1ca2d734e431468363c7ea267f7817afa50a1f865dfdb8dd3e
                  • Opcode Fuzzy Hash: 9e8cf37be38c9d8b4441ebcd7269069ae4ea469994d4f8a91f2db5d2e53164e2
                  • Instruction Fuzzy Hash: D051D7B4D087149BCB10EF65C58069EBBF4EF84354F00C9AEE89CA7341D77899858F56
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: malloc
                  • String ID: wA
                  • API String ID: 2803490479-2241071787
                  • Opcode ID: c1942b9ef3ee7efb90057551ef2bd3b9d57f791f179a07b8547abc79e4114769
                  • Instruction ID: b3ce33c02d2adc67a1be81ba305f1ecc45b8c83c03d9b0789a960feec4bc780c
                  • Opcode Fuzzy Hash: c1942b9ef3ee7efb90057551ef2bd3b9d57f791f179a07b8547abc79e4114769
                  • Instruction Fuzzy Hash: 591271704087908ED711AF36D5492AEBBE0AF45309F45487FE8C4AB3D2D7BC8589CB5A
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: recvsend$htons
                  • String ID:
                  • API String ID: 2448738288-0
                  • Opcode ID: 96d11c9c68b2896d9b9d7a8983b74177866f7a7d96671aba66e4708bc343f380
                  • Instruction ID: 0af73237e4819d2a6fd2bb66c7aadb4d5e860f75e5265a6ee1ba409244a54811
                  • Opcode Fuzzy Hash: 96d11c9c68b2896d9b9d7a8983b74177866f7a7d96671aba66e4708bc343f380
                  • Instruction Fuzzy Hash: 084126F18187589AD710AF25C8443DEBFF4AF44315F00C8AEE588A7281D37997C88F96
                  APIs
                    • Part of subcall function 004087B6: CryptAcquireContextA.ADVAPI32 ref: 00408805
                    • Part of subcall function 004087B6: CryptCreateHash.ADVAPI32 ref: 0040883C
                    • Part of subcall function 004087B6: CryptHashData.ADVAPI32 ref: 00408868
                    • Part of subcall function 004087B6: CryptGetHashParam.ADVAPI32 ref: 004088A3
                  • RegQueryValueExA.ADVAPI32 ref: 004089F7
                  • CryptUnprotectData.CRYPT32 ref: 00408A6B
                  • LocalFree.KERNEL32 ref: 00408B25
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: Crypt$Hash$Data$AcquireContextCreateFreeLocalParamQueryUnprotectValue
                  • String ID: BAA
                  • API String ID: 1605365258-1692831742
                  • Opcode ID: 0be4edd1013ea82f49039c4e7a60059d9a7865d727498685a99c62b3369e60e4
                  • Instruction ID: f179bb109a2118bc5320f792643b829922f5a01b24bd9340d5c77f4fd436c39b
                  • Opcode Fuzzy Hash: 0be4edd1013ea82f49039c4e7a60059d9a7865d727498685a99c62b3369e60e4
                  • Instruction Fuzzy Hash: 605184B49042099FCB50DF68C98579EBBF0FF48344F00856AE898E7351E774EA848F96
                  APIs
                  • SetErrorMode.KERNEL32 ref: 004045CB
                    • Part of subcall function 0040B003: _vsnprintf.MSVCRT ref: 0040B027
                  • FindFirstFileA.KERNEL32 ref: 00404605
                  • FindClose.KERNEL32(?,?), ref: 0040462F
                  • FindNextFileA.KERNEL32(?,?), ref: 004047B9
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: Find$File$CloseErrorFirstModeNext_vsnprintf
                  • String ID:
                  • API String ID: 3730131509-0
                  • Opcode ID: cff88fd960a1a20bad580e60cd069f30997f7ceb9bd1d6fc2fc32d8876ef301f
                  • Instruction ID: f060474aadf0eacf1b52d1b8ed81c3e5be4ff31658bb1397a1b148920b024b9a
                  • Opcode Fuzzy Hash: cff88fd960a1a20bad580e60cd069f30997f7ceb9bd1d6fc2fc32d8876ef301f
                  • Instruction Fuzzy Hash: E961E9B4918705AFD710EF25C58469EBBF4EF84348F04C96EE5889B381D3789A84CF4A
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                  • String ID:
                  • API String ID: 420147892-0
                  • Opcode ID: 74706cf70a759713ded17d191935e5dd41166c0ef1915d39beea04cd36872676
                  • Instruction ID: 62dc56eb63f44dbe15c103c2bb5ecb402caf75696f765e2790a52999e9b354d7
                  • Opcode Fuzzy Hash: 74706cf70a759713ded17d191935e5dd41166c0ef1915d39beea04cd36872676
                  • Instruction Fuzzy Hash: 2F112CB0909304ABD710AF65C9456AEBBE8EF88754F00885FF988D7201D3B899908B96
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: NameUsergetenv
                  • String ID: KCA
                  • API String ID: 3323410895-1493292787
                  • Opcode ID: b00a7324634794fb3b964863d7c52f8d56f82682e5edb33a137536abfbaef005
                  • Instruction ID: 4175b7b0365fa983d86b33f5d9a502483810bee78ae6fc75850a3e95115a9847
                  • Opcode Fuzzy Hash: b00a7324634794fb3b964863d7c52f8d56f82682e5edb33a137536abfbaef005
                  • Instruction Fuzzy Hash: CDF03671904318AED700AF56C9404DEBBF8EE44754F00C42FFD9897201E3789590DB8B
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: CryptDataFreeLocalUnprotect
                  • String ID:
                  • API String ID: 1561624719-0
                  • Opcode ID: bdff6604ffba01dbf17363abd4d8a0f87cd84668af0e44fbdba58665eeec2796
                  • Instruction ID: d1bfcab12d688ec36e112635e1aeeacf5dabbfdd4c7e1a16bfd4dd83dc0475a7
                  • Opcode Fuzzy Hash: bdff6604ffba01dbf17363abd4d8a0f87cd84668af0e44fbdba58665eeec2796
                  • Instruction Fuzzy Hash: CF91A5B09043198FDB50DF64C58579EBBF4FF48308F1084AAE988A7340D7799A94CF96
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: Cursormouse_event
                  • String ID:
                  • API String ID: 1102576784-0
                  • Opcode ID: 3052724c6d5122f159fb62323d2c676a979c4be9a027182a9b91ce99891353d6
                  • Instruction ID: 359e4aa527543433c0896175b0ac13a633aee152ab799177bbba5732e6b4454a
                  • Opcode Fuzzy Hash: 3052724c6d5122f159fb62323d2c676a979c4be9a027182a9b91ce99891353d6
                  • Instruction Fuzzy Hash: 650184B0008304AAE700AF15C12936BBBE5BF80708F41CC1DE8D95A281D7BE9599DF9B
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID: 0-3916222277
                  • Opcode ID: b8d42a7b63d4474c9d296802be1ff9ad28c4bd8d98a796cadb29ad3b8ed83466
                  • Instruction ID: 3f37d34f01cdf8a4d5bcc118966dd77b7e58c9b584f3d9175108e78e060ba070
                  • Opcode Fuzzy Hash: b8d42a7b63d4474c9d296802be1ff9ad28c4bd8d98a796cadb29ad3b8ed83466
                  • Instruction Fuzzy Hash: 6EE1A3316093919FD344CF2ED894467BBE2ABD9200F49C97EE5C487366C634E812DBA6
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID: 0-3916222277
                  • Opcode ID: 2cb219ad1ba735ddc1010fc04fb07be04a48c2c717d2421ba4e92f8a78365db7
                  • Instruction ID: f2da43bf588a0edd59bf2f6faae1e16a1b9b3f048b5e8f3d7aa9867b09630d40
                  • Opcode Fuzzy Hash: 2cb219ad1ba735ddc1010fc04fb07be04a48c2c717d2421ba4e92f8a78365db7
                  • Instruction Fuzzy Hash: 42E1A1316093519FC344DF2ED8D046ABBE2EBC9200F89C93ED69487356CB34E915DBA6
                  APIs
                  • GetLocalTime.KERNEL32 ref: 0041047C
                    • Part of subcall function 0040B003: _vsnprintf.MSVCRT ref: 0040B027
                    • Part of subcall function 0040FACC: GetLocalTime.KERNEL32 ref: 0040FAEE
                    • Part of subcall function 0040FACC: CloseHandle.KERNEL32 ref: 0040FB51
