Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ytgzVtg25k.exe

Overview

General Information

Sample name:ytgzVtg25k.exe
renamed because original name is a hash value
Original sample name:8dfa86ab54225a8e1c2027172d71cebf13dfa2e622ac9cc06fe1058b6be3ff20.exe
Analysis ID:1447654
MD5:02249b59bff7fa6b932d09cce70dc5b8
SHA1:93ef935fc9041c0f37bc2cb6d60e2591e33cc86e
SHA256:8dfa86ab54225a8e1c2027172d71cebf13dfa2e622ac9cc06fe1058b6be3ff20
Tags:exeNetWire
Infos:

Detection

NetWire
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected NetWire RAT
Yara detected Netwire RAT
C2 URLs / IPs found in malware configuration
Contains functionality to log keystrokes
Found evasive API chain (may stop execution after checking mutex)
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality to dynamically determine API calls
Contains functionality to record screenshots
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Detected potential crypto function
Found decision node followed by non-executed suspicious APIs
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Installs a raw input device (often for capturing keystrokes)
One or more processes crash
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • ytgzVtg25k.exe (PID: 6164 cmdline: "C:\Users\user\Desktop\ytgzVtg25k.exe" MD5: 02249B59BFF7FA6B932D09CCE70DC5B8)
    • WerFault.exe (PID: 5296 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6164 -s 380 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
NetWire RC, NetWireNetwire is a RAT, its functionality seems focused on password stealing and keylogging, but includes remote control capabilities as well.Keylog files are stored on the infected machine in an obfuscated form. The algorithm is: for i in range(0,num_read): buffer[i] = ((buffer[i]-0x24)^0x9D)&0xFF
  • APT33
https://malpedia.caad.fkie.fraunhofer.de/details/win.netwire
{"C2 list": ["86t7b9br9.ddns.net:8980"], "Password": "4678553478654HJKGHKJGHKJG4543", "Host ID": "HostId-MAm4sa", "Mutex": "-", "Install Path": "-", "Startup Name": "-", "ActiveX Key": "-", "KeyLog Directory": "-"}
SourceRuleDescriptionAuthorStrings
ytgzVtg25k.exeJoeSecurity_NetWire_1Yara detected NetWire RATJoe Security
    ytgzVtg25k.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      ytgzVtg25k.exeJoeSecurity_NetwireYara detected Netwire RATJoe Security
        ytgzVtg25k.exeWindows_Trojan_Netwire_6a7df287unknownunknown
        • 0x472d:$a: 0F B6 74 0C 10 89 CF 29 C7 F7 C6 DF 00 00 00 74 09 41 89 F3 88 5C
        ytgzVtg25k.exeWindows_Trojan_Netwire_1b43df38unknownunknown
        • 0x13874:$a1: [%.2d/%.2d/%d %.2d:%.2d:%.2d]
        • 0x134b6:$a2: \Login Data
        • 0x134e1:$a2: \Login Data
        • 0x1350e:$a2: \Login Data
        Click to see the 5 entries
        SourceRuleDescriptionAuthorStrings
        00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpWindows_Trojan_Netwire_1b43df38unknownunknown
        • 0x674:$a1: [%.2d/%.2d/%d %.2d:%.2d:%.2d]
        • 0x2b6:$a2: \Login Data
        • 0x2e1:$a2: \Login Data
        • 0x30e:$a2: \Login Data
        00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpMAL_unspecified_Jan18_1Detects unspecified malware sampleFlorian Roth
        • 0x66d:$s5: [%s] - [%.2d/%.2d/%d %.2d:%.2d:%.2d]
        • 0x4e5:$s6: %s\%s.bat
        00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpNetWiredRC_BNetWiredRCJean-Philippe Teissier / @Jipe_
        • 0x600:$str2: %d:%I64u:%s%s;
        • 0x658:$str3: %s%.2d-%.2d-%.4d
        • 0x66d:$str4: [%s] - [%.2d/%.2d/%d %.2d:%.2d:%.2d]
        • 0x675:$str5: %.2d/%.2d/%d %.2d:%.2d:%.2d
        • 0x816:$str5: %.2d/%.2d/%d %.2d:%.2d:%.2d
        • 0x694:$klg1: [Backspace]
        • 0x6a0:$klg2: [Enter]
        • 0x6a8:$klg3: [Tab]
        • 0x6ae:$klg4: [Arrow Left]
        • 0x6bb:$klg5: [Arrow Up]
        • 0x6c6:$klg6: [Arrow Right]
        • 0x6d4:$klg7: [Arrow Down]
        • 0x6e1:$klg8: [Home]
        • 0x6e8:$klg9: [Page Up]
        • 0x6f2:$klg10: [Page Down]
        • 0x6fe:$klg11: [End]
        • 0x704:$klg12: [Break]
        • 0x70c:$klg13: [Delete]
        • 0x715:$klg14: [Insert]
        • 0x71e:$klg15: [Print Screen]
        • 0x72d:$klg16: [Scroll Lock]
        00000000.00000000.1644578754.0000000000413000.00000008.00000001.01000000.00000003.sdmpJoeSecurity_NetWire_1Yara detected NetWire RATJoe Security
          00000000.00000000.1644578754.0000000000413000.00000008.00000001.01000000.00000003.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 18 entries
            SourceRuleDescriptionAuthorStrings
            0.2.ytgzVtg25k.exe.400000.0.unpackJoeSecurity_NetWire_1Yara detected NetWire RATJoe Security
              0.2.ytgzVtg25k.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                0.2.ytgzVtg25k.exe.400000.0.unpackJoeSecurity_NetwireYara detected Netwire RATJoe Security
                  0.2.ytgzVtg25k.exe.400000.0.unpackWindows_Trojan_Netwire_6a7df287unknownunknown
                  • 0x472d:$a: 0F B6 74 0C 10 89 CF 29 C7 F7 C6 DF 00 00 00 74 09 41 89 F3 88 5C
                  0.2.ytgzVtg25k.exe.400000.0.unpackWindows_Trojan_Netwire_1b43df38unknownunknown
                  • 0x13874:$a1: [%.2d/%.2d/%d %.2d:%.2d:%.2d]
                  • 0x134b6:$a2: \Login Data
                  • 0x134e1:$a2: \Login Data
                  • 0x1350e:$a2: \Login Data
                  Click to see the 15 entries
                  No Sigma rule has matched
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: ytgzVtg25k.exeAvira: detected
                  Source: 0.2.ytgzVtg25k.exe.400000.0.unpackMalware Configuration Extractor: NetWire {"C2 list": ["86t7b9br9.ddns.net:8980"], "Password": "4678553478654HJKGHKJGHKJG4543", "Host ID": "HostId-MAm4sa", "Mutex": "-", "Install Path": "-", "Startup Name": "-", "ActiveX Key": "-", "KeyLog Directory": "-"}
                  Source: ytgzVtg25k.exeReversingLabs: Detection: 97%
                  Source: ytgzVtg25k.exeVirustotal: Detection: 91%Perma Link
                  Source: ytgzVtg25k.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_0040A07F CryptUnprotectData,LocalFree,0_2_0040A07F
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_004080D4 RegOpenKeyExA,RegOpenKeyExA,CryptUnprotectData,LocalFree,RegCloseKey,RegEnumKeyExA,RegCloseKey,0_2_004080D4
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_00408D46 LoadLibraryA,GetProcAddress,GetProcAddress,CryptUnprotectData,strlen,0_2_00408D46
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_00408971 RegQueryValueExA,CryptUnprotectData,LocalFree,0_2_00408971
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_004087B6 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_004087B6
                  Source: ytgzVtg25k.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_0040D054 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,0_2_0040D054
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_0040947B SetErrorMode,FindFirstFileA,strlen,FindNextFileA,FindClose,0_2_0040947B
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_00404C1F SetErrorMode,FindFirstFileA,FindClose,FindNextFileA,0_2_00404C1F
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_004045AC SetErrorMode,FindFirstFileA,FindClose,FindNextFileA,0_2_004045AC
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_00404305 SetErrorMode,FindFirstFileA,FileTimeToSystemTime,FindNextFileA,FindClose,0_2_00404305
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_00412640 SetErrorMode,GetLogicalDriveStringsA,GetVolumeInformationA,GetDiskFreeSpaceExA,GetDriveTypeA,0_2_00412640

                  Networking

                  barindex
                  Source: Malware configuration extractorURLs: 86t7b9br9.ddns.net:8980
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_00403877 send,recv,htons,send,recv,0_2_00403877
                  Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_0040FD21 GetKeyState,GetKeyState,GetKeyState,GetKeyboardState,MapVirtualKeyA,ToAscii,GetKeyState,MapVirtualKeyA,GetKeyNameTextA,GetKeyState,0_2_0040FD21
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_004061D0 GetSystemMetrics,GetSystemMetrics,GetDesktopWindow,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,GetDIBits,malloc,GetDIBits,ReleaseDC,DeleteDC,DeleteObject,0_2_004061D0
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_0040FD21 GetKeyState,GetKeyState,GetKeyState,GetKeyboardState,MapVirtualKeyA,ToAscii,GetKeyState,MapVirtualKeyA,GetKeyNameTextA,GetKeyState,0_2_0040FD21
                  Source: ytgzVtg25k.exe, 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: RegisterRawInputDevicesmemstr_8b0cc14f-b
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_0040FD21 GetKeyState,GetKeyState,GetKeyState,GetKeyboardState,MapVirtualKeyA,ToAscii,GetKeyState,MapVirtualKeyA,GetKeyNameTextA,GetKeyState,0_2_0040FD21

                  System Summary

                  barindex
                  Source: ytgzVtg25k.exe, type: SAMPLEMatched rule: Windows_Trojan_Netwire_6a7df287 Author: unknown
                  Source: ytgzVtg25k.exe, type: SAMPLEMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
                  Source: ytgzVtg25k.exe, type: SAMPLEMatched rule: Detects credential stealer byed on many strings that indicate password store access Author: Florian Roth
                  Source: ytgzVtg25k.exe, type: SAMPLEMatched rule: Detects unspecified malware sample Author: Florian Roth
                  Source: ytgzVtg25k.exe, type: SAMPLEMatched rule: Detects NetWire RAT Author: Kevin Breen <kevin@techanarchy.net> & David Cannings
                  Source: ytgzVtg25k.exe, type: SAMPLEMatched rule: NetWiredRC Author: Jean-Philippe Teissier / @Jipe_
                  Source: ytgzVtg25k.exe, type: SAMPLEMatched rule: detect netwire in memory Author: JPCERT/CC Incident Response Group
                  Source: 0.2.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_6a7df287 Author: unknown
                  Source: 0.2.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
                  Source: 0.2.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects credential stealer byed on many strings that indicate password store access Author: Florian Roth
                  Source: 0.2.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects unspecified malware sample Author: Florian Roth
                  Source: 0.2.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NetWire RAT Author: Kevin Breen <kevin@techanarchy.net> & David Cannings
                  Source: 0.2.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NetWiredRC Author: Jean-Philippe Teissier / @Jipe_
                  Source: 0.2.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect netwire in memory Author: JPCERT/CC Incident Response Group
                  Source: 0.0.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_6a7df287 Author: unknown
                  Source: 0.0.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
                  Source: 0.0.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects credential stealer byed on many strings that indicate password store access Author: Florian Roth
                  Source: 0.0.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects unspecified malware sample Author: Florian Roth
                  Source: 0.0.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NetWire RAT Author: Kevin Breen <kevin@techanarchy.net> & David Cannings
                  Source: 0.0.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NetWiredRC Author: Jean-Philippe Teissier / @Jipe_
                  Source: 0.0.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect netwire in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
                  Source: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects unspecified malware sample Author: Florian Roth
                  Source: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: NetWiredRC Author: Jean-Philippe Teissier / @Jipe_
                  Source: 00000000.00000000.1644578754.0000000000413000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
                  Source: 00000000.00000000.1644578754.0000000000413000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects unspecified malware sample Author: Florian Roth
                  Source: 00000000.00000000.1644578754.0000000000413000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects NetWire RAT Author: Kevin Breen <kevin@techanarchy.net> & David Cannings
                  Source: 00000000.00000000.1644578754.0000000000413000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: NetWiredRC Author: Jean-Philippe Teissier / @Jipe_
                  Source: 00000000.00000000.1644578754.0000000000413000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detect netwire in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000000.00000000.1644544695.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_6a7df287 Author: unknown
                  Source: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_6a7df287 Author: unknown
                  Source: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects unspecified malware sample Author: Florian Roth
                  Source: Process Memory Space: ytgzVtg25k.exe PID: 6164, type: MEMORYSTRMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
                  Source: Process Memory Space: ytgzVtg25k.exe PID: 6164, type: MEMORYSTRMatched rule: Detects unspecified malware sample Author: Florian Roth
                  Source: Process Memory Space: ytgzVtg25k.exe PID: 6164, type: MEMORYSTRMatched rule: Detects NetWire RAT Author: Kevin Breen <kevin@techanarchy.net> & David Cannings
                  Source: Process Memory Space: ytgzVtg25k.exe PID: 6164, type: MEMORYSTRMatched rule: NetWiredRC Author: Jean-Philippe Teissier / @Jipe_
                  Source: Process Memory Space: ytgzVtg25k.exe PID: 6164, type: MEMORYSTRMatched rule: detect netwire in memory Author: JPCERT/CC Incident Response Group
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeMemory allocated: 70E80000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeMemory allocated: 71E50000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeMemory allocated: 73A90000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeMemory allocated: 77040000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeMemory allocated: 72E20000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeMemory allocated: 76860000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeMemory allocated: 73610000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeMemory allocated: 74A60000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeMemory allocated: 75550000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeMemory allocated: 73810000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeMemory allocated: 74C60000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeMemory allocated: 75100000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeMemory allocated: 752C0000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeMemory allocated: 75750000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeMemory allocated: 76360000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeMemory allocated: 73910000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeMemory allocated: 75200000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeMemory allocated: 753C0000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeMemory allocated: 75850000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeMemory allocated: 76460000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeMemory allocated: 765D0000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeMemory allocated: 76C60000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeMemory allocated: 73990000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeMemory allocated: 758D0000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeMemory allocated: 75AF0000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeMemory allocated: 75B70000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeMemory allocated: 764E0000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeMemory allocated: 76CE0000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeMemory allocated: 76E20000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeMemory allocated: 76520000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeMemory allocated: 76650000 page read and writeJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_0040E4C40_2_0040E4C4
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_00411D8F0_2_00411D8F
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_0040E1900_2_0040E190
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_004116140_2_00411614
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_0040E6A30_2_0040E6A3
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_0040EB760_2_0040EB76
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_00402BE60_2_00402BE6
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6164 -s 380
                  Source: ytgzVtg25k.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                  Source: ytgzVtg25k.exe, type: SAMPLEMatched rule: Windows_Trojan_Netwire_6a7df287 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 85051a0b94da4388eaead4c4f4b2d16d4a5eb50c3c938b3daf5c299c9c12f1e6, id = 6a7df287-1656-4779-9a96-c0ab536ae86a, last_modified = 2021-08-23
                  Source: ytgzVtg25k.exe, type: SAMPLEMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
                  Source: ytgzVtg25k.exe, type: SAMPLEMatched rule: CredentialStealer_Generic_Backdoor date = 2017-06-07, hash1 = edb2d039a57181acf95bd91b2a20bd9f1d66f3ece18506d4ad870ab65e568f2c, author = Florian Roth, description = Detects credential stealer byed on many strings that indicate password store access, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: ytgzVtg25k.exe, type: SAMPLEMatched rule: MAL_unspecified_Jan18_1 date = 2018-01-19, hash1 = f87879b29ff83616e9c9044bd5fb847cf5d2efdd2f01fc284d1a6ce7d464a417, author = Florian Roth, description = Detects unspecified malware sample, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: ytgzVtg25k.exe, type: SAMPLEMatched rule: RAT_NetWire date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net> & David Cannings, maltype = Remote Access Trojan, description = Detects NetWire RAT, reference = http://malwareconfig.com/stats/NetWire
                  Source: ytgzVtg25k.exe, type: SAMPLEMatched rule: NetWiredRC_B date = 2014-12-23, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = NetWiredRC, version = 1.1
                  Source: ytgzVtg25k.exe, type: SAMPLEMatched rule: netwire author = JPCERT/CC Incident Response Group, description = detect netwire in memory, rule_usage = memory scan, reference = internal research
                  Source: 0.2.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_6a7df287 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 85051a0b94da4388eaead4c4f4b2d16d4a5eb50c3c938b3daf5c299c9c12f1e6, id = 6a7df287-1656-4779-9a96-c0ab536ae86a, last_modified = 2021-08-23
                  Source: 0.2.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
                  Source: 0.2.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: CredentialStealer_Generic_Backdoor date = 2017-06-07, hash1 = edb2d039a57181acf95bd91b2a20bd9f1d66f3ece18506d4ad870ab65e568f2c, author = Florian Roth, description = Detects credential stealer byed on many strings that indicate password store access, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.2.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_unspecified_Jan18_1 date = 2018-01-19, hash1 = f87879b29ff83616e9c9044bd5fb847cf5d2efdd2f01fc284d1a6ce7d464a417, author = Florian Roth, description = Detects unspecified malware sample, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.2.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: RAT_NetWire date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net> & David Cannings, maltype = Remote Access Trojan, description = Detects NetWire RAT, reference = http://malwareconfig.com/stats/NetWire
                  Source: 0.2.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NetWiredRC_B date = 2014-12-23, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = NetWiredRC, version = 1.1
                  Source: 0.2.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: netwire author = JPCERT/CC Incident Response Group, description = detect netwire in memory, rule_usage = memory scan, reference = internal research
                  Source: 0.0.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_6a7df287 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 85051a0b94da4388eaead4c4f4b2d16d4a5eb50c3c938b3daf5c299c9c12f1e6, id = 6a7df287-1656-4779-9a96-c0ab536ae86a, last_modified = 2021-08-23
                  Source: 0.0.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
                  Source: 0.0.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: CredentialStealer_Generic_Backdoor date = 2017-06-07, hash1 = edb2d039a57181acf95bd91b2a20bd9f1d66f3ece18506d4ad870ab65e568f2c, author = Florian Roth, description = Detects credential stealer byed on many strings that indicate password store access, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.0.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_unspecified_Jan18_1 date = 2018-01-19, hash1 = f87879b29ff83616e9c9044bd5fb847cf5d2efdd2f01fc284d1a6ce7d464a417, author = Florian Roth, description = Detects unspecified malware sample, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.0.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: RAT_NetWire date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net> & David Cannings, maltype = Remote Access Trojan, description = Detects NetWire RAT, reference = http://malwareconfig.com/stats/NetWire
                  Source: 0.0.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NetWiredRC_B date = 2014-12-23, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = NetWiredRC, version = 1.1
                  Source: 0.0.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: netwire author = JPCERT/CC Incident Response Group, description = detect netwire in memory, rule_usage = memory scan, reference = internal research
                  Source: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
                  Source: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MAL_unspecified_Jan18_1 date = 2018-01-19, hash1 = f87879b29ff83616e9c9044bd5fb847cf5d2efdd2f01fc284d1a6ce7d464a417, author = Florian Roth, description = Detects unspecified malware sample, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: NetWiredRC_B date = 2014-12-23, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = NetWiredRC, version = 1.1
                  Source: 00000000.00000000.1644578754.0000000000413000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
                  Source: 00000000.00000000.1644578754.0000000000413000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MAL_unspecified_Jan18_1 date = 2018-01-19, hash1 = f87879b29ff83616e9c9044bd5fb847cf5d2efdd2f01fc284d1a6ce7d464a417, author = Florian Roth, description = Detects unspecified malware sample, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 00000000.00000000.1644578754.0000000000413000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: RAT_NetWire date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net> & David Cannings, maltype = Remote Access Trojan, description = Detects NetWire RAT, reference = http://malwareconfig.com/stats/NetWire
                  Source: 00000000.00000000.1644578754.0000000000413000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: NetWiredRC_B date = 2014-12-23, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = NetWiredRC, version = 1.1
                  Source: 00000000.00000000.1644578754.0000000000413000.00000008.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: netwire author = JPCERT/CC Incident Response Group, description = detect netwire in memory, rule_usage = memory scan, reference = internal research
                  Source: 00000000.00000000.1644544695.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_6a7df287 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 85051a0b94da4388eaead4c4f4b2d16d4a5eb50c3c938b3daf5c299c9c12f1e6, id = 6a7df287-1656-4779-9a96-c0ab536ae86a, last_modified = 2021-08-23
                  Source: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_6a7df287 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 85051a0b94da4388eaead4c4f4b2d16d4a5eb50c3c938b3daf5c299c9c12f1e6, id = 6a7df287-1656-4779-9a96-c0ab536ae86a, last_modified = 2021-08-23
                  Source: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MAL_unspecified_Jan18_1 date = 2018-01-19, hash1 = f87879b29ff83616e9c9044bd5fb847cf5d2efdd2f01fc284d1a6ce7d464a417, author = Florian Roth, description = Detects unspecified malware sample, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: Process Memory Space: ytgzVtg25k.exe PID: 6164, type: MEMORYSTRMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
                  Source: Process Memory Space: ytgzVtg25k.exe PID: 6164, type: MEMORYSTRMatched rule: MAL_unspecified_Jan18_1 date = 2018-01-19, hash1 = f87879b29ff83616e9c9044bd5fb847cf5d2efdd2f01fc284d1a6ce7d464a417, author = Florian Roth, description = Detects unspecified malware sample, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: Process Memory Space: ytgzVtg25k.exe PID: 6164, type: MEMORYSTRMatched rule: RAT_NetWire date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net> & David Cannings, maltype = Remote Access Trojan, description = Detects NetWire RAT, reference = http://malwareconfig.com/stats/NetWire
                  Source: Process Memory Space: ytgzVtg25k.exe PID: 6164, type: MEMORYSTRMatched rule: NetWiredRC_B date = 2014-12-23, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = NetWiredRC, version = 1.1
                  Source: Process Memory Space: ytgzVtg25k.exe PID: 6164, type: MEMORYSTRMatched rule: netwire author = JPCERT/CC Incident Response Group, description = detect netwire in memory, rule_usage = memory scan, reference = internal research
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@2/5@0/0
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_00412640 SetErrorMode,GetLogicalDriveStringsA,GetVolumeInformationA,GetDiskFreeSpaceExA,GetDriveTypeA,0_2_00412640
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_004120BC CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,0_2_004120BC
                  Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6164
                  Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\b6b74e6b-41bb-4bb7-9cf4-dd8aaa0e9649Jump to behavior
                  Source: ytgzVtg25k.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: ytgzVtg25k.exeReversingLabs: Detection: 97%
                  Source: ytgzVtg25k.exeVirustotal: Detection: 91%
                  Source: unknownProcess created: C:\Users\user\Desktop\ytgzVtg25k.exe "C:\Users\user\Desktop\ytgzVtg25k.exe"
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6164 -s 380
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_00408D46 LoadLibraryA,GetProcAddress,GetProcAddress,CryptUnprotectData,strlen,0_2_00408D46
                  Source: ytgzVtg25k.exeStatic PE information: real checksum: 0x22a50 should be: 0x21b67
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_0040491C push edi; mov dword ptr [esp], eax0_2_004049DB
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_0040FD21 push ecx; mov dword ptr [esp], 00000091h0_2_0040FD3C
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_0040FD21 push eax; mov dword ptr [esp], esi0_2_0040FD5C
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_0040D9C2 push ecx; mov dword ptr [esp], ebx0_2_0040D9EE
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_004061D0 push edx; mov dword ptr [esp], eax0_2_00406464
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_004049EC push ecx; mov dword ptr [esp], ebx0_2_00404A1A
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_004111FE push ecx; mov dword ptr [esp], eax0_2_004113ED
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_00410182 push eax; mov dword ptr [esp], ebx0_2_004102E2
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_0040FA98 push eax; mov dword ptr [esp], 004186C0h0_2_0040FB46
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_0-4794
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-4924
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_0-4839
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeAPI coverage: 0.8 %
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_0040D054 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,0_2_0040D054
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_0040947B SetErrorMode,FindFirstFileA,strlen,FindNextFileA,FindClose,0_2_0040947B
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_00404C1F SetErrorMode,FindFirstFileA,FindClose,FindNextFileA,0_2_00404C1F
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_004045AC SetErrorMode,FindFirstFileA,FindClose,FindNextFileA,0_2_004045AC
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_00404305 SetErrorMode,FindFirstFileA,FileTimeToSystemTime,FindNextFileA,FindClose,0_2_00404305
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_00412640 SetErrorMode,GetLogicalDriveStringsA,GetVolumeInformationA,GetDiskFreeSpaceExA,GetDriveTypeA,0_2_00412640
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_0040B8A4 GetVersionExA,GetVersionExA,GetSystemInfo,GetSystemMetrics,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,0_2_0040B8A4
                  Source: Amcache.hve.6.drBinary or memory string: VMware
                  Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
                  Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
                  Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
                  Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
                  Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                  Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                  Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                  Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                  Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: ytgzVtg25k.exe, 00000000.00000002.2061663525.00000000007BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: Amcache.hve.6.drBinary or memory string: vmci.sys
                  Source: Amcache.hve.6.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                  Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
                  Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
                  Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: Amcache.hve.6.drBinary or memory string: VMware20,1
                  Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
                  Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
                  Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                  Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                  Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                  Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                  Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
                  Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
                  Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
                  Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                  Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeAPI call chain: ExitProcess graph end nodegraph_0-4684
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeAPI call chain: ExitProcess graph end nodegraph_0-5001
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeAPI call chain: ExitProcess graph end nodegraph_0-4657
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_00408D46 LoadLibraryA,GetProcAddress,GetProcAddress,CryptUnprotectData,strlen,0_2_00408D46
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_0040658F keybd_event,0_2_0040658F
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_004065ED SetCursorPos,mouse_event,0_2_004065ED
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_0040FC58 GetForegroundWindow,GetLocalTime,GetWindowTextA,0_2_0040FC58
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_0040B849 getenv,GetUserNameA,0_2_0040B849
                  Source: C:\Users\user\Desktop\ytgzVtg25k.exeCode function: 0_2_0040B8A4 GetVersionExA,GetVersionExA,GetSystemInfo,GetSystemMetrics,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,0_2_0040B8A4
                  Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                  Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
                  Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                  Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe
                  Source: Yara matchFile source: ytgzVtg25k.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.2.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.0.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000000.1644578754.0000000000413000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ytgzVtg25k.exe PID: 6164, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: ytgzVtg25k.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.2.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.0.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000000.1644578754.0000000000413000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ytgzVtg25k.exe PID: 6164, type: MEMORYSTR
                  Source: Yara matchFile source: ytgzVtg25k.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.2.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.0.ytgzVtg25k.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000000.1644578754.0000000000413000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ytgzVtg25k.exe PID: 6164, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                  Native API
                  1
                  DLL Side-Loading
                  1
                  Process Injection
                  1
                  Process Injection
                  131
                  Input Capture
                  1
                  System Time Discovery
                  Remote Services1
                  Screen Capture
                  2
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                  DLL Side-Loading
                  1
                  Obfuscated Files or Information
                  LSASS Memory11
                  Security Software Discovery
                  Remote Desktop Protocol131
                  Input Capture
                  1
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                  DLL Side-Loading
                  Security Account Manager1
                  Process Discovery
                  SMB/Windows Admin Shares1
                  Archive Collected Data
                  1
                  Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
                  Account Discovery
                  Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
                  System Owner/User Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials2
                  File and Directory Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync5
                  System Information Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  ytgzVtg25k.exe97%ReversingLabsWin32.Backdoor.NetWiredRc
                  ytgzVtg25k.exe92%VirustotalBrowse
                  ytgzVtg25k.exe100%AviraTR/Spy.Gen
                  ytgzVtg25k.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://upx.sf.net0%URL Reputationsafe
                  86t7b9br9.ddns.net:89800%Avira URL Cloudsafe
                  86t7b9br9.ddns.net:89803%VirustotalBrowse
                  No contacted domains info
                  NameMaliciousAntivirus DetectionReputation
                  86t7b9br9.ddns.net:8980true
                  • 3%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://upx.sf.netAmcache.hve.6.drfalse
                  • URL Reputation: safe
                  unknown
                  No contacted IP infos
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1447654
                  Start date and time:2024-05-26 10:52:05 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 5m 16s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:9
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:ytgzVtg25k.exe
                  renamed because original name is a hash value
                  Original Sample Name:8dfa86ab54225a8e1c2027172d71cebf13dfa2e622ac9cc06fe1058b6be3ff20.exe
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@2/5@0/0
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 3
                  • Number of non-executed functions: 79
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                  • Excluded IPs from analysis (whitelisted): 20.189.173.21
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  TimeTypeDescription
                  04:53:35API Interceptor1x Sleep call for process: WerFault.exe modified
                  No context
                  No context
                  No context
                  No context
                  No context
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):65536
                  Entropy (8bit):0.7346931607260482
                  Encrypted:false
                  SSDEEP:192:hODIpLGEM0x+bH08CjYqzuiF4Z24IO8P/:KsqEHxS08CjdzuiF4Y4IO8P/
                  MD5:53B483EA15DADA7AB13B97ED26AE9825
                  SHA1:6F764300DC29422DC620B9453F3DF69BF0BE0E9F
                  SHA-256:EFB473B3EAB4AD2B2970B7D92F9F69941AFC18DBDEABF2F50085BAB82B294F6C
                  SHA-512:2F6E7C7E6471AC35CF450D663E3E7E7F392A78BFAC81F0911BBEE9855930670B9F4E1E2EC34B33138A34D918599F7B2A4A03874F8205CA9796AFDB8D515F8A24
                  Malicious:false
                  Reputation:low
                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.1.1.8.7.2.0.3.8.8.2.1.9.4.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.1.1.8.7.2.0.4.2.5.7.1.9.8.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.c.c.2.2.7.f.8.-.2.f.1.4.-.4.2.8.9.-.a.e.e.1.-.7.b.0.f.1.e.0.e.b.c.5.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.f.a.f.4.0.a.9.-.0.e.4.4.-.4.6.1.8.-.8.2.b.f.-.3.e.5.d.8.e.e.3.5.1.f.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.y.t.g.z.V.t.g.2.5.k...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.1.4.-.0.0.0.1.-.0.0.1.4.-.c.d.8.1.-.9.5.1.8.4.a.a.f.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.2.a.5.0.0.c.0.2.0.9.3.5.b.8.3.c.b.e.8.a.0.f.b.e.9.1.3.7.f.a.2.0.0.0.0.f.f.f.f.!.0.0.0.0.9.3.e.f.9.3.5.f.c.9.0.4.1.c.0.f.3.7.b.c.2.c.b.6.d.6.0.e.2.5.9.1.e.3.3.c.c.8.6.e.!.y.t.g.z.V.t.g.2.5.k...e.x.e.....T.a.r.g.e.t.A.p.p.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Mini DuMP crash report, 14 streams, Sun May 26 08:53:23 2024, 0x1205a4 type
                  Category:dropped
                  Size (bytes):34456
                  Entropy (8bit):2.009357268603733
                  Encrypted:false
                  SSDEEP:96:5k8g5OV6IOXBsOcBAJZqr6hi7WVTWF3vm2YrC5oK3vlo51krNOHCONWIkWI0YIMM:hgVRM8ODvm2YrfK3s8NmCOyjbDjWMq
                  MD5:93CD9D9A706F31DCA0E9E5DC3AFFBF5F
                  SHA1:C759B8A08E76C32C3F6F5710D37BA1FBBB3DB14E
                  SHA-256:DCF627CE23D103A9E45D73FDBD99D940EE3609641CB6FF213457285C2D732C20
                  SHA-512:0578BE2C683F8749CAEB0B8944E71B0D41EA7385F58840609A0EB8EC2F345F924D600D0EFD7B200D73A9F22AAD3C9F891D1F91BC25949272498ECE660A1E02F0
                  Malicious:false
                  Reputation:low
                  Preview:MDMP..a..... .........Rf........................t................ ..........T.......8...........T...........`...8w......................................................................................................eJ..............GenuineIntel............T...........e.Rf.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):8364
                  Entropy (8bit):3.692347182166643
                  Encrypted:false
                  SSDEEP:192:R6l7wVeJdv6VyWeYU6Y9ZSU9sWgmf8sbWDbpDG89bPOKsfnDLlm:R6lXJF6VyWej6YDSU9sWgmf8R9POpfDk
                  MD5:4AA148A19BEC9B919A246D3285EB9B81
                  SHA1:767F4A63CC30043324175F978C4848BA0CC3A004
                  SHA-256:775E4D84C56CC869317EE9771BA4A9DA14D8CCB4669A3C0C31F2C93299EA5A57
                  SHA-512:C05660FB910C12E21281F3E2884A3603827DC21DA4E96A7EF3F3DD16B8A4F9182DFACCA7AF7AC3A5902F45B4DDB27B83AF189856437C1A3E9AB9D8FC242379AD
                  Malicious:false
                  Reputation:low
                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.1.6.4.<./.P.i.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):4583
                  Entropy (8bit):4.45716840501857
                  Encrypted:false
                  SSDEEP:48:cvIwWl8zsHsJg77aI9x2WpW8VYgYm8M4JalGpDJFv/+q8XDAFDdSz2Awzydd:uIjfKI7fX7VgJyGlDCD0DdSz2Rzydd
                  MD5:A32D7D4144FE10969FF29470D4DEBF4D
                  SHA1:E15DEFC4C889FD6EF3B6D70CEA445399B76A14E5
                  SHA-256:F7D9D8B3BD14ED730304F960F83089888F11218DA0852EA188AD1ABCCDF9D6B5
                  SHA-512:5232A99B943E2BF526DE1C0DBA3FA20F5BF858E0009C0092BE7C8DBF11DC03346D3AB0EF4B0DD176DFB5C17B80D304A93E4CB60510F97FE4639DD96550E08F0D
                  Malicious:false
                  Reputation:low
                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="339836" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:MS Windows registry file, NT/2000 or above
                  Category:dropped
                  Size (bytes):1835008
                  Entropy (8bit):4.465443399735992
                  Encrypted:false
                  SSDEEP:6144:8IXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNrdwBCswSba:BXD94+WlLZMM6YFHd+a
                  MD5:0742A2E52D384EE87C5779C75719583F
                  SHA1:DB2260C98BEF78155C7B9777C4A43C26DE984308
                  SHA-256:0D0DD8A589CA7C2FF560DA3C8E4858D45DCF7C1AA8B5DFD8F74FDD1A79F1951D
                  SHA-512:5F8AD80B41B57661E37BF3F01EC909B5467CD9B6F5CFC88532A2D193AAB8AE6549BDB505B1C507ACB8AAE77E99B72F4D203B4E9C635FBB35371BBEFC85299BA8
                  Malicious:false
                  Reputation:low
                  Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmn..*J...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                  Entropy (8bit):6.186277243362521
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.94%
                  • Win16/32 Executable Delphi generic (2074/23) 0.02%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:ytgzVtg25k.exe
                  File size:86'016 bytes
                  MD5:02249b59bff7fa6b932d09cce70dc5b8
                  SHA1:93ef935fc9041c0f37bc2cb6d60e2591e33cc86e
                  SHA256:8dfa86ab54225a8e1c2027172d71cebf13dfa2e622ac9cc06fe1058b6be3ff20
                  SHA512:948339aafc124fdc15c152f1eccefa2ad5ebfd732b71bbb6bebd832bb61296027b494d0fddf18e5347c798e91c3fcc0ab000f54362dcc4012da777148923961b
                  SSDEEP:1536:7Lp3YvQCGQ10ismSklVI8VjCX1Isv3fA9qeRgLHsbg/+ySr1Ra:7Lp3Yvhn9VI8VjCX1I43fAwegLMbrO
                  TLSH:FD83D619FA0BE0F2EE4E1D7162CBF6AF4B786920D864CE41DF840D43EA53D536219B94
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...a.\V...............8.........d...!.......0....@.................................P*........ ............................
                  Icon Hash:90cececece8e8eb0
                  Entrypoint:0x4021da
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                  DLL Characteristics:NX_COMPAT
                  Time Stamp:0x565C9161 [Mon Nov 30 18:11:45 2015 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:eaf9915d2b5730c3717ea003bd93404a
                  Instruction
                  push ebp
                  mov eax, 0000103Ch
                  push edi
                  push esi
                  push ebx
                  call 00007F7460827109h
                  sub esp, eax
                  call 00007F746081835Ah
                  lea ebp, dword ptr [esp+28h]
                  call 00007F7460824119h
                  lea ebx, dword ptr [esp+2Ch]
                  call 00007F746082386Ch
                  call 00007F74608217B7h
                  call 00007F7460820F15h
                  call 00007F7460821399h
                  mov dword ptr [esp+2Ch], FFFFFFFFh
                  mov eax, dword ptr [esp+2Ch]
                  mov dword ptr [esp+08h], 00000004h
                  mov dword ptr [esp+04h], ebp
                  mov dword ptr [esp+28h], 00000000h
                  mov dword ptr [esp], eax
                  call 00007F74608189D9h
                  test al, al
                  je 00007F7460816A9Fh
                  mov edi, dword ptr [esp+28h]
                  mov esi, dword ptr [esp+2Ch]
                  mov dword ptr [esp+04h], edi
                  mov dword ptr [esp], esi
                  call 00007F7460816937h
                  test al, al
                  je 00007F74608169B2h
                  lea eax, dword ptr [esp+30h]
                  mov dword ptr [esp+08h], edi
                  mov dword ptr [esp+04h], eax
                  mov dword ptr [esp], esi
                  call 00007F74608189A5h
                  test al, al
                  je 00007F7460816A5Ah
                  mov esi, dword ptr [esp+28h]
                  cmp esi, 00000FFFh
                  jnbe 00007F74608169F7h
                  mov byte ptr [esp+esi+30h], 00000000h
                  movzx edx, byte ptr [esp+30h]
                  mov edi, dword ptr [esp+2Ch]
                  mov dword ptr [esp+04h], edx
                  mov dword ptr [esp], edi
                  mov dword ptr [esp+1Ch], edx
                  call 00007F7460816918h
                  mov edx, dword ptr [esp+1Ch]
                  test al, al
                  jne 00007F7460816A0Bh
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x1c0000x10fc.idata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x1c30c0x258.idata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x11da80x11e0028ed0d155e1e65b4e9fa75ca25b08d36False0.48537204982517484data5.977643066137705IMAGE_SCN_CNT_CODE, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .data0x130000x1a7c0x1c00d928a8e6030ae25ed51ed2929cf55a93False0.5775669642857143data6.348388745913756IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .bss0x150000x63f00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .idata0x1c0000x10fc0x12001c5eecb94befaaec442aaa260dde1560False0.5158420138888888data5.623593330498326IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  DLLImport
                  ADVAPI32.DLLCryptAcquireContextA, CryptCreateHash, CryptDestroyHash, CryptGetHashParam, CryptHashData, CryptReleaseContext, GetUserNameA, RegCloseKey, RegCreateKeyExA, RegDeleteKeyA, RegDeleteValueA, RegEnumKeyExA, RegEnumValueA, RegOpenKeyExA, RegQueryValueExA, RegSetValueExA
                  CRYPT32.DLLCryptUnprotectData
                  GDI32.dllBitBlt, CreateCompatibleBitmap, CreateCompatibleDC, DeleteDC, DeleteObject, GetDIBits, SelectObject
                  KERNEL32.dllCloseHandle, CreateDirectoryA, CreateFileA, CreateMutexA, CreatePipe, CreateProcessA, CreateToolhelp32Snapshot, DeleteFileA, EnterCriticalSection, ExitProcess, FileTimeToSystemTime, FindClose, FindFirstFileA, FindNextFileA, FreeLibrary, GetCommandLineA, GetComputerNameA, GetCurrentProcessId, GetCurrentThreadId, GetDiskFreeSpaceExA, GetDriveTypeA, GetFileAttributesA, GetFileAttributesExA, GetLastError, GetLocalTime, GetLogicalDriveStringsA, GetModuleFileNameA, GetProcAddress, GetProcessTimes, GetStartupInfoA, GetSystemInfo, GetSystemTime, GetTickCount, GetVersionExA, GetVolumeInformationA, InitializeCriticalSection, LeaveCriticalSection, LoadLibraryA, LocalFree, MoveFileA, OpenProcess, PeekNamedPipe, Process32First, Process32Next, ReadFile, ReleaseMutex, ResumeThread, SetErrorMode, SetFileAttributesA, SetFilePointer, Sleep, TerminateProcess, WideCharToMultiByte, WriteFile
                  msvcrt.dll_beginthreadex, _filelengthi64, _vscprintf, _vsnprintf, fclose, fflush, fgetpos, fgets, fopen, fread, free, fsetpos, fwrite, getenv, malloc, realloc, strlen
                  SHELL32.DLLSHGetPathFromIDListA, SHGetSpecialFolderLocation
                  USER32.dllCreateWindowExA, DefWindowProcA, DispatchMessageA, EnumWindows, GetDC, GetDesktopWindow, GetForegroundWindow, GetKeyNameTextA, GetKeyState, GetKeyboardState, GetMessageA, GetSystemMetrics, GetWindowTextA, IsWindowVisible, MapVirtualKeyA, PostQuitMessage, RegisterClassExA, ReleaseDC, SendMessageA, SetCursorPos, SetWindowTextA, ShowWindow, ToAscii, TranslateMessage, keybd_event, mouse_event
                  WS2_32.dllWSACleanup, WSAGetLastError, WSAIoctl, WSAStartup, __WSAFDIsSet, closesocket, connect, gethostbyname, gethostname, htons, inet_ntoa, ioctlsocket, ntohs, recv, select, send, setsockopt, shutdown, socket
                  No network behavior found

