Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
26B1sczZ88.dll

Overview

General Information

Sample name:26B1sczZ88.dll
renamed because original name is a hash value
Original sample name:6aff1202f53fe4cc6282f9ad3ebdef95bb4cf49f.dll
Analysis ID:1578325
MD5:51ac05b8af0e9e0a2180f230588e795f
SHA1:6aff1202f53fe4cc6282f9ad3ebdef95bb4cf49f
SHA256:68f9c7084a93f5b0487210704343acb69339b5bd16921cf1dae0c20966911df0
Tags:dlluser-NDA0E
Infos:

Detection

Virut
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Virut
AI detected suspicious sample
Changes memory attributes in foreign processes to executable or writable
Contains functionality to detect sleep reduction / modifications
Creates a thread in another existing process (thread injection)
Creates files in the system32 config directory
Drops executables to the windows directory (C:\Windows) and starts them
Found evasive API chain (may stop execution after checking mutex)
Found evasive API chain (may stop execution after checking volume information)
Injects code into the Windows Explorer (explorer.exe)
Installs new ROOT certificates
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Tries to evade debugger and weak emulator (self modifying code)
Tries to resolve many domain names, but no domain seems valid
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Entry point lies outside standard sections
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May check if the current machine is a sandbox (GetTickCount - Sleep)
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 4944 cmdline: loaddll32.exe "C:\Users\user\Desktop\26B1sczZ88.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 4992 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6944 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\26B1sczZ88.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 5656 cmdline: rundll32.exe "C:\Users\user\Desktop\26B1sczZ88.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • hrl97AF.tmp (PID: 3388 cmdline: C:\Users\user\AppData\Local\Temp\hrl97AF.tmp MD5: F3F920AAF85289A8E532890BC618AADD)
          • winlogon.exe (PID: 584 cmdline: winlogon.exe MD5: F8B41A1B3E569E7E6F990567F21DCE97)
          • svchost.exe (PID: 752 cmdline: C:\Windows\system32\svchost.exe -k DcomLaunch -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 928 cmdline: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • dwm.exe (PID: 992 cmdline: "dwm.exe" MD5: 5C27608411832C5B39BA04E33D53536C)
          • svchost.exe (PID: 1336 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s nsi MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1348 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1408 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1640 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1680 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • rundll32.exe (PID: 7000 cmdline: rundll32.exe C:\Users\user\Desktop\26B1sczZ88.dll,LpkDllInitialize MD5: 889B99C52A60DD49227C5E485A016679)
      • hrl97BF.tmp (PID: 5732 cmdline: C:\Users\user\AppData\Local\Temp\hrl97BF.tmp MD5: F3F920AAF85289A8E532890BC618AADD)
        • lsass.exe (PID: 640 cmdline: C:\Windows\system32\lsass.exe MD5: A1CC00332BBF370654EE3DC8CDC8C95A)
        • fontdrvhost.exe (PID: 776 cmdline: "fontdrvhost.exe" MD5: BBCB897697B3442657C7D6E3EDDBD25F)
        • fontdrvhost.exe (PID: 784 cmdline: "fontdrvhost.exe" MD5: BBCB897697B3442657C7D6E3EDDBD25F)
        • svchost.exe (PID: 880 cmdline: C:\Windows\system32\svchost.exe -k RPCSS -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 436 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 376 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 792 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1028 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1036 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1148 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1160 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • rundll32.exe (PID: 5664 cmdline: rundll32.exe C:\Users\user\Desktop\26B1sczZ88.dll,LpkDrawTextEx MD5: 889B99C52A60DD49227C5E485A016679)
      • hrlA367.tmp (PID: 3916 cmdline: C:\Users\user\AppData\Local\Temp\hrlA367.tmp MD5: F3F920AAF85289A8E532890BC618AADD)
        • svchost.exe (PID: 1124 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1220 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1392 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1584 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1800 cmdline: C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • rundll32.exe (PID: 6012 cmdline: rundll32.exe C:\Users\user\Desktop\26B1sczZ88.dll,LpkEditControl MD5: 889B99C52A60DD49227C5E485A016679)
      • hrlAF3E.tmp (PID: 6016 cmdline: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmp MD5: F3F920AAF85289A8E532890BC618AADD)