                    • Part of subcall function 0040FACC: CreateFileA.KERNEL32 ref: 0040FC04
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: LocalTime$CloseCreateFileHandle_vsnprintf
                  • String ID:
                  • API String ID: 2103698811-0
                  • Opcode ID: 63690216b72a1c53842b416b2d2305f02b088d60ee1072d3dd554ffcc9136bda
                  • Instruction ID: d04b5bec65cd5e82f1f172591afcf2028d515c0c46bc0842736414adfd99d777
                  • Opcode Fuzzy Hash: 63690216b72a1c53842b416b2d2305f02b088d60ee1072d3dd554ffcc9136bda
                  • Instruction Fuzzy Hash: 401100F44083149AD710AF22C8812EEBBF4EF85358F00886EF5D857281D7BC8584CF9A
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: keybd_event
                  • String ID:
                  • API String ID: 2665452162-0
                  • Opcode ID: 8e793267731e74a471ce4c647f6fb3bab29bcddfc950cb6d751f583ce367ce4b
                  • Instruction ID: ec1167725e788c181b87d7cd053c0f17ee461c09059b1ff668a5e5903f31a6cf
                  • Opcode Fuzzy Hash: 8e793267731e74a471ce4c647f6fb3bab29bcddfc950cb6d751f583ce367ce4b
                  • Instruction Fuzzy Hash: 71D0C9B04083046AD7007F39C12A31ABFE8AB40358F80C84CE8D88B282D2B9D1588BD2
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 97078c1ec4012f78fb44af18f5c532879ac62cdecd602c122b775541fe005406
                  • Instruction ID: 98a0f098bcfd4f2504ddc750419ae9923d1f935bb537633bc1d12b4812e28a0d
                  • Opcode Fuzzy Hash: 97078c1ec4012f78fb44af18f5c532879ac62cdecd602c122b775541fe005406
                  • Instruction Fuzzy Hash: 6B227077F442104BDB5CCE5ACC906AAB393BBD831035FD27D8C06AB759DAB4B94686C0
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 31593d8cefdcca00685f87743ed0cec816f2b2c0fbbdf3ba0f037685ca3658f4
                  • Instruction ID: 0fa8561775c5e030c237411aceb05de3c03d5ea575caaef6c8977b91e497aa65
                  • Opcode Fuzzy Hash: 31593d8cefdcca00685f87743ed0cec816f2b2c0fbbdf3ba0f037685ca3658f4
                  • Instruction Fuzzy Hash: 6DA1A2729281B14BD35D8F2D9865436BBE0AB0920174B85FBD8C6AB393CA74DC41DBE4
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cbdbce695deb1e2b3e85a9bc98d2888b1b594ebbb5921316fa6f60b82e0e5ede
                  • Instruction ID: 2fe1e4ab88cda3d562dc2646662b34e7cd51756ed242f06843dcfce6c41a3e1b
                  • Opcode Fuzzy Hash: cbdbce695deb1e2b3e85a9bc98d2888b1b594ebbb5921316fa6f60b82e0e5ede
                  • Instruction Fuzzy Hash: 0351A3758082649FD7049F1EE8A00B6BBE1E78D310B09C57EEA84173A2D734F951DBE9
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5f0cb38eadaf4d6d83f4dade177b392778d08c3289c2bab45c74c43a88b0d488
                  • Instruction ID: a33a8f22ae6e85c1ab51808d79daa2e8ac5d5006bbfa8e747cb6f33f2d499034
                  • Opcode Fuzzy Hash: 5f0cb38eadaf4d6d83f4dade177b392778d08c3289c2bab45c74c43a88b0d488
                  • Instruction Fuzzy Hash: 52411B652093C08EC715DF6D84C055ABFE1AFA6200B08C9DEE8D99F74BD238D949C776

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 85 409681-409771 LoadLibraryA 86 409773-409778 85->86 87 40977d-409858 GetProcAddress * 6 85->87 88 409e2f-409e35 86->88 89 40985a 87->89 90 40985f-409883 87->90 91 409de6-409deb 89->91 97 409885 90->97 98 40988a-4098b5 90->98 92 409dfb-409e00 91->92 93 409ded-409df8 91->93 95 409e10-409e14 92->95 96 409e02-409e0d 92->96 93->92 100 409e24-409e2c 95->100 101 409e16-409e21 FreeLibrary 95->101 96->95 97->91 104 4098b7 98->104 105 4098bc-4098c1 98->105 100->88 101->100 104->91 106 4098c3 105->106 107 4098c8-4098d0 call 40b904 105->107 106->91 110 4098e0-4098e7 107->110 111 4098d2-4098da call 40b904 107->111 113 409b5e-409b64 110->113 111->110 117 409b6f-409b76 111->117 115 409b6a 113->115 116 4098ec-409921 call 40b22a 113->116 115->91 121 409927-409a68 WideCharToMultiByte * 3 116->121 122 409b5a 116->122 119 409dda-409de0 117->119 119->91 123 409b7b-409ba5 call 40b22a 119->123 127 409b45-409b4a 121->127 128 409a6e-409b0f WideCharToMultiByte call 40afb0 121->128 122->113 129 409dd6 123->129 130 409bab-409ce4 WideCharToMultiByte * 3 123->130 127->122 132 409b4c-409b57 127->132 128->127 135 409b11-409b42 call 40b32b 128->135 129->119 136 409dc1-409dc6 130->136 137 409cea-409d8b WideCharToMultiByte call 40afb0 130->137 132->122 135->127 136->129 141 409dc8-409dd3 136->141 137->136 145 409d8d-409dbe call 40b32b 137->145 141->129 145->136
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressProc$Library$FreeLoad
                  • String ID: ($7BA$;$<$A$B$J$K$K$M$T$U$`$p
                  • API String ID: 2449869053-391259618
                  • Opcode ID: 83dc6994b1219519ad1942492044cbd189cdd033f1be03c6e012c31656b67397
                  • Instruction ID: f0ef341e7a26ddd6f06a2e8b11894eaa8e57a5bd707cacc1113fa0c2a1f95dfa
                  • Opcode Fuzzy Hash: 83dc6994b1219519ad1942492044cbd189cdd033f1be03c6e012c31656b67397
                  • Instruction Fuzzy Hash: D532A6B0908349CFDB10DFA9C58479EBBF0BF45314F00865EE498AB291D7789989CF96

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 386 405dd8-405e1f getenv call 40b003 call 404a4e 391 405e21-405e44 getenv call 40b003 386->391 392 405e49-405e53 call 404a4e 386->392 391->392 396 405fa6 392->396 397 405e59-405eec call 40b24e * 2 CreatePipe 392->397 398 405fae-405fc8 call 403f73 396->398 397->398 406 405ef2-405f11 CreatePipe 397->406 404 406191-406198 398->404 406->396 407 405f17-405fa4 GetStartupInfoA CreateProcessA 406->407 407->396 408 405fcd-406016 CloseHandle * 2 call 403f73 407->408 410 40601b-40605c PeekNamedPipe 408->410 411 406062-40606a 410->411 412 4060fd 410->412 413 406107-40610e 411->413 414 406070-406077 411->414 412->413 415 406180-40618c call 4053d0 413->415 416 406110-40616e CloseHandle * 2 TerminateProcess call 403f73 413->416 414->413 417 40607d-40607f 414->417 415->410 416->404 426 406170-40617e call 405434 416->426 420 4060a1-4060ce ReadFile 417->420 421 406081-406097 malloc 417->421 420->413 425 4060d0-4060f7 call 403f73 420->425 421->413 424 406099-40609f 421->424 424->420 425->410 425->412 426->404
                  APIs
                  • getenv.MSVCRT ref: 00405DF4
                    • Part of subcall function 0040B003: _vsnprintf.MSVCRT ref: 0040B027
                    • Part of subcall function 00404A4E: GetFileAttributesA.KERNEL32 ref: 00404A5A
                  • getenv.MSVCRT ref: 00405E28
                  • CreatePipe.KERNEL32 ref: 00405ED4
                  • CreatePipe.KERNEL32 ref: 00405F07
                  • GetStartupInfoA.KERNEL32 ref: 00405F1A
                  • CreateProcessA.KERNEL32 ref: 00405F9A
                  • CloseHandle.KERNEL32 ref: 00405FD6
                  • CloseHandle.KERNEL32(?), ref: 00405FEB
                    • Part of subcall function 00403F73: EnterCriticalSection.KERNEL32 ref: 00403FA3
                    • Part of subcall function 00403F73: LeaveCriticalSection.KERNEL32 ref: 004040C3
                  • PeekNamedPipe.KERNEL32 ref: 00406052
                  • malloc.MSVCRT ref: 0040608A
                  • ReadFile.KERNEL32 ref: 004060C4
                  • CloseHandle.KERNEL32 ref: 00406119
                  • CloseHandle.KERNEL32(00000000), ref: 00406127