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:04:52:53
                  Start date:26/05/2024
                  Path:C:\Users\user\Desktop\ytgzVtg25k.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\ytgzVtg25k.exe"
                  Imagebase:0x400000
                  File size:86'016 bytes
                  MD5 hash:02249B59BFF7FA6B932D09CCE70DC5B8
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: Windows_Trojan_Netwire_1b43df38, Description: unknown, Source: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmp, Author: unknown
                  • Rule: MAL_unspecified_Jan18_1, Description: Detects unspecified malware sample, Source: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmp, Author: Florian Roth
                  • Rule: NetWiredRC_B, Description: NetWiredRC, Source: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                  • Rule: JoeSecurity_NetWire_1, Description: Yara detected NetWire RAT, Source: 00000000.00000000.1644578754.0000000000413000.00000008.00000001.01000000.00000003.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000000.1644578754.0000000000413000.00000008.00000001.01000000.00000003.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Netwire, Description: Yara detected Netwire RAT, Source: 00000000.00000000.1644578754.0000000000413000.00000008.00000001.01000000.00000003.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Netwire_1b43df38, Description: unknown, Source: 00000000.00000000.1644578754.0000000000413000.00000008.00000001.01000000.00000003.sdmp, Author: unknown
                  • Rule: MAL_unspecified_Jan18_1, Description: Detects unspecified malware sample, Source: 00000000.00000000.1644578754.0000000000413000.00000008.00000001.01000000.00000003.sdmp, Author: Florian Roth
                  • Rule: RAT_NetWire, Description: Detects NetWire RAT, Source: 00000000.00000000.1644578754.0000000000413000.00000008.00000001.01000000.00000003.sdmp, Author: Kevin Breen <kevin@techanarchy.net> & David Cannings
                  • Rule: NetWiredRC_B, Description: NetWiredRC, Source: 00000000.00000000.1644578754.0000000000413000.00000008.00000001.01000000.00000003.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                  • Rule: netwire, Description: detect netwire in memory, Source: 00000000.00000000.1644578754.0000000000413000.00000008.00000001.01000000.00000003.sdmp, Author: JPCERT/CC Incident Response Group
                  • Rule: Windows_Trojan_Netwire_6a7df287, Description: unknown, Source: 00000000.00000000.1644544695.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                  • Rule: Windows_Trojan_Netwire_6a7df287, Description: unknown, Source: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                  • Rule: JoeSecurity_NetWire_1, Description: Yara detected NetWire RAT, Source: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                  • Rule: MAL_unspecified_Jan18_1, Description: Detects unspecified malware sample, Source: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmp, Author: Florian Roth
                  Reputation:low
                  Has exited:true

                  Target ID:6
                  Start time:04:53:23
                  Start date:26/05/2024
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6164 -s 380
                  Imagebase:0x500000
                  File size:483'680 bytes
                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Reset < >

