Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
5ZjBJd69zi.exe

Overview

General Information

Sample name:5ZjBJd69zi.exe
renamed because original name is a hash value
Original sample name:167508c26c39acd68d3ea5229bfde9baeb769002.exe
Analysis ID:1546800
MD5:f8fe4a90e412f083ba00e5a82aaacd75
SHA1:167508c26c39acd68d3ea5229bfde9baeb769002
SHA256:acbc0c7b6c149dc9400eaaa19991877ac86b9c3e2d6d54294fc519ad611ea981
Tags:exeReversingLabsuser-NDA0E
Infos:

Detection

Blihan Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Blihan Stealer
Creates an autostart registry key pointing to binary in C:\Windows
Deletes itself after installation
Drops executables to the windows directory (C:\Windows) and starts them
Found evasive API chain (may stop execution after checking mutex)
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file has a writeable .text section
Contains functionality to dynamically determine API calls
Contains functionality to query network adapater information
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates files inside the system directory
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain (may stop execution after checking a module file name)
PE file contains sections with non-standard names
Sigma detected: CurrentVersion Autorun Keys Modification
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 5ZjBJd69zi.exe (PID: 7092 cmdline: "C:\Users\user\Desktop\5ZjBJd69zi.exe" MD5: F8FE4A90E412F083BA00E5A82AAACD75)
    • microsofthelp.exe (PID: 7108 cmdline: "C:\Windows\microsofthelp.exe" MD5: 8228E31D55A982D60FF2A093FC32E36E)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
5ZjBJd69zi.exeJoeSecurity_BlihanStealerYara detected Blihan StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Windows\microsofthelp.exeJoeSecurity_BlihanStealerYara detected Blihan StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.2405655773.0000000000406000.00000080.00000001.01000000.00000003.sdmpJoeSecurity_BlihanStealerYara detected Blihan StealerJoe Security
        00000001.00000000.2405440885.0000000000401000.00000080.00000001.01000000.00000004.sdmpJoeSecurity_BlihanStealerYara detected Blihan StealerJoe Security
          00000000.00000000.2405041765.0000000000401000.00000080.00000001.01000000.00000003.sdmpJoeSecurity_BlihanStealerYara detected Blihan StealerJoe Security
            00000001.00000002.3663123424.0000000000406000.00000080.00000001.01000000.00000004.sdmpJoeSecurity_BlihanStealerYara detected Blihan StealerJoe Security
              00000000.00000002.2405773168.000000000049E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BlihanStealerYara detected Blihan StealerJoe Security
                Click to see the 2 entries
                SourceRuleDescriptionAuthorStrings
                0.2.5ZjBJd69zi.exe.4af438.1.unpackJoeSecurity_BlihanStealerYara detected Blihan StealerJoe Security
                  0.2.5ZjBJd69zi.exe.4af438.1.raw.unpackJoeSecurity_BlihanStealerYara detected Blihan StealerJoe Security
                    0.2.5ZjBJd69zi.exe.400000.0.unpackJoeSecurity_BlihanStealerYara detected Blihan StealerJoe Security
                      1.2.microsofthelp.exe.400000.0.unpackJoeSecurity_BlihanStealerYara detected Blihan StealerJoe Security
                        1.0.microsofthelp.exe.400000.0.unpackJoeSecurity_BlihanStealerYara detected Blihan StealerJoe Security
                          Click to see the 1 entries

                          System Summary

                          barindex
                          Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Windows\microsofthelp.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\5ZjBJd69zi.exe, ProcessId: 7092, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2024-11-01T15:56:45.172099+010020229301A Network Trojan was detected20.109.210.53443192.168.2.1249710TCP
                          2024-11-01T15:57:24.219172+010020229301A Network Trojan was detected20.109.210.53443192.168.2.1249717TCP

                          Click to jump to signature section

                          Show All Signature Results

                          AV Detection

                          barindex
                          Source: 5ZjBJd69zi.exeAvira: detected
                          Source: C:\Windows\microsofthelp.exeAvira: detection malicious, Label: TR/Downloader.Gen
                          Source: 5ZjBJd69zi.exeReversingLabs: Detection: 92%
                          Source: C:\Windows\microsofthelp.exeJoe Sandbox ML: detected
                          Source: 5ZjBJd69zi.exeJoe Sandbox ML: detected
                          Source: 5ZjBJd69zi.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                          Source: C:\Users\user\Desktop\5ZjBJd69zi.exeCode function: 0_2_00401C80 FindFirstFileA,FindClose,0_2_00401C80
                          Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.12:49710
                          Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.12:49717
                          Source: C:\Users\user\Desktop\5ZjBJd69zi.exeCode function: 0_2_004017C0 HeapFree,InternetOpenA,InternetSetOptionExA,InternetOpenUrlA,GetProcessHeap,InternetReadFile,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,RtlReAllocateHeap,InternetReadFile,InternetCloseHandle,InternetCloseHandle,0_2_004017C0

                          System Summary

                          barindex
                          Source: 5ZjBJd69zi.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          Source: microsofthelp.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          Source: C:\Users\user\Desktop\5ZjBJd69zi.exeFile created: C:\Windows\microsofthelp.exeJump to behavior
                          Source: C:\Windows\microsofthelp.exeFile created: C:\Windows\HidePlugin.dllJump to behavior
                          Source: 5ZjBJd69zi.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                          Source: classification engineClassification label: mal100.troj.evad.winEXE@3/1@0/0
                          Source: C:\Windows\microsofthelp.exeMutant created: \Sessions\1\BaseNamedObjects\pomdfghrt
                          Source: C:\Users\user\Desktop\5ZjBJd69zi.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                          Source: 5ZjBJd69zi.exeReversingLabs: Detection: 92%
                          Source: C:\Users\user\Desktop\5ZjBJd69zi.exeFile read: C:\Users\user\Desktop\5ZjBJd69zi.exeJump to behavior
                          Source: unknownProcess created: C:\Users\user\Desktop\5ZjBJd69zi.exe "C:\Users\user\Desktop\5ZjBJd69zi.exe"
                          Source: C:\Users\user\Desktop\5ZjBJd69zi.exeProcess created: C:\Windows\microsofthelp.exe "C:\Windows\microsofthelp.exe"
                          Source: C:\Users\user\Desktop\5ZjBJd69zi.exeProcess created: C:\Windows\microsofthelp.exe "C:\Windows\microsofthelp.exe"Jump to behavior
                          Source: C:\Users\user\Desktop\5ZjBJd69zi.exeSection loaded: apphelp.dllJump to behavior
                          Source: C:\Users\user\Desktop\5ZjBJd69zi.exeSection loaded: iphlpapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\5ZjBJd69zi.exeSection loaded: wininet.dllJump to behavior
                          Source: C:\Windows\microsofthelp.exeSection loaded: apphelp.dllJump to behavior
                          Source: C:\Windows\microsofthelp.exeSection loaded: iphlpapi.dllJump to behavior
                          Source: C:\Windows\microsofthelp.exeSection loaded: wininet.dllJump to behavior
                          Source: C:\Users\user\Desktop\5ZjBJd69zi.exeCode function: 0_2_00401510 lstrcat,LoadLibraryA,GetProcAddress,0_2_00401510
                          Source: 5ZjBJd69zi.exeStatic PE information: section name: .shoooo
                          Source: 5ZjBJd69zi.exeStatic PE information: section name: .imports
                          Source: microsofthelp.exe.0.drStatic PE information: section name: .shoooo
                          Source: microsofthelp.exe.0.drStatic PE information: section name: .imports
                          Source: C:\Users\user\Desktop\5ZjBJd69zi.exeCode function: 0_2_004041C0 push eax; ret 0_2_004041EE
                          Source: 5ZjBJd69zi.exeStatic PE information: section name: .shoooo entropy: 7.835447843663171
                          Source: microsofthelp.exe.0.drStatic PE information: section name: .shoooo entropy: 7.835447843663171

                          Persistence and Installation Behavior

                          barindex
                          Source: C:\Users\user\Desktop\5ZjBJd69zi.exeExecutable created and started: C:\Windows\microsofthelp.exeJump to behavior
                          Source: C:\Users\user\Desktop\5ZjBJd69zi.exeFile created: C:\Windows\microsofthelp.exeJump to dropped file
                          Source: C:\Users\user\Desktop\5ZjBJd69zi.exeFile created: C:\Windows\microsofthelp.exeJump to dropped file

                          Boot Survival

                          barindex
                          Source: C:\Users\user\Desktop\5ZjBJd69zi.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run microsofthelpJump to behavior
                          Source: C:\Users\user\Desktop\5ZjBJd69zi.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run microsofthelpJump to behavior
                          Source: C:\Users\user\Desktop\5ZjBJd69zi.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run microsofthelpJump to behavior

                          Hooking and other Techniques for Hiding and Protection

                          barindex
                          Source: C:\Windows\microsofthelp.exeFile deleted: c:\users\user\desktop\5zjbjd69zi.exeJump to behavior

                          Malware Analysis System Evasion

                          barindex
                          Source: C:\Users\user\Desktop\5ZjBJd69zi.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_0-1662
                          Source: C:\Users\user\Desktop\5ZjBJd69zi.exeCode function: GetProcessHeap,GetAdaptersInfo,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,GetAdaptersInfo,GetProcessHeap,HeapFree,0_2_00401CC0
                          Source: C:\Users\user\Desktop\5ZjBJd69zi.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_0-1702
                          Source: C:\Users\user\Desktop\5ZjBJd69zi.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_0-1876
                          Source: C:\Users\user\Desktop\5ZjBJd69zi.exeCode function: 0_2_00401C80 FindFirstFileA,FindClose,0_2_00401C80
                          Source: C:\Users\user\Desktop\5ZjBJd69zi.exeAPI call chain: ExitProcess graph end nodegraph_0-1664
                          Source: C:\Users\user\Desktop\5ZjBJd69zi.exeAPI call chain: ExitProcess graph end nodegraph_0-1895
                          Source: C:\Users\user\Desktop\5ZjBJd69zi.exeCode function: 0_2_00401510 lstrcat,LoadLibraryA,GetProcAddress,0_2_00401510
                          Source: C:\Users\user\Desktop\5ZjBJd69zi.exeCode function: 0_2_00401000 EntryPoint,GetModuleFileNameA,Sleep,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,GetWindowsDirectoryA,lstrcat,lstrcmpiA,ExitProcess,Sleep,DeleteFileA,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,Sleep,CreateThread,wsprintfA,Sleep,WaitForSingleObject,0_2_00401000
                          Source: C:\Users\user\Desktop\5ZjBJd69zi.exeCode function: 0_2_00402D5E SetUnhandledExceptionFilter,0_2_00402D5E
                          Source: C:\Users\user\Desktop\5ZjBJd69zi.exeCode function: 0_2_00402D70 SetUnhandledExceptionFilter,0_2_00402D70