                  • TerminateProcess.KERNEL32(?,00000000), ref: 0040613E
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseHandle$CreatePipe$CriticalFileProcessSectiongetenv$AttributesEnterInfoLeaveNamedPeekReadStartupTerminate_vsnprintfmalloc
                  • String ID: "$D
                  • API String ID: 1761898876-1154559923
                  • Opcode ID: 952761bcfc0b9674db8a1b1078ce94540f0fd060db4d0d55170df64b73035078
                  • Instruction ID: 09788f14ea1cd9a2dde663cd501fe6c2f13b7d896097547298190afc460fad7c
                  • Opcode Fuzzy Hash: 952761bcfc0b9674db8a1b1078ce94540f0fd060db4d0d55170df64b73035078
                  • Instruction Fuzzy Hash: A7A1DCB48097159FDB10EF25C58879EBBF4BF44308F0189AEE488A7391D7B89984CF46

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 431 410c22-410c71 call 412854 RegOpenKeyExA 434 410c77-410c81 431->434 435 411049-411052 431->435 436 410c87-410cd7 RegEnumValueA 434->436 437 411038-411048 RegCloseKey 436->437 438 410cdd-410cea 436->438 437->435 439 410cf0-410cf6 438->439 440 411029-411033 438->440 439->440 441 410eeb-410f1e RegQueryValueExA 439->441 442 410dba-410df9 RegQueryValueExA 439->442 443 410cfd-410d54 call 40b24e RegQueryValueExA 439->443 444 410e3e-410e7d RegQueryValueExA 439->444 440->436 441->440 445 410f24-410f3a malloc 441->445 442->440 446 410dff-410e39 call 40b003 442->446 443->440 453 410d5a-410d63 443->453 444->440 448 410e83-410ec6 call 40b003 444->448 445->440 450 410f40-410f6b RegQueryValueExA 445->450 454 410ecb-410ecd 446->454 448->454 455 410f71-410f8f 450->455 456 41101b-411024 call 405434 450->456 458 410d65-410d8f call 40b003 453->458 459 410d94-410d9c 453->459 454->440 460 410ed3-410ee6 call 411f24 454->460 462 410f91-410fae call 40b7b6 455->462 463 410fb0-410fe0 call 40afb0 455->463 456->440 458->454 459->458 466 410d9e-410da0 459->466 460->440 462->463 475 410fe2-410fea 463->475 476 411007-41100b 463->476 471 410da1-410da3 466->471 471->458 474 410da5-410dad 471->474 479 410db7-410db8 474->479 480 410daf 474->480 475->476 477 410fec-411002 call 411f24 call 405434 475->477 476->456 478 41100d-411016 call 405434 476->478 477->476 478->456 479->471 480->479
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: Value$Query$CloseEnumOpen_vsnprintfmalloc
                  • String ID: BHA$_HA$xHA
                  • API String ID: 4070552197-3285710930
                  • Opcode ID: c457b5a9a2a22c427117ce710c053d3f19028e22e154c9eaee1a1d08f0d38bc5
                  • Instruction ID: f7014be8ebb14d179c1419ba26ae49d0402fd0cf9b8c6c09819d40fc7f6e2413
                  • Opcode Fuzzy Hash: c457b5a9a2a22c427117ce710c053d3f19028e22e154c9eaee1a1d08f0d38bc5
                  • Instruction Fuzzy Hash: 6BB1B8B0908355DFDB10EF29D58879ABBF4BF48344F00899EE48897251D3789AC8CF56

                  Control-flow Graph

                  APIs
                  • CreateToolhelp32Snapshot.KERNEL32 ref: 00405A73
                  • Process32First.KERNEL32 ref: 00405A98
                  • CloseHandle.KERNEL32 ref: 00405AA6
                    • Part of subcall function 0040B003: _vsnprintf.MSVCRT ref: 0040B027
                  • OpenProcess.KERNEL32 ref: 00405B43
                  • GetProcessTimes.KERNEL32 ref: 00405BBF
                  • FileTimeToSystemTime.KERNEL32 ref: 00405BF0
                  • CloseHandle.KERNEL32 ref: 00405C83
                  • Process32Next.KERNEL32 ref: 00405CF6
                  • CloseHandle.KERNEL32 ref: 00405D0E
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseHandle$ProcessProcess32Time$CreateFileFirstNextOpenSnapshotSystemTimesToolhelp32_vsnprintf
                  • String ID: )$`;A$~;A
                  • API String ID: 1698657367-2041144709
                  • Opcode ID: 7782544bbc45f11d423662694c1d12b3699859ba1a94dde34c3e84cc6fa2fbfb
                  • Instruction ID: 61697017e6007795aa363774a73ed7ccfe3259b77202650b54fbf82562579c0d
                  • Opcode Fuzzy Hash: 7782544bbc45f11d423662694c1d12b3699859ba1a94dde34c3e84cc6fa2fbfb
                  • Instruction Fuzzy Hash: A581F9B4808715DEDB10EF25C9447AFBBF4EF84345F00896EE888A7241E7789A84DF56

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 602 40578a-405819 call 412854 call 405773 socket call 4033a1 609 405a0d-405a14 602->609 610 40581f-40583e connect 602->610 611 405a26-405a57 call 405773 call 405434 call 403b94 609->611 612 405840-405847 610->612 613 40584c-4058a0 call 40b003 send 610->613 612->611 613->612 619 4058a2-4058e3 call 40b24e recv 613->619 624 4058f1-4058f6 619->624 625 4058e5-4058ec 619->625 627 4058f8 624->627 628 4058fc-405915 call 40ae40 624->628 625->611 627->628 628->625 631 405917-405932 call 40ae40 628->631 631->625 634 405934-40595a fopen 631->634 635 405960-40597d fwrite 634->635 636 405a16-405a1d 634->636 637 405982-4059ab recv 635->637 636->611 638 4059da-4059ec fclose 637->638 639 4059ad-4059c7 fwrite 637->639 640 4059ee-405a0b call 40491c 638->640 641 405a1f-405a21 638->641 639->637 642 4059c9-4059d8 fclose 639->642 640->641 641->611 642->611
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: connectgethostbynamehtonsrecvsendsocket
                  • String ID: ):A$1;A
                  • API String ID: 2370112503-816570355
                  • Opcode ID: 1ce466b65d3952daa620895002d9ebfd44272819a979813164e03d50d3217bf3
                  • Instruction ID: 111cfb8894430c3ee57274e16e24e4d9ea14f12f3d6e1b24cd7d8834a0b22c56
                  • Opcode Fuzzy Hash: 1ce466b65d3952daa620895002d9ebfd44272819a979813164e03d50d3217bf3
                  • Instruction Fuzzy Hash: 0671FAB09087049FD710AF69C58539EBBE0EF44358F00C97EE888D7381E7B999949F4A

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 645 4120d4-412154 call 411e38 call 405455 call 405469 call 405455 call 405469 call 405455 call 405469 660 412172-412179 645->660 661 412156-41216d call 405455 call 405469 645->661 663 412534-412541 660->663 664 41217f-412181 660->664 661->660 667 412563-412573 663->667 668 412543-412561 call 41200c 663->668 664->663 666 412187-412189 664->666 666->663 670 41218f-4121d2 666->670 672 41257b-412595 call 403f73 call 411e7d 667->672 668->672 677 4121d8-4121ee malloc 670->677 678 41238f-4123d6 670->678 677->663 680 4121f4-412222 677->680 678->663 683 4123dc-4123f2 malloc 678->683 686 412244 680->686 687 412224-41222b 680->687 683->663 685 4123f8-41242a 683->685 695 41244c-41244e 685->695 696 41242c-412433 685->696 688 412246-41224e 686->688 687->678 689 412231-41223f call 405434 687->689 688->687 690 412250-412371 htons inet_ntoa call 40b003 htons inet_ntoa call 40b003 call 412014 call 40b003 688->690 689->678 715 412373-412384 call 411f24 690->715 716 412389-41238a 690->716 699 412454-41245c 695->699 696->663 698 412439-412447 call 405434 696->698 698->663 699->696 702 41245e-412516 htons inet_ntoa call 40b003 call 412014 call 40b003 699->702 717 412518-412529 call 411f24 702->717 718 41252e-41252f 702->718 715->716 716->688 717->718 718->699
                  APIs
                    • Part of subcall function 00411E38: malloc.MSVCRT ref: 00411E48
                    • Part of subcall function 00405455: LoadLibraryA.KERNEL32 ref: 00405461
                    • Part of subcall function 00405469: GetProcAddress.KERNEL32 ref: 0040547C