                    Execution Graph

                    Execution Coverage:1.5%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:10.5%
                    Total number of Nodes:1627
                    Total number of Limit Nodes:2
                    execution_graph 4930 4064c2 4939 4061d0 GetSystemMetrics GetSystemMetrics GetDesktopWindow 4930->4939 4933 4064f5 4935 403f73 10 API calls 4933->4935 4934 406517 malloc 4936 406527 4934->4936 4937 406515 4934->4937 4935->4937 4938 4053e4 2 API calls 4936->4938 4938->4937 4940 40621c 4939->4940 4950 406220 4939->4950 4941 40622b GetDC CreateCompatibleDC CreateCompatibleBitmap 4940->4941 4940->4950 4942 406263 4941->4942 4943 406444 ReleaseDC DeleteDC DeleteObject 4941->4943 4942->4943 4945 406275 SelectObject BitBlt 4942->4945 4944 406478 4943->4944 4943->4950 4944->4950 4957 402be6 4944->4957 4945->4943 4947 4062d0 4945->4947 4951 406306 GetDIBits 4947->4951 4948 4064ab 4949 405434 free 4948->4949 4949->4950 4950->4933 4950->4934 4951->4943 4952 406354 malloc 4951->4952 4952->4943 4953 4063bf GetDIBits 4952->4953 4954 406430 4953->4954 4956 4063f7 4953->4956 4955 405434 free 4954->4955 4955->4956 4956->4943 4961 402c08 4957->4961 4958 402c39 malloc 4959 402c55 4958->4959 4967 402c4e 4958->4967 4960 402c68 malloc 4959->4960 4962 402c7d 4959->4962 4960->4962 4960->4967 4961->4958 4961->4959 4963 402dcc malloc 4962->4963 4964 405434 free 4962->4964 4966 402d7e malloc 4962->4966 4962->4967 4963->4966 4963->4967 4964->4963 4966->4967 4967->4948 4968 401342 4979 40c46d 4968->4979 4971 403b94 2 API calls 4972 401352 4971->4972 4973 401000 2 API calls 4972->4973 4974 401357 4973->4974 4999 40c5b8 4974->4999 4980 40c480 4979->4980 4982 40c4a0 4980->4982 5018 4109e0 RegOpenKeyExA 4980->5018 4984 40c4cc 4982->4984 5021 410a45 4982->5021 4985 40c4ed 4984->4985 4986 40c4e5 fclose 4984->4986 4987 4051fb GetModuleFileNameA 4985->4987 4986->4985 4988 40c504 4987->4988 4989 401347 4988->4989 4990 40afa3 _vsnprintf 4988->4990 4989->4971 4991 40c530 4990->4991 4992 404a4e GetFileAttributesA 4991->4992 4993 40c538 4992->4993 4994 40c544 4993->4994 4995 4049ec 3 API calls 4993->4995 4996 4051a9 GetModuleFileNameA 4994->4996 4995->4994 4997 40c55b 4996->4997 4997->4989 5032 40c27a 4997->5032 5000 40c5c1 ReleaseMutex CloseHandle 4999->5000 5001 40135c WSACleanup ExitProcess 4999->5001 5000->5001 5002 40ce57 5001->5002 5003 4051fb GetModuleFileNameA 5002->5003 5004 40ce79 5003->5004 5005 40137d 5004->5005 5006 40afa3 _vsnprintf 5004->5006 5007 40cead 5006->5007 5008 404a4e GetFileAttributesA 5007->5008 5009 40ceb5 5008->5009 5010 40ceb9 SetFileAttributesA 5009->5010 5011 40cecb fopen 5009->5011 5010->5011 5012 40cf9b 5011->5012 5015 40cee5 5011->5015 5013 404a4e GetFileAttributesA 5012->5013 5014 40cfa7 5013->5014 5014->5005 5016 40cfab SetFileAttributesA 5014->5016 5017 40cf6d fwrite fclose 5015->5017 5016->5005 5017->5012 5019 410a19 RegDeleteValueA RegCloseKey 5018->5019 5020 410a3e 5018->5020 5019->5020 5020->4982 5022 410a62 5021->5022 5024 410a82 5021->5024 5023 40afa3 _vsnprintf 5022->5023 5023->5024 5025 410a98 RegDeleteKeyA 5024->5025 5026 410ab3 RegOpenKeyExA 5025->5026 5027 410ae3 5025->5027 5026->5027 5030 410ae8 5026->5030 5027->4984 5028 410b22 RegEnumKeyExA 5029 410b43 RegCloseKey RegDeleteKeyA 5028->5029 5028->5030 5029->5027 5030->5028 5030->5029 5031 410a45 _vsnprintf 5030->5031 5031->5030 5033 40c288 5032->5033 5034 40c2cd getenv 5033->5034 5035 40afa3 _vsnprintf 5034->5035 5036 40c300 5035->5036 5037 40afa3 _vsnprintf 5036->5037 5038 40c32e 5037->5038 5039 40c337 5038->5039 5040 40c33e fopen 5038->5040 5039->4989 5040->5039 5041 40c354 fwrite fclose getenv 5040->5041 5042 40afa3 _vsnprintf 5041->5042 5043 40c3a7 5042->5043 5044 40491c 3 API calls 5043->5044 5044->5039 5050 401543 5051 40157b 5050->5051 5054 404305 SetErrorMode FindFirstFileA 5051->5054 5055 40433c 5054->5055 5056 40436d 5054->5056 5057 403f73 10 API calls 5055->5057 5079 411ee0 malloc 5056->5079 5059 404368 5057->5059 5061 4018c0 5059->5061 5063 405434 free 5059->5063 5060 404383 5060->5059 5062 411ee0 malloc 5060->5062 5064 4043a1 5062->5064 5063->5061 5064->5059 5065 4043a9 FileTimeToSystemTime 5064->5065 5066 40afa3 _vsnprintf 5065->5066 5069 404429 5066->5069 5067 40afa3 _vsnprintf 5067->5069 5068 4044f0 FindNextFileA 5068->5065 5070 404506 FindClose 5068->5070 5069->5067 5069->5068 5081 411fcc 5069->5081 5085 41202d 5070->5085 5073 403f73 10 API calls 5075 40457d 5073->5075 5074 404521 5074->5073 5088 411f25 5075->5088 5078 411f25 free 5078->5059 5080 411efb 5079->5080 5080->5060 5082 411fec 5081->5082 5084 411ff8 5081->5084 5082->5084 5091 411f89 realloc 5082->5091 5084->5068 5086 411fcc realloc 5085->5086 5087 41204d 5086->5087 5087->5074 5089 404585 5088->5089 5090 411f33 free 5088->5090 5089->5078 5090->5089 5092 411fad 5091->5092 5092->5084 5093 40a943 5102 406e5a 5093->5102 5096 40a970 5098 403f73 10 API calls 5096->5098 5097 40a95b strlen 5097->5096 5099 40ab7c 5098->5099 5100 40ab90 5099->5100 5101 405434 free 5099->5101 5101->5100 5103 406e80 5102->5103 5104 406f53 5102->5104 5106 407014 5103->5106 5107 406e89 5103->5107 5105 406a02 11 API calls 5104->5105 5108 406f6a 5105->5108 5110 406a02 11 API calls 5106->5110 5109 406f49 5107->5109 5189 406a02 5107->5189 5111 406f7b getenv 5108->5111 5158 406eb0 5108->5158 5113 40afa3 _vsnprintf 5109->5113 5114 40702b 5110->5114 5116 40afa3 _vsnprintf 5111->5116 5118 4070fc 5113->5118 5115 40703c getenv 5114->5115 5114->5158 5119 40afa3 _vsnprintf 5115->5119 5120 406faa 5116->5120 5122 40afa3 _vsnprintf 5118->5122 5123 40706b 5119->5123 5124 406764 3 API calls 5120->5124 5121 406eba getenv 5125 40afa3 _vsnprintf 5121->5125 5126 407126 5122->5126 5127 406764 3 API calls 5123->5127 5128 406fcc 5124->5128 5129 406ee9 5125->5129 5207 405469 GetProcAddress 5126->5207 5132 40708d 5127->5132 5133 406fd0 getenv 5128->5133 5171 406f4e 5128->5171 5200 406764 5129->5200 5131 40713d 5131->5158 5208 405469 GetProcAddress 5131->5208 5135 407091 getenv 5132->5135 5132->5171 5136 40afa3 _vsnprintf 5133->5136 5140 40afa3 _vsnprintf 5135->5140 5136->5109 5140->5109 5141 406f0f getenv 5143 40afa3 _vsnprintf 5141->5143 5142 40716f 5142->5158 5209 405469 GetProcAddress 5142->5209 5143->5109 5145 4071a1 5145->5158 5210 405469 GetProcAddress 5145->5210 5147 4071d3 5147->5158 5211 405469 GetProcAddress 5147->5211 5149 407205 5149->5158 5212 405469 GetProcAddress 5149->5212 5151 407237 5151->5158 5213 405469 GetProcAddress 5151->5213 5153 407269 5153->5158 5214 405469 GetProcAddress 5153->5214 5155 40729b 5155->5158 5215 405469 GetProcAddress 5155->5215 5157 4072cd 5157->5158 5216 405469 GetProcAddress 5157->5216 5158->5096 5158->5097 5160 4072ff 5160->5158 5217 405469 GetProcAddress 5160->5217 5162 407331 5162->5158 5218 405469 GetProcAddress 5162->5218 5164 407363 5164->5158 5165 404a4e GetFileAttributesA 5164->5165 5182 40738d 5165->5182 5166 4076f4 5167 404a4e GetFileAttributesA 5166->5167 5168 40772f 5167->5168 5169 407737 fopen 5168->5169 5168->5171 5170 407764 5169->5170 5169->5171 5234 404be8 GetFileAttributesExA 5170->5234 5236 4069c9 5171->5236 5174 407795 fclose 5174->5171 5175 4077a9 fread fclose 5180 4077f5 5175->5180 5176 405434 free 5176->5171 5177 406d6d strlen 5177->5180 5178 4074d0 strlen 5178->5182 5179 4078a5 5179->5176 5180->5177 5180->5179 5181 407923 strlen 5180->5181 5184 4079c9 strlen 5180->5184 5187 40af50 3 API calls 5180->5187 5188 40b2cb 2 API calls 5180->5188 5181->5180 5182->5158 5182->5166 5182->5178 5183 4075a6 strlen 5182->5183 5219 40af50 _vscprintf 5182->5219 5223 40b2cb 5182->5223 5183->5182 5184->5180 5187->5180 5188->5180 5240 4068db 5189->5240 5191 406ac0 LoadLibraryA 5193 406a30 5191->5193 5193->5191 5194 406a37 5193->5194 5195 404a4e GetFileAttributesA 5193->5195 5196 406b0b LoadLibraryA 5193->5196 5197 406b56 LoadLibraryA 5193->5197 5198 406ba1 LoadLibraryA 5193->5198 5199 40afa3 _vsnprintf 5193->5199 5250 405455 LoadLibraryA 5193->5250 5194->5121 5194->5158 5195->5193 5196->5193 5197->5193 5198->5193 5199->5193 5257 40b1ee 5200->5257 5203 4067c0 fread 5205 4068bd fclose 5203->5205 5206 4067ef 5203->5206 5204 4068cc 5204->5141 5204->5171 5205->5204 5206->5205 5207->5131 5208->5142 5209->5145 5210->5147 5211->5149 5212->5151 5213->5153 5214->5155 5215->5157 5216->5160 5217->5162 5218->5164 5220 40af73 malloc 5219->5220 5221 40af6e 5219->5221 5220->5221 5222 40af88 _vsnprintf 5220->5222 5221->5182 5222->5221 5224 40b2e8 5223->5224 5225 40b351 5224->5225 5226 40b33a 5224->5226 5233 40b32c 5224->5233 5227 40b36f realloc 5225->5227 5229 40b358 5225->5229 5228 405434 free 5226->5228 5226->5233 5230 40b384 5227->5230 5227->5233 5228->5233 5231 405434 free 5229->5231 5229->5233 5232 405434 free 5230->5232 5230->5233 5231->5233 5232->5233 5233->5182 5235 404c0f malloc 5234->5235 5235->5174 5235->5175 5237 4069d6 5236->5237 5238 4069fd 5237->5238 5259 405485 5237->5259 5238->5158 5241 406903 5240->5241 5242 40afa3 _vsnprintf 5241->5242 5243 40692a 5242->5243 5251 41091e RegOpenKeyExA 5243->5251 5246 4069bb 5246->5193 5247 40afa3 _vsnprintf 5248 406989 5247->5248 5249 41091e 4 API calls 5248->5249 5249->5246 5250->5193 5252 406956 5251->5252 5253 41095c RegQueryValueExA 5251->5253 5252->5246 5252->5247 5254 410991 5253->5254 5255 4109ca RegCloseKey 5253->5255 5254->5255 5256 410999 RegQueryValueExA 5254->5256 5255->5252 5256->5255 5258 406794 fopen 5257->5258 5258->5203 5258->5204 5260 405492 FreeLibrary 5259->5260 5261 40549b 5259->5261 5260->5261 5261->5237 5262 4018c5 5265 4102ff 5262->5265 5266 410322 5265->5266 5267 4103ee 5266->5267 5268 40afa3 _vsnprintf 5266->5268 5269 403f73 10 API calls 5267->5269 5270 410359 5268->5270 5275 4018d4 5269->5275 5276 405524 fopen 5270->5276 5273 41037e malloc 5274 4053e4 2 API calls 5273->5274 5274->5275 5277 405644 5276->5277 5278 40555c 5276->5278 5277->5267 5277->5273 5279 40549d 4 API calls 5278->5279 5280 40557c 5279->5280 5281 405584 fgetpos 5280->5281 5282 405629 fclose 5280->5282 5281->5282 5283 4055a6 fsetpos 5281->5283 5282->5277 5284 405638 5282->5284 5283->5282 5287 4055d6 malloc 5283->5287 5285 405434 free 5284->5285 5285->5277 5287->5282 5288 4055e6 fread 5287->5288 5289 405604 realloc 5288->5289 5290 405618 fclose 5288->5290 5289->5290 5290->5277 5291 401847 5292 401853 5291->5292 5293 40afa3 _vsnprintf 5292->5293 5294 4018b8 5293->5294 5295 404305 19 API calls 5294->5295 5296 4018c0 5295->5296 5297 40d24e 5298 40d260 5297->5298 5299 40d26c 5297->5299 5317 40d267 5298->5317 5331 405050 CreateDirectoryA 5298->5331 5300 40cff8 fclose 5299->5300 5302 40d27b 5300->5302 5305 411ee0 malloc 5302->5305 5303 40d35c 5307 404a77 GetFileAttributesA 5303->5307 5304 405434 free 5308 40d3ae 5304->5308 5306 40d29a 5305->5306 5309 411fcc realloc 5306->5309 5310 40d368 5307->5310 5311 40d2b7 5309->5311 5313 403f73 10 API calls 5310->5313 5319 40d054 SetErrorMode 5311->5319 5313->5317 5314 403f73 10 API calls 5315 40d34a 5314->5315 5316 411f25 free 5315->5316 5316->5317 5317->5304 5318 40d2d2 5318->5314 5320 40afa3 _vsnprintf 5319->5320 5321 40d09b 5320->5321 5322 40d0a2 FindFirstFileA 5321->5322 5323 40d246 5321->5323 5322->5323 5329 40d0c1 5322->5329 5323->5318 5324 40d20f FindNextFileA 5325 40d23d FindClose 5324->5325 5324->5329 5325->5323 5326 411fcc realloc 5326->5324 5327 411fcc realloc 5327->5329 5328 40afa3 _vsnprintf 5328->5329 5329->5324 5329->5325 5329->5326 5329->5327 5329->5328 5330 40d054 2 API calls 5329->5330 5330->5329 5331->5303 5332 40a850 5333 406e5a 38 API calls 5332->5333 5334 40a85c 5333->5334 5335 40a868 strlen 5334->5335 5336 40a87d 5334->5336 5335->5336 5337 403f73 10 API calls 5336->5337 5338 40ab7c 5337->5338 5339 40ab90 5338->5339 5340 405434 free 5338->5340 5340->5339 5341 401b51 malloc 5342 401b67 5341->5342 5344 401bdf 5341->5344 5343 4053e4 2 API calls 5342->5343 5343->5344 5345 4017d7 5346 4017f1 5345->5346 5349 40669f 5346->5349 5350 4066ac 5349->5350 5351 406731 mouse_event 5350->5351 5352 40180a 5350->5352 5351->5352 5353 411459 RegOpenKeyExA 5354 411606 5353->5354 5355 41148a RegQueryValueExA 5353->5355 5356 4114d0 malloc 5355->5356 5357 411598 RegCloseKey 5355->5357 5356->5357 5358 4114ec RegQueryValueExA 5356->5358 5357->5354 5359 4115ab 5357->5359 5360 411528 5358->5360 5361 41152c RegSetValueExA 5358->5361 5362 40afa3 _vsnprintf 5359->5362 5365 405434 free 5360->5365 5361->5360 5363 41156e RegDeleteValueA 5361->5363 5364 4115e7 5362->5364 5363->5360 5364->5354 5366 403f73 10 API calls 5364->5366 5365->5357 5366->5354 5367 40a8d8 5378 407b77 getenv 5367->5378 5372 40a935 5373 403f73 10 API calls 5372->5373 5375 40ab7c 5373->5375 5374 40b2cb 2 API calls 5374->5372 5376 40ab90 5375->5376 5377 405434 free 5375->5377 5377->5376 5379 40afa3 _vsnprintf 5378->5379 5380 407bb6 5379->5380 5381 404a4e GetFileAttributesA 5380->5381 5382 407bc2 5381->5382 5383 407bf5 fopen 5382->5383 5384 407bc9 getenv 5382->5384 5386 407c24 5383->5386 5387 407c1a 5383->5387 5385 40afa3 _vsnprintf 5384->5385 5385->5383 5388 404be8 GetFileAttributesExA 5386->5388 5397 40a795 getenv 5387->5397 5389 407c38 5388->5389 5390 407d10 fclose 5389->5390 5391 407c4d malloc 5389->5391 5390->5387 5391->5390 5392 407c6f fread 5391->5392 5393 407d04 5392->5393 5394 407cb4 5392->5394 5395 405434 free 5393->5395 5396 407cdc fclose 5394->5396 5395->5390 5396->5387 5398 40afa3 _vsnprintf 5397->5398 5399 40a7c7 5398->5399 5400 404a4e GetFileAttributesA 5399->5400 5401 40a7d3 5400->5401 5402 40a7eb 5401->5402 5404 40a4d5 5401->5404 5402->5372 5402->5374 5405 405524 13 API calls 5404->5405 5409 40a4fd 5405->5409 5406 40a511 5406->5402 5407 40a54d 5408 405434 free 5407->5408 5408->5406 5409->5406 5409->5407 5411 40b2cb 2 API calls 5409->5411 5412 40a07f 5409->5412 5411->5409 5415 40a0ab 5412->5415 5413 40a390 5413->5409 5414 40a180 CryptUnprotectData 5414->5415 5415->5413 5415->5414 5416 40a29c LocalFree 5415->5416 5417 40af50 3 API calls 5415->5417 5418 40b2cb 2 API calls 5415->5418 5416->5415 5417->5415 5418->5415 5419 405dd8 getenv 5420 40afa3 _vsnprintf 5419->5420 5421 405e15 5420->5421 5422 404a4e GetFileAttributesA 5421->5422 5423 405e1d 5422->5423 5424 405e21 getenv 5423->5424 5425 405e49 5423->5425 5426 40afa3 _vsnprintf 5424->5426 5427 404a4e GetFileAttributesA 5425->5427 5426->5425 5429 405e51 5427->5429 5428 405fa6 5430 403f73 10 API calls 5428->5430 5429->5428 5432 405ea9 CreatePipe 5429->5432 5431 405fc8 5430->5431 5432->5428 5433 405ef2 CreatePipe 5432->5433 5433->5428 5434 405f17 GetStartupInfoA CreateProcessA 5433->5434 5434->5428 5435 405fcd CloseHandle CloseHandle 5434->5435 5436 403f73 10 API calls 5435->5436 5437 40601b PeekNamedPipe 5436->5437 5443 406062 5437->5443 5438 406110 CloseHandle CloseHandle TerminateProcess 5442 403f73 10 API calls 5438->5442 5440 4060a1 ReadFile 5440->5443 5441 406081 malloc 5441->5443 5444 406167 5442->5444 5443->5437 5443->5438 5443->5440 5443->5441 5445 403f73 10 API calls 5443->5445 5447 4053d0 Sleep 5443->5447 5444->5431 5446 405434 free 5444->5446 5445->5443 5446->5431 5447->5443 5448 401a59 5449 401a83 5448->5449 5452 404a2d MoveFileA 5449->5452 5451 401ac5 5452->5451 5453 4018d9 5456 410417 5453->5456 5457 410431 5456->5457 5458 4018e1 5457->5458 5459 410439 GetLocalTime 5457->5459 5460 40afa3 _vsnprintf 5459->5460 5462 410487 5460->5462 5461 4104ab 5464 40afa3 _vsnprintf 5461->5464 5462->5461 5467 40fa98 5462->5467 5465 4104cf 5464->5465 5466 4049ec 3 API calls 5465->5466 5466->5458 5468 40fab0 GetLocalTime 5467->5468 5469 40fbe2 5467->5469 5470 40fb2f 5468->5470 5471 40facf 5468->5471 5469->5461 5474 40fb46 5470->5474 5475 40fb3d CloseHandle 5470->5475 5479 40fb23 5470->5479 5471->5470 5472 40fad3 5471->5472 5473 40afa3 _vsnprintf 5472->5473 5476 40fb10 5473->5476 5477 4049ec 3 API calls 5474->5477 5475->5474 5476->5479 5480 40fb1a CloseHandle 5476->5480 5477->5479 5478 404a77 GetFileAttributesA 5482 40fb89 5478->5482 5479->5478 5481 40fc11 5479->5481 5480->5479 5481->5469 5483 40fc21 WriteFile 5481->5483 5484 40fb99 CreateFileA 5482->5484 5486 405072 2 API calls 5482->5486 5483->5469 5484->5469 5485 40fbee SetFilePointer 5484->5485 5485->5481 5486->5484 4639 4021da 4640 4021e8 4639->4640 4655 403b54 WSAStartup 4640->4655 4642 4021ef 4669 40f91c GetTickCount GetCurrentProcessId GetCurrentThreadId 4642->4669 4644 4021f8 4658 40c72b 4644->4658 4648 403b94 shutdown closesocket 4654 402210 4648->4654 4650 40421c 16 API calls 4650->4654 4653 4053d0 Sleep 4653->4654 4654->4648 4654->4650 4654->4653 4714 401000 4654->4714 4720 403e63 4654->4720 4727 40f6e5 4654->4727 4656 403b85 InitializeCriticalSection 4655->4656 4657 403b79 ExitProcess 4655->4657 4656->4642 4734 40c5e0 4658->4734 4660 40c73c malloc 4661 40c76a 4660->4661 4662 40c7e8 malloc 4661->4662 4662->4661 4663 40c80e 4662->4663 4736 405434 4663->4736 4665 40c819 4666 40220b 4665->4666 4667 40c84b malloc 4665->4667 4671 40cbb4 4666->4671 4668 40c87e 4667->4668 4668->4665 4670 40f94b 4669->4670 4670->4644 4739 4051a9 GetModuleFileNameA 4671->4739 4673 40cbd6 4674 40ce4f 4673->4674 4741 40b56d 4673->4741 4674->4654 4676 40ccd6 4677 40cceb 4676->4677 4779 40c3cc 4676->4779 4794 40c577 CreateMutexA 4677->4794 4681 40ccf0 4684 40cd04 ExitProcess 4681->4684 4685 40cd10 4681->4685 4683 40cbfc 4683->4676 4687 40cc4c 4683->4687 4745 4049ec GetFileAttributesA 4683->4745 4749 404a4e GetFileAttributesA 4683->4749 4751 4053d0 Sleep 4683->4751 4691 40cd48 4685->4691 4797 41086e RegCreateKeyExA 4685->4797 4752 405072 4687->4752 4690 40cdc4 4697 40cdd4 fopen 4690->4697 4702 40cde9 4690->4702 4691->4690 4693 40afa3 _vsnprintf 4691->4693 4694 40cd84 4693->4694 4696 40afa3 _vsnprintf 4694->4696 4698 40cda0 4696->4698 4697->4702 4699 41086e 3 API calls 4698->4699 4699->4690 4700 40cc64 4700->4676 4707 40cc9a 4700->4707 4772 40afa3 _vsnprintf 4700->4772 4701 40ce43 4803 40c941 4701->4803 4702->4701 4704 40b56d getenv 4702->4704 4706 40ce17 4704->4706 4800 4053e4 _beginthreadex 4706->4800 4708 404a4e GetFileAttributesA 4707->4708 4710 40ccbc 4708->4710 4710->4676 4711 40ccc0 4710->4711 4774 40491c 4711->4774 4716 40101d 4714->4716 4717 40105e 4716->4717 4855 40cff8 4716->4855 4718 40106e 4717->4718 4859 4053d0 Sleep 4717->4859 4718->4654 4722 403e66 4720->4722 4723 403e9b 4722->4723 4860 403bd0 4722->4860 4883 4053d0 Sleep 4722->4883 4884 403403 4723->4884 4728 40f70e 4727->4728 4729 40f752 4728->4729 4732 40f7a2 4728->4732 4730 403b94 2 API calls 4729->4730 4731 40f75c 4730->4731 4731->4654 4908 403f73 4732->4908 4735 40c603 4734->4735 4735->4660 4737 405442 free 4736->4737 4738 40544a 4736->4738 4737->4738 4738->4665 4740 4051d2 4739->4740 4740->4673 4742 40b5c0 4741->4742 4743 40b58b 4741->4743 4742->4683 4743->4742 4744 40b6b9 getenv 4743->4744 4744->4743 4746 404a04 4745->4746 4747 404a1a DeleteFileA 4745->4747 4746->4747 4748 404a08 SetFileAttributesA 4746->4748 4747->4683 4748->4747 4750 404a65 4749->4750 4750->4683 4751->4683 4753 405096 4752->4753 4755 40509a 4752->4755 4753->4676 4757 404a9d fopen 4753->4757 4755->4753 4824 404a77 GetFileAttributesA 4755->4824 4826 405050 CreateDirectoryA 4755->4826 4758 404ac2 fopen 4757->4758 4759 404b87 4757->4759 4760 404ae0 4758->4760 4761 404b6b 4758->4761 4759->4700 4763 404aea malloc 4760->4763 4769 404b5f 4760->4769 4762 404b6d fclose 4761->4762 4762->4759 4764 404b7b 4762->4764 4763->4760 4765 404b00 fread 4763->4765 4766 4049ec 3 API calls 4764->4766 4767 404b2a fwrite 4765->4767 4768 404b1c free 4765->4768 4766->4759 4767->4765 4767->4768 4771 404b61 fclose 4768->4771 4769->4771 4771->4762 4773 40afd0 4772->4773 4773->4707 4775 404945 4774->4775 4776 40497f CreateProcessA 4775->4776 4777 4049e4 4776->4777 4778 4049cc CloseHandle CloseHandle 4776->4778 4777->4684 4778->4777 4781 40c3db 4779->4781 4782 40c412 4781->4782 4791 40c43a 4781->4791 4827 40525e 4781->4827 4783 40525e GetCommandLineA 4782->4783 4784 40c42d 4783->4784 4785 404a4e GetFileAttributesA 4784->4785 4784->4791 4786 40c444 4785->4786 4787 40c452 4786->4787 4788 40c44b 4786->4788 4790 404a77 GetFileAttributesA 4787->4790 4789 4049ec 3 API calls 4788->4789 4789->4791 4792 40c457 4790->4792 4791->4677 4792->4791 4831 405105 4792->4831 4795 40c5b4 4794->4795 4796 40c5a7 GetLastError 4794->4796 4795->4681 4796->4795 4798 410915 4797->4798 4799 4108c8 RegSetValueExA RegCloseKey 4797->4799 4798->4691 4799->4798 4801 405430 4800->4801 4802 405420 CloseHandle 4800->4802 4801->4701 4802->4801 4804 40c96e 4803->4804 4837 4051fb 4804->4837 4806 40c97e 4807 40c982 4806->4807 4808 40afa3 _vsnprintf 4806->4808 4807->4674 4809 40c9b3 4808->4809 4810 404a4e GetFileAttributesA 4809->4810 4811 40c9bb fopen 4810->4811 4811->4807 4813 40c9df fread 4811->4813 4814 40ca00 4813->4814 4816 40cb76 fclose 4814->4816 4841 40564e 4814->4841 4817 404a4e GetFileAttributesA 4816->4817 4818 40cb8c 4817->4818 4818->4807 4819 40cb98 SetFileAttributesA 4818->4819 4819->4807 4820 40ca1e 4848 40549d 4820->4848 4822 40cafe 4823 40cb4e fwrite 4822->4823 4823->4816 4825 404a8e 4824->4825 4825->4755 4826->4755 4828 405284 4827->4828 4829 4052a6 GetCommandLineA 4828->4829 4830 4052bf 4829->4830 4830->4781 4832 405124 4831->4832 4833 405127 LoadLibraryA GetProcAddress 4831->4833 4832->4833 4834 40514a 4833->4834 4836 405193 4833->4836 4835 404a77 GetFileAttributesA 4834->4835 4834->4836 4835->4836 4836->4791 4838 40522b 4837->4838 4839 4051a9 GetModuleFileNameA 4838->4839 4840 40523b 4839->4840 4840->4806 4842 405674 4841->4842 4843 405680 GetSystemTime 4842->4843 4844 405687 GetLocalTime 4842->4844 4845 40568c 4843->4845 4844->4845 4846 40afa3 _vsnprintf 4845->4846 4847 4056d1 4846->4847 4847->4820 4849 4054b8 fgetpos 4848->4849 4850 4054db 4848->4850 4851 4054d1 4849->4851 4854 4054cc 4849->4854 4850->4851 4852 4054e0 fflush _filelengthi64 4850->4852 4853 40550d fsetpos 4851->4853 4851->4854 4852->4853 4853->4854 4854->4822 4856 40d009 4855->4856 4857 40d023 4856->4857 4858 40d01b fclose 4856->4858 4857->4716 4858->4857 4859->4718 4861 403be8 4860->4861 4862 403d24 4861->4862 4871 403bf1 4861->4871 4863 403d32 4862->4863 4864 403df3 4862->4864 4870 403cf5 4863->4870 4873 4033a1 2 API calls 4863->4873 4878 403d72 socket connect 4863->4878 4879 403ae4 3 API calls 4863->4879 4880 403b94 2 API calls 4863->4880 4866 4033a1 2 API calls 4864->4866 4867 403e09 4866->4867 4869 403e12 socket 4867->4869 4867->4870 4868 403c35 socket connect 4868->4871 4869->4870 4872 403e39 connect 4869->4872 4870->4722 4871->4868 4871->4870 4874 403b94 2 API calls 4871->4874 4882 403ca2 4871->4882 4892 4033a1 gethostbyname 4871->4892 4896 403ae4 4871->4896 4872->4870 4876 403cea 4872->4876 4873->4863 4874->4871 4904 403b94 4876->4904 4878->4863 4879->4863 4880->4863 4881 403ae4 3 API calls 4881->4882 4882->4870 4882->4876 4882->4881 4883->4722 4885 40341a ioctlsocket 4884->4885 4886 40343b 4884->4886 4885->4886 4887 4034d4 4886->4887 4888 403447 setsockopt 4886->4888 4890 403507 4887->4890 4891 4034d9 setsockopt 4887->4891 4888->4887 4889 403479 WSAIoctl 4888->4889 4889->4887 4890->4654 4891->4890 4893 4033fa 4892->4893 4894 4033be 4892->4894 4893->4871 4895 4033d6 htons 4894->4895 4895->4893 4897 403b1a 4896->4897 4898 403a1d 4896->4898 4897->4871 4898->4897 4899 40afa3 _vsnprintf 4898->4899 4900 403a60 send 4899->4900 4901 403a85 4900->4901 4903 403a81 4900->4903 4902 403a9d recv 4901->4902 4902->4903 4903->4871 4905 403ba2 4904->4905 4906 403bc5 4904->4906 4905->4906 4907 403ba8 shutdown closesocket 4905->4907 4906->4870 4907->4906 4909 403f86 EnterCriticalSection 4908->4909 4922 403eb7 4909->4922 4913 403fc0 4914 4040bc LeaveCriticalSection 4913->4914 4915 4040cd 4914->4915 4915->4731 4916 403fea malloc 4920 403ffd 4916->4920 4917 405434 free 4917->4916 4918 40406c send 4919 40409b WSAGetLastError 4918->4919 4918->4920 4919->4914 4919->4920 4920->4913 4920->4914 4920->4918 4929 4053d0 Sleep 4920->4929 4923 403ecf 4922->4923 4924 403f23 select 4923->4924 4925 403ef6 select 4923->4925 4926 403f21 4924->4926 4927 403f50 4924->4927 4925->4923 4925->4926 4926->4927 4928 403f58 __WSAFDIsSet 4926->4928 4927->4913 4927->4916 4927->4917 4927->4920 4928->4927 4929->4920 5487 4010db 5488 4011b2 5487->5488 5489 403f73 10 API calls 5488->5489 5490 4011bd 5489->5490 5491 401d5c 5494 40d9c2 5491->5494 5495 411ee0 malloc 5494->5495 5496 40d9dc EnumWindows 5495->5496 5497 40d9f6 5496->5497 5498 403f73 10 API calls 5497->5498 5499 40da14 5498->5499 5500 411f25 free 5499->5500 5501 401d67 5500->5501 5502 4011de malloc 5503 4011f4 5502->5503 5508 40152e 5502->5508 5504 40129e getenv 5503->5504 5505 40afa3 _vsnprintf 5504->5505 5506 4012d0 5505->5506 5507 4053e4 2 API calls 5506->5507 5507->5508 5509 40da60 SetWindowTextA 5510 401ae2 5511 4049ec 3 API calls 5510->5511 5512 401aea 5511->5512 5513 401f65 5516 41217c 5513->5516 5517 411ee0 malloc 5516->5517 5518 41219e 5517->5518 5561 405455 LoadLibraryA 5518->5561 5520 4121aa 5562 405469 GetProcAddress 5520->5562 5522 4121ba 5563 405455 LoadLibraryA 5522->5563 5524 4121c8 5564 405469 GetProcAddress 5524->5564 5526 4121d8 5565 405455 LoadLibraryA 5526->5565 5528 4121ea 5566 405469 GetProcAddress 5528->5566 5530 4121fa 5533 41221a 5530->5533 5567 405455 LoadLibraryA 5530->5567 5532 41220a 5568 405469 GetProcAddress 5532->5568 5534 4124ef 5533->5534 5538 412280 malloc 5533->5538 5547 4122e7 5533->5547 5536 403f73 10 API calls 5534->5536 5537 41262e 5536->5537 5539 411f25 free 5537->5539 5538->5534 5557 41229c 5538->5557 5540 401f70 5539->5540 5541 412484 malloc 5541->5534 5554 4124a0 5541->5554 5542 4122cc 5543 405434 free 5542->5543 5542->5547 5543->5547 5544 4122f8 htons inet_ntoa 5545 40afa3 _vsnprintf 5544->5545 5548 41234b htons inet_ntoa 5545->5548 5546 4124d4 5546->5534 5550 405434 free 5546->5550 5547->5534 5547->5541 5549 40afa3 _vsnprintf 5548->5549 5549->5557 5550->5534 5551 412506 htons inet_ntoa 5552 40afa3 _vsnprintf 5551->5552 5552->5554 5554->5546 5554->5551 5555 4120bc 4 API calls 5554->5555 5558 40afa3 _vsnprintf 5554->5558 5560 411fcc realloc 5554->5560 5555->5554 5556 40afa3 _vsnprintf 5556->5557 5557->5542 5557->5544 5557->5556 5559 411fcc realloc 5557->5559 5569 4120bc 5557->5569 5558->5554 5559->5557 5560->5554 5561->5520 5562->5522 5563->5524 5564->5526 5565->5528 5566->5530 5567->5532 5568->5533 5570 4120e2 5569->5570 5571 4120f9 CreateToolhelp32Snapshot 5570->5571 5572 412115 Process32First 5571->5572 5573 412174 5571->5573 5574 412131 5572->5574 5573->5557 5575 41216b CloseHandle 5574->5575 5576 412142 5574->5576 5577 41215d Process32Next 5574->5577 5575->5573 5576->5575 5577->5574 5578 4018e6 5583 4104de 5578->5583 5581 40afa3 _vsnprintf 