                          Stealing of Sensitive Information

                          barindex
                          Source: Yara matchFile source: 5ZjBJd69zi.exe, type: SAMPLE
                          Source: Yara matchFile source: 0.2.5ZjBJd69zi.exe.4af438.1.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.5ZjBJd69zi.exe.4af438.1.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.5ZjBJd69zi.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 1.2.microsofthelp.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 1.0.microsofthelp.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.0.5ZjBJd69zi.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000000.00000002.2405655773.0000000000406000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000001.00000000.2405440885.0000000000401000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000000.2405041765.0000000000401000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000001.00000002.3663123424.0000000000406000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.2405773168.000000000049E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: 5ZjBJd69zi.exe PID: 7092, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: microsofthelp.exe PID: 7108, type: MEMORYSTR
                          Source: Yara matchFile source: C:\Windows\microsofthelp.exe, type: DROPPED

                          Remote Access Functionality

                          barindex
                          Source: Yara matchFile source: 5ZjBJd69zi.exe, type: SAMPLE
                          Source: Yara matchFile source: 0.2.5ZjBJd69zi.exe.4af438.1.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.5ZjBJd69zi.exe.4af438.1.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.5ZjBJd69zi.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 1.2.microsofthelp.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 1.0.microsofthelp.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.0.5ZjBJd69zi.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000000.00000002.2405655773.0000000000406000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000001.00000000.2405440885.0000000000401000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000000.2405041765.0000000000401000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000001.00000002.3663123424.0000000000406000.00000080.00000001.01000000.00000004.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.2405773168.000000000049E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: 5ZjBJd69zi.exe PID: 7092, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: microsofthelp.exe PID: 7108, type: MEMORYSTR
                          Source: Yara matchFile source: C:\Windows\microsofthelp.exe, type: DROPPED
                          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                          Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                          Native API
                          11
                          Registry Run Keys / Startup Folder
                          1
                          Process Injection
                          12
                          Masquerading
                          OS Credential Dumping1
                          Security Software Discovery
                          Remote ServicesData from Local System1
                          Ingress Tool Transfer
                          Exfiltration Over Other Network MediumAbuse Accessibility Features
                          CredentialsDomainsDefault AccountsScheduled Task/Job1
                          DLL Side-Loading
                          11
                          Registry Run Keys / Startup Folder
                          1
                          Process Injection
                          LSASS Memory1
                          System Network Configuration Discovery
                          Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
                          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                          DLL Side-Loading
                          2
                          Obfuscated Files or Information
                          Security Account Manager1
                          File and Directory Discovery
                          SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                          Software Packing
                          NTDS1
                          System Information Discovery
                          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                          DLL Side-Loading
                          LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                          File Deletion
                          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                          Hide Legend

                          Legend:

                          • Process
                          • Signature
                          • Created File
                          • DNS/IP Info
                          • Is Dropped
                          • Is Windows Process
                          • Number of created Registry Values
                          • Number of created Files
                          • Visual Basic
                          • Delphi
                          • Java
                          • .Net C# or VB.NET
                          • C, C++ or other language
                          • Is malicious
                          • Internet

                          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                          windows-stand
                          SourceDetectionScannerLabelLink
                          5ZjBJd69zi.exe92%ReversingLabsWin32.Trojan.Blihan
                          5ZjBJd69zi.exe100%AviraTR/Downloader.Gen
                          5ZjBJd69zi.exe100%Joe Sandbox ML
                          SourceDetectionScannerLabelLink
                          C:\Windows\microsofthelp.exe100%AviraTR/Downloader.Gen
                          C:\Windows\microsofthelp.exe100%Joe Sandbox ML
                          No Antivirus matches
                          No Antivirus matches
                          No Antivirus matches
                          No contacted domains info
                          No contacted IP infos
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1546800
                          Start date and time:2024-11-01 15:55:18 +01:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 4m 17s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:6
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:5ZjBJd69zi.exe
                          renamed because original name is a hash value
                          Original Sample Name:167508c26c39acd68d3ea5229bfde9baeb769002.exe
                          Detection:MAL
                          Classification:mal100.troj.evad.winEXE@3/1@0/0
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 7
                          • Number of non-executed functions: 16
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                          • VT rate limit hit for: 5ZjBJd69zi.exe
                          TimeTypeDescription
                          15:56:30AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run microsofthelp C:\Windows\microsofthelp.exe
                          15:56:50AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run microsofthelp C:\Windows\microsofthelp.exe
                          No context
                          No context
                          No context
                          No context
                          No context
                          Process:C:\Users\user\Desktop\5ZjBJd69zi.exe
                          File Type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                          Category:dropped
                          Size (bytes):75084
                          Entropy (8bit):5.734402464970277
                          Encrypted:false
                          SSDEEP:1536:qAo0+j2d6rnJqlIUlizbR9XwzSPamvDsdHgHSIQEvTbWh7MzdPAxHyHfOvwXIfIm:qAoVl4lX8Pvw2PamvDsdHgHSIQEvTbWD
                          MD5:8228E31D55A982D60FF2A093FC32E36E
                          SHA1:A545831A6E39D706758DEA6ED4C4622B790B087A
                          SHA-256:A0B8B0DFA88DB6B7FA59FB16F29D6A8AE86F4EF7EC813CD117F1B3377E9644CA
                          SHA-512:D26FC8BA5553711E93476949A9BE763D661F214ED7755B4ED14A019F8172092A38CF8FFB385430EBFCA0B3AB94BFA8D67C91C7582E70E02C9B90FE916D053F20
                          Malicious:true
                          Yara Hits:
                          • Rule: JoeSecurity_BlihanStealer, Description: Yara detected Blihan Stealer, Source: C:\Windows\microsofthelp.exe, Author: Joe Security
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          Reputation:low
                          Preview:MZ......................@....2..........................................!..L.!This program cannot be run in DOS mode....$.......................................................K.....................`.......Rich....................PE..L......O.................8...8...............P....@.............................................................................x.......................PM...........................................................................................text....@.......8.......................rdata.......P.......<...................data....0...`...(...B...................shoooo..0.......(...j...................imports............................@...................................................................................................................................................................................................................................................................................................................................
                          File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                          Entropy (8bit):5.74620231769737
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.96%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:5ZjBJd69zi.exe
                          File size:74'824 bytes
                          MD5:f8fe4a90e412f083ba00e5a82aaacd75
                          SHA1:167508c26c39acd68d3ea5229bfde9baeb769002
                          SHA256:acbc0c7b6c149dc9400eaaa19991877ac86b9c3e2d6d54294fc519ad611ea981
                          SHA512:5ed8d852eee09d6a92c9b3ffc6feb1fd32a2c0e35e436552e9b5b3d560b1bbc6032a3ed0e3db8aff527457174a202f0f759eb124f21d54ef76f9abf02d087857
                          SSDEEP:1536:qAo0+j2d6rnJqlIUlizbR9XwzSPamvDsdHgHSIQEvTbWh7MzdPAxHyHfOvwXIfIE:qAoVl4lX8Pvw2PamvDsdHgHSIQEvTbW1
                          TLSH:01737C53ADD88483D896243012E8EB7F6D7FBFC21E94915387D8FC1529A37C0DB2925A
                          File Content Preview:MZ......................@....2..........................................!..L.!This program cannot be run in DOS mode....$.......................................................K.......................`.......Rich....................PE..L......O...........
                          Icon Hash:00928e8e8686b000
                          Entrypoint:0x401000
                          Entrypoint Section:.text
                          Digitally signed:true
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                          DLL Characteristics:
                          Time Stamp:0x4F179BFF [Thu Jan 19 04:28:47 2012 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:ed42d4abceb2444958dc2f2ce7063809
                          Signature Valid:
                          Signature Issuer:
                          Signature Validation Error:
                          Error Number:
                          Not Before, Not After
                            Subject Chain
                              Version:
                              Thumbprint MD5:
                              Thumbprint SHA-1:
                              Thumbprint SHA-256:
                              Serial:
                              Instruction
                              push FFFFFFFFh
                              push 00404611h
                              mov eax, dword ptr fs:[00000000h]
                              push eax
                              mov dword ptr fs:[00000000h], esp
                              sub esp, 00000630h
                              push ebx
                              push ebp
                              push esi
                              push edi
                              mov ecx, 00000040h
                              xor eax, eax
                              lea edi, dword ptr [esp+0000013Dh]
                              mov byte ptr [esp+0000013Ch], 00000000h
                              rep stosd
                              stosw
                              stosb
                              lea eax, dword ptr [esp+0000013Ch]
                              push 00000104h
                              push eax
                              push 00000000h
                              call dword ptr [00405050h]
                              lea ecx, dword ptr [esp+14h]
                              call 00007FB1090CD17Dh
                              lea ecx, dword ptr [esp+0000013Ch]
                              push 00000000h
                              push ecx
                              lea ecx, dword ptr [esp+1Ch]
                              mov dword ptr [esp+00000650h], 00000000h
                              call 00007FB1090CD17Fh
                              test eax, eax
                              jne 00007FB1090CC3A4h
                              push 000003E8h
                              call dword ptr [0040504Ch]
                              lea edx, dword ptr [esp+0000013Ch]
                              push 00000000h
                              push edx
                              lea ecx, dword ptr [esp+1Ch]
                              call 00007FB1090CD15Dh
                              test eax, eax
                              je 00007FB1090CC360h
                              lea ecx, dword ptr [esp+14h]
                              call 00007FB1090CD310h
                              mov ebx, dword ptr [00405048h]
                              push eax
                              push 00000008h
                              mov dword ptr [004086E4h], eax
                              call ebx
                              push eax
                              call dword ptr [00405044h]
                              mov ecx, dword ptr [004086E4h]
                              mov dword ptr [004086E0h], eax
                              Programming Language:
                              • [C++] VS98 (6.0) SP6 build 8804
                              • [ C ] VS98 (6.0) SP6 build 8804
                              • [C++] VS98 (6.0) build 8168
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0xc0000x78.imports
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x98000x4d50
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x40000x38002ab7fd8c123b112cf3b5d1962a297b8dFalse0.5809849330357143data6.401056074083298IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rdata0x50000x10000x60028b0dcb84195a5ab4b77ee0c12902aeaFalse0.45703125data4.732953369377026IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .data0x60000x30000x2800e9acbf5d01a439b581e4c01e8d2a5f39False0.0779296875data0.9614498560336738IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .shoooo0x90000x30000x2800a7b4ffd70e877fa95b9be758de40bb67False0.9544921875data7.835447843663171IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .imports0xc0000x10000x600f70ebb256fe0ad244adedff7b8bda2b7False0.345703125data3.608258743690415IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              DLLImport
                              ADVAPI32.dllRegSetValueExA, RegQueryValueExA, RegOpenKeyExA, RegCreateKeyA, RegOpenKeyA, RegCloseKey
                              iphlpapi.dllGetAdaptersInfo
                              KERNEL32.dllGetStringTypeA, LCMapStringW, WaitForSingleObject, CreateThread, HeapFree, DeleteFileA, ExitProcess, lstrcmpiA, lstrcatA, GetWindowsDirectoryA, HeapAlloc, GetProcessHeap, Sleep, GetModuleFileNameA, CloseHandle, GetLastError, CreateMutexA, GetProcAddress, LoadLibraryA, HeapReAlloc, GetTickCount, FindClose, FindFirstFileA, TerminateProcess, CreateProcessA, CreateFileA, ReadFile, WriteFile, FlushFileBuffers, GetFileSize, LCMapStringA, GetStringTypeW, MultiByteToWideChar, GetOEMCP, GetACP, GetCPInfo, RtlUnwind, SetUnhandledExceptionFilter, IsBadReadPtr, IsBadWritePtr, IsBadCodePtr, GetCurrentProcess, GetStdHandle, WideCharToMultiByte
                              WININET.dllInternetOpenA, InternetSetOptionExA, InternetOpenUrlA, InternetCloseHandle, InternetReadFile
                              USER32.dllwsprintfA
                              No network behavior found