                  • malloc.MSVCRT ref: 004121E1
                  • htons.WS2_32 ref: 00412265
                  • inet_ntoa.WS2_32(?), ref: 00412277
                  • htons.WS2_32 ref: 004122BB
                  • inet_ntoa.WS2_32 ref: 004122CD
                  • malloc.MSVCRT ref: 004123E5
                  • htons.WS2_32 ref: 00412473
                  • inet_ntoa.WS2_32 ref: 00412489
                    • Part of subcall function 00412014: CreateToolhelp32Snapshot.KERNEL32 ref: 00412060
                    • Part of subcall function 00412014: Process32First.KERNEL32 ref: 00412084
                    • Part of subcall function 00412014: CloseHandle.KERNEL32 ref: 004120C6
                    • Part of subcall function 0040B003: _vsnprintf.MSVCRT ref: 0040B027
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: htonsinet_ntoamalloc$AddressCloseCreateFirstHandleLibraryLoadProcProcess32SnapshotToolhelp32_vsnprintf
                  • String ID: =IA$N$}IA
                  • API String ID: 3806733647-3309204232
                  • Opcode ID: f26ad551e1a7b7d6af48cea083ccbc8037bc5215a3de7649536514671f8a8303
                  • Instruction ID: f8a8161028ad7ca21a64c98559ef0398e0247d51c3e8658290eddf96b5b10619
                  • Opcode Fuzzy Hash: f26ad551e1a7b7d6af48cea083ccbc8037bc5215a3de7649536514671f8a8303
                  • Instruction Fuzzy Hash: 6CD1E9B09087159FCB11EF65C58479EBBF4FF84708F01889EE58897251D7B89A84CF8A

                  Control-flow Graph

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: AttributesFilefclosefopenfreadfwrite
                  • String ID: 4A$ 4A$D$D$lEA
                  • API String ID: 89957345-2790498474
                  • Opcode ID: 0748150ca969badcdfdb6980310fd3762a7f7f2af798bc9a52f75b0b9998ac6c
                  • Instruction ID: a0f4930c04e500052b11a6926fbf3e4862edb1f1428525f09a58b86b76729e92
                  • Opcode Fuzzy Hash: 0748150ca969badcdfdb6980310fd3762a7f7f2af798bc9a52f75b0b9998ac6c
                  • Instruction Fuzzy Hash: 0D51D3F0408714EBD710EF21C58539EBBE4AF84348F41C86EE5886B281D7BD9989DF4A
                  APIs
                    • Part of subcall function 0040B003: _vsnprintf.MSVCRT ref: 0040B027
                    • Part of subcall function 00404A4E: GetFileAttributesA.KERNEL32 ref: 00404A5A
                  • SetFileAttributesA.KERNEL32 ref: 0040CEF8
                  • fopen.MSVCRT ref: 0040CF0A
                  • fwrite.MSVCRT ref: 0040CFB8
                  • fclose.MSVCRT ref: 0040CFC8
                  • SetFileAttributesA.KERNEL32 ref: 0040CFEA
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: AttributesFile$_vsnprintffclosefopenfwrite
                  • String ID: D$D$lEA$xEA$DA
                  • API String ID: 1105125946-1048815438
                  • Opcode ID: 330a5554e423b286da3aff255541e713e5c811e610f924629fd068ee921ce37b
                  • Instruction ID: 8befd67c76517ca466d45368a0efbd0e1547b2cd68a55236b14d662bed35a97c
                  • Opcode Fuzzy Hash: 330a5554e423b286da3aff255541e713e5c811e610f924629fd068ee921ce37b
                  • Instruction Fuzzy Hash: D2310DB0508314AFC710AF25C58429EFBE5EF84358F01C86EE9C8A7341D7B88989DF5A
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseOpenValue$CreateDelete
                  • String ID: ?$Q
                  • API String ID: 774071636-1039334267
                  • Opcode ID: 6dd0c983af6d4f3e8391fe0b4817c74ec251a37638099fb634efd4853757ca54
                  • Instruction ID: 594b76bfe066d82c118d28d1c9aa74a35dbd6311e4eca6a915345af15c47a7eb
                  • Opcode Fuzzy Hash: 6dd0c983af6d4f3e8391fe0b4817c74ec251a37638099fb634efd4853757ca54
                  • Instruction Fuzzy Hash: AB61E4B4908315AFD740EF69D58429EBBF4EF88354F00891EF89997311D3B8C9888F96
                  APIs
                    • Part of subcall function 00405455: LoadLibraryA.KERNEL32 ref: 00405461
                    • Part of subcall function 00405469: GetProcAddress.KERNEL32 ref: 0040547C
                  • RegisterClassExA.USER32 ref: 00410263
                  • CreateWindowExA.USER32 ref: 004102C9
                  • GetMessageA.USER32 ref: 00410301
                  • TranslateMessage.USER32 ref: 00410310
                  • DispatchMessageA.USER32(00000000), ref: 00410319
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: Message$AddressClassCreateDispatchLibraryLoadProcRegisterTranslateWindow
                  • String ID: 0$0$pGA$wcnwClass
                  • API String ID: 3243276898-1772338863
                  • Opcode ID: 71b348a4bfe34ede3b44eaa997f55862cf314c9a13b8f4585a673dbf6b7d1171
                  • Instruction ID: 5227af386e882ceadc208393300cbb36bff9ee19e55008b76853b068dc6512c6
                  • Opcode Fuzzy Hash: 71b348a4bfe34ede3b44eaa997f55862cf314c9a13b8f4585a673dbf6b7d1171
                  • Instruction Fuzzy Hash: 71311EB04093059BD700AF61D65839FBBF4EF84348F01892EE4946B281D7BD85C9CF9A
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: recvsend$mallocselect
                  • String ID:
                  • API String ID: 2752384660-0
                  • Opcode ID: 8bf3d3a189aed913813953f45a5c36eede7787cde540d3ff4dd76cab598824bb
                  • Instruction ID: 4a1c93bd732a40b2804f6e0ad1985379ed7b018d6ea50f030f98286be5360c60
                  • Opcode Fuzzy Hash: 8bf3d3a189aed913813953f45a5c36eede7787cde540d3ff4dd76cab598824bb
                  • Instruction Fuzzy Hash: 7661ECB09043149FDB10AFA5C58979EBBF4EF44354F10856FE958E7281E3B89A848F86
                  APIs
                    • Part of subcall function 00411E38: malloc.MSVCRT ref: 00411E48
                  • LoadLibraryA.KERNEL32 ref: 004105C5
                  • GetProcAddress.KERNEL32 ref: 004105E0
                  • GetProcAddress.KERNEL32 ref: 004105F4
                  • GetProcAddress.KERNEL32 ref: 0041060C
                  • FileTimeToSystemTime.KERNEL32 ref: 004106A8
                    • Part of subcall function 00403F73: EnterCriticalSection.KERNEL32 ref: 00403FA3
                    • Part of subcall function 00403F73: LeaveCriticalSection.KERNEL32 ref: 004040C3
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressProc$CriticalSectionTime$EnterFileLeaveLibraryLoadSystemmalloc
                  • String ID: HA$'$GA
                  • API String ID: 2869995242-598030498
                  • Opcode ID: 6ff5f7cc1358fb750a3e7986d4004c61136ad8ecef7d16c959adf154a59d2ad7
                  • Instruction ID: 96ac5f606bab2d497a7a822983fcb7c56945800001f94d05a6a568c049f0a852
                  • Opcode Fuzzy Hash: 6ff5f7cc1358fb750a3e7986d4004c61136ad8ecef7d16c959adf154a59d2ad7
                  • Instruction Fuzzy Hash: 6051E7B48057159ED710EF16C9886AAFBF4EF88704F10C99EE89897350E37899C4CF56
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: Value$Query$CloseDeleteOpenmalloc
                  • String ID: Q
                  • API String ID: 262012908-3463352047
                  • Opcode ID: 700ca1186a7c3fb542b7772a98515681c9436a3c83c751acc84dab658f0d9f4b
                  • Instruction ID: fab9c0b65614be5e3debc5e3cfdb5f30ae1d0cfcd0c0ecf47d199c32b6813020
                  • Opcode Fuzzy Hash: 700ca1186a7c3fb542b7772a98515681c9436a3c83c751acc84dab658f0d9f4b