5582 401914 5581->5582 5584 4104f1 5583->5584 5585 4018ee 5584->5585 5586 40afa3 _vsnprintf 5584->5586 5585->5581 5587 410529 5586->5587 5588 404be8 GetFileAttributesExA 5587->5588 5588->5585 5589 401ee6 5590 401eee 5589->5590 5593 40ac58 5590->5593 5594 40ac94 5593->5594 5595 40ac7d 5593->5595 5612 408620 5594->5612 5596 40ac82 5595->5596 5597 40ac9f 5595->5597 5599 406e5a 38 API calls 5596->5599 5600 406e5a 38 API calls 5597->5600 5609 40ac8e 5599->5609 5601 40acab 5600->5601 5602 408620 16 API calls 5601->5602 5605 40acb4 5602->5605 5603 40ad09 5606 403f73 10 API calls 5603->5606 5604 40acf9 strlen 5604->5603 5607 40b2cb 2 API calls 5605->5607 5608 40ad2e 5606->5608 5607->5609 5610 401f09 5608->5610 5611 405434 free 5608->5611 5609->5603 5609->5604 5611->5610 5623 4080d4 RegOpenKeyExA 5612->5623 5615 40865b strlen 5617 40b2cb 2 API calls 5615->5617 5616 4080d4 14 API calls 5619 4086af 5616->5619 5618 408697 5617->5618 5618->5616 5620 4086f7 5619->5620 5621 4086bb strlen 5619->5621 5620->5609 5622 40b2cb 2 API calls 5621->5622 5622->5620 5624 40861b 5623->5624 5633 408143 5623->5633 5624->5615 5624->5618 5625 4085b9 RegEnumKeyExA 5626 40860d RegCloseKey 5625->5626 5625->5633 5626->5624 5627 40afa3 _vsnprintf 5628 40817b RegOpenKeyExA 5627->5628 5628->5633 5629 4085a1 RegCloseKey 5629->5633 5630 407eec RegQueryValueExA 5630->5633 5631 40847a CryptUnprotectData 5631->5633 5632 40af50 3 API calls 5632->5633 5633->5625 5633->5627 5633->5629 5633->5630 5633->5631 5633->5632 5634 408501 LocalFree 5633->5634 5635 40b2cb 2 API calls 5633->5635 5634->5633 5635->5633 5636 401d6c 5639 40da7c 5636->5639 5640 40da98 5639->5640 5641 40db2e 5639->5641 5642 40dab4 5640->5642 5643 40da9a 5640->5643 5644 40db50 ShowWindow 5641->5644 5642->5641 5647 40dabc 5642->5647 5645 401d74 5643->5645 5649 40d997 SendMessageA 5643->5649 5644->5645 5647->5645 5648 40db20 SetWindowTextA 5647->5648 5648->5645 5649->5645 5650 4065ed SetCursorPos 5651 406610 5650->5651 5652 406695 mouse_event 5651->5652 5653 40669d 5651->5653 5652->5653 5654 4012f3 5655 40b56d getenv 5654->5655 5656 40130d 5655->5656 5659 40c0e4 5656->5659 5660 404a4e GetFileAttributesA 5659->5660 5661 40c0fb 5660->5661 5662 40c1c8 5661->5662 5676 40536b fopen 5661->5676 5664 403f73 10 API calls 5662->5664 5665 40131c 5664->5665 5666 40c10b 5666->5662 5667 40c149 CreateProcessA 5666->5667 5667->5662 5668 40c198 5667->5668 5669 40c5b8 2 API calls 5668->5669 5670 40c19d 5669->5670 5671 403b94 2 API calls 5670->5671 5672 40c1a8 ResumeThread 5671->5672 5673 40c1c3 5672->5673 5674 40c1b7 ExitProcess 5672->5674 5675 40c577 2 API calls 5673->5675 5675->5662 5677 4053c9 5676->5677 5678 405389 fread 5676->5678 5677->5666 5679 4053b1 fclose 5678->5679 5680 4053b8 fclose 5678->5680 5679->5677 5680->5677 5681 40c1f3 5691 40578a 5681->5691 5684 40c224 5687 403f73 10 API calls 5684->5687 5685 40c20a 5686 40c0e4 24 API calls 5685->5686 5688 40c222 5686->5688 5687->5688 5689 405434 free 5688->5689 5690 40c256 5689->5690 5692 40579a 5691->5692 5693 4057d4 socket 5692->5693 5694 4033a1 2 API calls 5693->5694 5695 405817 5694->5695 5696 40581f connect 5695->5696 5699 405840 5695->5699 5697 40584c 5696->5697 5696->5699 5698 40afa3 _vsnprintf 5697->5698 5700 40587b send 5698->5700 5701 405434 free 5699->5701 5700->5699 5702 4058a2 5700->5702 5703 405a40 5701->5703 5705 4058ba recv 5702->5705 5704 403b94 2 API calls 5703->5704 5706 405a4e 5704->5706 5705->5699 5707 4058f1 5705->5707 5706->5684 5706->5685 5707->5699 5708 405934 fopen 5707->5708 5708->5699 5709 405960 fwrite 5708->5709 5710 405982 recv 5709->5710 5711 4059da fclose 5710->5711 5712 4059ad fwrite 5710->5712 5711->5699 5714 4059ee 5711->5714 5712->5710 5713 4059c9 fclose 5712->5713 5713->5699 5715 40491c 3 API calls 5714->5715 5715->5699 5716 401f75 5717 401f92 5716->5717 5720 4110fd 5717->5720 5721 40afa3 _vsnprintf 5720->5721 5722 411142 5721->5722 5723 411ee0 malloc 5722->5723 5724 411156 5723->5724 5725 411fcc realloc 5724->5725 5726 41116a 5725->5726 5737 410bbe RegOpenKeyExA 5726->5737 5729 411fcc realloc 5731 411196 5729->5731 5730 403f73 10 API calls 5732 4111eb 5730->5732 5744 410ccc 5731->5744 5734 411f25 free 5732->5734 5736 401fab 5734->5736 5735 4111a6 5735->5730 5738 410cc2 5737->5738 5742 410c03 5737->5742 5738->5729 5738->5735 5739 410c1b RegEnumKeyExA 5740 410cb1 RegCloseKey 5739->5740 5739->5742 5740->5738 5741 40afa3 _vsnprintf 5741->5742 5742->5739 5742->5741 5743 411fcc realloc 5742->5743 5743->5742 5762 4128fc 5744->5762 5746 410cdc RegOpenKeyExA 5747 4110f3 5746->5747 5761 410d21 5746->5761 5747->5735 5748 410d31 RegEnumValueA 5749 4110e2 RegCloseKey 5748->5749 5748->5761 5749->5747 5750 410f95 RegQueryValueExA 5753 410fce malloc 5750->5753 5750->5761 5751 410e64 RegQueryValueExA 5751->5761 5752 410ee8 RegQueryValueExA 5752->5761 5755 410fea RegQueryValueExA 5753->5755 5753->5761 5754 410dcf RegQueryValueExA 5754->5761 5755->5761 5756 405434 free 5756->5761 5757 40af50 3 API calls 5757->5761 5758 40afa3 _vsnprintf 5758->5761 5760 411fcc realloc 5760->5761 5761->5748 5761->5750 5761->5751 5761->5752 5761->5754 5761->5756 5761->5757 5761->5758 5761->5760 5764 40b756 5761->5764 5763 412909 5762->5763 5763->5746 5763->5763 5765 40b769 5764->5765 5766 40b76d malloc 5764->5766 5765->5761 5766->5765 5767 40e0f6 5768 403bd0 13 API calls 5767->5768 5770 40e114 5768->5770 5769 40e17e 5771 405434 free 5769->5771 5770->5769 5772 40e13f send 5770->5772 5773 40e189 5771->5773 5774 40e173 5772->5774 5775 40e168 5772->5775 5777 403b94 2 API calls 5774->5777 5778 40de41 select 5775->5778 5777->5769 5779 40dec2 __WSAFDIsSet 5778->5779 5780 40e086 5778->5780 5779->5780 5781 40deda recv 5779->5781 5780->5774 5781->5780 5782 40df09 5781->5782 5783 40df26 recv 5782->5783 5784 40dfac recv 5782->5784 5783->5780 5788 40df46 5783->5788 5784->5780 5785 40dfcb 5784->5785 5786 40e00d htons 5785->5786 5787 4033a1 2 API calls 5786->5787 5787->5788 5789 40e040 5788->5789 5790 40e04a socket 5788->5790 5801 40de0a send 5789->5801 5790->5789 5791 40e088 connect 5790->5791 5793 40e0d0 5791->5793 5794 40e0aa 5791->5794 5822 40de0a send 5793->5822 5802 40de0a send 5794->5802 5797 40e0e0 5799 403b94 2 API calls 5797->5799 5798 40e0ba 5803 40db64 malloc 5798->5803 5799->5780 5801->5780 5802->5798 5804 40dc46 5803->5804 5820 40db8a 5803->5820 5804->5780 5805 40dbeb select 5805->5820 5806 40dc22 5808 405434 free 5806->5808 5807 40dc4b __WSAFDIsSet 5807->5806 5809 40dc60 __WSAFDIsSet 5807->5809 5811 40dc30 5808->5811 5809->5806 5810 40dc75 __WSAFDIsSet 5809->5810 5812 40dca8 recv 5810->5812 5813 40dc8a __WSAFDIsSet 5810->5813 5814 403b94 2 API calls 5811->5814 5812->5806 5812->5820 5813->5820 5815 40dc3b 5814->5815 5818 403b94 2 API calls 5815->5818 5816 40dd4a recv 5816->5806 5816->5820 5817 40dce4 send 5817->5820 5818->5804 5819 40dd7e send 5819->5820 5820->5804 5820->5805 5820->5806 5820->5807 5820->5813 5820->5816 5820->5817 5820->5819 5821 4053d0 Sleep 5820->5821 5821->5820 5822->5797 5823 401cf6 5826 406199 WriteFile 5823->5826 5825 401d02 5826->5825 5827 403877 send 5828 4038d5 5827->5828 5835 4038ce 5827->5835 5829 4038f3 recv 5828->5829 5830 403917 5829->5830 5829->5835 5831 40397a htons 5830->5831 5830->5835 5836 40b2af 5831->5836 5834 4039d2 recv 5834->5835 5837 4039af send 5836->5837 5837->5834 5837->5835 5838 4010f8 5856 40f800 5838->5856 5840 40110e 5841 4011c2 5840->5841 5842 401116 5840->5842 5876 4053d0 Sleep 5841->5876 5863 40b849 getenv 5842->5863 5845 401138 5866 40b7e0 5845->5866 5846 4011ce 5848 403b94 2 API calls 5846->5848 5855 4011bd 5848->5855 5849 401148 5871 40bc1b 5849->5871 5852 40afa3 _vsnprintf 5853 4011a2 5852->5853 5854 403f73 10 API calls 5853->5854 5854->5855 5857 40f825 5856->5857 5858 40f841 5857->5858 5860 40f852 5857->5860 5859 403b94 2 API calls 5858->5859 5861 40f84d 5859->5861 5860->5861 5862 403f73 10 API calls 5860->5862 5861->5840 5862->5861 5864 40b867 GetUserNameA 5863->5864 5865 40b87f 5863->5865 5864->5865 5865->5845 5867 40b1ee 5866->5867 5868 40b802 gethostname 5867->5868 5869 40b816 GetComputerNameA 5868->5869 5870 40b82e 5868->5870 5869->5870 5870->5849 5877 40b8a4 5871->5877 5873 40bc23 5874 40afa3 _vsnprintf 5873->5874 5875 401158 5874->5875 5875->5852 5876->5846 5878 40b1ee 5877->5878 5879 40b8cd GetVersionExA 5878->5879 5880 40b914 GetVersionExA 5879->5880 5881 40b8e7 5879->5881 5880->5881 5891 40b954 5880->5891 5893 405455 LoadLibraryA 5881->5893 5883 40b8f3 5894 405469 GetProcAddress 5883->5894 5885 40b903 5886 40b931 GetSystemInfo 5885->5886 5887 40b90d 5885->5887 5886->5887 5888 40bae6 RegOpenKeyExA 5887->5888 5890 40b942 5887->5890 5889 40bb29 RegQueryValueExA RegCloseKey 5888->5889 5888->5891 5889->5891 5890->5891 5892 40ba47 GetSystemMetrics 5890->5892 5891->5873 5892->5891 5893->5883 5894->5885 5899 401d79 malloc 5900 401e21 5899->5900 5901 401d8f 5899->5901 5902 40b56d getenv 5901->5902 5902->5900 5903 4056fc 5904 40afa3 _vsnprintf 5903->5904 5905 405748 5904->5905 5906 40576a 5905->5906 5907 403f73 10 API calls 5905->5907 5907->5906 5908 401580 malloc 5909 401596 5908->5909 5916 40164e 5908->5916 5910 4015db 5909->5910 5913 401688 5909->5913 5911 40b56d getenv 5910->5911 5910->5916 5912 401620 5911->5912 5915 405072 2 API calls 5912->5915 5914 404be8 GetFileAttributesExA 5913->5914 5914->5916 5915->5916 5917 40d881 5918 40d89c 5917->5918 5919 40d8a0 fwrite 5918->5919 5920 40d8d8 5918->5920 5921 40d8cb 5919->5921 5922 40d8fc 5919->5922 5923 403f73 10 API calls 5920->5923 5924 40cff8 fclose 5921->5924 5923->5922 5924->5920 5925 40a882 5934 40a705 5925->5934 5928 40a893 strlen 5929 40a8a8 5928->5929 5930 403f73 10 API calls 5929->5930 5931 40ab7c 5930->5931 5932 40ab90 5931->5932 5933 405434 free 5931->5933 5933->5932 5939 40a3a0 malloc 5934->5939 5937 40a73f 5937->5928 5937->5929 5938 40a4d5 19 API calls 5938->5937 5940 40a3c0 5939->5940 5941 40a3c9 malloc 5939->5941 5940->5937 5940->5938 5941->5940 5942 40a3e7 SHGetSpecialFolderLocation 5941->5942 5943 40a40d 5942->5943 5956 40a41a 5942->5956 5945 40a415 5943->5945 5946 40a41f SHGetPathFromIDListA 5943->5946 5944 405434 free 5949 40a4bd 5944->5949 5947 40a469 SHGetPathFromIDListA 5945->5947 5945->5956 5948 40a444 5946->5948 5946->5956 5951 40a48e 5947->5951 5947->5956 5950 40afa3 _vsnprintf 5948->5950 5952 405434 free 5949->5952 5950->5956 5953 40afa3 _vsnprintf 5951->5953 5954 40a4c8 5952->5954 5953->5956 5955 404a4e GetFileAttributesA 5954->5955 5955->5940 5956->5944 5957 401382 malloc 5958 40152e 5957->5958 5959 401398 5957->5959 5960 401473 getenv 5959->5960 5961 4014aa getenv 5959->5961 5962 40afa3 _vsnprintf 5960->5962 5963 40afa3 _vsnprintf 5961->5963 5964 4014a8 5962->5964 5963->5964 5965 4053e4 2 API calls 5964->5965 5965->5958 5966 402183 5967 40218e 5966->5967 5969 412640 5966->5969 5970 411ee0 malloc 5969->5970 5971 412668 SetErrorMode GetLogicalDriveStringsA 5970->5971 5972 41268b 5971->5972 5979 4126c4 5971->5979 5973 403f73 10 API calls 5972->5973 5975 4128ea 5973->5975 5974 412705 GetVolumeInformationA 5976 412780 GetDiskFreeSpaceExA 5974->5976 5974->5979 5977 411f25 free 5975->5977 5976->5979 5978 4128f2 5977->5978 5978->5967 5979->5972 5979->5974 5979->5976 5980 4127f4 GetDriveTypeA 5979->5980 5982 411fcc realloc 5979->5982 5981 40afa3 _vsnprintf 5980->5981 5981->5979 5982->5979 5983 410182 5998 405455 LoadLibraryA 5983->5998 5985 4101ac 5999 405469 GetProcAddress 5985->5999 5987 4101bc 5997 4101ea 5987->5997 6000 405455 LoadLibraryA 5987->6000 5989 4101d1 6001 405469 GetProcAddress 5989->6001 5991 4101e1 5992 410214 RegisterClassExA 5991->5992 5991->5997 5993 41023a CreateWindowExA 5992->5993 5992->5997 5994 4102a1 5993->5994 5993->5997 5995 4102b2 GetMessageA 5994->5995 5996 4102d9 TranslateMessage DispatchMessageA 5995->5996 5995->5997 5996->5995 5998->5985 5999->5987 6000->5989 6001->5991 6002 40d904 6003 40d916 IsWindowVisible 6002->6003 6004 40d989 6002->6004 6003->6004 6005 40d923 SendMessageA 6003->6005 6005->6004 6006 40d94c 6005->6006 6007 40afa3 _vsnprintf 6006->6007 6008 40d972 6007->6008 6008->6004 6009 411fcc realloc 6008->6009 6009->6004 6010 401786 6011 40cff8 fclose 6010->6011 6012 401791 6011->6012 6013 401d07 6016 40be4d 6013->6016 6017 40b849 2 API calls 6016->6017 6018 40be75 6017->6018 6019 40b7e0 2 API calls 6018->6019 6020 40be8c 6019->6020 6043 40bcd9 6020->6043 6023 40bc1b 10 API calls 6024 40beba 6023->6024 6047 40bc47 GetTickCount 6024->6047 6027 4051a9 GetModuleFileNameA 6028 40bed9 6027->6028 6029 40564e 3 API calls 6028->6029 6030 40bf1b 6029->6030 6031 40bf67 getenv getenv 6030->6031 6052 40bd24 6031->6052 6034 40af50 3 API calls 6035 40c07c 6034->6035 6036 40c0b1 6035->6036 6037 40c081 6035->6037 6039 403f73 10 API calls 6036->6039 6038 403f73 10 API calls 6037->6038 6040 40c0a7 6038->6040 6041 401d12 6039->6041 6042 405434 free 6040->6042 6042->6041 6044 40bcfa 6043->6044 6045 41091e 4 API calls 6044->6045 6046 40bd1e 6045->6046 6046->6023 6065 405455 LoadLibraryA 6047->6065 6049 40bc94 6066 405469 GetProcAddress 6049->6066 6051 40bca4 6051->6027 6067 405455 LoadLibraryA 6052->6067 6054 40bd51 6068 405469 GetProcAddress 6054->6068 6056 40bd61 6069 405455 LoadLibraryA 6056->6069 6058 40bd6f 6070 405469 GetProcAddress 6058->6070 6060 40bd7f 6071 405455 LoadLibraryA 6060->6071 6062 40bd8d 6072 405469 GetProcAddress 6062->6072 6064 40bd9d 6064->6034 6065->6049 6066->6051 6067->6054 6068->6056 6069->6058 6070->6060 6071->6062 6072->6064 6073 401b07 6076 405050 CreateDirectoryA 6073->6076 6075 401b0f 6076->6075 6079 40350f 6080 4033a1 2 API calls 6079->6080 6081 40353a 6080->6081 6082 4035b1 send 6081->6082 6087 40353e 6081->6087 6083 4035e0 6082->6083 6082->6087 6084 403604 select 6083->6084 6085 403646 __WSAFDIsSet 6084->6085 6084->6087 6086 40365c recv 6085->6086 6085->6087 6086->6087 6088 404b91 6089 404a9d 11 API calls 6088->6089 6091 404baa 6089->6091 6090 404bc3 6092 404be0 6090->6092 6094 405434 free 6090->6094 6091->6090 6093 4049ec 3 API calls 6091->6093 6093->6090 6094->6092 6095 401e96 6096 401e9e 6095->6096 6099 40a7f9 6096->6099 6100 40a832 6099->6100 6101 406e5a 38 API calls 6100->6101 6102 40a981 6101->6102 6103 40a705 26 API calls 6102->6103 6104 40a98a 6103->6104 6105 40a9c2 6104->6105 6106 40b2cb 2 API calls 6104->6106 6133 40a74d 6105->6133 6106->6105 6109 40aa03 6111 406e5a 38 API calls 6109->6111 6110 40b2cb 2 API calls 6110->6109 6112 40aa13 6111->6112 6113 40aa4b 6112->6113 6114 40b2cb 2 API calls 6112->6114 6115 40a795 22 API calls 6113->6115 6114->6113 6116 40aa54 6115->6116 6117 40aa8c 6116->6117 6118 40b2cb 2 API calls 6116->6118 6119 40aaa8 6117->6119 6120 40aa98 strlen 6117->6120 6118->6117 6121 407b77 11 API calls 6119->6121 6120->6119 6122 40aab4 6121->6122 6123 40aaec 6122->6123 6125 40b2cb 2 API calls 6122->6125 6138 409e36 6123->6138 6125->6123 6127 40ab42 6129 403f73 10 API calls 6127->6129 6128 40b2cb 2 API calls 6128->6127 6130 40ab7c 6129->6130 6131 401eb9 6130->6131 6132 405434 free 6130->6132 6132->6131 6134 40a3a0 8 API calls 6133->6134 6135 40a76f 6134->6135 6136 40a787 6135->6136 6137 40a4d5 19 API calls 6135->6137 6136->6109 6136->6110 6137->6136 6157 408d46 LoadLibraryA GetProcAddress GetProcAddress 6138->6157 6141 409eaa 6164 410790 RegOpenKeyExA 6141->6164 6142 409e6e strlen 6143 40b2cb 2 API calls 6142->6143 6143->6141 6146 409f0e 6148 409f16 strlen 6146->6148 6149 409f52 6146->6149 6152 40b2cb 2 API calls 6148->6152 6185 409681 LoadLibraryA 6149->6185 6152->6149 6153 405434 free 6153->6146 6155 409fa2 6155->6127 6155->6128 6156 40b2cb 2 API calls 6156->6155 6161 408da3 6157->6161 6158 408f7d 6158->6141 6158->6142 6159 408e53 CryptUnprotectData 6160 408ec3 strlen 6159->6160 6159->6161 6160->6161 6161->6158 6161->6159 6162 40af50 3 API calls 6161->6162 6163 40b2cb 2 API calls 6161->6163 6162->6161 6163->6161 6165 409eda 6164->6165 6166 4107d9 RegQueryValueExA 6164->6166 6165->6146 6172 40947b SetErrorMode 6165->6172 6166->6165 6167 41080e malloc 6166->6167 6168 410820 RegQueryValueExA 6167->6168 6169 410858 RegCloseKey 6167->6169 6168->6169 6170 41084d 6168->6170 6169->6165 6171 405434 free 6170->6171 6171->6169 6173 40afa3 _vsnprintf 6172->6173 6174 4094b8 6173->6174 6175 4094c2 FindFirstFileA 6174->6175 6176 4094bd 6174->6176 6175->6176 6179 4094ea 6175->6179 6176->6153 6177 409650 FindNextFileA 6178 409670 FindClose 6177->6178 6177->6179 6178->6176 6179->6177 6180 40947b 26 API calls 6179->6180 6181 40afa3 _vsnprintf 6179->6181 6183 4095fd strlen 6179->6183 6205 408f96 fopen 6179->6205 6180->6179 6181->6179 6184 40b2cb 2 API calls 6183->6184 6184->6179 6186 409773 6185->6186 6187 40977d 6 API calls 6185->6187 6186->6155 6186->6156 6188 40985a 6187->6188 6190 40985f 6187->6190 6188->6186 6189 409e16 FreeLibrary 6188->6189 6189->6186 6190->6188 6191 40b8a4 9 API calls 6190->6191 6192 4098cd 6191->6192 6193 4098e0 6192->6193 6194 40b8a4 9 API calls 6192->6194 6193->6188 6196 409927 WideCharToMultiByte WideCharToMultiByte WideCharToMultiByte 6193->6196 6197 409a6e WideCharToMultiByte 6193->6197 6201 40b2cb 2 API calls 6193->6201 6195 4098d7 6194->6195 6195->6193 6203 409b6f 6195->6203 6196->6193 6199 40af50 3 API calls 6197->6199 6198 409bab WideCharToMultiByte WideCharToMultiByte WideCharToMultiByte 6198->6203 6199->6193 6200 409cea WideCharToMultiByte 6202 40af50 3 API calls 6200->6202 6201->6193 6202->6203 6203->6188 6203->6198 6203->6200 6204 40b2cb 2 API calls 6203->6204 6204->6203 6206 408fd3 6205->6206 6207 408fc9 6205->6207 6224 408758 6206->6224 6207->6179 6209 408ff5 6209->6207 6210 408758 5 API calls 6209->6210 6211 40903e 6210->6211 6211->6207 6212 409062 RegOpenKeyExA 6211->6212 6212->6207 6220 4090a1 6212->6220 6213 4090db 6214 409465 6213->6214 6215 409457 RegCloseKey 6213->6215 6214->6207 6216 40946b fclose 6214->6216 6215->6214 6216->6207 6217 408758 fgetpos fflush _filelengthi64 fsetpos fread 6217->6220 6220->6213 6220->6217 6221 408971 10 API calls 6220->6221 6222 40af50 _vscprintf malloc _vsnprintf 6220->6222 6223 40b2cb free realloc 6220->6223 6229 408bb7 6220->6229 6236 408b3b 6220->6236 6221->6220 6222->6220 6223->6220 6225 40549d 4 API calls 6224->6225 6226 40877c 6225->6226 6227 408780 6226->6227 6228 408787 fread 6226->6228 6227->6209 6228->6227 6230 408758 5 API calls 6229->6230 6232 408bea 6230->6232 6231 408758 5 API calls 6231->6232 6232->6231 6234 408bf1 6232->6234 6235 408c6f 6232->6235 6233 408758 5 API calls 6233->6235 6234->6220 6235->6233 6235->6234 6237 40b1ee 6236->6237 6238 408b5a strlen 6237->6238 6239 408ba0 strlen 6238->6239 6240 408bb2 6239->6240 6241 408b7c 6239->6241 6240->6220 6241->6239 6242 401d17 6245 41053c 6242->6245 6246 411ee0 malloc 6245->6246 6247 41055e 6246->6247 6248 410562 6247->6248 6249 41058a LoadLibraryA 6247->6249 6250 403f73 10 API calls 6248->6250 6251 4105a1 GetProcAddress GetProcAddress GetProcAddress 6249->6251 6252 410732 6249->6252 6253 401d22 6250->6253 6251->6252 6259 4105ed 6251->6259 6254 403f73 10 API calls 6252->6254 6255 41077e 6254->6255 6256 411f25 free 6255->6256 6256->6253 6257 410649 FileTimeToSystemTime 6258 40afa3 _vsnprintf 6257->6258 6258->6259 6259->6252 6259->6257 6260 411fcc realloc 6259->6260 6260->6259 6261 40da21 6262 40da32 6261->6262 6263 40da4c ShowWindow 6262->6263 6264 40da58 6262->6264 6263->6264 6265 401321 6266 403b94 2 API calls 6265->6266 6267 40132c 6266->6267 6268 401000 2 API calls 6267->6268 6269 401331 6268->6269 6272 4053d0 Sleep 6269->6272 6271 40133d 6272->6271 6273 4036a6 6274 4036d3 6273->6274 6282 4036cc 6273->6282 6275 4036f7 htons 6274->6275 6276 403739 6275->6276 6277 403790 send 6276->6277 6278 4037c1 6277->6278 6277->6282 6279 4037e5 select 6278->6279 6280 403827 __WSAFDIsSet 6279->6280 6279->6282 6281 40383d recv 6280->6281 6280->6282 6281->6282 6283 401726 malloc 6284 40173c 6283->6284 6285 401d27 6288 405a58 CreateToolhelp32Snapshot 6285->6288 6289 405a81 Process32First 6288->6289 6290 405aac 6288->6290 6291 405aa3 CloseHandle 6289->6291 6292 405ad4 6289->6292 6293 403f73 10 API calls 6290->6293 6291->6290 6295 411ee0 malloc 6292->6295 6294 401d32 6293->6294 6296 405aea 6295->6296 6318 405455 LoadLibraryA 6296->6318 6298 405af6 6319 405469 GetProcAddress 6298->6319 6300 405b2a OpenProcess 6310 405b28 6300->6310 6301 405b06 6301->6300 6320 405455 LoadLibraryA 6301->6320 6303 405b18 6321 405469 GetProcAddress 6303->6321 6305 405ba0 GetProcessTimes 6305->6310 6306 405bdd FileTimeToSystemTime 6307 40afa3 _vsnprintf 6306->6307 6307->6310 6308 405c80 CloseHandle 6308->6310 6309 40afa3 _vsnprintf 6309->6310 6310->6300 6310->6305 6310->6306 6310->6308 6310->6309 6311 405ce9 Process32Next 6310->6311 6312 411fcc realloc 6310->6312 6311->6300 6313 405d05 CloseHandle 6311->6313 6312->6311 6314 405d1d 6313->6314 6315 403f73 10 API calls 6314->6315 6316 405d60 6315->6316 6317 411f25 free 6316->6317 6317->6294 6318->6298 6319->6301 6320->6303 6321->6310 6324 401b2c 6325 405105 3 API calls 6324->6325 6326 401b34 6325->6326 6331 40a8ad 6332 40a74d 26 API calls 6331->6332 6333 40a8b2 6332->6333 6334 40a8be strlen 6333->6334 6335 40a8d3 6333->6335 6334->6335 6336 403f73 10 API calls 6335->6336 6337 40ab7c 6336->6337 6338 40ab90 6337->6338 6339 405434 free 6337->6339 6339->6338 6340 4017ad 6341 4017b5 6340->6341 6344 4065be keybd_event 6341->6344 6343 4017bd 6344->6343 6345 410031 6346 410144 PostQuitMessage 6345->6346 6347 41004b 6345->6347 6350 41005b 6346->6350 6348 4100b2 6347->6348 6349 410052 6347->6349 6348->6350 6352 4100e0 malloc 6348->6352 6349->6350 6351 41015f DefWindowProcA 6349->6351 6351->6350 6352->6350 6354 4100f2 6352->6354 6353 410137 6355 405434 free 6353->6355 6354->6353 6357 40fd21 GetKeyState GetKeyState GetKeyState GetKeyboardState 6354->6357 6355->6350 6358 40fd99 6357->6358 6362 40fd6e 6357->6362 6359 40afa3 _vsnprintf 6358->6359 6360 40fefe 6359->6360 6361 41001c 6360->6361 6372 40fc58 GetForegroundWindow 6360->6372 6361->6353 6362->6358 6362->6361 6363 40ff03 MapVirtualKeyA ToAscii 6362->6363 6366 40ff77 MapVirtualKeyA GetKeyNameTextA 6363->6366 6367 40ff3d GetKeyState 6363->6367 6366->6361 6369 40ffad GetKeyState 6366->6369 6370 40ff60 6367->6370 6368 40fa98 12 API calls 6368->6361 6369->6370 6371 40afa3 _vsnprintf 6370->6371 6371->6360 6373 40fc73 GetLocalTime GetWindowTextA 6372->6373 6374 40fd1c 6372->6374 6373->6374 6375 40fcad 6373->6375 6374->6368 6376 40afa3 _vsnprintf 6375->6376 6377 40fd11 6376->6377 6378 40fa98 12 API calls 6377->6378 6378->6374 6379 401fb0 6380 401fd9 6379->6380 6383 4111fe 6380->6383 6384 402181 6383->6384 6385 41121d 6383->6385 6386 411224 RegCreateKeyExA 6385->6386 6387 41139d RegOpenKeyExA 6385->6387 6388 41128c RegOpenKeyExA 6385->6388 6389 41133e 6385->6389 6386->6384 6391 411277 6386->6391 6387->6384 6390 4113ce RegDeleteValueA RegCloseKey 6387->6390 6388->6384 6392 4112bd RegSetValueExA RegCloseKey 6388->6392 6393 410a45 6 API calls 6389->6393 6390->6384 6394 4113fe 6390->6394 6397 40afa3 _vsnprintf 6391->6397 6392->6384 6392->6391 6395 411351 6393->6395 6396 40afa3 _vsnprintf 6394->6396 6395->6384 6399 40afa3 _vsnprintf 6395->6399 6398 411339 6396->6398 6397->6398 6400 411390 6398->6400 6401 403f73 10 API calls 6398->6401 6399->6400 6400->6384 6402 403f73 10 API calls 6400->6402 6401->6400 6402->6384 6403 4019b2 6404 4019e2 6403->6404 6405 40491c 3 API calls 6404->6405 6406 401a54 6405->6406 6410 401533 6413 404278 6410->6413 6414 4128fc 6413->6414 6415 404288 GetLogicalDriveStringsA 6414->6415 6416 4042a9 6415->6416 6418 4042ad 6415->6418 6417 4042d0 GetDriveTypeA 6416->6417 6416->6418 6417->6416 6419 403f73 10 API calls 6418->6419 6420 40153e 6419->6420 6421 40d3b3 6422 40d3c1 6421->6422 6423 40d536 6422->6423 6424 40d3d8 6422->6424 6425 40d680 fopen 6423->6425 6426 40d543 6423->6426 6427 40d64a 6424->6427 6428 40d3df fopen 6424->6428 6430 40d69a 6425->6430 6457 40d511 6425->6457 6431 40afa3 _vsnprintf 6426->6431 6429 405434 free 6427->6429 6432 40d3f5 6428->6432 6433 40d44b fopen 6428->6433 6435 40d876 6429->6435 6437 40cff8 fclose 6430->6437 6438 40d573 6431->6438 6434 40549d 4 API calls 6432->6434 6436 40d435 6433->6436 6433->6457 6440 40d415 fgetpos 6434->6440 6441 40cff8 fclose 6436->6441 6442 40d6b4 6437->6442 6439 403f73 10 API calls 6438->6439 6455 40d59b 6439->6455 6440->6436 6444 40d49d 6441->6444 6445 40afa3 _vsnprintf 6442->6445 6443 403f73 10 API calls 6443->6427 6446 40549d 4 API calls 6444->6446 6447 40d6f9 6445->6447 6449 40d4d3 6446->6449 6450 403f73 10 API calls 6447->6450 6448 40d606 6452 403f73 10 API calls 6448->6452 6453 40afa3 _vsnprintf 6449->6453 6454 40d721 6450->6454 6451 403f73 10 API calls 6451->6455 6456 40d636 6452->6456 6453->6457 6458 40549d 4 API calls 6454->6458 6455->6448 6455->6451 6467 4053d0 Sleep 6455->6467 6459 405434 free 6456->6459 6457->6443 6464 40d750 6458->6464 6459->6427 6460 40d76b 6462 40cff8 fclose 6460->6462 6462->6457 6463 40d7ad fread 6463->6460 6463->6464 6464->6460 6464->6463 6465 403f73 10 API calls 6464->6465 6468 4053d0 Sleep 6464->6468 6465->6464 6467->6455 6468->6464 6469 401d37 6472 405d70 6469->6472 6477 40ae2b 6472->6477 6475 405da4 TerminateProcess CloseHandle 6476 401d3f 6475->6476 6478 405d83 OpenProcess 6477->6478 6478->6475 6478->6476 6479 40a83b 6480 409e36 68 API calls 6479->6480 6481 40a847 6480->6481 6482 403f73 10 API calls 6481->6482 6483 40ab7c 6482->6483 6484 40ab90 6483->6484 6485 405434 free 6483->6485 6485->6484 6486 40673b SetCursorPos 6487 401ebe 6488 401ec6 6487->6488 6491 40ab95 6488->6491 6492 40abc1 6491->6492 6493 40abba 6491->6493 6508 407f34 6492->6508 6494 40abcc 6493->6494 6496 40abbf 6493->6496 6520 407d2b getenv 6494->6520 6499 407f34 8 API calls 6496->6499 6497 40abc6 6500 403f73 10 API calls 6497->6500 6501 40abdc 6499->6501 6502 40ac3f 6500->6502 6503 407d2b 10 API calls 6501->6503 6504 401ee1 6502->6504 6506 405434 free 6502->6506 6505 40abe5 6503->6505 6507 40b2cb 2 API calls 6505->6507 6506->6504 6507->6497 6529 405455 LoadLibraryA 6508->6529 6510 407f7e 6516 407f87 6510->6516 6530 405469 GetProcAddress 6510->6530 6512 407f9f 6512->6516 6531 405469 GetProcAddress 6512->6531 6513 405485 FreeLibrary 6514 4080cf 6513->6514 6514->6497 6516->6513 6517 40af50 3 API calls 6518 407fc0 6517->6518 6518->6516 6518->6517 6519 40b2cb 2 API calls 6518->6519 6519->6518 6521 40afa3 _vsnprintf 6520->6521 6522 407d65 fopen 6521->6522 6525 407d8e 6522->6525 6526 407df3 6522->6526 6523 407ea8 fgets 6524 407ed2 fclose 6523->6524 6523->6525 6524->6526 6525->6523 6525->6526 6527 40af50 _vscprintf malloc _vsnprintf 6525->6527 6528 40b2cb 2 API calls 6525->6528 6526->6497 6527->6525 6528->6525 6529->6510 6530->6512 6531->6518