                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:10:56:26
                              Start date:01/11/2024
                              Path:C:\Users\user\Desktop\5ZjBJd69zi.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\5ZjBJd69zi.exe"
                              Imagebase:0x400000
                              File size:74'824 bytes
                              MD5 hash:F8FE4A90E412F083BA00E5A82AAACD75
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_BlihanStealer, Description: Yara detected Blihan Stealer, Source: 00000000.00000002.2405655773.0000000000406000.00000080.00000001.01000000.00000003.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_BlihanStealer, Description: Yara detected Blihan Stealer, Source: 00000000.00000000.2405041765.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_BlihanStealer, Description: Yara detected Blihan Stealer, Source: 00000000.00000002.2405773168.000000000049E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low
                              Has exited:true

                              Target ID:1
                              Start time:10:56:26
                              Start date:01/11/2024
                              Path:C:\Windows\microsofthelp.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\microsofthelp.exe"
                              Imagebase:0x400000
                              File size:75'084 bytes
                              MD5 hash:8228E31D55A982D60FF2A093FC32E36E
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_BlihanStealer, Description: Yara detected Blihan Stealer, Source: 00000001.00000000.2405440885.0000000000401000.00000080.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_BlihanStealer, Description: Yara detected Blihan Stealer, Source: 00000001.00000002.3663123424.0000000000406000.00000080.00000001.01000000.00000004.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_BlihanStealer, Description: Yara detected Blihan Stealer, Source: C:\Windows\microsofthelp.exe, Author: Joe Security
                              Antivirus matches:
                              • Detection: 100%, Avira
                              • Detection: 100%, Joe Sandbox ML
                              Reputation:low
                              Has exited:false