                  • Instruction Fuzzy Hash: 7451E8B49053199FCB50EF69D58478ABBF4AF88744F00896EE888D3311E378DA84CF56
                  APIs
                  • getenv.MSVCRT ref: 00407B91
                    • Part of subcall function 0040B003: _vsnprintf.MSVCRT ref: 0040B027
                    • Part of subcall function 00404A4E: GetFileAttributesA.KERNEL32 ref: 00404A5A
                  • getenv.MSVCRT ref: 00407BD0
                    • Part of subcall function 00404BE8: GetFileAttributesExA.KERNEL32 ref: 00404C03
                  • fopen.MSVCRT ref: 00407C04
                  • malloc.MSVCRT ref: 00407C5A
                  • fread.MSVCRT ref: 00407C9E
                  • fclose.MSVCRT ref: 00407CF9
                  • fclose.MSVCRT ref: 00407D1A
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: AttributesFilefclosegetenv$_vsnprintffopenfreadmalloc
                  • String ID: 4?A
                  • API String ID: 3920827873-2233913188
                  • Opcode ID: 0734a81ae9558e2d6666e7e864e966c46805246213be3467a8d45702887ffd2f
                  • Instruction ID: b13287e39e793b54e87ec7d120e36690ef4d4ff5c2c2a62a5dcbcdf9b80f6115
                  • Opcode Fuzzy Hash: 0734a81ae9558e2d6666e7e864e966c46805246213be3467a8d45702887ffd2f
                  • Instruction Fuzzy Hash: 8E41B3B45483858FC720EF25C18979EBBE0BF94308F118C2EE49497351E7789989CB9B
                  APIs
                    • Part of subcall function 0040B8A9: getenv.MSVCRT ref: 0040B8BE
                    • Part of subcall function 0040B8A9: GetUserNameA.ADVAPI32 ref: 0040B8D4
                    • Part of subcall function 0040B840: gethostname.WS2_32 ref: 0040B86C
                    • Part of subcall function 0040B840: GetComputerNameA.KERNEL32 ref: 0040B883
                    • Part of subcall function 0040BC7C: GetTickCount.KERNEL32 ref: 0040BCAF
                    • Part of subcall function 004051A9: GetModuleFileNameA.KERNEL32 ref: 004051C6
                  • getenv.MSVCRT ref: 0040BFA7
                  • getenv.MSVCRT ref: 0040BFB5
                    • Part of subcall function 00403F73: EnterCriticalSection.KERNEL32 ref: 00403FA3
                    • Part of subcall function 00403F73: LeaveCriticalSection.KERNEL32 ref: 004040C3
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: Namegetenv$CriticalSection$ComputerCountEnterFileLeaveModuleTickUsergethostname
                  • String ID: %$H4A$KCA$l4A$l5A
                  • API String ID: 3776303047-1407204963
                  • Opcode ID: 6b27ce5cf2719641ceba1825dcb303ce74c8cb670ba7a36cf7aae4d491be4723
                  • Instruction ID: 4fc35f1c36761601e3f94c08449797863b3ba5a8779402fbf7500d7d94f70578
                  • Opcode Fuzzy Hash: 6b27ce5cf2719641ceba1825dcb303ce74c8cb670ba7a36cf7aae4d491be4723
                  • Instruction Fuzzy Hash: 63619DB48087809FD320EF65C18469FFBE4AF89348F10892EE9D897351D77995488F9A
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$CloseHandle$CreateLocalPointerTimeWrite_vsnprintf
                  • String ID: XFA
                  • API String ID: 3264027427-974536607
                  • Opcode ID: 5426f6b5fcb6f37349fd10ab8936c85668ceefb8216ac6fbee4be49d56c4ea83
                  • Instruction ID: 74df94b654997151f3d9fe86a2003a3cd3b12ed2526cd4b1bb9af366b3238621
                  • Opcode Fuzzy Hash: 5426f6b5fcb6f37349fd10ab8936c85668ceefb8216ac6fbee4be49d56c4ea83
                  • Instruction Fuzzy Hash: A9412DF08083058AD720AF65D5453AABBF0FB44369F10CA3EE4A5973D1D7BC55888F9A
                  APIs
                  • RegDeleteKeyA.ADVAPI32 ref: 004109F8
                  • RegOpenKeyExA.ADVAPI32 ref: 00410A2D
                    • Part of subcall function 0040B003: _vsnprintf.MSVCRT ref: 0040B027
                  • RegEnumKeyExA.ADVAPI32 ref: 00410A8D
                  • RegCloseKey.ADVAPI32 ref: 00410AA2
                  • RegDeleteKeyA.ADVAPI32(00000000), ref: 00410AB2
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: Delete$CloseEnumOpen_vsnprintf
                  • String ID: 8HA$@
                  • API String ID: 3258335120-4290720585
                  • Opcode ID: 20c6c6a820e3336058dbda9cad8de54f9f27bf6bfc08787d99569cd706a3b572
                  • Instruction ID: 0ac56a4377049136f8aa7fc1996f8a468577ce0a8a281fa06c0a24f8a4011f3d
                  • Opcode Fuzzy Hash: 20c6c6a820e3336058dbda9cad8de54f9f27bf6bfc08787d99569cd706a3b572
                  • Instruction Fuzzy Hash: A741C3B48083069FDB10EF65C59879BBBE4EF84344F00895EE89897241D3B99989CF86
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: getenv$_vsnprintffclosefopenfwrite
                  • String ID: l6A$DA
                  • API String ID: 3159630692-3596656015
                  • Opcode ID: cbee2f29c891b821309839180577e5a7298b3d5f7dab118ea466cf333c3704da
                  • Instruction ID: 3074a073850966244afaf778b265e688697f6f49e8b5883d7ae2296f66400148
                  • Opcode Fuzzy Hash: cbee2f29c891b821309839180577e5a7298b3d5f7dab118ea466cf333c3704da
                  • Instruction Fuzzy Hash: 643192B05087409BD310AF6AC58529EBBE0FF84748F01CD2EE4D99B241D7BD95889F5A
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: recv$closesocketconnecthtonsselectsendshutdownsocket
                  • String ID:
                  • API String ID: 1430705073-0
                  • Opcode ID: cc10febddf6c8073bb1f690ceeeca895f7ed61e81b178301ed85d69d0d59df5a
                  • Instruction ID: 8a0027b1871d40354a670ab6b011452358f9e24804312f26f221fa92e8f0c63b
                  • Opcode Fuzzy Hash: cc10febddf6c8073bb1f690ceeeca895f7ed61e81b178301ed85d69d0d59df5a
                  • Instruction Fuzzy Hash: 99611EB08097149FDB10EF25C58979EBBF4FF44344F1089AEE48897291E7B89598CF86
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: fclosefgetpos$fopenfreadfsetposmallocrealloc
                  • String ID:
                  • API String ID: 3217104080-0
                  • Opcode ID: feea2a42410a150057346b256c85a7e3d2659e253700c393a0a92c9fae14d72c
                  • Instruction ID: 84f89338b0f2ad620864214a04b56a16ad267c4d8d295640036067ac5af64e8a
                  • Opcode Fuzzy Hash: feea2a42410a150057346b256c85a7e3d2659e253700c393a0a92c9fae14d72c
                  • Instruction Fuzzy Hash: FC31D3B0509B019AD710EF26D68535FBBE4EF84748F404C2EE48897291D7B9D988CF5A
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: fclosefopen$freadfreefwritemalloc
                  • String ID:
                  • API String ID: 3268861121-0
                  • Opcode ID: 7692bdaf6cf9a6fe2cdd44cad3a7fdfe300091da52ebf57c6ebd8fafc62080a2
                  • Instruction ID: 4e26785ce0d18f6dab09d7e247152080db2387a4ddab37ed6860b4f4aa8509f8
                  • Opcode Fuzzy Hash: 7692bdaf6cf9a6fe2cdd44cad3a7fdfe300091da52ebf57c6ebd8fafc62080a2
                  • Instruction Fuzzy Hash: 71210AB06087008EC750AF76858166FBBE4AF84354F10882EE5D8D7381D6BDE885CB4A
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: fopen
                  • String ID: $/
                  • API String ID: 1432627528-2637513485
                  • Opcode ID: fc0029ca030e7d8461ea3c3aa89d809796b8c28de517c9d4e449b8cdb61640e9