                    Control-flow Graph

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: malloc
                    • String ID: :$@$l4A
                    • API String ID: 2803490479-2178790103
                    • Opcode ID: b83cbc6a64ff352804b9bfddee4ddf57693cdf8cfb53a6cb52c0b83734f20869
                    • Instruction ID: f932696bdea0e9fbbb3abfc95eb8d80010f47caf81c3293b5a6935d0f1b39213
                    • Opcode Fuzzy Hash: b83cbc6a64ff352804b9bfddee4ddf57693cdf8cfb53a6cb52c0b83734f20869
                    • Instruction Fuzzy Hash: 0751F5B04087049FD701EF26C48425EBBE0FB84348F11C92EE5E89B392DBB99545CF8A

                    Control-flow Graph

                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalExitInitializeProcessSectionStartup
                    • String ID:
                    • API String ID: 3456047655-0
                    • Opcode ID: 63ff5738400b76bf3aba5b293504b0f52e0bb6060e5d5d878e74598d1dd7f8c0
                    • Instruction ID: 1f216b37b12b0f72473575d17fb5684b7e683a454140a5030794b2cc63ffedef
                    • Opcode Fuzzy Hash: 63ff5738400b76bf3aba5b293504b0f52e0bb6060e5d5d878e74598d1dd7f8c0
                    • Instruction Fuzzy Hash: 01D012B02043045AE7907F69D9067ABB6FC9B41709F00445F68C4D2242EBFC98958667

                    Control-flow Graph

                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: Processmalloc$CurrentExit$CountCriticalInitializeSectionStartupThreadTick
                    • String ID:
                    • API String ID: 1809231239-0
                    • Opcode ID: 101377c076011302767dfb9f751ca096f28e4f94a2a092162b949ab9b24beb94
                    • Instruction ID: 142c39be9d2d5e3745f822b90aca99a9f7cf19e8943649cfdd8a405ec8ab76f6
                    • Opcode Fuzzy Hash: 101377c076011302767dfb9f751ca096f28e4f94a2a092162b949ab9b24beb94
                    • Instruction Fuzzy Hash: F931FBB04087408AC710BFA6818561EFBE4AF84358F054A7FF8D4772D2C7B895468B5B

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 148 4061d0-40621a GetSystemMetrics * 2 GetDesktopWindow 149 406220-406222 148->149 150 40621c-40621e 148->150 152 4064ba-4064c1 149->152 150->149 151 406227-406229 150->151 151->149 153 40622b-40625d GetDC CreateCompatibleDC CreateCompatibleBitmap 151->153 154 406263-406267 153->154 155 406444-406472 ReleaseDC DeleteDC DeleteObject 153->155 154->155 157 40626d-40626f 154->157 155->149 156 406478-40647e 155->156 156->149 159 406484-4064b8 call 402be6 call 405434 156->159 157->155 158 406275-4062ca SelectObject BitBlt 157->158 158->155 160 4062d0-40634e call 40b1ee * 2 GetDIBits 158->160 159->152 160->155 169 406354-4063b9 malloc 160->169 169->155 170 4063bf-4063f5 GetDIBits 169->170 171 406430-40643e call 405434 170->171 172 4063f7-40642e call 40b2af * 2 170->172 171->155 172->155
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: BitsCompatibleCreateDeleteMetricsObjectSystem$BitmapDesktopReleaseSelectWindowmalloc
                    • String ID: $($($6$BM
                    • API String ID: 3568129938-2637400849
                    • Opcode ID: 181f89d6ae9e89f7e295e51894366df1a79d8c5fc48be972af6e57f5eaa62152
                    • Instruction ID: 266a23183267d1046fc9d9c225dd37840db50443dff86e0b9bb452c3212cbd7b
                    • Opcode Fuzzy Hash: 181f89d6ae9e89f7e295e51894366df1a79d8c5fc48be972af6e57f5eaa62152
                    • Instruction Fuzzy Hash: FE81A5B09083059FDB00EFA9D58579EBBF4BF44344F01882EE888EB351E7789995CB56

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 535 40fd21-40fd68 GetKeyState * 3 GetKeyboardState 536 40fea4-40feac 535->536 537 40fd6e 535->537 540 40fee8-40fefe call 40afa3 536->540 538 40fd70-40fd73 537->538 539 40fdef-40fdf2 537->539 544 40fd75-40fd78 538->544 545 40fda6-40fda9 538->545 542 40fe86-40fe8e 539->542 543 40fdf8 539->543 557 40fff8-410000 540->557 542->540 549 40fe24-40fe27 543->549 550 40fdfa-40fdfd 543->550 551 41002a-410030 544->551 552 40fd7e-40fd81 544->552 546 40fecc-40fed4 545->546 547 40fdaf 545->547 546->540 555 40fdd0-40fdd3 547->555 556 40fdb1-40fdb4 547->556 553 40fec2-40feca 549->553 554 40fe2d 549->554 558 40fe03 550->558 559 40fe9a-40fea2 550->559 560 40fe72-40fe7a 552->560 561 40fd87-40fd8a 552->561 553->540 562 40fe4a-40fe4d 554->562 563 40fe2f-40fe32 554->563 567 40fee0 555->567 568 40fdd9-40fddc 555->568 564 40fed6-40fede 556->564 565 40fdba-40fdbd 556->565 557->551 566 410002-41001e call 40fc58 call 40fa98 557->566 569 40fe09-40fe0c 558->569 570 40feae-40feb6 558->570 559->540 560->540 571 40fd90-40fd93 561->571 572 40fe68-40fe70 561->572 577 40feb8-40fec0 562->577 578 40fe4f-40fe55 562->578 573 40fe90-40fe98 563->573 574 40fe34-40fe37 563->574 564->540 575 40ff03-40ff3b MapVirtualKeyA ToAscii 565->575 576 40fdc3-40fdcb 565->576 566->551 600 410020 566->600 567->540 568->575 580 40fde2-40fdea 568->580 581 40fe7c-40fe84 569->581 582 40fe0e-40fe11 569->582 570->540 571->575 583 40fd99-40fda1 571->583 572->540 573->540 574->575 584 40fe3d-40fe45 574->584 587 40ff77-40ffab MapVirtualKeyA GetKeyNameTextA 575->587 588 40ff3d-40ff5e GetKeyState 575->588 576->540 577->540 578->575 585 40fe5b-40fe63 578->585 580->540 581->540 582->575 589 40fe17-40fe1f 582->589 583->540 584->540 585->540 587->551 593 40ffad-40ffc4 GetKeyState 587->593 591 40ff60-40ff67 588->591 592 40ff69-40ff75 588->592 589->540 595 40ffd2-40ffda 591->595 596 40ffe8-40fff3 call 40afa3 592->596 597 40ffc6-40ffcc 593->597 598 40ffdc-40ffe0 593->598 595->596 596->557 597->598 601 40ffce 597->601 598->596 600->551 601->595
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: State$Virtual$AsciiKeyboardNameText
                    • String ID: $`GA
                    • API String ID: 2992186895-3733422996
                    • Opcode ID: eb52b18bba3e4d925d6e9d22f1429ef7a14ed76e712acfa9fac7246c6a0998f4
                    • Instruction ID: 80565416b984be0d3f78b850c93890a41459460eba26d941ea0aad13ddd5b4af
                    • Opcode Fuzzy Hash: eb52b18bba3e4d925d6e9d22f1429ef7a14ed76e712acfa9fac7246c6a0998f4
                    • Instruction Fuzzy Hash: B46135B14083019AD7309F14D5C429FBAE4EF86348F61C53FE48966AA2D3BD45C98B8F

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 721 4080d4-40813d RegOpenKeyExA 722 408143 721->722 723 40861b-40861f 721->723 724 4085b9-408607 RegEnumKeyExA 722->724 725 408148-4081ad call 40afa3 RegOpenKeyExA 724->725 726 40860d-408618 RegCloseKey 724->726 729 4081b3-4081ec call 407eec 725->729 730 4085af 725->730 726->723 733 4085a1-4085ac RegCloseKey 729->733 734 4081f2-408223 call 407eec 729->734 730->724 733->730 737 408225-40828a call 407eec * 2 734->737 738 40828f-4082c0 call 407eec 734->738 749 408461-408465 737->749 744 4082c2-408327 call 407eec * 2 738->744 745 40832c-40835d call 407eec 738->745 744->749 755 4083c9-4083fa call 407eec 745->755 756 40835f-4083c4 call 407eec * 2 745->756 753 408512-408516 749->753 754 40846b-408474 749->754 753->733 758 40851c-40855f 753->758 754->753 761 40847a-4084dd CryptUnprotectData 754->761 755->749 769 4083fc-40845d call 407eec * 2 755->769 756->749 763 408562 call 40af50 758->763 761->753 765 4084df-40850f call 40b2af LocalFree 761->765 768 408567-40856e 763->768 765->753 768->733 772 408570-40859e call 40b2cb 768->772 769->749 772->733
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: Open$CloseCryptDataEnumFreeLocalUnprotect
                    • String ID: ?$R@A$i<A
                    • API String ID: 465718330-2923574325
                    • Opcode ID: 9d8d3a0d1ece565365071117d4f44f17b8d588ba342fe06ff15d4423da111424
                    • Instruction ID: c2495c30ca7efd79f8dcd7662a936437fd26801a372f492a6e9eb2653917f24a
                    • Opcode Fuzzy Hash: 9d8d3a0d1ece565365071117d4f44f17b8d588ba342fe06ff15d4423da111424
                    • Instruction Fuzzy Hash: C9E1ABB08093169FCB10DF65C54469EFBF0BF88314F00C96EE488A7251D7B89A89DF96