                              Reset < >

                                Execution Graph

                                Execution Coverage:5%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:27.2%
                                Total number of Nodes:283
                                Total number of Limit Nodes:3
                                execution_graph 1584 401000 GetModuleFileNameA 1585 401058 1584->1585 1644 401e70 1585->1644 1588 40107a Sleep 1590 401e70 CreateFileA 1588->1590 1589 40109c 1648 402030 GetFileSize 1589->1648 1592 401098 1590->1592 1592->1588 1592->1589 1593 4010a5 GetProcessHeap RtlAllocateHeap 1649 401fb0 ReadFile 1593->1649 1595 4010d2 1650 402010 1595->1650 1598 4011b1 1662 401450 CreateMutexA GetLastError 1598->1662 1599 40112b 1602 401e70 CreateFileA 1599->1602 1604 40114f 1602->1604 1604->1598 1606 401153 1604->1606 1605 4011e4 1607 4011eb Sleep DeleteFileA 1605->1607 1608 4011fd 1605->1608 1653 401fe0 WriteFile 1606->1653 1607->1608 1668 401510 1608->1668 1610 40116a 1654 401fe0 WriteFile 1610->1654 1613 401180 1655 402000 FlushFileBuffers 1613->1655 1616 401243 1618 4012b8 Sleep 1616->1618 1621 4012c5 1616->1621 1622 4012b0 GetProcessHeap HeapFree 1616->1622 1623 4012a0 GetProcessHeap HeapFree 1616->1623 1682 4017c0 InternetOpenA 1616->1682 1617 401189 1619 402010 CloseHandle 1617->1619 1618->1616 1620 401192 1619->1620 1656 401a70 RegOpenKeyExA 1620->1656 1626 4012d2 CreateThread 1621->1626 1622->1618 1623->1622 1694 401cc0 GetAdaptersInfo 1626->1694 1709 401930 1626->1709 1629 4011a6 ExitProcess 1630 4012f3 1631 4012ff wsprintfA 1630->1631 1700 401d30 LoadLibraryA GetProcAddress 1631->1700 1633 401362 1702 401dc0 RegOpenKeyA 1633->1702 1635 401406 WaitForSingleObject 1636 401427 1635->1636 1637 401378 1637->1635 1638 4013af Sleep 1637->1638 1639 4013c3 1638->1639 1705 401b70 GetTickCount 1639->1705 1641 4013d3 1642 401d30 4 API calls 1641->1642 1643 401403 1642->1643 1643->1635 1645 401e90 CreateFileA 1644->1645 1647 401076 1645->1647 1647->1588 1647->1589 1648->1593 1649->1595 1651 4010db GetWindowsDirectoryA lstrcat lstrcmpiA 1650->1651 1652 40201a CloseHandle 1650->1652 1651->1598 1651->1599 1652->1651 1653->1610 1654->1613 1655->1617 1657 40119c 1656->1657 1658 401aa2 RegQueryValueExA 1656->1658 1661 401e00 CreateProcessA 1657->1661 1659 401b56 RegCloseKey 1658->1659 1660 401b2e RegSetValueExA 1658->1660 1659->1657 1660->1659 1661->1629 1663 4011cc 1662->1663 1664 40146f CloseHandle ExitProcess 1662->1664 1665 401c80 FindFirstFileA 1663->1665 1666 401cab 1665->1666 1667 401c9b FindClose 1665->1667 1666->1605 1667->1605 1706 401c40 GetModuleFileNameA 1668->1706 1671 40156c 1672 401c80 2 API calls 1671->1672 1673 401581 1672->1673 1674 4015c4 LoadLibraryA 1673->1674 1675 401e70 CreateFileA 1673->1675 1676 4015d3 GetProcAddress 1674->1676 1677 4015e3 1674->1677 1678 40159c 1675->1678 1676->1677 1677->1616 1678->1674 1708 401fe0 WriteFile 1678->1708 1680 4015bb 1681 402010 CloseHandle 1680->1681 1681->1674 1683 4017e8 InternetSetOptionExA 1682->1683 1684 40191e 1682->1684 1685 401805 InternetOpenUrlA 1683->1685 1686 401917 InternetCloseHandle 1683->1686 1684->1616 1685->1686 1687 401837 InternetReadFile 1685->1687 1686->1684 1688 40190b InternetCloseHandle 1687->1688 1690 401856 1687->1690 1688->1686 1689 40186c GetProcessHeap RtlAllocateHeap 1689->1690 1690->1688 1690->1689 1691 4018b0 GetProcessHeap RtlAllocateHeap 1690->1691 1692 4018be GetProcessHeap RtlReAllocateHeap 1690->1692 1693 4018e2 InternetReadFile 1690->1693 1691->1690 1692->1690 1693->1688 1693->1690 1695 401d29 1694->1695 1696 401cda GetProcessHeap RtlAllocateHeap 1694->1696 1695->1630 1696->1695 1697 401cf6 GetAdaptersInfo 1696->1697 1698 401d05 1697->1698 1699 401d1d GetProcessHeap HeapFree 1697->1699 1698->1699 1699->1695 1701 401d91 WaitForSingleObject TerminateProcess 1700->1701 1701->1633 1703 401dda 1702->1703 1704 401dde RegCreateKeyA 1702->1704 1703->1637 1704->1637 1705->1641 1707 401550 lstrcat 1706->1707 1707->1671 1708->1680 1715 401956 1709->1715 1710 4017c0 13 API calls 1710->1715 1711 401a5e Sleep 1711->1715 1712 401a36 GetProcessHeap HeapFree 1713 401a4e GetProcessHeap HeapFree 1712->1713 1713->1711 1715->1710 1715->1711 1715->1712 1715->1713 1716 401a14 Sleep 1715->1716 1717 401610 1715->1717 1716->1715 1718 4017c0 13 API calls 1717->1718 1719 401659 1718->1719 1721 401689 1719->1721 1736 401b70 GetTickCount 1719->1736 1722 401c40 GetModuleFileNameA 1721->1722 1723 4016c2 lstrcat 1722->1723 1724 401789 1723->1724 1725 4016dd 1723->1725 1724->1715 1725->1724 1726 40174a 1725->1726 1729 401e70 CreateFileA 1725->1729 1727 401760 GetProcessHeap HeapFree 1726->1727 1728 401771 GetProcessHeap HeapFree 1726->1728 1727->1728 1728->1724 1730 401722 1729->1730 1730->1726 1737 401fe0 WriteFile 1730->1737 1732 401737 1733 402010 CloseHandle 1732->1733 1734 401740 1733->1734 1738 401e00 CreateProcessA 1734->1738 1736->1719 1737->1732 1738->1726 1860 402161 1861 40241a 4 API calls 1860->1861 1862 402181 1861->1862 1896 404303 1897 404312 1896->1897 1898 404317 MultiByteToWideChar 1897->1898 1899 40437d 1897->1899 1898->1899 1900 404330 LCMapStringW 1898->1900 1900->1899 1901 40434b 1900->1901 1902 404351 1901->1902 1904 404391 1901->1904 1902->1899 1903 40435f LCMapStringW 1902->1903 1903->1899 1904->1899 1905 4043c9 LCMapStringW 1904->1905 1905->1899 1906 4043e1 WideCharToMultiByte 1905->1906 1906->1899 1739 403cd0 1742 40390b 1739->1742 1749 403aa4 1742->1749 1746 40394e GetCPInfo 1748 403962 1746->1748 1747 403a98 1748->1747 1754 403b4a GetCPInfo 1748->1754 1750 403ac4 1749->1750 1751 403ab4 GetOEMCP 1749->1751 1752 40391c 1750->1752 1753 403ac9 GetACP 1750->1753 1751->1750 1752->1746 1752->1747 1752->1748 1753->1752 1755 403c35 1754->1755 1757 403b6d 1754->1757 1755->1747 1762 40443e 1757->1762 1761 4041ef 9 API calls 1761->1755 1763 40446f GetStringTypeW 1762->1763 1766 404487 1762->1766 1763->1766 1767 40448b GetStringTypeA 1763->1767 1764 4044b2 GetStringTypeA 1768 403be9 1764->1768 1765 4044d6 1765->1768 1770 4044ec MultiByteToWideChar 1765->1770 1766->1764 1766->1765 1767->1766 1767->1768 1774 4041ef 1768->1774 1770->1768 1771 404510 1770->1771 1771->1768 1772 40454a MultiByteToWideChar 1771->1772 1772->1768 1773 404563 GetStringTypeW 1772->1773 1773->1768 1775 40423b 1774->1775 1776 40421f LCMapStringW 1774->1776 1778 4042a1 1775->1778 1779 404284 LCMapStringA 1775->1779 1776->1775 1777 404243 LCMapStringA 1776->1777 1777->1775 1780 403c0d 1777->1780 1778->1780 1781 4042b7 MultiByteToWideChar 1778->1781 1779->1780 1780->1761 1781->1780 1782 4042e1 1781->1782 1782->1780 1783 404317 MultiByteToWideChar 1782->1783 1783->1780 1784 404330 LCMapStringW 1783->1784 1784->1780 1785 40434b 1784->1785 1786 404351 1785->1786 1788 404391 1785->1788 1786->1780 1787 40435f LCMapStringW 1786->1787 1787->1780 1788->1780 1789 4043c9 LCMapStringW 1788->1789 1789->1780 1790 4043e1 WideCharToMultiByte 1789->1790 1790->1780 1792 402e54 1795 402e5c 1792->1795 1793 402eee 1795->1793 1796 40232c RtlUnwind 1795->1796 1796->1795 1864 403275 1870 4034c2 1864->1870 1872 4034d5 1870->1872 1871 40327c 1879 403350 1871->1879 1872->1871 1873 4035ec 1872->1873 1874 403515 1872->1874 1875 4035ff GetStdHandle WriteFile 1873->1875 1874->1871 1876 403521 GetModuleFileNameA 1874->1876 1875->1871 1877 403539 1876->1877 1886 403615 1877->1886 1880 40335e 1879->1880 1881 40328c 3 API calls 1880->1881 1882 403283 1880->1882 1881->1882 1883 40328c 1882->1883 1891 40329d 1883->1891 1887 403622 LoadLibraryA 1886->1887 1889 403664 1886->1889 1888 403633 GetProcAddress 1887->1888 1887->1889 1888->1889 1890 40364a GetProcAddress GetProcAddress 1888->1890 1889->1871 1890->1889 1892 4032a9 GetCurrentProcess TerminateProcess 1891->1892 1893 4032ba 1891->1893 1892->1893 1894 403299 1893->1894 1895 403324 ExitProcess 1893->1895 1797 4020d7 1800 40241a 1797->1800 1799 4020fd 1801 40242b 1800->1801 1803 402439 1801->1803 1804 4024b5 1801->1804 1803->1799 1807 4024cd 1804->1807 1805 402631 1811 402657 1805->1811 1822 40265c 1805->1822 1807->1805 1808 402525 1807->1808 1809 40261c 1807->1809 1814 402d7c IsBadReadPtr 1807->1814 1808->1805 1812 402569 1808->1812 1809->1803 1812->1809 1816 402815 1812->1816 1815 402d92 1814->1815 1815->1808 1817 402834 1816->1817 1818 402827 1816->1818 1849 402088 RtlUnwind 1817->1849 1826 4029c6 1818->1826 1821 40284b 1821->1812 1823 40266c 1822->1823 1824 402700 1823->1824 1825 402815 4 API calls 1823->1825 1824->1809 1825->1823 1827 4029fa 1826->1827 1848 402a3e 1826->1848 1828 402a63 1827->1828 1829 402a1f 1827->1829 1827->1848 1830 402a6b 1828->1830 1831 402abd 1828->1831 1832 402d7c IsBadReadPtr 1829->1832 1835 402d7c IsBadReadPtr 1830->1835 1833 402b05 1831->1833 1834 402acb 1831->1834 1836 402a2c 1832->1836 1839 402d7c IsBadReadPtr 1833->1839 1837 402d7c IsBadReadPtr 1834->1837 1838 402a78 1835->1838 1836->1848 1850 402d98 IsBadWritePtr 1836->1850 1840 402ad0 1837->1840 1843 402d98 IsBadWritePtr 1838->1843 1838->1848 1841 402b0a 1839->1841 1845 402d98 IsBadWritePtr 1840->1845 1840->1848 1844 402d98 IsBadWritePtr 1841->1844 1841->1848 1843->1848 1846 402b18 1844->1846 1845->1848 1846->1848 1852 402db4 IsBadCodePtr 1846->1852 1848->1817 1849->1821 1851 402dae 1850->1851 1851->1848 1853 402dc6 1852->1853 1853->1848 1912 4043b7 1913 4043c5 1912->1913 1914 4043c9 LCMapStringW 1913->1914 1915 40437d 1913->1915 1914->1915 1916 4043e1 WideCharToMultiByte 1914->1916 1916->1915 1908 402d18 1909 402d27 1908->1909 1910 402db4 IsBadCodePtr 1909->1910 1911 402c6c 1909->1911 1910->1911 1918 40223a 1919 40225d 1918->1919 1920 40224e 1918->1920 1921 40241a 4 API calls 1919->1921 1922 402284 1921->1922 1922->1920 1924 402088 RtlUnwind 1922->1924 1924->1920 1925 40453b 1926 404542 1925->1926 1927 404573 1926->1927 1928 40454a MultiByteToWideChar 1926->1928 1928->1927 1929 404563 GetStringTypeW 1928->1929 1929->1927 1854 402e5c 1855 402eee 1854->1855 1857 402e7a 1854->1857 1857->1855 1858 40232c RtlUnwind 1857->1858 1858->1857 1859 402d5e SetUnhandledExceptionFilter

                                Control-flow Graph

                                APIs
                                • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 00401049
                                • Sleep.KERNEL32(000003E8), ref: 0040107F
                                  • Part of subcall function 00401E70: CreateFileA.KERNELBASE(?,80000000,00000000,?,00000003,00000080,00000000), ref: 00401F29
                                • GetProcessHeap.KERNEL32(00000008,00000000), ref: 004010B3
                                • RtlAllocateHeap.KERNEL32(00000000), ref: 004010B6
                                • GetWindowsDirectoryA.KERNEL32(00000000,00000104,00000000,00012448), ref: 004010FA
                                • lstrcat.KERNEL32(00000000,\microsofthelp.exe), ref: 0040110A
                                • lstrcmpiA.KERNEL32(00000000,00000000), ref: 0040111D
                                • ExitProcess.KERNEL32 ref: 004011AB
                                • Sleep.KERNEL32(000007D0), ref: 004011F0
                                • DeleteFileA.KERNEL32(004AF334), ref: 004011F7
                                • GetProcessHeap.KERNEL32(00000008,?,00000000), ref: 004012A3
                                • HeapFree.KERNEL32(00000000), ref: 004012A6
                                • GetProcessHeap.KERNEL32(00000008,00000000,00000000), ref: 004012B3
                                • HeapFree.KERNEL32(00000000), ref: 004012B6
                                • Sleep.KERNEL32(000003E8,00000000), ref: 004012BD
                                • CreateThread.KERNEL32(00000000,00000000,00401930,00000000,00000000,00000000), ref: 004012DF
                                • wsprintfA.USER32 ref: 0040134F
                                  • Part of subcall function 00401D30: LoadLibraryA.KERNEL32(Shell32.dll,ShellExecuteExA,?), ref: 00401D3E
                                  • Part of subcall function 00401D30: GetProcAddress.KERNEL32(00000000), ref: 00401D45
                                  • Part of subcall function 00401D30: WaitForSingleObject.KERNEL32(?,0000EA60), ref: 00401D9B
                                  • Part of subcall function 00401D30: TerminateProcess.KERNEL32(?,00000000), ref: 00401DA8
                                  • Part of subcall function 00401DC0: RegOpenKeyA.ADVAPI32(80000001,Software\motherFucker,00000000), ref: 00401DD0
                                • Sleep.KERNEL32(00000000), ref: 004013B3
                                  • Part of subcall function 00401B70: GetTickCount.KERNEL32 ref: 00401B91
                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0040140D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2405623435.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2405610333.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405640977.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405655773.0000000000406000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405669404.0000000000408000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405688362.0000000000409000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405709558.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_5ZjBJd69zi.jbxd
                                Yara matches
                                Similarity
                                • API ID: Heap$Process$Sleep$File$CreateFreeObjectSingleWait$AddressAllocateCountDeleteDirectoryExitLibraryLoadModuleNameOpenProcTerminateThreadTickWindowslstrcatlstrcmpiwsprintf
                                • String ID: %s?mac=%02X-%02X-%02X-%02X-%02X-%02X$X`@$\microsofthelp.exe$pomdfghrt
                                • API String ID: 2581394299-1931053007
                                • Opcode ID: 7c86d722310137bea74e8926fe4469c2c242f417fb379d92e93ada3bf0e95c41
                                • Instruction ID: c93c4410b6f9ce83984329ff30afab9ceec6f0109ae303d27975de2972423e7e
                                • Opcode Fuzzy Hash: 7c86d722310137bea74e8926fe4469c2c242f417fb379d92e93ada3bf0e95c41
                                • Instruction Fuzzy Hash: 92B1B471104341ABD310EB61DD85FAF77A8EB84748F00493EF545B72E1DB79A508CBAA