                  • Instruction ID: e335f4893fcbe95b33d83db71ffdefd5011d0c2ec99bd8187d9d8cd14b7d3c2e
                  • Opcode Fuzzy Hash: fc0029ca030e7d8461ea3c3aa89d809796b8c28de517c9d4e449b8cdb61640e9
                  • Instruction Fuzzy Hash: D7E1E6B48083199FCB10EFA5D58469EBBF0FF44314F50886EE899A7381D7789A85CF46
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: fopen$fgetpos$fread
                  • String ID: "FA
                  • API String ID: 1519157137-1668338201
                  • Opcode ID: c80bc8ae3df67dc0496436a0cb53f723b7a8415e37c177a36a69a3267f043ebb
                  • Instruction ID: 8b5dd919a6c16fb1b8c7a3920ea3275975f0a20c828cac0e41251de37c129676
                  • Opcode Fuzzy Hash: c80bc8ae3df67dc0496436a0cb53f723b7a8415e37c177a36a69a3267f043ebb
                  • Instruction Fuzzy Hash: A4D1FAB49087419FC310EF65C0887AABBE0BF88354F15897EE5D89B396D3789885CF46
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: CriticalSection$EnterErrorLastLeavemallocsend
                  • String ID: -
                  • API String ID: 1786834168-2547889144
                  • Opcode ID: 5696e040c501629a2f1978b70cac4920d289bdbc117d9e00008f85baebfd7334
                  • Instruction ID: 38d28748d84b584a290a71d19c19f95a6763138028e903192b294b18625f3013
                  • Opcode Fuzzy Hash: 5696e040c501629a2f1978b70cac4920d289bdbc117d9e00008f85baebfd7334
                  • Instruction Fuzzy Hash: C241A0B09047058FCB10AF79C58019EBBE4EF81324F11867FE6A4A72D1D7BC89458B9A
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: htonsrecvselectsend
                  • String ID: Z
                  • API String ID: 3248711867-1505515367
                  • Opcode ID: 4e98d9fc3d65689fafd845c2dddca78e7eae01e0da4b0ad0300fced443896cca
                  • Instruction ID: 41855fdb71bab7f2f7b524b6be45631769302bcb6c034a2f712c87405e66b5eb
                  • Opcode Fuzzy Hash: 4e98d9fc3d65689fafd845c2dddca78e7eae01e0da4b0ad0300fced443896cca
                  • Instruction Fuzzy Hash: 534142B08083189BD711EF25C58439EFFF4EF44754F1089AEE89897381D7798A848F96
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: _vsnprintffclosefgetsfopengetenv
                  • String ID: 9?A$t?A
                  • API String ID: 3106633423-361060513
                  • Opcode ID: 1cfe00ea726ca5de47ff4484029823c571a458226f08b3e1a3be3d5acd8c2b94
                  • Instruction ID: 2310f2a4a80d5d50e96d5bd15a956ea174fc0d9324c7ee7adc87f858bb97abb1
                  • Opcode Fuzzy Hash: 1cfe00ea726ca5de47ff4484029823c571a458226f08b3e1a3be3d5acd8c2b94
                  • Instruction Fuzzy Hash: 234186B040D3449BD710DF65C18879EBBE4AF88318F508A6EE4D897291E3789685DF4B
                  APIs
                  • RegOpenKeyExA.ADVAPI32 ref: 00410B47
                  • RegEnumKeyExA.ADVAPI32 ref: 00410BA6
                  • RegCloseKey.ADVAPI32 ref: 00410C10
                    • Part of subcall function 0040B003: _vsnprintf.MSVCRT ref: 0040B027
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseEnumOpen_vsnprintf
                  • String ID: >HA$@$@
                  • API String ID: 2247870055-995552534
                  • Opcode ID: 66b716632745de7941a210d9b553e3b1e1648a58aa5596adc30a80249648cf52
                  • Instruction ID: d951ec1614c52a30530e91913a323e11f85892ad2653d04f7f4d1dffaba572d0
                  • Opcode Fuzzy Hash: 66b716632745de7941a210d9b553e3b1e1648a58aa5596adc30a80249648cf52
                  • Instruction Fuzzy Hash: F421F7B49083159FDB10EF6AC58579EBBF4EF84344F00895EE89897340D3B895888F96
                  APIs
                  • socket.WS2_32 ref: 00403C4C
                  • connect.WS2_32 ref: 00403C66
                    • Part of subcall function 00403B94: shutdown.WS2_32 ref: 00403BB3
                    • Part of subcall function 00403B94: closesocket.WS2_32 ref: 00403BBF
                    • Part of subcall function 004033A1: gethostbyname.WS2_32(?), ref: 004033B2
                    • Part of subcall function 004033A1: htons.WS2_32 ref: 004033EC
                  • socket.WS2_32 ref: 00403D89
                  • connect.WS2_32 ref: 00403DA3
                  • socket.WS2_32 ref: 00403E29
                  • connect.WS2_32 ref: 00403E48
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: connectsocket$closesocketgethostbynamehtonsshutdown
                  • String ID:
                  • API String ID: 4225652895-0
                  • Opcode ID: a9d067e1c457786c3d9dea246259b8e02cacda7e4379102a03f46eb3febae908
                  • Instruction ID: 0fba90beb908a74255dcb7be2595a4d410f269a42543519fa0d916bf3a195bc6
                  • Opcode Fuzzy Hash: a9d067e1c457786c3d9dea246259b8e02cacda7e4379102a03f46eb3febae908
                  • Instruction Fuzzy Hash: 5C712B709047059FDB00EF2AC58069ABFF8AF48719F00CA7EE898A7391D7789545CF5A
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: i<A
                  • API String ID: 0-3396280644
                  • Opcode ID: 1d0d877c6ff3b457f1f93cad1e2a8c7d877c21866f896b3bbabe40e6541063c4
                  • Instruction ID: b52f65bf3ebe0c6bec769d91c54d5e0de07e6e71933a3923709542a0b49869a4
                  • Opcode Fuzzy Hash: 1d0d877c6ff3b457f1f93cad1e2a8c7d877c21866f896b3bbabe40e6541063c4
                  • Instruction Fuzzy Hash: 1691BBF49043189ECB10EF65C5886DEB7F4BF84308F0188AED499A7341E7799698CF5A
                  APIs
                    • Part of subcall function 004051A9: GetModuleFileNameA.KERNEL32 ref: 004051C6
                  • ExitProcess.KERNEL32 ref: 0040CD3F
                  • fopen.MSVCRT ref: 0040CE13
                    • Part of subcall function 004049EC: GetFileAttributesA.KERNEL32 ref: 004049F9
                    • Part of subcall function 004049EC: SetFileAttributesA.KERNEL32 ref: 00404A13
                    • Part of subcall function 004049EC: DeleteFileA.KERNEL32 ref: 00404A1D
                    • Part of subcall function 00404A4E: GetFileAttributesA.KERNEL32 ref: 00404A5A
                    • Part of subcall function 004053D0: Sleep.KERNEL32 ref: 004053DC
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$Attributes$DeleteExitModuleNameProcessSleepfopen
                  • String ID: T3A$|3A$}EA
                  • API String ID: 1458395772-2817059344
                  • Opcode ID: 0567612a08aeedec2578e0bb13782989d259f3bc8451fa6396a77ae677604975
                  • Instruction ID: 2b3d1a5baa3bd1cf932fe89ddea18cb132307519ae0653ad0a0bce4ccc4217a3
                  • Opcode Fuzzy Hash: 0567612a08aeedec2578e0bb13782989d259f3bc8451fa6396a77ae677604975
                  • Instruction Fuzzy Hash: 9351F8B0408304DADB00BF55D5853AEBBE0EF85748F01C96EE9D82B2C2C7BD8485DB5A
                  APIs
                    • Part of subcall function 004033A1: gethostbyname.WS2_32(?), ref: 004033B2
                    • Part of subcall function 004033A1: htons.WS2_32 ref: 004033EC
                  • send.WS2_32 ref: 004035CF
                  • select.WS2_32 ref: 00403636
                  • __WSAFDIsSet.WS2_32 ref: 0040364D
                  • recv.WS2_32 ref: 00403673
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: gethostbynamehtonsrecvselectsend
                  • String ID: Z