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 779 40b8a4-40b8e5 call 40b1ee GetVersionExA 782 40b914-40b929 GetVersionExA 779->782 783 40b8e7-40b90b call 405455 call 405469 779->783 785 40bc12 782->785 786 40b92f 782->786 791 40b931-40b934 GetSystemInfo 783->791 792 40b90d-40b912 783->792 787 40bc14-40bc1a 785->787 786->783 793 40b939-40b93c 791->793 792->793 794 40b942-40b94b 793->794 795 40bae6-40bb23 RegOpenKeyExA 793->795 797 40b963-40b96a 794->797 798 40b94d 794->798 795->785 799 40bb29-40bb79 RegQueryValueExA RegCloseKey 795->799 797->785 802 40b970-40b979 797->802 800 40b959-40b95e 798->800 801 40b94f-40b952 798->801 799->785 803 40bb7f-40bb86 799->803 800->787 804 40b954 801->804 805 40b9bd-40b9c9 801->805 806 40b9a9-40b9b8 802->806 807 40b97b-40b97e 802->807 803->785 808 40bb8c-40bb9e call 40b055 803->808 804->785 805->785 812 40b9cf 805->812 806->787 809 40b980-40b982 807->809 810 40b99f-40b9a4 807->810 827 40bbb0-40bbc2 call 40b055 808->827 828 40bba0-40bba7 808->828 809->785 818 40b988-40b99a 809->818 810->787 812->785 813 40b9e0-40b9e5 812->813 814 40ba61-40ba6a 812->814 815 40b9d6-40b9db 812->815 816 40bac8-40bacf 812->816 817 40b9fb-40ba04 812->817 820 40bba9-40bbae 813->820 821 40b9eb-40b9f6 813->821 825 40ba6c 814->825 826 40ba8e-40ba9a 814->826 815->787 816->785 824 40bad5-40bae1 816->824 822 40ba0a 817->822 823 40bc0b-40bc10 817->823 818->787 820->787 821->787 830 40ba16-40ba1b 822->830 831 40ba0c-40ba0f 822->831 823->787 824->787 832 40ba7d-40ba89 825->832 833 40ba6e-40ba71 825->833 826->787 841 40bbd1-40bbe3 call 40b055 827->841 842 40bbc4-40bbcd 827->842 828->820 828->827 830->787 835 40ba20-40ba2b 831->835 836 40ba11 831->836 832->787 837 40ba73-40ba76 833->837 838 40ba9f-40baa8 833->838 835->787 844 40ba31-40ba35 835->844 836->785 839 40bab8-40babc 837->839 840 40ba78 837->840 838->787 843 40baae-40bab3 838->843 839->843 847 40babe-40bac3 839->847 840->785 841->842 854 40bbe5 841->854 845 40bbfd-40bc00 842->845 846 40bbcf-40bbf0 842->846 843->787 849 40ba47-40ba5c GetSystemMetrics 844->849 850 40ba37-40ba41 844->850 845->820 853 40bc02 845->853 855 40bbf2-40bbf9 846->855 856 40bc04-40bc09 846->856 847->787 849->787 850->787 850->849 853->785 854->785 855->785 857 40bbfb 855->857 856->787 857->787
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: Version$InfoSystem
                    • String ID: A$P$tCA
                    • API String ID: 731687086-2098838653
                    • Opcode ID: 9ff25001332db28a4cba43fe2e3603d7148304719e311cce78e5d16147e7a9e5
                    • Instruction ID: 213f5c7581ae602c04361a2c582c44ae70c7d1d104af1192d7f0063fb23a7b35
                    • Opcode Fuzzy Hash: 9ff25001332db28a4cba43fe2e3603d7148304719e311cce78e5d16147e7a9e5
                    • Instruction Fuzzy Hash: 28816274A082488AEB249B28C5453AFB6A0EB82304F14487FD585F7381D77D89C5DF9F
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$CryptDataLibraryLoadUnprotectstrlen
                    • String ID: $$J$TAA$yAA
                    • API String ID: 3252690914-3341814342
                    • Opcode ID: dee79b657d048a92c128fd807979512fe649fcd34e8697addc6dec66ea951e89
                    • Instruction ID: 0d44d37ccb953c5ce8451930b2e0d927d54d6dc613895bc50854d86488a5e919
                    • Opcode Fuzzy Hash: dee79b657d048a92c128fd807979512fe649fcd34e8697addc6dec66ea951e89
                    • Instruction Fuzzy Hash: 8461E1B0D042199FCB10DF68C584B8EBBF0BF48304F0085AAE498A7351E7789A89CF46
                    APIs
                      • Part of subcall function 00411EE0: malloc.MSVCRT ref: 00411EF0
                    • SetErrorMode.KERNEL32 ref: 0041266F
                    • GetLogicalDriveStringsA.KERNEL32 ref: 00412680
                    • GetVolumeInformationA.KERNEL32 ref: 00412744
                    • GetDiskFreeSpaceExA.KERNEL32 ref: 0041279F
                    • GetDriveTypeA.KERNEL32 ref: 00412833
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: Drive$DiskErrorFreeInformationLogicalModeSpaceStringsTypeVolumemalloc
                    • String ID: PJA$S$[JA
                    • API String ID: 4103324456-1761618106
                    • Opcode ID: 9aabe946a61e41fee52c1eee580b3b3fdb41f05ef89c8c5d0f1c201d8a81c991
                    • Instruction ID: 356039814e263398ffd4ce6cd742752868d75a7b6425d292464e317d17f25cc6
                    • Opcode Fuzzy Hash: 9aabe946a61e41fee52c1eee580b3b3fdb41f05ef89c8c5d0f1c201d8a81c991
                    • Instruction Fuzzy Hash: BE71C9B48093199FD715EF15C59479EFBF4BF84344F0089AEE48897351D7B88A848F86
                    APIs
                    • SetErrorMode.KERNEL32 ref: 0040431E
                    • FindFirstFileA.KERNEL32 ref: 0040432E
                    • FileTimeToSystemTime.KERNEL32 ref: 004043BC
                    • FindNextFileA.KERNEL32 ref: 004044F7
                    • FindClose.KERNEL32 ref: 00404509
                      • Part of subcall function 00403F73: EnterCriticalSection.KERNEL32 ref: 00403FA3
                      • Part of subcall function 00403F73: LeaveCriticalSection.KERNEL32 ref: 004040C3
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: FileFind$CriticalSectionTime$CloseEnterErrorFirstLeaveModeNextSystem
                    • String ID: $l9A
                    • API String ID: 353538454-1713450632
                    • Opcode ID: 98bc08f6b243b074ef08a4a373ac03dd52d83b39fe9c81a162ffe9445c34541c
                    • Instruction ID: 1fc34434550e5242d9d5ba0645ad2f11a375c46af1ef1a3391ad130d418d873c
                    • Opcode Fuzzy Hash: 98bc08f6b243b074ef08a4a373ac03dd52d83b39fe9c81a162ffe9445c34541c
                    • Instruction Fuzzy Hash: 1571E4B49087159FC711DF25C4846AABBF4AF84744F00C9AEF8C8A7351E7789A84CF86
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: Crypt$Hash$Context$AcquireCreateDataDestroyParamRelease
                    • String ID: =AA
                    • API String ID: 3186506766-994812051
                    • Opcode ID: 2f6a475c9571eee0b807f023cad8654a9ca41767567a4e8f6473becba9cecbd4
                    • Instruction ID: 43e913180013c81e561a4f03503189ea9849b0a11c57a370dc83b3bb8802f5fd
                    • Opcode Fuzzy Hash: 2f6a475c9571eee0b807f023cad8654a9ca41767567a4e8f6473becba9cecbd4
                    • Instruction Fuzzy Hash: D741C3F49083459BDB00EF69C5557AEBBF0AF84348F00C92EE8949B281D7B88558CF96
                    APIs
                    • SetErrorMode.KERNEL32 ref: 00404DA2
                    • FindFirstFileA.KERNEL32 ref: 00404DDC
                    • FindClose.KERNEL32 ref: 00404E06
                    • FindNextFileA.KERNEL32 ref: 0040500B
                      • Part of subcall function 0040AFA3: _vsnprintf.MSVCRT ref: 0040AFC7
                      • Part of subcall function 0040481E: fopen.MSVCRT ref: 0040485C
                      • Part of subcall function 0040481E: fread.MSVCRT ref: 00404895
                      • Part of subcall function 0040481E: fclose.MSVCRT ref: 0040490C
                      • Part of subcall function 00403F73: EnterCriticalSection.KERNEL32 ref: 00403FA3
                      • Part of subcall function 00403F73: LeaveCriticalSection.KERNEL32 ref: 004040C3
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: Find$CriticalFileSection$CloseEnterErrorFirstLeaveModeNext_vsnprintffclosefopenfread
                    • String ID: !$L
                    • API String ID: 2399339665-1212946904
                    • Opcode ID: 520669d3c9e5167182d3218735a7a2b716ccb301ed5db82f3caaeeb510aa4600
                    • Instruction ID: 396f7101ae688dc5a1daa98546f1596006a8bdfdd7540070ae8a870131a2037a
                    • Opcode Fuzzy Hash: 520669d3c9e5167182d3218735a7a2b716ccb301ed5db82f3caaeeb510aa4600
                    • Instruction Fuzzy Hash: 16B1B5B48087159FD710EF15C58469EBBF0EF84354F00C9AEE58CA7391D3789A889F4A
                    APIs
                    • SetErrorMode.KERNEL32 ref: 0040948B
                      • Part of subcall function 0040AFA3: _vsnprintf.MSVCRT ref: 0040AFC7
                    • FindFirstFileA.KERNEL32 ref: 004094D5
                    • FindNextFileA.KERNEL32 ref: 00409660
                    • FindClose.KERNEL32 ref: 00409676
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: Find$File$CloseErrorFirstModeNext_vsnprintf
                    • String ID: i<A
                    • API String ID: 3730131509-3396280644
                    • Opcode ID: 08d414c553bf70d7ecb26121772d48012eb50a6de60c5b71e8a3bb9334b8a2f3
                    • Instruction ID: 634cb96f22232059071e44900e8d17bf50e35e5b716e0b5affd2cc289ba29c1d
                    • Opcode Fuzzy Hash: 08d414c553bf70d7ecb26121772d48012eb50a6de60c5b71e8a3bb9334b8a2f3
                    • Instruction Fuzzy Hash: 4251D9B49047099FCB50EF69C98569EBBF4AF44305F00896EE898E7341E778D984CF4A
                    APIs
                    • SetErrorMode.KERNEL32 ref: 0040D073
                      • Part of subcall function 0040AFA3: _vsnprintf.MSVCRT ref: 0040AFC7
                    • FindFirstFileA.KERNEL32 ref: 0040D0AF
                    • FindNextFileA.KERNEL32 ref: 0040D21C
                    • FindClose.KERNEL32 ref: 0040D240
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: Find$File$CloseErrorFirstModeNext_vsnprintf
                    • String ID: EA$EA
                    • API String ID: 3730131509-2825276752
                    • Opcode ID: 21ea41ee33ca27a9ba7a00c637488261db3e5fa5855e3697372241443351829d
                    • Instruction ID: f5e0fac76b1629c5f19c698915ab5dd52894034e7796ffa824b2178f72c5ea18
                    • Opcode Fuzzy Hash: 21ea41ee33ca27a9ba7a00c637488261db3e5fa5855e3697372241443351829d
                    • Instruction Fuzzy Hash: 1351E5B48087159FCB10EF65C58069EBBF0EF84354F00C9AEE89CA7341D77899858F56
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: malloc
                    • String ID: wA
                    • API String ID: 2803490479-2241071787
                    • Opcode ID: f7590618486acb90a0b4045038a1b9980daa56503a97e3c65fc2a379a13d9216
                    • Instruction ID: 1903f6f71b833f789e86fa46751705e409b3d32491f2a3118026c90f9d04b3e6
                    • Opcode Fuzzy Hash: f7590618486acb90a0b4045038a1b9980daa56503a97e3c65fc2a379a13d9216
                    • Instruction Fuzzy Hash: 531271B04087908ED711AF36D5492AEBBE0AF45305F45487FE8C4AB3D2D7BC8589CB5A
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: recvsend$htons
                    • String ID:
                    • API String ID: 2448738288-0
                    • Opcode ID: ff5436d585582389e34766bf336c56e4aeb74634b6732d0944e1465468626d1f
                    • Instruction ID: 2f68b1b73ed64f245c1a6ebda433876d96cf46e9067814a4a33702efc6ea4ceb
                    • Opcode Fuzzy Hash: ff5436d585582389e34766bf336c56e4aeb74634b6732d0944e1465468626d1f
                    • Instruction Fuzzy Hash: 974125B18187589ADB10AF25C8453DEBFF4AF50315F00C8AEE58897281D37997C8CF96
                    APIs
                      • Part of subcall function 004087B6: CryptAcquireContextA.ADVAPI32 ref: 00408805
                      • Part of subcall function 004087B6: CryptCreateHash.ADVAPI32 ref: 0040883C
                      • Part of subcall function 004087B6: CryptHashData.ADVAPI32 ref: 00408868
                      • Part of subcall function 004087B6: CryptGetHashParam.ADVAPI32 ref: 004088A3
                    • RegQueryValueExA.ADVAPI32 ref: 004089F7
                    • CryptUnprotectData.CRYPT32 ref: 00408A6B
                    • LocalFree.KERNEL32 ref: 00408B25
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: Crypt$Hash$Data$AcquireContextCreateFreeLocalParamQueryUnprotectValue
                    • String ID: BAA
                    • API String ID: 1605365258-1692831742
                    • Opcode ID: 48ab4e01a5728df10220c763567179fde9bcf9614d20cdb5cf2f54ab0b6fcdaf
                    • Instruction ID: ca52c820bf44693809b768f53c9273ce6cb39d51f7934d701046dfe5554239b4
                    • Opcode Fuzzy Hash: 48ab4e01a5728df10220c763567179fde9bcf9614d20cdb5cf2f54ab0b6fcdaf
                    • Instruction Fuzzy Hash: EC5173B4A042099FCB40DF69C98579EBBF0BB48304F00856AE898E7351D774EA848F96
                    APIs
                    • GetForegroundWindow.USER32 ref: 0040FC62
                    • GetLocalTime.KERNEL32 ref: 0040FC81
                    • GetWindowTextA.USER32 ref: 0040FCA1
                      • Part of subcall function 0040AFA3: _vsnprintf.MSVCRT ref: 0040AFC7
                      • Part of subcall function 0040FA98: GetLocalTime.KERNEL32 ref: 0040FABA
                      • Part of subcall function 0040FA98: CloseHandle.KERNEL32 ref: 0040FB1D
                      • Part of subcall function 0040FA98: CreateFileA.KERNEL32 ref: 0040FBD0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: LocalTimeWindow$CloseCreateFileForegroundHandleText_vsnprintf
                    • String ID: iFA
                    • API String ID: 3580565685-532656184
                    • Opcode ID: dc00317daa823cb9276fda14bab8d1ce1c9f3b77865aa93909205f1f568bd11f
                    • Instruction ID: 38f6a2c2e79afc0ecd5df7ed28411f7503ab69d836c464945d8390dd89849ff4
                    • Opcode Fuzzy Hash: dc00317daa823cb9276fda14bab8d1ce1c9f3b77865aa93909205f1f568bd11f
                    • Instruction Fuzzy Hash: 9511D0B09047199AC760DF65D9812AFB7F0BB48745F1049BEA88993281E7788A84CF55
                    APIs
                    • SetErrorMode.KERNEL32 ref: 004045CB
                      • Part of subcall function 0040AFA3: _vsnprintf.MSVCRT ref: 0040AFC7
                    • FindFirstFileA.KERNEL32 ref: 00404605
                    • FindClose.KERNEL32(?,?), ref: 0040462F
                    • FindNextFileA.KERNEL32(?,?), ref: 004047B9
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: Find$File$CloseErrorFirstModeNext_vsnprintf
                    • String ID:
                    • API String ID: 3730131509-0
                    • Opcode ID: 076ee79122b3436bb3b8bfaabb885c4b5ad79c44ed25760ef8b051012f3dd94f
                    • Instruction ID: 2593e12487520a48a322449849de4ca25e75851314d5c1416644c12062ff8950
                    • Opcode Fuzzy Hash: 076ee79122b3436bb3b8bfaabb885c4b5ad79c44ed25760ef8b051012f3dd94f
                    • Instruction Fuzzy Hash: 3361E9F4808305AFD710EF25C98469EBBF4EF84354F04C96EE588AB391D3789A848F46
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                    • String ID:
                    • API String ID: 420147892-0
                    • Opcode ID: b34769d8eb764ed80869c329f0dcd0ed218771a8a99234c4eb81c95ea124fb97
                    • Instruction ID: dc86b6391665ec6c51e98d6a30bc66ecca3d47f1a0914be38fd54aad509e9d2c
                    • Opcode Fuzzy Hash: b34769d8eb764ed80869c329f0dcd0ed218771a8a99234c4eb81c95ea124fb97
                    • Instruction Fuzzy Hash: 9D110AB0904304AFD710EF65C9856EEBBF8EF84754F00886FF988D7201D7B899908B56
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: NameUsergetenv
                    • String ID: KCA
                    • API String ID: 3323410895-1493292787
                    • Opcode ID: f09bc2163d5e417fda667a3801d56544f7504deba1a95c2535fbb1d0da4d81f5
                    • Instruction ID: 93b68ccb07a19b0e332611bce7a53bba85470a5ab4b852b611ab372c68c4848c
                    • Opcode Fuzzy Hash: f09bc2163d5e417fda667a3801d56544f7504deba1a95c2535fbb1d0da4d81f5
                    • Instruction Fuzzy Hash: 63F0D6B1908314AFDB00AF55D5414DEBBF8EE44754F10C42FFC9897251D37495509B9A
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: CryptDataFreeLocalUnprotect
                    • String ID:
                    • API String ID: 1561624719-0
                    • Opcode ID: 6b3e8b3b548a0994eeafafb947f04af19ae933bf52dd646e836e27da49c569cd
                    • Instruction ID: 354592a7c4b75b1edebc5e8f641874d5ef5bd54dec488d7c52d0676a8032899d
                    • Opcode Fuzzy Hash: 6b3e8b3b548a0994eeafafb947f04af19ae933bf52dd646e836e27da49c569cd
                    • Instruction Fuzzy Hash: 9891A4B09043198FDB50DF65C58579EBBF4FF48304F1084AAE898A7340DB799A94CF96
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: Cursormouse_event
                    • String ID:
                    • API String ID: 1102576784-0
                    • Opcode ID: b56dbc3c8afd2e86c22553aa27f180bdb3824a90655ea9961313d8c7895b2879
                    • Instruction ID: d4530d024c4aa0a579763f122d2ae13491926dfd7348beb7c7e67ec921a419ba
                    • Opcode Fuzzy Hash: b56dbc3c8afd2e86c22553aa27f180bdb3824a90655ea9961313d8c7895b2879
                    • Instruction Fuzzy Hash: EF0184B0008345AAE700AF15C11936FBBE5AB84708F41CD1EE8D95B281D7BEC599DF9B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID: 0-3916222277
                    • Opcode ID: b8d42a7b63d4474c9d296802be1ff9ad28c4bd8d98a796cadb29ad3b8ed83466
                    • Instruction ID: af0e4bd2f8db11168633d7947d060afc8ea8c21cc56c489c88e60dc4be1be253
                    • Opcode Fuzzy Hash: b8d42a7b63d4474c9d296802be1ff9ad28c4bd8d98a796cadb29ad3b8ed83466
                    • Instruction Fuzzy Hash: 2BE1A3316093919FD344CF2ED894467BBE2ABD9200F49C97EE5C487366C634E812DBA6
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID: 0-3916222277
                    • Opcode ID: 2cb219ad1ba735ddc1010fc04fb07be04a48c2c717d2421ba4e92f8a78365db7
                    • Instruction ID: dbe08ef90ca7c0ba67045d17c91d3382d316b0ef5ad8322767aaa1e22ac0fbde
                    • Opcode Fuzzy Hash: 2cb219ad1ba735ddc1010fc04fb07be04a48c2c717d2421ba4e92f8a78365db7
                    • Instruction Fuzzy Hash: 1AE1A1316093519FC344DF2ED8D046ABBE2EBC9200F89C93ED69487356CB34E915DBA6
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: keybd_event
                    • String ID:
                    • API String ID: 2665452162-0
                    • Opcode ID: ad786c9eec74cfddfaa1de87bd31ff0ac883e7b7428f562d910820cb54471c70
                    • Instruction ID: 514b6a3e3d432557939aa7a66e17ac90f26ef639243acb5799a6f0622e44b1ea
                    • Opcode Fuzzy Hash: ad786c9eec74cfddfaa1de87bd31ff0ac883e7b7428f562d910820cb54471c70
                    • Instruction Fuzzy Hash: F7D0C9B44083446AD700BF39C51A31FBEE49B4034CF40C94DE8D44B286E2B9C1588BD2
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 97078c1ec4012f78fb44af18f5c532879ac62cdecd602c122b775541fe005406
                    • Instruction ID: b6bb0abaf440d756293c1a002dd11d6f450bc76aad7b664dcb83bd2216a62ab0
                    • Opcode Fuzzy Hash: 97078c1ec4012f78fb44af18f5c532879ac62cdecd602c122b775541fe005406
                    • Instruction Fuzzy Hash: E0227077F442104BDB5CCE5ACC906AAB393BBD831035FD27D8C06AB759DAB4B94686C0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 31593d8cefdcca00685f87743ed0cec816f2b2c0fbbdf3ba0f037685ca3658f4
                    • Instruction ID: e6d911fdb611b8e20caa4b8839373222f843f50831378261c373f2f2ec46952d
                    • Opcode Fuzzy Hash: 31593d8cefdcca00685f87743ed0cec816f2b2c0fbbdf3ba0f037685ca3658f4
                    • Instruction Fuzzy Hash: 35A184729281B14BD74D8F2D9865437BBE0AB0920174B85FBD8C6AB393CA74DC41DBE4
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: cbdbce695deb1e2b3e85a9bc98d2888b1b594ebbb5921316fa6f60b82e0e5ede
                    • Instruction ID: 2701268bbd9fc2b5e320d490e8e555aea3c7527564387eb6455bb319325a37e2
                    • Opcode Fuzzy Hash: cbdbce695deb1e2b3e85a9bc98d2888b1b594ebbb5921316fa6f60b82e0e5ede
                    • Instruction Fuzzy Hash: 9C51A5758082649FD7049F1EE8A00B6BBE1E78D310B09C57EEA8417392D734F911DBE9
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5f0cb38eadaf4d6d83f4dade177b392778d08c3289c2bab45c74c43a88b0d488
                    • Instruction ID: cb815717d701d92d0321e5c1705efccde2e51b9c811003f00643a04b9458148e
                    • Opcode Fuzzy Hash: 5f0cb38eadaf4d6d83f4dade177b392778d08c3289c2bab45c74c43a88b0d488
                    • Instruction Fuzzy Hash: 27411C651093C08FCB15CF6D84C059ABFE19FA6200B08C99EE8D99F74BD634D948C772

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 85 409681-409771 LoadLibraryA 86 409773-409778 85->86 87 40977d-409858 GetProcAddress * 6 85->87 88 409e2f-409e35 86->88 89 40985a 87->89 90 40985f-409883 87->90 91 409de6-409deb 89->91 97 409885 90->97 98 40988a-4098b5 90->98 92 409dfb-409e00 91->92 93 409ded-409df8 91->93 95 409e10-409e14 92->95 96 409e02-409e0d 92->96 93->92 100 409e24-409e2c 95->100 101 409e16-409e21 FreeLibrary 95->101 96->95 97->91 104 4098b7 98->104 105 4098bc-4098c1 98->105 100->88 101->100 104->91 106 4098c3 105->106 107 4098c8-4098d0 call 40b8a4 105->107 106->91 110 4098e0-4098e7 107->110 111 4098d2-4098da call 40b8a4 107->111 113 409b5e-409b64 110->113 111->110 117 409b6f-409b76 111->117 115 409b6a 113->115 116 4098ec-409921 call 40b1ca 113->116 115->91 121 409927-409a68 WideCharToMultiByte * 3 116->121 122 409b5a 116->122 119 409dda-409de0 117->119 119->91 123 409b7b-409ba5 call 40b1ca 119->123 127 409b45-409b4a 121->127 128 409a6e-409b0f WideCharToMultiByte call 40af50 121->128 122->113 129 409dd6 123->129 130 409bab-409ce4 WideCharToMultiByte * 3 123->130 127->122 132 409b4c-409b57 127->132 128->127 135 409b11-409b42 call 40b2cb 128->135 129->119 136 409dc1-409dc6 130->136 137 409cea-409d8b WideCharToMultiByte call 40af50 130->137 132->122 135->127 136->129 141 409dc8-409dd3 136->141 137->136 145 409d8d-409dbe call 40b2cb 137->145 141->129 145->136
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$Library$FreeLoad
                    • String ID: ($7BA$;$<$A$B$J$K$K$M$T$U$`$p
                    • API String ID: 2449869053-391259618
                    • Opcode ID: 0102906048278b01bfaadb7cca6d2feb094f081cc665968ec8cf0634dcfafca6
                    • Instruction ID: 5cdc09787fa2d98662f5f6e6c34f3ce4d23c8e7ea1ffc8e747b05e0de4b5849e
                    • Opcode Fuzzy Hash: 0102906048278b01bfaadb7cca6d2feb094f081cc665968ec8cf0634dcfafca6
                    • Instruction Fuzzy Hash: 633296B0908349CFDB10DFA9C58479EBBF0BF45314F108A5DE498AB291D3789949CF96

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 386 405dd8-405e1f getenv call 40afa3 call 404a4e 391 405e21-405e44 getenv call 40afa3 386->391 392 405e49-405e53 call 404a4e 386->392 391->392 396 405fa6 392->396 397 405e59-405eec call 40b1ee * 2 CreatePipe 392->397 399 405fae-405fc8 call 403f73 396->399 397->399 406 405ef2-405f11 CreatePipe 397->406 405 406191-406198 399->405 406->396 407 405f17-405fa4 GetStartupInfoA CreateProcessA 406->407 407->396 408 405fcd-406016 CloseHandle * 2 call 403f73 407->408 410 40601b-40605c PeekNamedPipe 408->410 411 406062-40606a 410->411 412 4060fd 410->412 413 406107-40610e 411->413 414 406070-406077 411->414 412->413 416 406180-40618c call 4053d0 413->416 417 406110-40616e CloseHandle * 2 TerminateProcess call 403f73 413->417 414->413 415 40607d-40607f 414->415 419 4060a1-4060ce ReadFile 415->419 420 406081-406097 malloc 415->420 416->410 417->405 427 406170-40617e call 405434 417->427 419->413 424 4060d0-4060f7 call 403f73 419->424 420->413 423 406099-40609f 420->423 423->419 424->410 424->412 427->405
                    APIs
                    • getenv.MSVCRT ref: 00405DF4
                      • Part of subcall function 0040AFA3: _vsnprintf.MSVCRT ref: 0040AFC7
                      • Part of subcall function 00404A4E: GetFileAttributesA.KERNEL32 ref: 00404A5A
                    • getenv.MSVCRT ref: 00405E28
                    • CreatePipe.KERNEL32 ref: 00405ED4
                    • CreatePipe.KERNEL32 ref: 00405F07
                    • GetStartupInfoA.KERNEL32 ref: 00405F1A
                    • CreateProcessA.KERNEL32 ref: 00405F9A
                    • CloseHandle.KERNEL32 ref: 00405FD6
                    • CloseHandle.KERNEL32(?), ref: 00405FEB
                      • Part of subcall function 00403F73: EnterCriticalSection.KERNEL32 ref: 00403FA3
                      • Part of subcall function 00403F73: LeaveCriticalSection.KERNEL32 ref: 004040C3
                    • PeekNamedPipe.KERNEL32 ref: 00406052
                    • malloc.MSVCRT ref: 0040608A
                    • ReadFile.KERNEL32 ref: 004060C4
                    • CloseHandle.KERNEL32 ref: 00406119
                    • CloseHandle.KERNEL32(00000000), ref: 00406127
                    • TerminateProcess.KERNEL32(?,00000000), ref: 0040613E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseHandle$CreatePipe$CriticalFileProcessSectiongetenv$AttributesEnterInfoLeaveNamedPeekReadStartupTerminate_vsnprintfmalloc
                    • String ID: "$D
                    • API String ID: 1761898876-1154559923
                    • Opcode ID: fbb02ef1c314bbc3df60b360c3dda634f94df7fada419d372bd55523850ea963
                    • Instruction ID: ab78ed7e7bd911190741dcd00d2c2ce8cf39d2132aa506c12495ccbc8fdc81d2
                    • Opcode Fuzzy Hash: fbb02ef1c314bbc3df60b360c3dda634f94df7fada419d372bd55523850ea963
                    • Instruction Fuzzy Hash: 5AA10EB48097159FDB10EF25C58879EBBF4BF84308F0088AEE488A7351D7B89984CF46