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 93 401a70-401a9c RegOpenKeyExA 94 401b62-401b68 93->94 95 401aa2-401b2c RegQueryValueExA 93->95 96 401b56-401b61 RegCloseKey 95->96 97 401b2e-401b50 RegSetValueExA 95->97 96->94 97->96
                                APIs
                                • RegOpenKeyExA.KERNELBASE(80000001,Software\Microsoft\Windows\CurrentVersion\Run,00000000,000F003F,00000000), ref: 00401A94
                                • RegQueryValueExA.KERNELBASE(?,?,00000000,?,00000000,?), ref: 00401B24
                                • RegSetValueExA.KERNELBASE(?,?,00000000,00000001,?), ref: 00401B50
                                • RegCloseKey.KERNELBASE(?), ref: 00401B5B
                                Strings
                                • microsofthelp, xrefs: 00401AA2
                                • Software\Microsoft\Windows\CurrentVersion\Run, xrefs: 00401A8A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2405623435.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2405610333.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405640977.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405655773.0000000000406000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405669404.0000000000408000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405688362.0000000000409000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405709558.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_5ZjBJd69zi.jbxd
                                Yara matches
                                Similarity
                                • API ID: Value$CloseOpenQuery
                                • String ID: Software\Microsoft\Windows\CurrentVersion\Run$microsofthelp
                                • API String ID: 237177642-1634705127
                                • Opcode ID: f7c400446dd4b0eaf363823c9acbb087059bbcb61e32a475db951db840792250
                                • Instruction ID: b03c8cffa3ec6c7e040931d0d3628476303e7d830e5fa7719da2c02013b6585d
                                • Opcode Fuzzy Hash: f7c400446dd4b0eaf363823c9acbb087059bbcb61e32a475db951db840792250
                                • Instruction Fuzzy Hash: 7B213075204300AFE314CF54DD45BABB7E9FBC8704F10892DF699A7290D774A908CBA6

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 98 401e00-401e40 CreateProcessA
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2405623435.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2405610333.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405640977.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405655773.0000000000406000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405669404.0000000000408000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405688362.0000000000409000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405709558.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_5ZjBJd69zi.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateProcess
                                • String ID: D
                                • API String ID: 963392458-2746444292
                                • Opcode ID: 0f08fe3d5e39c7ad0f3b9866134e47126feb68cf31e5c23f9a2aaa827ce31891
                                • Instruction ID: fd742313cb0a091491768e560f4c778023b14539371b139e9f1572b6239331a1
                                • Opcode Fuzzy Hash: 0f08fe3d5e39c7ad0f3b9866134e47126feb68cf31e5c23f9a2aaa827ce31891
                                • Instruction Fuzzy Hash: 73E0C2B1204205AFE700CB18C901F9FF3F9EBC4B04F00482DB28592160EBB4E80D8AA3

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 99 401e70-401e8e 100 401e90-401e91 99->100 101 401ea4 99->101 102 401e93-401e94 100->102 103 401e9d-401ea2 100->103 104 401ea9-401eb4 101->104 102->104 105 401e96-401e9b 102->105 103->104 106 401eb6-401ebe 104->106 107 401edc-401efd 104->107 105->104 106->107 108 401ed0-401ed5 106->108 109 401ec5-401ec7 106->109 110 401ed7 106->110 111 401ec9-401ece 106->111 112 401f10 107->112 113 401eff-401f0e 107->113 108->107 109->107 110->107 111->107 114 401f15-401f33 CreateFileA 112->114 113->114 115 401f35-401f3c 114->115 116 401f3f-401f4c 114->116
                                APIs
                                • CreateFileA.KERNELBASE(?,80000000,00000000,?,00000003,00000080,00000000), ref: 00401F29
                                Memory Dump Source
                                • Source File: 00000000.00000002.2405623435.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2405610333.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405640977.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405655773.0000000000406000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405669404.0000000000408000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405688362.0000000000409000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405709558.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_5ZjBJd69zi.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateFile
                                • String ID:
                                • API String ID: 823142352-0
                                • Opcode ID: 244432acfb3134b082432ff8491b6debc7a3ecf6e80df1f238a0c7c9efdd7ce6
                                • Instruction ID: 05550ef9e33e7e84e3b6bc3839cb9a3f78c36243665b6addbe76957046887e68
                                • Opcode Fuzzy Hash: 244432acfb3134b082432ff8491b6debc7a3ecf6e80df1f238a0c7c9efdd7ce6
                                • Instruction Fuzzy Hash: 652106729182019BE3148929DC047BF7695FBC4320F59463FFC59AB2E0D73C9D4A838A

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 117 401fb0-401fce ReadFile
                                APIs
                                • ReadFile.KERNELBASE(?,?,?,?,00000000,004010D2,00000000,00012448), ref: 00401FC4
                                Memory Dump Source
                                • Source File: 00000000.00000002.2405623435.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2405610333.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405640977.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405655773.0000000000406000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405669404.0000000000408000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405688362.0000000000409000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405709558.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_5ZjBJd69zi.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileRead
                                • String ID:
                                • API String ID: 2738559852-0
                                • Opcode ID: b93a9b78cbd62f9fe948b498fb7911c449fe5431a5487516e5b23f81960dbb3c
                                • Instruction ID: 43a84dae57fcb4f39ce841453d48ab4dd32bf7ac3f326298a40ffc40c6fe3ef3
                                • Opcode Fuzzy Hash: b93a9b78cbd62f9fe948b498fb7911c449fe5431a5487516e5b23f81960dbb3c
                                • Instruction Fuzzy Hash: F2D0C975204202BFD600CB14C984F2BBBE8EBC8344F10C80CB588C7264C230E840CB21

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 118 401fe0-401ffa WriteFile
                                APIs
                                • WriteFile.KERNELBASE(?,-00000104,?,?,00000000,004015BB,-00000104,?,?,00001001), ref: 00401FF4
                                Memory Dump Source
                                • Source File: 00000000.00000002.2405623435.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2405610333.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405640977.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405655773.0000000000406000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405669404.0000000000408000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405688362.0000000000409000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405709558.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_5ZjBJd69zi.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileWrite
                                • String ID:
                                • API String ID: 3934441357-0
                                • Opcode ID: d51f81dfc302b25ed21715e1a4ec1d1ea5c212fa588abe32f30b4167e8c1f651
                                • Instruction ID: 8412a9df26c4f65110dcd5ffe45d6d75a38598c42cfd04e715d6217de15bf98b
                                • Opcode Fuzzy Hash: d51f81dfc302b25ed21715e1a4ec1d1ea5c212fa588abe32f30b4167e8c1f651
                                • Instruction Fuzzy Hash: ECC012B5204202BFD600CB10CC80F2BB7ACEBC8300F10C80CB589C2164C230E844CB21

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 119 402010-402018 120 402021-402028 119->120 121 40201a-40201b CloseHandle 119->121 121->120
                                APIs
                                • CloseHandle.KERNELBASE(00000000,?,004010DB,00000000,00012448), ref: 0040201B
                                Memory Dump Source
                                • Source File: 00000000.00000002.2405623435.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2405610333.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405640977.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405655773.0000000000406000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405669404.0000000000408000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405688362.0000000000409000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405709558.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_5ZjBJd69zi.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseHandle
                                • String ID:
                                • API String ID: 2962429428-0
                                • Opcode ID: ed0b8a1cc943b172fc063eda297eab4dd0b697e40e826464df3d2352261a915f
                                • Instruction ID: f380ff02c583651ec5e048fedd40acb13b80acef4397e412b4aeb2cfa76ed4a0
                                • Opcode Fuzzy Hash: ed0b8a1cc943b172fc063eda297eab4dd0b697e40e826464df3d2352261a915f
                                • Instruction Fuzzy Hash: 42C04C7140451147CA245F6CB94888677D89A0A3303250B5AB5B4E73E0C7744CCA8A94