                  • API String ID: 3406712544-1505515367
                  • Opcode ID: 2052dc56e84d1895f0a9dc48bb66c4f5a486c86b75d998e0f50038cb2b252e93
                  • Instruction ID: 25d11018809a7eb39efaaf5dad8f928c3adfea759ab23c1d514ecca4a790f553
                  • Opcode Fuzzy Hash: 2052dc56e84d1895f0a9dc48bb66c4f5a486c86b75d998e0f50038cb2b252e93
                  • Instruction Fuzzy Hash: E0410EB1808354AEDB10EF25C98539EBFF4EF44744F4088AEE58897241D3798688CF96
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: fclose$fopenfread
                  • String ID: MZ
                  • API String ID: 3873288765-2410715997
                  • Opcode ID: 9657f1b3b1119f5c7091767e8c38fd4cd0b6de0af593628b6b6d8a26fd817a22
                  • Instruction ID: 7b064f6efc5561fa8d981c57a4d5f2286d9b9c7c5dfa20d8d859c38ff18431d6
                  • Opcode Fuzzy Hash: 9657f1b3b1119f5c7091767e8c38fd4cd0b6de0af593628b6b6d8a26fd817a22
                  • Instruction Fuzzy Hash: 5EF03AB0419700CAC700AF61858525FBAF4AB44344F009C2EE881C6241E2FCE5D5CF4B
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: malloc
                  • String ID:
                  • API String ID: 2803490479-0
                  • Opcode ID: 8d8346ef929e1ced26dc955478b1234d41a5a0a3707666c689b57026b96a782c
                  • Instruction ID: 26bb1f18f2193ca7105f6668e1ca156be76c16a9896446137979092a5f984e1d
                  • Opcode Fuzzy Hash: 8d8346ef929e1ced26dc955478b1234d41a5a0a3707666c689b57026b96a782c
                  • Instruction Fuzzy Hash: 1931D9B49087459FCB00EFA9C5456AEBBF0BF44304F10886EE884E7391E378D994DB5A
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: _vsnprintfrecvsend
                  • String ID: <9A$d9A
                  • API String ID: 2169655391-3684208877
                  • Opcode ID: cb9b3686f7f4fcb9cddf240828ed71f2e9948656a8b5db5f00621b93540a1a2c
                  • Instruction ID: 19fb78dcce55241861ebc919b22c83996a17c647a2e60c8ff9f1e2ac8e80e217
                  • Opcode Fuzzy Hash: cb9b3686f7f4fcb9cddf240828ed71f2e9948656a8b5db5f00621b93540a1a2c
                  • Instruction Fuzzy Hash: EC31C0B1908306AFD700EF6AD48425FBFE4EB88355F20C82EE49897351D3799544CF9A
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: getenv$_vsnprintfmalloc
                  • String ID: h7A
                  • API String ID: 3160696619-676958904
                  • Opcode ID: 24f8ad3eeab229b166db779fb24b56ae56ad6a2f636f618f2603998dfb92f2a0
                  • Instruction ID: da40df5e69458c8760323637a72a71e7466935cdfa80261ed07db2837aecf0b1
                  • Opcode Fuzzy Hash: 24f8ad3eeab229b166db779fb24b56ae56ad6a2f636f618f2603998dfb92f2a0
                  • Instruction Fuzzy Hash: 174192B44097459ED710EF25C58439EFBE0BF84348F00C86EE4E997291D7B99588CF8A
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: fclosefopenfread
                  • String ID: <A
                  • API String ID: 2679521937-2242986680
                  • Opcode ID: 3255f0eda0f9efa45981df8b516c8895c60192bd2f3e5c8e8557ede3df203789
                  • Instruction ID: c26952ae3abd0985e6c18063cdff218bc95691b3f2700e39173d3eaef08d73c9
                  • Opcode Fuzzy Hash: 3255f0eda0f9efa45981df8b516c8895c60192bd2f3e5c8e8557ede3df203789
                  • Instruction Fuzzy Hash: 983192B55493859FD360EF68C18979EBBE0AFA4304F018C2EE498C7341E7789594CB97
                  APIs
                    • Part of subcall function 00404A4E: GetFileAttributesA.KERNEL32 ref: 00404A5A
                    • Part of subcall function 0040536B: fopen.MSVCRT ref: 0040537E
                    • Part of subcall function 0040536B: fread.MSVCRT ref: 004053A4
                    • Part of subcall function 0040536B: fclose.MSVCRT ref: 004053B1
                  • CreateProcessA.KERNEL32 ref: 0040C1C0
                    • Part of subcall function 0040C5EC: ReleaseMutex.KERNEL32(?,?,?,?,?,0040C1D1), ref: 0040C5FE
                    • Part of subcall function 0040C5EC: CloseHandle.KERNEL32(00000000,?,?,?,?,?,0040C1D1), ref: 0040C60C
                    • Part of subcall function 00403B94: shutdown.WS2_32 ref: 00403BB3
                    • Part of subcall function 00403B94: closesocket.WS2_32 ref: 00403BBF
                  • ResumeThread.KERNEL32 ref: 0040C1E2
                  • ExitProcess.KERNEL32 ref: 0040C1F2
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: Process$AttributesCloseCreateExitFileHandleMutexReleaseResumeThreadclosesocketfclosefopenfreadshutdown
                  • String ID: D
                  • API String ID: 1496764705-2746444292
                  • Opcode ID: f05f0b2134a514c4cfa47bf0798895f83db7c70430c778cf8ac7f942262e3f95
                  • Instruction ID: b6b9766ed53505c4010a4c8c24d49106edac11c49aed5e074c3242c655f6055b
                  • Opcode Fuzzy Hash: f05f0b2134a514c4cfa47bf0798895f83db7c70430c778cf8ac7f942262e3f95
                  • Instruction Fuzzy Hash: 6521E9B04083049AD710AF66C59535EFBF4FF80348F01892EE8C86B282C7BD9549DF8A
                  APIs
                  • fclose.MSVCRT ref: 0040C51C
                    • Part of subcall function 00410936: RegOpenKeyExA.ADVAPI32 ref: 00410963
                    • Part of subcall function 00410936: RegDeleteValueA.ADVAPI32 ref: 0041097C
                    • Part of subcall function 00410936: RegCloseKey.ADVAPI32 ref: 0041098E
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseDeleteOpenValuefclose
                  • String ID: 7EA$lEA$xEA
                  • API String ID: 3171391837-703029007
                  • Opcode ID: 192d2399ce94cc7230b9445624a158a12f170591d79e1ed4219d18e2e18af25a
                  • Instruction ID: e3b04a7aa2cede327fc92e6a7033fe610f59aa74083eac3105ada9e39676499c
                  • Opcode Fuzzy Hash: 192d2399ce94cc7230b9445624a158a12f170591d79e1ed4219d18e2e18af25a
                  • Instruction Fuzzy Hash: 3421C2F04097049BD710BF61D5C525EBBE0AF85348F418D6EA5C42B382D7BCD589CB4A
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseHandle$CreateProcess
                  • String ID: D
                  • API String ID: 2922976086-2746444292
                  • Opcode ID: 724e75efeb19002958ae05069f2742baf8af5b34950677b2ca7c14ff1c61b838
                  • Instruction ID: fbab935f1d6e7dfe8e1afacba237a6d306025f386285e64f9b565e12cc85bf14
                  • Opcode Fuzzy Hash: 724e75efeb19002958ae05069f2742baf8af5b34950677b2ca7c14ff1c61b838
                  • Instruction Fuzzy Hash: 4D21B8B09043049BDB00EF66C58979FFBF4FF84758F00891EE998AB241D3B99548CB96
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressLibraryLoadProc
                  • String ID: 9A$9A
                  • API String ID: 2574300362-3490971509
                  • Opcode ID: cc797c492ef9caf5c0117e5ae6c5c0815f14dd54aa7156b9da78e63957f52b68
                  • Instruction ID: d48a13e1259b84ce47518d3fc8ea4e1be4dd1f7cc282424d645e1903eb2c55b3
                  • Opcode Fuzzy Hash: cc797c492ef9caf5c0117e5ae6c5c0815f14dd54aa7156b9da78e63957f52b68
                  • Instruction Fuzzy Hash: 9A1182B5A186088AEB00DFA6C8457EFBBF4EF84315F00452ED454AB281D7B95648CBA9
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseCreateValue
                  • String ID: ?