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 431 410ccc-410d1b call 4128fc RegOpenKeyExA 434 410d21-410d2b 431->434 435 4110f3-4110fc 431->435 436 410d31-410d81 RegEnumValueA 434->436 437 4110e2-4110f2 RegCloseKey 436->437 438 410d87-410d94 436->438 437->435 439 4110d3-4110dd 438->439 440 410d9a-410da0 438->440 439->436 440->439 441 410f95-410fc8 RegQueryValueExA 440->441 442 410e64-410ea3 RegQueryValueExA 440->442 443 410da7-410dfe call 40b1ee RegQueryValueExA 440->443 444 410ee8-410f27 RegQueryValueExA 440->444 441->439 447 410fce-410fe4 malloc 441->447 442->439 448 410ea9-410ee3 call 40afa3 442->448 443->439 454 410e04-410e0d 443->454 444->439 446 410f2d-410f70 call 40afa3 444->446 455 410f75-410f77 446->455 447->439 451 410fea-411015 RegQueryValueExA 447->451 448->455 456 4110c5-4110ce call 405434 451->456 457 41101b-411039 451->457 458 410e0f-410e39 call 40afa3 454->458 459 410e3e-410e46 454->459 455->439 460 410f7d-410f90 call 411fcc 455->460 456->439 462 41103b-411058 call 40b756 457->462 463 41105a-41108a call 40af50 457->463 458->455 459->458 467 410e48-410e4a 459->467 460->439 462->463 474 4110b1-4110b5 463->474 475 41108c-411094 463->475 472 410e4b-410e4d 467->472 472->458 476 410e4f-410e57 472->476 474->456 478 4110b7-4110c0 call 405434 474->478 475->474 477 411096-4110ac call 411fcc call 405434 475->477 479 410e61-410e62 476->479 480 410e59 476->480 477->474 478->456 479->472 480->479
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: Value$Query$CloseEnumOpen_vsnprintfmalloc
                    • String ID: BHA$_HA$xHA
                    • API String ID: 4070552197-3285710930
                    • Opcode ID: ac5d138f93a558dbc5e116cd23dbb3c29edebc9a2d5825cb4dd6319581db7c8d
                    • Instruction ID: 989e93437ed1fc3a8c40e072f8fd8bc0d184f3097b92b14acd78646b57eb1c1e
                    • Opcode Fuzzy Hash: ac5d138f93a558dbc5e116cd23dbb3c29edebc9a2d5825cb4dd6319581db7c8d
                    • Instruction Fuzzy Hash: A3B197B49083559FDB10DF29D58879AFBF0BF48344F10899EE48897251D3B89AC8CF96

                    Control-flow Graph

                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32 ref: 00405A73
                    • Process32First.KERNEL32 ref: 00405A98
                    • CloseHandle.KERNEL32 ref: 00405AA6
                      • Part of subcall function 0040AFA3: _vsnprintf.MSVCRT ref: 0040AFC7
                    • OpenProcess.KERNEL32 ref: 00405B43
                    • GetProcessTimes.KERNEL32 ref: 00405BBF
                    • FileTimeToSystemTime.KERNEL32 ref: 00405BF0
                    • CloseHandle.KERNEL32 ref: 00405C83
                    • Process32Next.KERNEL32 ref: 00405CF6
                    • CloseHandle.KERNEL32 ref: 00405D0E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseHandle$ProcessProcess32Time$CreateFileFirstNextOpenSnapshotSystemTimesToolhelp32_vsnprintf
                    • String ID: )$`;A$~;A
                    • API String ID: 1698657367-2041144709
                    • Opcode ID: 36dd3521c2ac3d965cffdad25bdc6b6ff33896376b5b83b920d8e41b854f2f6b
                    • Instruction ID: 831750719b15e0876fd54e10c955a5243bc5bc00d0fe484e563cac8dfc63c47b
                    • Opcode Fuzzy Hash: 36dd3521c2ac3d965cffdad25bdc6b6ff33896376b5b83b920d8e41b854f2f6b
                    • Instruction Fuzzy Hash: BB81FAB48087159ED720EF25C9447AFBBF4EF44345F00896EE888A7281E7789A84DF56

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 602 40578a-405819 call 4128fc call 405773 socket call 4033a1 609 405a0d-405a14 602->609 610 40581f-40583e connect 602->610 611 405a26-405a57 call 405773 call 405434 call 403b94 609->611 612 405840-405847 610->612 613 40584c-4058a0 call 40afa3 send 610->613 612->611 613->612 619 4058a2-4058e3 call 40b1ee recv 613->619 624 4058f1-4058f6 619->624 625 4058e5-4058ec 619->625 627 4058f8 624->627 628 4058fc-405915 call 40ade0 624->628 625->611 627->628 628->625 631 405917-405932 call 40ade0 628->631 631->625 634 405934-40595a fopen 631->634 635 405960-40597d fwrite 634->635 636 405a16-405a1d 634->636 637 405982-4059ab recv 635->637 636->611 638 4059da-4059ec fclose 637->638 639 4059ad-4059c7 fwrite 637->639 641 4059ee-405a0b call 40491c 638->641 642 405a1f-405a21 638->642 639->637 640 4059c9-4059d8 fclose 639->640 640->611 641->642 642->611
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: connectgethostbynamehtonsrecvsendsocket
                    • String ID: ):A$1;A
                    • API String ID: 2370112503-816570355
                    • Opcode ID: 30f792e7e5844c66469dbdca816c237e38cee11f407f4a80b514b23e9ea034fc
                    • Instruction ID: 71e4d62505e26983df68ec771c9a0a1423731bef936d2721f1dc97ea6062637c
                    • Opcode Fuzzy Hash: 30f792e7e5844c66469dbdca816c237e38cee11f407f4a80b514b23e9ea034fc
                    • Instruction Fuzzy Hash: 4E71E8B49087049FD710EF69C58539EBBE0EF44358F00C96EE888DB381D7B999949F4A

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 645 41217c-4121fc call 411ee0 call 405455 call 405469 call 405455 call 405469 call 405455 call 405469 660 41221a-412221 645->660 661 4121fe-412215 call 405455 call 405469 645->661 662 412227-412229 660->662 663 4125dc-4125e9 660->663 661->660 662->663 665 41222f-412231 662->665 666 41260b-41261b 663->666 667 4125eb-412609 call 4120b4 663->667 665->663 669 412237-41227a 665->669 671 412623-41263d call 403f73 call 411f25 666->671 667->671 677 412280-412296 malloc 669->677 678 412437-41247e 669->678 677->663 680 41229c-4122ca 677->680 678->663 684 412484-41249a malloc 678->684 685 4122ec 680->685 686 4122cc-4122d3 680->686 684->663 687 4124a0-4124d2 684->687 689 4122ee-4122f6 685->689 686->678 688 4122d9-4122e7 call 405434 686->688 694 4124f4-4124f6 687->694 695 4124d4-4124db 687->695 688->678 689->686 692 4122f8-412419 htons inet_ntoa call 40afa3 htons inet_ntoa call 40afa3 call 4120bc call 40afa3 689->692 714 412431-412432 692->714 715 41241b-41242c call 411fcc 692->715 699 4124fc-412504 694->699 695->663 698 4124e1-4124ef call 405434 695->698 698->663 699->695 702 412506-4125be htons inet_ntoa call 40afa3 call 4120bc call 40afa3 699->702 718 4125c0-4125d1 call 411fcc 702->718 719 4125d6-4125d7 702->719 714->689 715->714 718->719 719->699
                    APIs
                      • Part of subcall function 00411EE0: malloc.MSVCRT ref: 00411EF0
                      • Part of subcall function 00405455: LoadLibraryA.KERNEL32 ref: 00405461
                      • Part of subcall function 00405469: GetProcAddress.KERNEL32 ref: 0040547C
                    • malloc.MSVCRT ref: 00412289
                    • htons.WS2_32 ref: 0041230D
                    • inet_ntoa.WS2_32(?), ref: 0041231F
                    • htons.WS2_32 ref: 00412363
                    • inet_ntoa.WS2_32 ref: 00412375
                    • malloc.MSVCRT ref: 0041248D
                    • htons.WS2_32 ref: 0041251B
                    • inet_ntoa.WS2_32 ref: 00412531
                      • Part of subcall function 004120BC: CreateToolhelp32Snapshot.KERNEL32 ref: 00412108
                      • Part of subcall function 004120BC: Process32First.KERNEL32 ref: 0041212C
                      • Part of subcall function 004120BC: CloseHandle.KERNEL32 ref: 0041216E
                      • Part of subcall function 0040AFA3: _vsnprintf.MSVCRT ref: 0040AFC7
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: htonsinet_ntoamalloc$AddressCloseCreateFirstHandleLibraryLoadProcProcess32SnapshotToolhelp32_vsnprintf
                    • String ID: =IA$N$}IA
                    • API String ID: 3806733647-3309204232
                    • Opcode ID: 7b9541f545c9f2a34757e8f7c29394d1a1f9830dc890e4d2419c71ec7690ea62
                    • Instruction ID: 20a1844e7a5c459d330a443d6b8fa9c6bd77651207b4c8d8b34c766d9274e1b4
                    • Opcode Fuzzy Hash: 7b9541f545c9f2a34757e8f7c29394d1a1f9830dc890e4d2419c71ec7690ea62
                    • Instruction Fuzzy Hash: EBD1D5B09083159FCB11EF65C58479EBBF8BF84708F01899EE58897251D7B89AC4CF46