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 122 4017c0-4017e2 InternetOpenA 123 4017e8-4017ff InternetSetOptionExA 122->123 124 40191e-401929 122->124 125 401805-401831 InternetOpenUrlA 123->125 126 401917-401918 InternetCloseHandle 123->126 125->126 127 401837-401850 InternetReadFile 125->127 126->124 128 401856 127->128 129 40190b-401916 InternetCloseHandle 127->129 130 40185c-401862 128->130 129->126 130->129 131 401868-40186a 130->131 132 40186c-40187b GetProcessHeap RtlAllocateHeap 131->132 133 40187f-40188d 131->133 132->133 134 4018d1-401905 call 401c10 InternetReadFile 133->134 135 40188f-4018ae 133->135 134->129 134->130 136 4018b0-4018bc GetProcessHeap RtlAllocateHeap 135->136 137 4018be-4018c8 GetProcessHeap RtlReAllocateHeap 135->137 139 4018ce 136->139 137->139 139->134
                                APIs
                                • InternetOpenA.WININET(-00000080,00000000,00000000,00000000,00000000), ref: 004017D4
                                • InternetSetOptionExA.WININET(00000000,0000003C,?,00000004,00000000), ref: 004017F7
                                • InternetOpenUrlA.WININET(00000000,?,?,?,84000100,00000000), ref: 00401825
                                • InternetReadFile.WININET(00000000,?,00000400,?), ref: 00401848
                                • GetProcessHeap.KERNEL32(00000008,0000000C,?,84000100,00000000), ref: 00401870
                                • RtlAllocateHeap.KERNEL32(00000000,?,84000100,00000000), ref: 00401873
                                • GetProcessHeap.KERNEL32(00000008,?,?,84000100,00000000), ref: 004018B3
                                • RtlAllocateHeap.KERNEL32(00000000,?,84000100,00000000), ref: 004018B6
                                • GetProcessHeap.KERNEL32(00000008,?,?,?,84000100,00000000), ref: 004018C5
                                • RtlReAllocateHeap.KERNEL32(00000000,?,84000100,00000000), ref: 004018C8
                                • InternetReadFile.WININET(?,?,00000400,?), ref: 004018F9
                                • InternetCloseHandle.WININET(?), ref: 00401910
                                • InternetCloseHandle.WININET(00000000), ref: 00401918
                                Memory Dump Source
                                • Source File: 00000000.00000002.2405623435.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2405610333.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405640977.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405655773.0000000000406000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405669404.0000000000408000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405688362.0000000000409000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405709558.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_5ZjBJd69zi.jbxd
                                Yara matches
                                Similarity
                                • API ID: Internet$Heap$AllocateProcess$CloseFileHandleOpenRead$Option
                                • String ID:
                                • API String ID: 4239491033-0
                                • Opcode ID: 27e194aba4e82846d3f4da33b5ed9e1d6c7b9291d0f5d1b706f76689d8bb74bc
                                • Instruction ID: de712bc095ac002a8553a350c11476705d51c3392b1ed3ae2cb040fc4048f14c
                                • Opcode Fuzzy Hash: 27e194aba4e82846d3f4da33b5ed9e1d6c7b9291d0f5d1b706f76689d8bb74bc
                                • Instruction Fuzzy Hash: 6F419DB1200305AFE714DB65DD48E6B77ECEB84740F00892DBA5AE3290E674ED44CBA8
                                APIs
                                • GetAdaptersInfo.IPHLPAPI(00000000,004012F3), ref: 00401CD0
                                • GetProcessHeap.KERNEL32(00000008,?,?,00000000,76E1F380,?,004012F3,?), ref: 00401CE7
                                • RtlAllocateHeap.KERNEL32(00000000,?,004012F3,?), ref: 00401CEA
                                • GetAdaptersInfo.IPHLPAPI(00000000,?), ref: 00401CFC
                                • GetProcessHeap.KERNEL32(00000008,00000000,00000000,?,?,004012F3,?), ref: 00401D20
                                • HeapFree.KERNEL32(00000000,?,004012F3,?), ref: 00401D23
                                Memory Dump Source
                                • Source File: 00000000.00000002.2405623435.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2405610333.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405640977.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405655773.0000000000406000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405669404.0000000000408000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405688362.0000000000409000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405709558.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_5ZjBJd69zi.jbxd
                                Yara matches
                                Similarity
                                • API ID: Heap$AdaptersInfoProcess$AllocateFree
                                • String ID:
                                • API String ID: 1547009028-0
                                • Opcode ID: ae4cd1613d13a3508d5532ec1a729aa1a889069799b90c70b2f88935c34b7fe7
                                • Instruction ID: dc2670a0019a1668092bca9973550d1eda5b32d409034f8e0507b86233cc308b
                                • Opcode Fuzzy Hash: ae4cd1613d13a3508d5532ec1a729aa1a889069799b90c70b2f88935c34b7fe7
                                • Instruction Fuzzy Hash: 49F028B25003107EE614ABB1ED89EAFB39DEFC4314F00883EF645A7291D6789C048B75
                                APIs
                                  • Part of subcall function 00401C40: GetModuleFileNameA.KERNEL32(00000000,00000000,00000000,?,00401550,?,00000104), ref: 00401C4D
                                • lstrcat.KERNEL32(?,HidePlugin.dll), ref: 0040155D
                                  • Part of subcall function 00401C80: FindFirstFileA.KERNEL32(?,004AF438), ref: 00401C90
                                  • Part of subcall function 00401C80: FindClose.KERNEL32(00000000), ref: 00401C9C
                                • LoadLibraryA.KERNEL32(?), ref: 004015C9
                                • GetProcAddress.KERNEL32(00000000,WindowsHookExON), ref: 004015D9
                                  • Part of subcall function 00401FE0: WriteFile.KERNELBASE(?,-00000104,?,?,00000000,004015BB,-00000104,?,?,00001001), ref: 00401FF4
                                  • Part of subcall function 00402010: CloseHandle.KERNELBASE(00000000,?,004010DB,00000000,00012448), ref: 0040201B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2405623435.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2405610333.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405640977.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405655773.0000000000406000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405669404.0000000000408000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405688362.0000000000409000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405709558.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_5ZjBJd69zi.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$CloseFind$AddressFirstHandleLibraryLoadModuleNameProcWritelstrcat
                                • String ID: HidePlugin.dll$WindowsHookExON
                                • API String ID: 3025667872-4170400652
                                • Opcode ID: cfa9ba43bf56096691c989f4651af11862903b7cc85df6f345d9adcbdabb091c
                                • Instruction ID: 1cfee7871fdb0a5e497566d1a60dc36b52138cb3ac88a2e81f3614d0223312f0
                                • Opcode Fuzzy Hash: cfa9ba43bf56096691c989f4651af11862903b7cc85df6f345d9adcbdabb091c
                                • Instruction Fuzzy Hash: 1321C275108340BBD314DB20CD86BDB73A8AB84B44F00493EB686A62E1EB78E544CA5A
                                APIs
                                • FindFirstFileA.KERNEL32(?,004AF438), ref: 00401C90
                                • FindClose.KERNEL32(00000000), ref: 00401C9C
                                Memory Dump Source
                                • Source File: 00000000.00000002.2405623435.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2405610333.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405640977.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405655773.0000000000406000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405669404.0000000000408000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405688362.0000000000409000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405709558.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_5ZjBJd69zi.jbxd
                                Yara matches
                                Similarity
                                • API ID: Find$CloseFileFirst
                                • String ID:
                                • API String ID: 2295610775-0
                                • Opcode ID: 396459ae9dbc40363b26d10f372c57bb8eb4907c95b21f3c69ddb9f91e0ef698
                                • Instruction ID: 999be1285c1457e8b158f15fa6632ad0c06acd6332edbbb8b50b98010bf598bc
                                • Opcode Fuzzy Hash: 396459ae9dbc40363b26d10f372c57bb8eb4907c95b21f3c69ddb9f91e0ef698
                                • Instruction Fuzzy Hash: A3D05E748006006BDB129B35EA089AB3368B744310FC41B25A92C952E0E63E89199A55
                                APIs
                                • SetUnhandledExceptionFilter.KERNEL32(Function_00002D18), ref: 00402D63
                                Memory Dump Source
                                • Source File: 00000000.00000002.2405623435.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2405610333.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405640977.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405655773.0000000000406000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405669404.0000000000408000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405688362.0000000000409000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405709558.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_5ZjBJd69zi.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExceptionFilterUnhandled
                                • String ID:
                                • API String ID: 3192549508-0
                                • Opcode ID: 54329c6066849e8d6f66c2d2d63da4c5d0a37b205ba5cd890395b89ab1935c85
                                • Instruction ID: 7baa2d917a238f68f9c444747c48ff2f2d2c5bfd5ec22148f497a587d35f09d0
                                • Opcode Fuzzy Hash: 54329c6066849e8d6f66c2d2d63da4c5d0a37b205ba5cd890395b89ab1935c85
                                • Instruction Fuzzy Hash: E7A002B4542B40DBEB009FA4AF5D70A3A61FEC4712770417AE541F26E8DFB40400EE9E
                                APIs
                                • SetUnhandledExceptionFilter.KERNEL32 ref: 00402D75
                                Memory Dump Source
                                • Source File: 00000000.00000002.2405623435.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2405610333.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405640977.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405655773.0000000000406000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405669404.0000000000408000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405688362.0000000000409000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405709558.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_5ZjBJd69zi.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExceptionFilterUnhandled
                                • String ID:
                                • API String ID: 3192549508-0
                                • Opcode ID: 87a07ab88af14b4b861e53270df4e4bcad16118dd914d66932d628474a690077
                                • Instruction ID: 2a2aa3ba8b16ee852c6eda22cbbbf5c917f74d603f65e28f191c167c999a12dc
                                • Opcode Fuzzy Hash: 87a07ab88af14b4b861e53270df4e4bcad16118dd914d66932d628474a690077
                                • Instruction Fuzzy Hash:

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 141 4034c2-4034d0 142 4034d5-4034d7 141->142 143 4034e4-4034f0 142->143 144 4034d9-4034e2 142->144 145 403612-403614 143->145 146 4034f6-4034fe 143->146 144->142 144->143 147 403504-403506 146->147 148 4035ec-40360c call 403890 GetStdHandle WriteFile 146->148 150 403515-40351b 147->150 151 403508-40350f 147->151 148->145 150->145 153 403521-403537 GetModuleFileNameA 150->153 151->148 151->150 154 403539-40354b call 4036a0 153->154 155 40354c-403564 call 403890 153->155 154->155 160 403566-40358c call 403890 call 403790 155->160 161 40358f-4035ea call 4036a0 call 4036b0 * 3 call 403615 155->161 160->161 161->145
                                APIs
                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0040352F
                                • GetStdHandle.KERNEL32(000000F4,004053D4,00000000,?,00000000), ref: 00403605
                                • WriteFile.KERNEL32(00000000), ref: 0040360C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2405623435.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2405610333.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405640977.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405655773.0000000000406000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405669404.0000000000408000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405688362.0000000000409000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405709558.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_5ZjBJd69zi.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$HandleModuleNameWrite
                                • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program: $pb@
                                • API String ID: 3784150691-2760755561
                                • Opcode ID: 494720bf53c82e86b4848cccfc41ffe18c81eb234ef754eb86fdfe3b02abf932
                                • Instruction ID: 30caa44505c107635b1953f75765a1a395c4180280156776a196f92af409ceee
                                • Opcode Fuzzy Hash: 494720bf53c82e86b4848cccfc41ffe18c81eb234ef754eb86fdfe3b02abf932
                                • Instruction Fuzzy Hash: 7D31C3726002187EDF20AF608D45F9B3BACEB85306F5408BBF545B61D0E6799B848E59