                  • API String ID: 1818849710-1684325040
                  • Opcode ID: dd198b324af1f7d1d6115da84e5c78cee6d1e84605931b42d2194f5b6d9b08f2
                  • Instruction ID: de5f51fec4fde91fab39cf441f97a3d451695e635ae9fe9040f3b00c87144a0a
                  • Opcode Fuzzy Hash: dd198b324af1f7d1d6115da84e5c78cee6d1e84605931b42d2194f5b6d9b08f2
                  • Instruction Fuzzy Hash: 771104B49083059FCB00EF69C58578EBBE4FB88354F00892EF89893341D775D6998B92
                  APIs
                  • GetForegroundWindow.USER32 ref: 0040FC96
                  • GetLocalTime.KERNEL32 ref: 0040FCB5
                  • GetWindowTextA.USER32 ref: 0040FCD5
                    • Part of subcall function 0040B003: _vsnprintf.MSVCRT ref: 0040B027
                    • Part of subcall function 0040FACC: GetLocalTime.KERNEL32 ref: 0040FAEE
                    • Part of subcall function 0040FACC: CloseHandle.KERNEL32 ref: 0040FB51
                    • Part of subcall function 0040FACC: CreateFileA.KERNEL32 ref: 0040FC04
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: LocalTimeWindow$CloseCreateFileForegroundHandleText_vsnprintf
                  • String ID: iFA
                  • API String ID: 3580565685-532656184
                  • Opcode ID: 1aff4795dfc0327aeea1d95e4b5645bb98b7c719d73cf3fcfcb6769fde18ddb5
                  • Instruction ID: b764b7c7e3ce9a8742e91d82a078812a5e52898d48a247f202ffd875ffd9796c
                  • Opcode Fuzzy Hash: 1aff4795dfc0327aeea1d95e4b5645bb98b7c719d73cf3fcfcb6769fde18ddb5
                  • Instruction Fuzzy Hash: 0B11D0B09047158AC760DF25C9852AFBBF0BB48745F0048BFE89892281E7789A84CF55
                  APIs
                    • Part of subcall function 00408D46: LoadLibraryA.KERNEL32 ref: 00408D5D
                    • Part of subcall function 00408D46: GetProcAddress.KERNEL32 ref: 00408D76
                    • Part of subcall function 00408D46: GetProcAddress.KERNEL32 ref: 00408D8F
                  • strlen.MSVCRT ref: 00409E8A
                  • strlen.MSVCRT ref: 00409F46
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressProcstrlen$LibraryLoad
                  • String ID: FBA$PBA
                  • API String ID: 4231066107-499912699
                  • Opcode ID: 6f2943ea69b5601c6fb473e7726b18b6da326a7cf562ba05f51fd6495db2688f
                  • Instruction ID: 9e328e6807ef34be45c85218d331cd70b7ec3c06c4783886c869fbf07ef2d3cd
                  • Opcode Fuzzy Hash: 6f2943ea69b5601c6fb473e7726b18b6da326a7cf562ba05f51fd6495db2688f
                  • Instruction Fuzzy Hash: 285122B450A3418FD360EF25C18879BBBE0AF88358F108D6EE898D7351E779A644CF46
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: setsockopt$Ioctlioctlsocket
                  • String ID:
                  • API String ID: 1196899187-0
                  • Opcode ID: a461ac8e76b1af521f6aa5c3f1d20aad4c1e6dd5677a94f068e25c2a8bb63ffb
                  • Instruction ID: 7a42e807d59b39563e190e3c94fb581eeb6c362007682e1a77285fd579c17996
                  • Opcode Fuzzy Hash: a461ac8e76b1af521f6aa5c3f1d20aad4c1e6dd5677a94f068e25c2a8bb63ffb
                  • Instruction Fuzzy Hash: F421F9B18083059ED700EF59C14978EFFF4AF88348F40852DE99867351D3BA9A58CF96
                  APIs
                  • RegOpenKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,00406956), ref: 004108A6
                  • RegQueryValueExA.ADVAPI32 ref: 004108DB
                  • RegQueryValueExA.ADVAPI32 ref: 00410913
                  • RegCloseKey.ADVAPI32 ref: 00410926
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: QueryValue$CloseOpen
                  • String ID:
                  • API String ID: 1586453840-0
                  • Opcode ID: 9d64b517f66c06f16d5f843a15594f141739a492221e3a5e05f59e9dc269c386
                  • Instruction ID: de7d998bdf0431f81fce0f1b4b98555c5c5cd8fac54ee446781ae9f2ba5babf7
                  • Opcode Fuzzy Hash: 9d64b517f66c06f16d5f843a15594f141739a492221e3a5e05f59e9dc269c386
                  • Instruction Fuzzy Hash: 1E21B9B590430A9BDB00EF69D54568EBBF4EF84354F00892EE894A7201E3B599548F96
                  APIs
                    • Part of subcall function 004080D4: RegOpenKeyExA.ADVAPI32 ref: 00408133
                    • Part of subcall function 004080D4: RegEnumKeyExA.ADVAPI32 ref: 004085FA
                    • Part of subcall function 004080D4: RegCloseKey.ADVAPI32 ref: 00408613
                  • strlen.MSVCRT ref: 00408662
                  • strlen.MSVCRT ref: 004086C2
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: strlen$CloseEnumOpen
                  • String ID: h@A@A$@A
                  • API String ID: 2898426016-2382529649
                  • Opcode ID: 04493f81e893d87e5cdb45f7a15133dfe5f87d2a2ade8e70fb33ef72d01dd08d
                  • Instruction ID: 43caab86a60b9782cf43506bfa4acbeaedb95704d78b05a79be1e40975aecc5e
                  • Opcode Fuzzy Hash: 04493f81e893d87e5cdb45f7a15133dfe5f87d2a2ade8e70fb33ef72d01dd08d
                  • Instruction Fuzzy Hash: EA212BB49093409FC780DF29C184A5ABBE0AF88758F419D2EF898A7351E779DA448F46
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: _filelengthi64fflushfgetposfsetpos
                  • String ID:
                  • API String ID: 3378604764-0
                  • Opcode ID: 572dcf07db478e5abad55a682674c9eb40fbba65b5d1769d826eff8997001d5c
                  • Instruction ID: c88433ada2e8ae88a1ca8b46f9d19cc589c7607253fba5790791b08eec88f6cd
                  • Opcode Fuzzy Hash: 572dcf07db478e5abad55a682674c9eb40fbba65b5d1769d826eff8997001d5c
                  • Instruction Fuzzy Hash: F70105B180C7019BC750EF25898055BBBE4EE94364F605D2FF891D2296E238E8858F96
                  APIs
                  • malloc.MSVCRT ref: 004011E5
                  • getenv.MSVCRT ref: 004012A5
                    • Part of subcall function 0040B003: _vsnprintf.MSVCRT ref: 0040B027
                    • Part of subcall function 004053E4: _beginthreadex.MSVCRT ref: 00405417
                    • Part of subcall function 004053E4: CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0040CE77), ref: 00405423
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseHandle_beginthreadex_vsnprintfgetenvmalloc
                  • String ID: U7A
                  • API String ID: 32720251-82502779
                  • Opcode ID: 417f50b027077d185518eb8a1aa58f9e89a40c02a9a88697fb44f43126abe7df
                  • Instruction ID: 8e6f58167c22f5e645b0097591fc0f3714b52ad41ce119bed0005e673d7392ec
                  • Opcode Fuzzy Hash: 417f50b027077d185518eb8a1aa58f9e89a40c02a9a88697fb44f43126abe7df
                  • Instruction Fuzzy Hash: CE2185F04087459ED710AF65C18839EBBE0BF84358F008C2EE5E99B291C7BD91888F86
                  APIs
                  • IsWindowVisible.USER32 ref: 0040D94D
                  • SendMessageA.USER32 ref: 0040D974
                    • Part of subcall function 0040B003: _vsnprintf.MSVCRT ref: 0040B027
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: MessageSendVisibleWindow_vsnprintf
                  • String ID: (FA
                  • API String ID: 3977088758-1860655055
                  • Opcode ID: 760b530b3583e3638550acf58721dfcdc46b192b21ffc769ca91e197663634be
                  • Instruction ID: 0931136deb13f06f06eb408ecf803e4a1a5f867b5632cb71c022813c8d6a8fd6
                  • Opcode Fuzzy Hash: 760b530b3583e3638550acf58721dfcdc46b192b21ffc769ca91e197663634be
                  • Instruction Fuzzy Hash: 3F010CB0908304ABD710AFA5C98569FBBE4EF44364F01882EF8D897341D7B8D598CB96
                  APIs
                  • GetTickCount.KERNEL32 ref: 0040BCAF
                    • Part of subcall function 00405455: LoadLibraryA.KERNEL32 ref: 00405461
                    • Part of subcall function 00405469: GetProcAddress.KERNEL32 ref: 0040547C
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressCountLibraryLoadProcTick
                  • String ID: @$CA
                  • API String ID: 4181504871-3183928166
                  • Opcode ID: 3b484b7422b032f322c7c83339abf1a8b61b6e3488d295d3d365209fae6e771e
                  • Instruction ID: 648be96d8c6c49ef04c96796c73a111c2a75e4022e31c03811d7ba915960d5b1
                  • Opcode Fuzzy Hash: 3b484b7422b032f322c7c83339abf1a8b61b6e3488d295d3d365209fae6e771e
                  • Instruction Fuzzy Hash: A311EEB0501704CBDB00DFA5D18478ABBF0AF44308F048069D848AF38AE7B8D9448FA6
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID: ComputerNamegethostname
                  • String ID: 8CA
                  • API String ID: 1822310196-263586042
                  • Opcode ID: 55d55492aa1e64814c378c23cd9283483dc1b1f580238bba7f06dcab4b1e5b85
                  • Instruction ID: 1f9f0f5355700a67fcf1235cda8d1ef190c0c78acdb3afe340083182e67e7d39
                  • Opcode Fuzzy Hash: 55d55492aa1e64814c378c23cd9283483dc1b1f580238bba7f06dcab4b1e5b85
                  • Instruction Fuzzy Hash: 24F0E1B0805304AFD710AF56C9815AEFBF8FF44754F41C82EF89893201E37899519B96
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1718150574.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1718130231.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718175155.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718194167.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718210536.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1718244896.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_8zyfXqDPaT.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: 6$7$7$n7A
                  • API String ID: 0-3626202689
                  • Opcode ID: bdd2fd97519feb2fbf737027a6bfb5485a56e8227d97887cb6c8ed79bb07813a
                  • Instruction ID: b7370dd82f8b8d839790749eee7d6da2d8ee6722b335b7c94580866067ac804f
                  • Opcode Fuzzy Hash: bdd2fd97519feb2fbf737027a6bfb5485a56e8227d97887cb6c8ed79bb07813a
                  • Instruction Fuzzy Hash: 6EF019B0808388DADB21AF55C58479EBBE0AB41358F00C99EE59C262C1C3BD4688CF56