                    Control-flow Graph

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: AttributesFilefclosefopenfreadfwrite
                    • String ID: 4A$ 4A$D$D$lEA
                    • API String ID: 89957345-2790498474
                    • Opcode ID: f152b6aa1b7416d8f0f0ebd9bf0003a6d043924cad8ac1b086a1b89980a8b980
                    • Instruction ID: 8ee7dcb1a855fa224ab7dec011a0fbf22432a1ee2610218971ebbed7d3f7c393
                    • Opcode Fuzzy Hash: f152b6aa1b7416d8f0f0ebd9bf0003a6d043924cad8ac1b086a1b89980a8b980
                    • Instruction Fuzzy Hash: F751D3F0408714EBD710EF11C58539EBBE4AF84348F41C96EE5886B281D7BD9989DF4A
                    APIs
                      • Part of subcall function 0040AFA3: _vsnprintf.MSVCRT ref: 0040AFC7
                      • Part of subcall function 00404A4E: GetFileAttributesA.KERNEL32 ref: 00404A5A
                    • SetFileAttributesA.KERNEL32 ref: 0040CEC4
                    • fopen.MSVCRT ref: 0040CED6
                    • fwrite.MSVCRT ref: 0040CF84
                    • fclose.MSVCRT ref: 0040CF94
                    • SetFileAttributesA.KERNEL32 ref: 0040CFB6
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: AttributesFile$_vsnprintffclosefopenfwrite
                    • String ID: D$D$lEA$xEA$DA
                    • API String ID: 1105125946-1048815438
                    • Opcode ID: 9e7d724425f60edd07a3b15a2b20a5c6f0d5eef6687e60083d1717f7f5f0570b
                    • Instruction ID: a99362d3ca4ca861082491842b0435d7b2127b1ddbd31fb88d185ee01cbaad60
                    • Opcode Fuzzy Hash: 9e7d724425f60edd07a3b15a2b20a5c6f0d5eef6687e60083d1717f7f5f0570b
                    • Instruction Fuzzy Hash: BD31FAF1408304ABC710AF25C58429EFBE4AF84358F01C86EE5D8A7381D7B89989CF5A
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseOpenValue$CreateDelete
                    • String ID: ?$Q
                    • API String ID: 774071636-1039334267
                    • Opcode ID: 0d1914a16431f499e83252cdacc41e37facfb873727850b0a8faac512d4cb015
                    • Instruction ID: c439cc1598956ffcb5f5d1af2c0e5dcdd498ed23d8f7eeac35ff14a014eb7dd8
                    • Opcode Fuzzy Hash: 0d1914a16431f499e83252cdacc41e37facfb873727850b0a8faac512d4cb015
                    • Instruction Fuzzy Hash: 4061E5B49093059FC700EF69D58469EFBF4AF98754F00891EF89897311D3B9C9888F96
                    APIs
                      • Part of subcall function 00405455: LoadLibraryA.KERNEL32 ref: 00405461
                      • Part of subcall function 00405469: GetProcAddress.KERNEL32 ref: 0040547C
                    • RegisterClassExA.USER32 ref: 0041022F
                    • CreateWindowExA.USER32 ref: 00410295
                    • GetMessageA.USER32 ref: 004102CD
                    • TranslateMessage.USER32 ref: 004102DC
                    • DispatchMessageA.USER32(00000000), ref: 004102E5
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: Message$AddressClassCreateDispatchLibraryLoadProcRegisterTranslateWindow
                    • String ID: 0$0$pGA$wcnwClass
                    • API String ID: 3243276898-1772338863
                    • Opcode ID: 61e49c2ad0511c5c941a7e6583859faedc0309ac2642f0c420f6551139e44464
                    • Instruction ID: 068bc183204c7eb98bb354b3682a6ee4adec67ee41bf8ba6f0d787dc2c733290
                    • Opcode Fuzzy Hash: 61e49c2ad0511c5c941a7e6583859faedc0309ac2642f0c420f6551139e44464
                    • Instruction Fuzzy Hash: D3310CB0409301DAD700AF65DA5839FBBF4FB84348F00892EE4946B281D7BD85C9CF9A
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: recvsend$mallocselect
                    • String ID:
                    • API String ID: 2752384660-0
                    • Opcode ID: 5fb4c28d16103b5818a03313459db5f4bff912668f9c2c18364a4389608e24b1
                    • Instruction ID: 18315e3feb48a88bf0c145b53d238d843914a4fc181e2f21cb6c293dc3b95497
                    • Opcode Fuzzy Hash: 5fb4c28d16103b5818a03313459db5f4bff912668f9c2c18364a4389608e24b1
                    • Instruction Fuzzy Hash: 1861FEB09043149ADB10EFA5D5897AEBBF4EF44354F10886FE898D7281E7789A848F46
                    APIs
                      • Part of subcall function 00411EE0: malloc.MSVCRT ref: 00411EF0
                    • LoadLibraryA.KERNEL32 ref: 00410591
                    • GetProcAddress.KERNEL32 ref: 004105AC
                    • GetProcAddress.KERNEL32 ref: 004105C0
                    • GetProcAddress.KERNEL32 ref: 004105D8
                    • FileTimeToSystemTime.KERNEL32 ref: 00410674
                      • Part of subcall function 00403F73: EnterCriticalSection.KERNEL32 ref: 00403FA3
                      • Part of subcall function 00403F73: LeaveCriticalSection.KERNEL32 ref: 004040C3
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$CriticalSectionTime$EnterFileLeaveLibraryLoadSystemmalloc
                    • String ID: HA$'$GA
                    • API String ID: 2869995242-598030498
                    • Opcode ID: 1f702612a7857ecf08445ef31928c6acf8a58152fd26bc50b3c97423ab7d203f
                    • Instruction ID: ae8baa5ecde7fb6ed3adbf78323fa767576e95d4853eb8a3befa3c6e51516c88
                    • Opcode Fuzzy Hash: 1f702612a7857ecf08445ef31928c6acf8a58152fd26bc50b3c97423ab7d203f
                    • Instruction Fuzzy Hash: B65108B48057149FC720DF16C9886AAFBF4EF88304F10C99EE88897350E3789985CF56
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: Value$Query$CloseDeleteOpenmalloc
                    • String ID: Q
                    • API String ID: 262012908-3463352047
                    • Opcode ID: b405ad368a74b2ba0b737f4586612eeebdab027994ea21b8dde39ad54d5f576c
                    • Instruction ID: 3ca93476defa6ef8bcc387df257a5238b1fbcca918f4bd75f6b8d369d1983045
                    • Opcode Fuzzy Hash: b405ad368a74b2ba0b737f4586612eeebdab027994ea21b8dde39ad54d5f576c
                    • Instruction Fuzzy Hash: BD51C8B49053199FCB50EF69D58479EBBF4AF88314F00896EE888D7311E378DA948F52
                    APIs
                    • getenv.MSVCRT ref: 00407B91
                      • Part of subcall function 0040AFA3: _vsnprintf.MSVCRT ref: 0040AFC7
                      • Part of subcall function 00404A4E: GetFileAttributesA.KERNEL32 ref: 00404A5A
                    • getenv.MSVCRT ref: 00407BD0
                      • Part of subcall function 00404BE8: GetFileAttributesExA.KERNEL32 ref: 00404C03
                    • fopen.MSVCRT ref: 00407C04
                    • malloc.MSVCRT ref: 00407C5A
                    • fread.MSVCRT ref: 00407C9E
                    • fclose.MSVCRT ref: 00407CF9
                    • fclose.MSVCRT ref: 00407D1A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: AttributesFilefclosegetenv$_vsnprintffopenfreadmalloc
                    • String ID: 4?A
                    • API String ID: 3920827873-2233913188
                    • Opcode ID: 1dca996ad7b087eadbf85a3b399a9cc6a68cd897726542f96d4f23dd8c0bffa1
                    • Instruction ID: 3966e464501311549d35d80b116e3f915d36021e1a2b2f7f5795f4143f236d35
                    • Opcode Fuzzy Hash: 1dca996ad7b087eadbf85a3b399a9cc6a68cd897726542f96d4f23dd8c0bffa1
                    • Instruction Fuzzy Hash: 334194B450C3858BC720EF25C18979EB7E0BF94304F518D2EE49897351D778A589CB97
                    APIs
                      • Part of subcall function 0040B849: getenv.MSVCRT ref: 0040B85E
                      • Part of subcall function 0040B849: GetUserNameA.ADVAPI32 ref: 0040B874
                      • Part of subcall function 0040B7E0: gethostname.WS2_32 ref: 0040B80C
                      • Part of subcall function 0040B7E0: GetComputerNameA.KERNEL32 ref: 0040B823
                      • Part of subcall function 0040BC47: GetTickCount.KERNEL32 ref: 0040BC7A
                      • Part of subcall function 004051A9: GetModuleFileNameA.KERNEL32 ref: 004051C6
                    • getenv.MSVCRT ref: 0040BF72
                    • getenv.MSVCRT ref: 0040BF80
                      • Part of subcall function 00403F73: EnterCriticalSection.KERNEL32 ref: 00403FA3
                      • Part of subcall function 00403F73: LeaveCriticalSection.KERNEL32 ref: 004040C3
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: Namegetenv$CriticalSection$ComputerCountEnterFileLeaveModuleTickUsergethostname
                    • String ID: %$H4A$KCA$l4A$l5A
                    • API String ID: 3776303047-1407204963
                    • Opcode ID: 28bec2c9a909412c80fc4afe47b31c81f4d736968078f8f8d868cdd665d4890a
                    • Instruction ID: d85f1876405dfec4d647fd46b7b60a1a979ce71c79954cbce53fc50b7907c98a
                    • Opcode Fuzzy Hash: 28bec2c9a909412c80fc4afe47b31c81f4d736968078f8f8d868cdd665d4890a
                    • Instruction Fuzzy Hash: 2D619FB4809780DFD320EF65C18469EFBE0AF89348F108D2EE9D897351D77995488F9A
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$CloseHandle$CreateLocalPointerTimeWrite_vsnprintf
                    • String ID: XFA
                    • API String ID: 3264027427-974536607
                    • Opcode ID: a40413c76cd8f53656618cd0bb0ef3d86255663df44c752a595bfe4aee92ffe6
                    • Instruction ID: 91731cd170c5d998bbcfc750042ee8dc55e74d060ef57c9b543632cca1338494
                    • Opcode Fuzzy Hash: a40413c76cd8f53656618cd0bb0ef3d86255663df44c752a595bfe4aee92ffe6
                    • Instruction Fuzzy Hash: 89410DF04083058AD720AF65D5453AABBF0FB40369F10CA3EE4A4973D1D7BC95889F9A
                    APIs
                    • RegDeleteKeyA.ADVAPI32 ref: 00410AA2
                    • RegOpenKeyExA.ADVAPI32 ref: 00410AD7
                      • Part of subcall function 0040AFA3: _vsnprintf.MSVCRT ref: 0040AFC7
                    • RegEnumKeyExA.ADVAPI32 ref: 00410B37
                    • RegCloseKey.ADVAPI32 ref: 00410B4C
                    • RegDeleteKeyA.ADVAPI32(00000000), ref: 00410B5C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: Delete$CloseEnumOpen_vsnprintf
                    • String ID: 8HA$@
                    • API String ID: 3258335120-4290720585
                    • Opcode ID: c5296b4e9af734e42d8dbebc49b89b832d88072c421cde381e7b794f12b01c9b
                    • Instruction ID: e26009748f05c12376dafa838653ca88d826763a5889efdba6fa65f1d4502876
                    • Opcode Fuzzy Hash: c5296b4e9af734e42d8dbebc49b89b832d88072c421cde381e7b794f12b01c9b
                    • Instruction Fuzzy Hash: E641C8B49083059BDB10EF69C58879FBBE4BF84344F00885EE8989B241D3B995888F96
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: getenv$_vsnprintffclosefopenfwrite
                    • String ID: l6A$DA
                    • API String ID: 3159630692-3596656015
                    • Opcode ID: 122f7d1ac48ac6bb0f43b323a60622b7e1d5dec9b676e12db3d618f369a0e9d3
                    • Instruction ID: 8d8fa0fa9e342449d6642be7a3f3b57dbab194fb3984e5e901ee57e0f6d2ef16
                    • Opcode Fuzzy Hash: 122f7d1ac48ac6bb0f43b323a60622b7e1d5dec9b676e12db3d618f369a0e9d3
                    • Instruction Fuzzy Hash: 5C31B1F44087409BD310AF66C58529EBBE0AF84348F01CD2EE4C89B241E7BC96888F5B
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: recv$closesocketconnecthtonsselectsendshutdownsocket
                    • String ID:
                    • API String ID: 1430705073-0
                    • Opcode ID: fc92c8c5a0dbe27017bf89f444769f8f89c10a8134cd6a4765926d74bf260c17
                    • Instruction ID: 01c18aa514289597c269caeadaa752c3b40ab312fda17ef6e48aabd214f6af05
                    • Opcode Fuzzy Hash: fc92c8c5a0dbe27017bf89f444769f8f89c10a8134cd6a4765926d74bf260c17
                    • Instruction Fuzzy Hash: 7B611EB08097149FDB10EF25C58939EBBF4EF44348F0089AEE48897291D7B98989CF46
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: fclosefgetpos$fopenfreadfsetposmallocrealloc
                    • String ID:
                    • API String ID: 3217104080-0
                    • Opcode ID: 620a412af4db0eede7548b3dcc00da877d41a799f83f43c82130cfbec20a1575
                    • Instruction ID: a0d5e706f921886c5c23fd30e6422af03956917385b2da39634412cda78928d3
                    • Opcode Fuzzy Hash: 620a412af4db0eede7548b3dcc00da877d41a799f83f43c82130cfbec20a1575
                    • Instruction Fuzzy Hash: 1A31C8B0509B019AD710EF26D68535FBBE4EF84748F404C2EE48897291D779D9848F57
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: fclosefopen$freadfreefwritemalloc
                    • String ID:
                    • API String ID: 3268861121-0
                    • Opcode ID: db9cd1ddba3533799f908722b1bbab13f80b73d4618c007276d285a121451fef
                    • Instruction ID: 9b27cd0a215e18dd769d40057a9f1d93868c1d8f5da361802dfeb248399d38f8
                    • Opcode Fuzzy Hash: db9cd1ddba3533799f908722b1bbab13f80b73d4618c007276d285a121451fef
                    • Instruction Fuzzy Hash: 20211BB05087008FC740AF76869176FBBE4AFC4354F10882EE6D8C7381E67DE8858B4A
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: fopen
                    • String ID: $/
                    • API String ID: 1432627528-2637513485
                    • Opcode ID: 4966ecf185f7c6fd39c6a4eddc59e0371599998d27bcbf0896b958455f4065aa
                    • Instruction ID: f0bb36988fa114ee1f39d1f6ddcb01fe17482cd2e2041a93a4f1d472369bf8b9
                    • Opcode Fuzzy Hash: 4966ecf185f7c6fd39c6a4eddc59e0371599998d27bcbf0896b958455f4065aa
                    • Instruction Fuzzy Hash: D4E1E5B48083199FCB00EFA5D58469EBBF0FF44314F50886EE499A7381D7789A85CF4A
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: fopen$fgetpos$fread
                    • String ID: "FA
                    • API String ID: 1519157137-1668338201
                    • Opcode ID: 1a8d85e7f2cfe4a533ac457cdb7edb3b32a9cc4bb35e199ab6d3934fab32b426
                    • Instruction ID: 9bca862d18c0339220621ce64de444c11e541942f0f53a18aadf7c85be5c6885
                    • Opcode Fuzzy Hash: 1a8d85e7f2cfe4a533ac457cdb7edb3b32a9cc4bb35e199ab6d3934fab32b426
                    • Instruction Fuzzy Hash: DED1D8B49087419FC310EF65C1887AABBE0BF88344F15897EE5D89B392D7789885CF46
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalSection$EnterErrorLastLeavemallocsend
                    • String ID: -
                    • API String ID: 1786834168-2547889144
                    • Opcode ID: 24377aebffa3b5281d1127045a8a1b48695aed9f0c74208b6dc564aaba80508c
                    • Instruction ID: a80a3717f3a453fd2ad5ae32bbc753337fa0d7ebaf2369df8f81d5272f7a8c28
                    • Opcode Fuzzy Hash: 24377aebffa3b5281d1127045a8a1b48695aed9f0c74208b6dc564aaba80508c
                    • Instruction Fuzzy Hash: 1041B3B09043058FCB10AF79C58019ABBE4FF81314F11867FE6A4A72C1C7BC88448B9A
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: htonsrecvselectsend
                    • String ID: Z
                    • API String ID: 3248711867-1505515367
                    • Opcode ID: e2fe29d13216e738a7d9de5c78a8d0e8961cc66796e1d6fd5d29dd145357a28f
                    • Instruction ID: 639f4686af90df012d81833e409e9ce70a181e0f674a263e2d816058d9577b47
                    • Opcode Fuzzy Hash: e2fe29d13216e738a7d9de5c78a8d0e8961cc66796e1d6fd5d29dd145357a28f
                    • Instruction Fuzzy Hash: 704142B08083189BD711EF25C98439EBFF4EF54754F1089AEE498A7281D7798A848F96
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: _vsnprintffclosefgetsfopengetenv
                    • String ID: 9?A$t?A
                    • API String ID: 3106633423-361060513
                    • Opcode ID: 780190c4c68a50bb2849932357d605d5961c48d1bb5beacd531f29cb5f208621
                    • Instruction ID: d56ad9afa16f09ea7403fc7f8586aa3536332f1b7c5a8df2208c776a3bfb1608
                    • Opcode Fuzzy Hash: 780190c4c68a50bb2849932357d605d5961c48d1bb5beacd531f29cb5f208621
                    • Instruction Fuzzy Hash: 744174B44093449BD710EF65C14879EBBE4AF88318F508E6FE4D897291E3789685CF4B
                    APIs
                    • RegOpenKeyExA.ADVAPI32 ref: 00410BF1
                    • RegEnumKeyExA.ADVAPI32 ref: 00410C50
                    • RegCloseKey.ADVAPI32 ref: 00410CBA
                      • Part of subcall function 0040AFA3: _vsnprintf.MSVCRT ref: 0040AFC7
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseEnumOpen_vsnprintf
                    • String ID: >HA$@$@
                    • API String ID: 2247870055-995552534
                    • Opcode ID: aaf79daa1072650b113f8b28d349df9d1ef36b6af601e0d60dc24ba25ea1c482
                    • Instruction ID: 0efa45cfe51a755981f14642be1fa79b8e9458597368fc141579fb9ad7984f90
                    • Opcode Fuzzy Hash: aaf79daa1072650b113f8b28d349df9d1ef36b6af601e0d60dc24ba25ea1c482
                    • Instruction Fuzzy Hash: 572117B49043159FDB10DF6AC58578EBBF4FF84354F00895EE88897341E3B899888F96
                    APIs
                    • socket.WS2_32 ref: 00403C4C
                    • connect.WS2_32 ref: 00403C66
                      • Part of subcall function 00403B94: shutdown.WS2_32 ref: 00403BB3
                      • Part of subcall function 00403B94: closesocket.WS2_32 ref: 00403BBF
                      • Part of subcall function 004033A1: gethostbyname.WS2_32(?), ref: 004033B2
                      • Part of subcall function 004033A1: htons.WS2_32 ref: 004033EC
                    • socket.WS2_32 ref: 00403D89
                    • connect.WS2_32 ref: 00403DA3
                    • socket.WS2_32 ref: 00403E29
                    • connect.WS2_32 ref: 00403E48
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: connectsocket$closesocketgethostbynamehtonsshutdown
                    • String ID:
                    • API String ID: 4225652895-0
                    • Opcode ID: e1fd7005636b4528ff74c502e5c20b6fc0877db0d376a9960d3f91a021e99125
                    • Instruction ID: f45608c9a9de19c42162c372290f679f17a1801011b9796fd91ebc5e26a1b952
                    • Opcode Fuzzy Hash: e1fd7005636b4528ff74c502e5c20b6fc0877db0d376a9960d3f91a021e99125
                    • Instruction Fuzzy Hash: D07138B09047019FDB00EF2AD58069ABFF8AF48719F00C97EE888A7391D7389545CF4A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: i<A
                    • API String ID: 0-3396280644
                    • Opcode ID: 1540d20901c712bcf7481c4b852b8111f1dc69a69761e444df4b5c5b44ba47b8
                    • Instruction ID: 26933de734823d81723c3ef3ef006f536492122f3a2a695693b393f7b42d023a
                    • Opcode Fuzzy Hash: 1540d20901c712bcf7481c4b852b8111f1dc69a69761e444df4b5c5b44ba47b8
                    • Instruction Fuzzy Hash: 2791B8F49043199ECB10EF65C5886DDBBF4BF84308F0188AED498A7341E7799698CF5A
                    APIs
                      • Part of subcall function 004051A9: GetModuleFileNameA.KERNEL32 ref: 004051C6
                    • ExitProcess.KERNEL32 ref: 0040CD0B
                    • fopen.MSVCRT ref: 0040CDDF
                      • Part of subcall function 004049EC: GetFileAttributesA.KERNEL32 ref: 004049F9
                      • Part of subcall function 004049EC: SetFileAttributesA.KERNEL32 ref: 00404A13
                      • Part of subcall function 004049EC: DeleteFileA.KERNEL32 ref: 00404A1D
                      • Part of subcall function 00404A4E: GetFileAttributesA.KERNEL32 ref: 00404A5A
                      • Part of subcall function 004053D0: Sleep.KERNEL32 ref: 004053DC
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$Attributes$DeleteExitModuleNameProcessSleepfopen
                    • String ID: T3A$|3A$}EA
                    • API String ID: 1458395772-2817059344
                    • Opcode ID: 718e782435daecc7b4a03f43b9078f6382099c987aa982178e431d811c2576fa
                    • Instruction ID: 51effcca1c704c504e302ac1a58f79a9d859821a49503cd4af434985cd58f9ce
                    • Opcode Fuzzy Hash: 718e782435daecc7b4a03f43b9078f6382099c987aa982178e431d811c2576fa
                    • Instruction Fuzzy Hash: 5E51CAF0408304DADB10BF52C5853AEBBE1AF85748F01C96EE5D82B382C7BD8585CB5A
                    APIs
                      • Part of subcall function 004033A1: gethostbyname.WS2_32(?), ref: 004033B2
                      • Part of subcall function 004033A1: htons.WS2_32 ref: 004033EC
                    • send.WS2_32 ref: 004035CF
                    • select.WS2_32 ref: 00403636
                    • __WSAFDIsSet.WS2_32 ref: 0040364D
                    • recv.WS2_32 ref: 00403673
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: gethostbynamehtonsrecvselectsend
                    • String ID: Z
                    • API String ID: 3406712544-1505515367
                    • Opcode ID: 6e6e436aaa553e773ace2c488cef308333e37fe85ede4f4e8089efc67dcee756
                    • Instruction ID: d8c65e0f9aad23d1af9af4d348d8c80e5621668995a4c6faa5eb2facd0193626
                    • Opcode Fuzzy Hash: 6e6e436aaa553e773ace2c488cef308333e37fe85ede4f4e8089efc67dcee756
                    • Instruction Fuzzy Hash: 41411CB1808354AEDB10EF25C9857DEBFF4EF44748F0088AEE48897241D7798688CF96
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: fclose$fopenfread
                    • String ID: MZ
                    • API String ID: 3873288765-2410715997
                    • Opcode ID: 9605b6368c7e52d2d36c2c8b4eab568b67af4b93ea4d172e13cb709ab50c471a
                    • Instruction ID: 9393c3985b465bb99bfc5020030233f5d28b48a66406ef6bb25f7d1826fd756a
                    • Opcode Fuzzy Hash: 9605b6368c7e52d2d36c2c8b4eab568b67af4b93ea4d172e13cb709ab50c471a
                    • Instruction Fuzzy Hash: A8F03AB041D700DAC700AF72869525EBBE4AB40344F009C2EE884D6241E2BCE5D58F4B
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: malloc
                    • String ID:
                    • API String ID: 2803490479-0
                    • Opcode ID: f8da10d288f937eb86023cac6c037111826c2a1de32a8c7e0a0aab0348e0a4d2
                    • Instruction ID: 789c58f6633a799f3ccdadbc4a0bac70c7f1a2e104ed6179fdba0fe567e55c56
                    • Opcode Fuzzy Hash: f8da10d288f937eb86023cac6c037111826c2a1de32a8c7e0a0aab0348e0a4d2
                    • Instruction Fuzzy Hash: 5931EDB49083459FCB00EFA9C5856AEBBF0AF44304F10886EE894E7351E378D994DB57
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: QueryValue$CloseOpenmalloc
                    • String ID:
                    • API String ID: 3087825141-0
                    • Opcode ID: da8aec73c22567295960909c3a800c693cf5124f7f3b0def9f79d6b74d7549c4
                    • Instruction ID: 1217e0b8794edc4e031b010a6be2ed351a67450e6abd488551cfa17ba1e0834e
                    • Opcode Fuzzy Hash: da8aec73c22567295960909c3a800c693cf5124f7f3b0def9f79d6b74d7549c4
                    • Instruction Fuzzy Hash: 302187B491830A9FDB00EF69C58569FBBF4FF44354F00881EE894E7241E378D5948B96
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: _vsnprintfrecvsend
                    • String ID: <9A$d9A
                    • API String ID: 2169655391-3684208877
                    • Opcode ID: e8b359e425845bb700784f7dfdd199c0dfdde8338becbbe548a60deb81eb2e56
                    • Instruction ID: 52c586be3d5286e1c27e98d6c6b05f26156bc573bbc9a7378f3ceb3dbd24a318
                    • Opcode Fuzzy Hash: e8b359e425845bb700784f7dfdd199c0dfdde8338becbbe548a60deb81eb2e56
                    • Instruction Fuzzy Hash: 0F31C1B1908302AFD700EF6AD58425BBFE4EB88355F20C82EF49897351D3799644CF96
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: getenv$_vsnprintfmalloc
                    • String ID: h7A
                    • API String ID: 3160696619-676958904
                    • Opcode ID: 487db17d1b4c47ea58c2dea3649691b4fc060ce402f28ef2e464a04554c8b9b0
                    • Instruction ID: 1fc0069b4abfa9b8dfb60568f3aa392d10e3822a04c98d6cd7e49b5590f01b81
                    • Opcode Fuzzy Hash: 487db17d1b4c47ea58c2dea3649691b4fc060ce402f28ef2e464a04554c8b9b0
                    • Instruction Fuzzy Hash: CA4182F44087459ED710EF25C18439EFBE0AF84358F01C86EE5E897292D7B99598CF86
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: fclosefopenfread
                    • String ID: <A
                    • API String ID: 2679521937-2242986680
                    • Opcode ID: ff589dd713b73397fdc3e6b5163c27066bcce45e9a8f163bc71680c80bdf0d54
                    • Instruction ID: dbd2f63e4770309578c13372b46e31df310eed181dc9b582002996e537544628
                    • Opcode Fuzzy Hash: ff589dd713b73397fdc3e6b5163c27066bcce45e9a8f163bc71680c80bdf0d54
                    • Instruction Fuzzy Hash: AB3181B55493859FD360EF68C18979EBBE0AFA4304F018C2EE498C7341D7789594CB97
                    APIs
                      • Part of subcall function 00404A4E: GetFileAttributesA.KERNEL32 ref: 00404A5A
                      • Part of subcall function 0040536B: fopen.MSVCRT ref: 0040537E
                      • Part of subcall function 0040536B: fread.MSVCRT ref: 004053A4
                      • Part of subcall function 0040536B: fclose.MSVCRT ref: 004053B1
                    • CreateProcessA.KERNEL32 ref: 0040C18C
                      • Part of subcall function 0040C5B8: ReleaseMutex.KERNEL32(?,?,?,?,?,0040C19D), ref: 0040C5CA
                      • Part of subcall function 0040C5B8: CloseHandle.KERNEL32(00000000,?,?,?,?,?,0040C19D), ref: 0040C5D8
                      • Part of subcall function 00403B94: shutdown.WS2_32 ref: 00403BB3
                      • Part of subcall function 00403B94: closesocket.WS2_32 ref: 00403BBF
                    • ResumeThread.KERNEL32 ref: 0040C1AE
                    • ExitProcess.KERNEL32 ref: 0040C1BE
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process$AttributesCloseCreateExitFileHandleMutexReleaseResumeThreadclosesocketfclosefopenfreadshutdown
                    • String ID: D
                    • API String ID: 1496764705-2746444292
                    • Opcode ID: 98759e6b4141c8037af9f44ae1c225824c537d05bc6d4c53ef4f4bafba89c97f
                    • Instruction ID: 3df724109044ca6045a273acb2a0b903fcea3471b9f62945986bb6794adae1b2
                    • Opcode Fuzzy Hash: 98759e6b4141c8037af9f44ae1c225824c537d05bc6d4c53ef4f4bafba89c97f
                    • Instruction Fuzzy Hash: 9F21E6B04087049AD700AF62C58575EFFE4EF84348F00892EF8D86B282C7BD9549CF8A
                    APIs
                    • fclose.MSVCRT ref: 0040C4E8
                      • Part of subcall function 004109E0: RegOpenKeyExA.ADVAPI32 ref: 00410A0D
                      • Part of subcall function 004109E0: RegDeleteValueA.ADVAPI32 ref: 00410A26
                      • Part of subcall function 004109E0: RegCloseKey.ADVAPI32(00000000,00000000), ref: 00410A38
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseDeleteOpenValuefclose
                    • String ID: 7EA$lEA$xEA
                    • API String ID: 3171391837-703029007
                    • Opcode ID: f80e68b3fa7901b6fad9aa7f6031b78a2ec26a266523b6d1ba26eeaafd0f803a
                    • Instruction ID: 605899f61dfecdf79069195a6bd4902f44fe9ec78421cae17124a412675369a3
                    • Opcode Fuzzy Hash: f80e68b3fa7901b6fad9aa7f6031b78a2ec26a266523b6d1ba26eeaafd0f803a
                    • Instruction Fuzzy Hash: 7021B9F0408700DADB10BF61D5C52AEBBE1AF85748F41896EA4D42B382D7BC8588CB4A
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseHandle$CreateProcess
                    • String ID: D
                    • API String ID: 2922976086-2746444292
                    • Opcode ID: d3c95db3079e2714f001d2fff3ef258dd1809fb70e580ee415af3ac449ba6cd0
                    • Instruction ID: b9964cf3b3d70a5b5dc938cb0872cd75bf232a4a120276fd28da50fc377402e5
                    • Opcode Fuzzy Hash: d3c95db3079e2714f001d2fff3ef258dd1809fb70e580ee415af3ac449ba6cd0
                    • Instruction Fuzzy Hash: AC21D8B18043049BDB10DF66C59579FFBF4FF84748F00881EE898AB241C7B99548CB96
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseCreateValue
                    • String ID: ?
                    • API String ID: 1818849710-1684325040
                    • Opcode ID: c5a9020963ce1851aabbaafaf777da6cb07ebc6527392f3bc5ecaa998ee9963d
                    • Instruction ID: b67772a298c16792d545e4c838f572247838e71552c807cf400b9bdcba797c68
                    • Opcode Fuzzy Hash: c5a9020963ce1851aabbaafaf777da6cb07ebc6527392f3bc5ecaa998ee9963d
                    • Instruction Fuzzy Hash: 6A11F3B49083099FD700DF69C58578EBBE4FB88354F00891EF89897341D775D6988F92
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: 9A$9A
                    • API String ID: 2574300362-3490971509
                    • Opcode ID: 441b7707d3960adbc57619bdbd9d5506379f5d47a378f29b1d72181832971a35
                    • Instruction ID: 04f137be5751caa9f4a5b5588fbb0c12bc948d0f94067a8f95b1b9f7478967cd
                    • Opcode Fuzzy Hash: 441b7707d3960adbc57619bdbd9d5506379f5d47a378f29b1d72181832971a35
                    • Instruction Fuzzy Hash: 071182B5A186089AEB10DFA2C8457EFBBF4EF84315F01452ED450AB281D7B94648CBA9
                    APIs
                      • Part of subcall function 00408D46: LoadLibraryA.KERNEL32 ref: 00408D5D
                      • Part of subcall function 00408D46: GetProcAddress.KERNEL32 ref: 00408D76
                      • Part of subcall function 00408D46: GetProcAddress.KERNEL32 ref: 00408D8F
                    • strlen.MSVCRT ref: 00409E75
                    • strlen.MSVCRT ref: 00409F1D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProcstrlen$LibraryLoad
                    • String ID: FBA$PBA
                    • API String ID: 4231066107-499912699
                    • Opcode ID: 2de3b840e7ba08736f63386ae35480bed279397f256ead27d54ca1a60b046580
                    • Instruction ID: affa15661951d38304884d731f73b7bd68e062ff7d470335ea469b935afa205d
                    • Opcode Fuzzy Hash: 2de3b840e7ba08736f63386ae35480bed279397f256ead27d54ca1a60b046580
                    • Instruction Fuzzy Hash: 80413AB4509341AFC780DF69C184A4BBBE0BF88758F809D2EF89997351E778D9848F46
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: setsockopt$Ioctlioctlsocket
                    • String ID:
                    • API String ID: 1196899187-0
                    • Opcode ID: 0bb391b96dbf3d38a92c29b9e60c2eae1ac5346070497d5f3f2441f7f3dab628
                    • Instruction ID: e4fc5efa884be795be492fef96cfd92d81a3c8fdc32e307957207fc162a98f3b
                    • Opcode Fuzzy Hash: 0bb391b96dbf3d38a92c29b9e60c2eae1ac5346070497d5f3f2441f7f3dab628
                    • Instruction Fuzzy Hash: 4E21EAB18043059AD700DF59C14938EFFF4BF84348F50842DE89867251D3BA9A58CF96
                    APIs
                    • RegOpenKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,00406956), ref: 00410950
                    • RegQueryValueExA.ADVAPI32 ref: 00410985
                    • RegQueryValueExA.ADVAPI32 ref: 004109BD
                    • RegCloseKey.ADVAPI32 ref: 004109D0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: QueryValue$CloseOpen
                    • String ID:
                    • API String ID: 1586453840-0
                    • Opcode ID: f9a1e11298a144b2812afb63a1443df88ef18117fa55cb9593c73efa3012817b
                    • Instruction ID: ad302815a94d9cbff96995cd7d5d913b80097c713e0b676eb4f4c36459654616
                    • Opcode Fuzzy Hash: f9a1e11298a144b2812afb63a1443df88ef18117fa55cb9593c73efa3012817b
                    • Instruction Fuzzy Hash: 9721E7B19053099BDB00EF69C64468FFBF4FF44344F00882EE894A7201E3B999588F92
                    APIs
                      • Part of subcall function 004080D4: RegOpenKeyExA.ADVAPI32 ref: 00408133
                      • Part of subcall function 004080D4: RegEnumKeyExA.ADVAPI32 ref: 004085FA
                      • Part of subcall function 004080D4: RegCloseKey.ADVAPI32 ref: 00408613
                    • strlen.MSVCRT ref: 00408662
                    • strlen.MSVCRT ref: 004086C2
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: strlen$CloseEnumOpen
                    • String ID: h@A@A$@A
                    • API String ID: 2898426016-2382529649
                    • Opcode ID: 1c97a400e97095ab1d72774d38258fb386ff9cd5fc6a7fe21eab2aa335d09b76
                    • Instruction ID: 51cf97fa2a358d26db60f32de82e9788272475af2e5874e69a239f955066867a
                    • Opcode Fuzzy Hash: 1c97a400e97095ab1d72774d38258fb386ff9cd5fc6a7fe21eab2aa335d09b76
                    • Instruction Fuzzy Hash: FB212BB49093409FC780DF29C184A4EBBE0BF88758F419D2EF898A7351E779DA448F46
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: _filelengthi64fflushfgetposfsetpos
                    • String ID:
                    • API String ID: 3378604764-0
                    • Opcode ID: b8486fb11fe7754b215a1ef4d30d8f3613565fd43fe73c70f9e0d83bbc15ba6c
                    • Instruction ID: 2a80c3a635ce7ec15f39c3c18633452c1c03a4374d1a0a1b5fc19e3439c4804e
                    • Opcode Fuzzy Hash: b8486fb11fe7754b215a1ef4d30d8f3613565fd43fe73c70f9e0d83bbc15ba6c
                    • Instruction Fuzzy Hash: 5E0139B090C7019BC750DF25898019BBBE4EE94354F501C2FF890D2252E238D8848F86
                    APIs
                    • malloc.MSVCRT ref: 004011E5
                    • getenv.MSVCRT ref: 004012A5
                      • Part of subcall function 0040AFA3: _vsnprintf.MSVCRT ref: 0040AFC7
                      • Part of subcall function 004053E4: _beginthreadex.MSVCRT ref: 00405417
                      • Part of subcall function 004053E4: CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0040CE43), ref: 00405423
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseHandle_beginthreadex_vsnprintfgetenvmalloc
                    • String ID: U7A
                    • API String ID: 32720251-82502779
                    • Opcode ID: d4dcbdb2d31c64d70e03e82ba827809c77499162b74b768b53075e48769a738d
                    • Instruction ID: fa56a288c009368ec5c2b3ada7b9da4447a481c2f367d7306f4d4d80003db507
                    • Opcode Fuzzy Hash: d4dcbdb2d31c64d70e03e82ba827809c77499162b74b768b53075e48769a738d
                    • Instruction Fuzzy Hash: D92167F04087459ED710AF55C18439EBBE0BF84358F018C2EE5E99B281D7BD95849F86
                    APIs
                    • IsWindowVisible.USER32 ref: 0040D919
                    • SendMessageA.USER32 ref: 0040D940
                      • Part of subcall function 0040AFA3: _vsnprintf.MSVCRT ref: 0040AFC7
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: MessageSendVisibleWindow_vsnprintf
                    • String ID: (FA
                    • API String ID: 3977088758-1860655055
                    • Opcode ID: dadd0752c82a856000982f161a48fc1a7d82abcbf255db38dcc4935541e8e948
                    • Instruction ID: 4eaaabdfa58e88587a430831f07749310c2ad3af8c7a434e2e97123cb1b56690
                    • Opcode Fuzzy Hash: dadd0752c82a856000982f161a48fc1a7d82abcbf255db38dcc4935541e8e948
                    • Instruction Fuzzy Hash: 8C012DB0804305AAD710AFA6D9846AFFBE4AF44754F00882FE9C497341D378D5888F86
                    APIs
                    • GetTickCount.KERNEL32 ref: 0040BC7A
                      • Part of subcall function 00405455: LoadLibraryA.KERNEL32 ref: 00405461
                      • Part of subcall function 00405469: GetProcAddress.KERNEL32 ref: 0040547C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressCountLibraryLoadProcTick
                    • String ID: @$CA
                    • API String ID: 4181504871-3183928166
                    • Opcode ID: 3ac17904a8ef3f3a48eefd68c97df8659283606dbd0096b0a92b1fb56026e872
                    • Instruction ID: dbbfac58934e84253d124d3bf46070b8f9fbc879e41fbd607e5a7d07a410115f
                    • Opcode Fuzzy Hash: 3ac17904a8ef3f3a48eefd68c97df8659283606dbd0096b0a92b1fb56026e872
                    • Instruction Fuzzy Hash: A611AEB45057089BDB04DF65C5C479ABBF0AF44308F048469D8589F38AD7B8D9448FA6
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID: ComputerNamegethostname
                    • String ID: 8CA
                    • API String ID: 1822310196-263586042
                    • Opcode ID: c485423bb71edfa6eb4212e0bb602ece1f555ff10f4238791057b934ed26c145
                    • Instruction ID: ccdac55abdf46612838cb21dddca5fc0ed241a160c63ca55aad5798dd9fd3d2a
                    • Opcode Fuzzy Hash: c485423bb71edfa6eb4212e0bb602ece1f555ff10f4238791057b934ed26c145
                    • Instruction Fuzzy Hash: 43F0ECB1809704AFDB00AF55C9815AEFBF8FF44754F40C82EF89897201D77899519B9A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2061358054.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2061341172.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061379904.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061396514.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061412059.000000000041C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2061448439.000000000041D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_ytgzVtg25k.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: 6$7$7$n7A
                    • API String ID: 0-3626202689
                    • Opcode ID: a3a654f9e19d5589fc7b7096a42e2a519b1fc551216a01fa312d95c34b72902e
                    • Instruction ID: ef4438e9f39ccb210b149dbafd0cd1418d577e3ef5ec846b32cc5e2c27f4f54f
                    • Opcode Fuzzy Hash: a3a654f9e19d5589fc7b7096a42e2a519b1fc551216a01fa312d95c34b72902e
                    • Instruction Fuzzy Hash: C7F0F6F08083889ADB20AF55C58479EBBA0AB41358F00C99EE59C2A281C3BC4688CF56