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 176 403615-403620 177 403622-403631 LoadLibraryA 176->177 178 403664-40366b 176->178 179 403633-403648 GetProcAddress 177->179 180 40369a-40369c 177->180 181 403683-40368f 178->181 182 40366d-403673 178->182 179->180 184 40364a-40365f GetProcAddress * 2 179->184 183 403696-403699 180->183 181->183 182->181 186 403675-40367c 182->186 184->178 186->181 187 40367e-403681 186->187 187->181
                                APIs
                                • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,004035E6,?,Microsoft Visual C++ Runtime Library,00012010,?,004053D4,?,00405424,?,?,?,Runtime Error!Program: ), ref: 00403627
                                • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 0040363F
                                • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 00403650
                                • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 0040365D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2405623435.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2405610333.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405640977.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405655773.0000000000406000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405669404.0000000000408000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405688362.0000000000409000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405709558.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_5ZjBJd69zi.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$LibraryLoad
                                • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
                                • API String ID: 2238633743-4044615076
                                • Opcode ID: 6648bb0cf6ab2364024db40a26a27d188e770c7a4f648041535ca084ddadecca
                                • Instruction ID: f14f4256c31c583cabfc643d01e6b202917792f182549b03fd3d916eb0d30c8c
                                • Opcode Fuzzy Hash: 6648bb0cf6ab2364024db40a26a27d188e770c7a4f648041535ca084ddadecca
                                • Instruction Fuzzy Hash: 4C018035200701AAC7218FB59E88A6B3EDCE748646324083FA541F3390DA798841CA5D

                                Control-flow Graph

                                APIs
                                • LoadLibraryA.KERNEL32(Shell32.dll,ShellExecuteExA,?), ref: 00401D3E
                                • GetProcAddress.KERNEL32(00000000), ref: 00401D45
                                • WaitForSingleObject.KERNEL32(?,0000EA60), ref: 00401D9B
                                • TerminateProcess.KERNEL32(?,00000000), ref: 00401DA8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2405623435.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2405610333.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405640977.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405655773.0000000000406000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405669404.0000000000408000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405688362.0000000000409000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405709558.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_5ZjBJd69zi.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressLibraryLoadObjectProcProcessSingleTerminateWait
                                • String ID: <$@$Shell32.dll$ShellExecuteExA
                                • API String ID: 147223314-455453916
                                • Opcode ID: 30361c74d003b684e33ebe575471fed2f31caefad97197682b103e4892ec008c
                                • Instruction ID: f3ee7dde88a2767ab9b9819a0d364dbdbe4749208eae26a4876106582c349e33
                                • Opcode Fuzzy Hash: 30361c74d003b684e33ebe575471fed2f31caefad97197682b103e4892ec008c
                                • Instruction Fuzzy Hash: DDF01970608340ABD700EF64D948B0FBBE4EBC9705F50892DF289B62A0C7B995048F9A

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 191 4041ef-40421d 192 404265-404268 191->192 193 40421f-404239 LCMapStringW 191->193 196 40427a-404282 192->196 197 40426a-404277 call 404413 192->197 194 404243-404255 LCMapStringA 193->194 195 40423b-404241 193->195 201 40425b 194->201 202 40437d 194->202 195->192 199 4042a1-4042a4 196->199 200 404284-40429c LCMapStringA 196->200 197->196 199->202 205 4042aa-4042ad 199->205 204 40437f-404390 200->204 201->192 202->204 206 4042b7-4042db MultiByteToWideChar 205->206 207 4042af-4042b4 205->207 206->202 208 4042e1-404315 call 4041c0 206->208 207->206 208->202 212 404317-40432e MultiByteToWideChar 208->212 212->202 213 404330-404349 LCMapStringW 212->213 213->202 214 40434b-40434f 213->214 215 404391-4043c7 call 4041c0 214->215 216 404351-404354 214->216 215->202 223 4043c9-4043df LCMapStringW 215->223 218 40435a-40435d 216->218 219 40440c-40440e 216->219 218->202 221 40435f-404377 LCMapStringW 218->221 219->204 221->202 221->219 223->202 224 4043e1-4043e6 223->224 225 4043e8-4043ea 224->225 226 4043ec-4043ef 224->226 227 4043f2-404406 WideCharToMultiByte 225->227 226->227 227->202 227->219
                                APIs
                                • LCMapStringW.KERNEL32(00000000,00000100,004054A0,00000001,00000000,00000000,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?,00000000), ref: 00404231
                                • LCMapStringA.KERNEL32(00000000,00000100,0040549C,00000001,00000000,00000000,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?,00000000), ref: 0040424D
                                • LCMapStringA.KERNEL32(?,00000100,00000020,00000001,00000000,00000100,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?,00000000), ref: 00404296
                                • MultiByteToWideChar.KERNEL32(00000000,00000101,00000020,00000001,00000000,00000000,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?,00000000), ref: 004042CE
                                • MultiByteToWideChar.KERNEL32(00000000,00000001,00000020,00000001,00000100,00000000,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?), ref: 00404326
                                • LCMapStringW.KERNEL32(?,00000100,00000100,00000000,00000000,00000000,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?), ref: 0040433C
                                • LCMapStringW.KERNEL32(?,00000100,00000100,00000000,00000000,00000100,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?), ref: 0040436F
                                • LCMapStringW.KERNEL32(?,00000100,00000100,00000100,?,00000000,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?), ref: 004043D7
                                Memory Dump Source
                                • Source File: 00000000.00000002.2405623435.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2405610333.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405640977.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405655773.0000000000406000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405669404.0000000000408000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405688362.0000000000409000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405709558.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_5ZjBJd69zi.jbxd
                                Yara matches
                                Similarity
                                • API ID: String$ByteCharMultiWide
                                • String ID:
                                • API String ID: 352835431-0
                                • Opcode ID: cf6cd3ea0d53a4292b9b6c064744d10efb8a84b9d8ce6cda0e0d2f74403f721a
                                • Instruction ID: 98ee5418c39406d66df4b3238e22c5ff09758f77d3906c2d4109edb63ff875be
                                • Opcode Fuzzy Hash: cf6cd3ea0d53a4292b9b6c064744d10efb8a84b9d8ce6cda0e0d2f74403f721a
                                • Instruction Fuzzy Hash: 2E516C71A00209EBDF218F94DD45E9F7FB5FB88754F10412AFA54B11A0C3398961DBA8

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 228 401610-40164d 229 401654 call 4017c0 228->229 230 401659-40166e 229->230 231 40166f 230->231 232 40166f call 401b70 231->232 233 401674-401687 232->233 233->231 234 401689-4016bc 233->234 235 4016bd call 401c40 234->235 236 4016c2-4016d7 lstrcat 235->236 237 401789-4017a1 236->237 238 4016dd-4016e0 236->238 238->237 239 4016e6-4016fd call 401e50 238->239 242 40174d-40175e 239->242 243 4016ff-40170d 239->243 245 401760-40176e GetProcessHeap HeapFree 242->245 246 401771-401784 GetProcessHeap HeapFree call 401e60 242->246 243->242 244 40170f-401724 call 401e70 243->244 244->242 250 401726-40174a call 401fe0 call 402010 call 401e00 244->250 245->246 246->237 250->242
                                APIs
                                  • Part of subcall function 004017C0: InternetOpenA.WININET(-00000080,00000000,00000000,00000000,00000000), ref: 004017D4
                                  • Part of subcall function 004017C0: InternetSetOptionExA.WININET(00000000,0000003C,?,00000004,00000000), ref: 004017F7
                                  • Part of subcall function 004017C0: InternetOpenUrlA.WININET(00000000,?,?,?,84000100,00000000), ref: 00401825
                                  • Part of subcall function 004017C0: InternetReadFile.WININET(00000000,?,00000400,?), ref: 00401848
                                  • Part of subcall function 004017C0: GetProcessHeap.KERNEL32(00000008,0000000C,?,84000100,00000000), ref: 00401870
                                  • Part of subcall function 004017C0: RtlAllocateHeap.KERNEL32(00000000,?,84000100,00000000), ref: 00401873
                                  • Part of subcall function 004017C0: GetProcessHeap.KERNEL32(00000008,?,?,84000100,00000000), ref: 004018B3
                                  • Part of subcall function 004017C0: RtlAllocateHeap.KERNEL32(00000000,?,84000100,00000000), ref: 004018B6
                                  • Part of subcall function 00401B70: GetTickCount.KERNEL32 ref: 00401B91
                                • lstrcat.KERNEL32(?,?), ref: 004016CF
                                • GetProcessHeap.KERNEL32(00000008,?), ref: 00401763
                                • HeapFree.KERNEL32(00000000), ref: 00401766
                                • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00401774
                                • HeapFree.KERNEL32(00000000), ref: 00401777
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2405623435.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2405610333.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405640977.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405655773.0000000000406000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405669404.0000000000408000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405688362.0000000000409000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405709558.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_5ZjBJd69zi.jbxd
                                Yara matches
                                Similarity
                                • API ID: Heap$InternetProcess$AllocateFreeOpen$CountFileOptionReadTicklstrcat
                                • String ID: X`@$x
                                • API String ID: 1655345245-717951356
                                • Opcode ID: cb30632985af1e3c9f67740ed37206872311120655ae5bed39b305224cf2606c
                                • Instruction ID: 3bf0248d1d02ff10fb603f448cc26978b7f31e24750967aed57f5272111a2168
                                • Opcode Fuzzy Hash: cb30632985af1e3c9f67740ed37206872311120655ae5bed39b305224cf2606c
                                • Instruction Fuzzy Hash: 4541E071109380EBD310EF24D880A9FBBA4EB95744F40483EF985A7391DB79D948CBA6

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 257 401930-401954 258 401956-40197d call 4017c0 257->258 261 401983-40198c 258->261 262 401a5e-401a69 Sleep 258->262 263 401992-401999 261->263 264 401a2f-401a34 261->264 262->258 263->264 267 40199f-4019b7 call 401490 call 4014d0 263->267 265 401a36-401a4c GetProcessHeap HeapFree 264->265 266 401a4e-401a58 GetProcessHeap HeapFree 264->266 265->266 266->262 272 4019d8-4019e0 267->272 273 4019b9-4019d4 call 401bc0 267->273 275 401a22-401a2c call 401490 272->275 276 4019e2-4019e9 272->276 273->272 275->264 278 4019f7-401a0c call 4014d0 276->278 279 4019eb-4019f4 call 401610 276->279 286 401a1e-401a20 278->286 287 401a0e-401a18 call 401bc0 Sleep 278->287 279->278 286->275 286->276 287->286
                                APIs
                                  • Part of subcall function 004017C0: InternetOpenA.WININET(-00000080,00000000,00000000,00000000,00000000), ref: 004017D4
                                  • Part of subcall function 004017C0: InternetSetOptionExA.WININET(00000000,0000003C,?,00000004,00000000), ref: 004017F7
                                  • Part of subcall function 004017C0: InternetOpenUrlA.WININET(00000000,?,?,?,84000100,00000000), ref: 00401825
                                  • Part of subcall function 004017C0: InternetReadFile.WININET(00000000,?,00000400,?), ref: 00401848
                                  • Part of subcall function 004017C0: GetProcessHeap.KERNEL32(00000008,0000000C,?,84000100,00000000), ref: 00401870
                                  • Part of subcall function 004017C0: RtlAllocateHeap.KERNEL32(00000000,?,84000100,00000000), ref: 00401873
                                  • Part of subcall function 004017C0: GetProcessHeap.KERNEL32(00000008,?,?,84000100,00000000), ref: 004018B3
                                  • Part of subcall function 004017C0: RtlAllocateHeap.KERNEL32(00000000,?,84000100,00000000), ref: 004018B6
                                • Sleep.KERNEL32(00000000), ref: 00401A18
                                • GetProcessHeap.KERNEL32(00000008,?,00000000,?,?,?,?,?,?,?,?,?,00404668,000000FF), ref: 00401A39
                                • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00404668,000000FF), ref: 00401A40
                                • GetProcessHeap.KERNEL32(00000008,00000000,00000000,?,?,?,?,?,?,?,?,?,00404668,000000FF), ref: 00401A51
                                • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00404668,000000FF), ref: 00401A58
                                • Sleep.KERNEL32(000927C0,00000000,?,?,?,?,?,?,?,?,?,00404668,000000FF), ref: 00401A63
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2405623435.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2405610333.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405640977.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405655773.0000000000406000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405669404.0000000000408000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405688362.0000000000409000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405709558.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_5ZjBJd69zi.jbxd
                                Yara matches
                                Similarity
                                • API ID: Heap$InternetProcess$AllocateFreeOpenSleep$FileOptionRead
                                • String ID: X`@
                                • API String ID: 4027785372-2395966509
                                • Opcode ID: ef5807f77e3d9209a1a73c8554bf5cae4dc84749adef77a81185759513a985a4
                                • Instruction ID: 2a3d68a4cb3ad5a6740f31ececbff504450f23066a0547a1662793225cd4e481
                                • Opcode Fuzzy Hash: ef5807f77e3d9209a1a73c8554bf5cae4dc84749adef77a81185759513a985a4
                                • Instruction Fuzzy Hash: 22316DB5900205AFC610EF65DD89D1BB7ACFB40708F40493EF455A72A2DB39E858CBA9

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 290 40443e-40446d 291 4044ad-4044b0 290->291 292 40446f-404485 GetStringTypeW 290->292 293 4044b2-4044b7 291->293 294 4044d6-4044d9 291->294 295 404487-404489 292->295 296 40448b-40449f GetStringTypeA 292->296 299 4044b9 293->299 300 4044be-4044d1 GetStringTypeA 293->300 297 404573 294->297 301 4044df-4044e2 294->301 302 4044a8 295->302 296->297 298 4044a5-4044a7 296->298 303 404575-404586 297->303 298->302 299->300 300->303 304 4044e4-4044e9 301->304 305 4044ec-40450e MultiByteToWideChar 301->305 302->291 304->305 305->297 306 404510-404548 call 4041c0 call 404590 305->306 306->297 312 40454a-404561 MultiByteToWideChar 306->312 312->297 313 404563-404571 GetStringTypeW 312->313 313->303
                                APIs
                                • GetStringTypeW.KERNEL32(00000001,004054A0,00000001,00000000,?,00000100,00000000,00403BE9,00000001,00000020,00000100,?,00000000), ref: 0040447D
                                • GetStringTypeA.KERNEL32(00000000,00000001,0040549C,00000001,00000000,?,00000100,00000000,00403BE9,00000001,00000020,00000100,?,00000000), ref: 00404497
                                • GetStringTypeA.KERNEL32(00000000,?,00000100,00000020,00000001,?,00000100,00000000,00403BE9,00000001,00000020,00000100,?,00000000), ref: 004044CB
                                • MultiByteToWideChar.KERNEL32(00403BE9,00000101,00000100,00000020,00000000,00000000,?,00000100,00000000,00403BE9,00000001,00000020,00000100,?,00000000), ref: 00404503
                                • MultiByteToWideChar.KERNEL32(00403BE9,00000001,00000100,00000020,?,00000100,?,00000100,00000000,00403BE9,00000001,00000020,00000100,?), ref: 00404559
                                • GetStringTypeW.KERNEL32(?,?,00000000,00000001,?,00000100,?,00000100,00000000,00403BE9,00000001,00000020,00000100,?), ref: 0040456B
                                Memory Dump Source
                                • Source File: 00000000.00000002.2405623435.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2405610333.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405640977.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405655773.0000000000406000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405669404.0000000000408000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405688362.0000000000409000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405709558.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_5ZjBJd69zi.jbxd
                                Yara matches
                                Similarity
                                • API ID: StringType$ByteCharMultiWide
                                • String ID:
                                • API String ID: 3852931651-0
                                • Opcode ID: 8e854d9fa4f4398d75815cede1d979f26cdfc50dae45bf3eda8242ca51bb8a02
                                • Instruction ID: 2188734dec57a6a0c26fce41748a14a73f6bfbabae9171f71f79f3fb2461c293
                                • Opcode Fuzzy Hash: 8e854d9fa4f4398d75815cede1d979f26cdfc50dae45bf3eda8242ca51bb8a02
                                • Instruction Fuzzy Hash: DB415DB2900219BFCF209F94DD85EAF7F68FB44750F10453AFA15A6290D3388951DAA8
                                APIs
                                • CreateMutexA.KERNEL32(00000000,00000000,?,?,004011CC,pomdfghrt), ref: 0040145A
                                • GetLastError.KERNEL32(?,004011CC,pomdfghrt), ref: 00401462
                                • CloseHandle.KERNEL32(00000000,?,004011CC,pomdfghrt), ref: 00401470
                                • ExitProcess.KERNEL32 ref: 00401478
                                Memory Dump Source
                                • Source File: 00000000.00000002.2405623435.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2405610333.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405640977.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405655773.0000000000406000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405669404.0000000000408000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405688362.0000000000409000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405709558.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_5ZjBJd69zi.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseCreateErrorExitHandleLastMutexProcess
                                • String ID:
                                • API String ID: 3398734568-0
                                • Opcode ID: e089459fb3c133711734621798408cb0bf6eac9c580570532973a8d6c4f29ab0
                                • Instruction ID: 9792b8971bcf3522c44d91a70b44a2a34ba3860b6ce640e96ef06d3b816d1a4e
                                • Opcode Fuzzy Hash: e089459fb3c133711734621798408cb0bf6eac9c580570532973a8d6c4f29ab0
                                • Instruction Fuzzy Hash: 25D09E35645610ABE65027A4AE0DB5F7B64EB45752F104461FA09F91A0C6744C448EE9
                                APIs
                                • GetCPInfo.KERNEL32(?,00000000), ref: 00403B5E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2405623435.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2405610333.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405640977.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405655773.0000000000406000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405669404.0000000000408000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405688362.0000000000409000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405709558.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_5ZjBJd69zi.jbxd
                                Yara matches
                                Similarity
                                • API ID: Info
                                • String ID: $
                                • API String ID: 1807457897-3032137957
                                • Opcode ID: 2e9acfdf2129eec143310afa17a87b31ebc8fffb8175ec50fa4333e461519020
                                • Instruction ID: 9fea7db5651f1ed54e8b234f10fcc364519221288e556eab496837c1a2af7e32
                                • Opcode Fuzzy Hash: 2e9acfdf2129eec143310afa17a87b31ebc8fffb8175ec50fa4333e461519020
                                • Instruction Fuzzy Hash: 42415A320082581AFB11AB14CE59BFB3FEC9B02705F1404FAD5C9F71D2C6794B489BAA
                                APIs
                                • RegOpenKeyA.ADVAPI32(80000001,Software\motherFucker,00000000), ref: 00401DD0
                                • RegCreateKeyA.ADVAPI32(80000001,Software\motherFucker), ref: 00401DED
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2405623435.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2405610333.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405640977.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405655773.0000000000406000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405669404.0000000000408000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405688362.0000000000409000.00000080.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2405709558.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_5ZjBJd69zi.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateOpen
                                • String ID: Software\motherFucker
                                • API String ID: 436179556-2836984702
                                • Opcode ID: fd27c9dd01183eb9183b13d0eab79d08815a2102ff50255ba53693f223f8de77
                                • Instruction ID: 2502ecdb676ee3a5e9370ea0e6d3390d155e98568e7563ded56a1d124eb2bb05
                                • Opcode Fuzzy Hash: fd27c9dd01183eb9183b13d0eab79d08815a2102ff50255ba53693f223f8de77
                                • Instruction Fuzzy Hash: 0FD0A7B2150200BFE7045B50AC09FEB77D8FB98302F31456EF507B50D0D67494699A69