        • taskkill.exe (PID: 1812 cmdline: taskkill /f /im ZhuDongFangYu.exe /t MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
          • conhost.exe (PID: 6472 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • zvhcfa.exe (PID: 800 cmdline: C:\Windows\SysWOW64\zvhcfa.exe MD5: F3F920AAF85289A8E532890BC618AADD)
    • svchost.exe (PID: 1504 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • svchost.exe (PID: 1656 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • svchost.exe (PID: 1836 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
26B1sczZ88.dllCN_disclosed_20180208_Mal1Detects malware from disclosed CN malware setFlorian Roth
  • 0x8f7f:$x2: User-Agent:Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
26B1sczZ88.dllMAL_Nitol_Malware_Jan19_1Detects Nitol MalwareFlorian Roth
  • 0x71b4:$xc2: GET ^&&%$%$^
  • 0x71e5:$xc2: GET ^&&%$%$^
  • 0x7216:$xc2: GET ^&&%$%$^
  • 0x7247:$xc2: GET ^&&%$%$^
  • 0x7278:$xc2: GET ^&&%$%$^
  • 0x72a9:$xc2: GET ^&&%$%$^
  • 0x72da:$xc2: GET ^&&%$%$^
  • 0x730b:$xc2: GET ^&&%$%$^
  • 0x733c:$xc2: GET ^&&%$%$^
  • 0x736d:$xc2: GET ^&&%$%$^
  • 0x739e:$xc2: GET ^&&%$%$^
  • 0x73cf:$xc2: GET ^&&%$%$^
  • 0x7400:$xc2: GET ^&&%$%$^
  • 0x7431:$xc2: GET ^&&%$%$^
  • 0x7462:$xc2: GET ^&&%$%$^
  • 0x7493:$xc2: GET ^&&%$%$^
  • 0x74c4:$xc2: GET ^&&%$%$^
  • 0x74f5:$xc2: GET ^&&%$%$^
  • 0x7526:$xc2: GET ^&&%$%$^
  • 0x7557:$xc2: GET ^&&%$%$^
  • 0x71e1:$n1: .htmGET
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\hrlBAE7.tmpCN_disclosed_20180208_Mal1Detects malware from disclosed CN malware setFlorian Roth
  • 0x74ef:$x2: User-Agent:Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
C:\Users\user\AppData\Local\Temp\hrlBAE7.tmpMAL_Nitol_Malware_Jan19_1Detects Nitol MalwareFlorian Roth
  • 0x5724:$xc2: GET ^&&%$%$^
  • 0x5755:$xc2: GET ^&&%$%$^
  • 0x5786:$xc2: GET ^&&%$%$^
  • 0x57b7:$xc2: GET ^&&%$%$^
  • 0x57e8:$xc2: GET ^&&%$%$^
  • 0x5819:$xc2: GET ^&&%$%$^
  • 0x584a:$xc2: GET ^&&%$%$^
  • 0x587b:$xc2: GET ^&&%$%$^
  • 0x58ac:$xc2: GET ^&&%$%$^
  • 0x58dd:$xc2: GET ^&&%$%$^
  • 0x590e:$xc2: GET ^&&%$%$^
  • 0x593f:$xc2: GET ^&&%$%$^
  • 0x5970:$xc2: GET ^&&%$%$^
  • 0x59a1:$xc2: GET ^&&%$%$^
  • 0x59d2:$xc2: GET ^&&%$%$^
  • 0x5a03:$xc2: GET ^&&%$%$^
  • 0x5a34:$xc2: GET ^&&%$%$^
  • 0x5a65:$xc2: GET ^&&%$%$^
  • 0x5a96:$xc2: GET ^&&%$%$^
  • 0x5ac7:$xc2: GET ^&&%$%$^
  • 0x5751:$n1: .htmGET
C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCN_disclosed_20180208_Mal1Detects malware from disclosed CN malware setFlorian Roth
  • 0x74ef:$x2: User-Agent:Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
C:\Users\user\AppData\Local\Temp\hrl97AF.tmpMAL_Nitol_Malware_Jan19_1Detects Nitol MalwareFlorian Roth
  • 0x5724:$xc2: GET ^&&%$%$^
  • 0x5755:$xc2: GET ^&&%$%$^
  • 0x5786:$xc2: GET ^&&%$%$^
  • 0x57b7:$xc2: GET ^&&%$%$^
  • 0x57e8:$xc2: GET ^&&%$%$^
  • 0x5819:$xc2: GET ^&&%$%$^
  • 0x584a:$xc2: GET ^&&%$%$^
  • 0x587b:$xc2: GET ^&&%$%$^
  • 0x58ac:$xc2: GET ^&&%$%$^
  • 0x58dd:$xc2: GET ^&&%$%$^
  • 0x590e:$xc2: GET ^&&%$%$^
  • 0x593f:$xc2: GET ^&&%$%$^
  • 0x5970:$xc2: GET ^&&%$%$^
  • 0x59a1:$xc2: GET ^&&%$%$^
  • 0x59d2:$xc2: GET ^&&%$%$^
  • 0x5a03:$xc2: GET ^&&%$%$^
  • 0x5a34:$xc2: GET ^&&%$%$^
  • 0x5a65:$xc2: GET ^&&%$%$^
  • 0x5a96:$xc2: GET ^&&%$%$^
  • 0x5ac7:$xc2: GET ^&&%$%$^
  • 0x5751:$n1: .htmGET
C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpCN_disclosed_20180208_Mal1Detects malware from disclosed CN malware setFlorian Roth
  • 0x74ef:$x2: User-Agent:Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
Click to see the 7 entries
SourceRuleDescriptionAuthorStrings
00000026.00000002.2743535164.000000007FFC0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_VirutYara detected VirutJoe Security
    0000001B.00000002.2741797049.000000007FFB0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_VirutYara detected VirutJoe Security
      00000025.00000002.2743367209.000000007FFF0000.00000040.00000001.00040000.00000000.sdmpJoeSecurity_VirutYara detected VirutJoe Security
        00000018.00000002.2743542686.000000007FFD0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_VirutYara detected VirutJoe Security
          0000000C.00000002.2798846486.000000007FFF0000.00000040.00000001.00040000.00000000.sdmpJoeSecurity_VirutYara detected VirutJoe Security
            Click to see the 109 entries
            SourceRuleDescriptionAuthorStrings
            3.2.rundll32.exe.10004090.1.unpackMAL_Nitol_Malware_Jan19_1Detects Nitol MalwareFlorian Roth
            • 0x4b24:$xc2: GET ^&&%$%$^
            • 0x4b55:$xc2: GET ^&&%$%$^
            • 0x4b86:$xc2: GET ^&&%$%$^
            • 0x4bb7:$xc2: GET ^&&%$%$^
            • 0x4be8:$xc2: GET ^&&%$%$^
            • 0x4c19:$xc2: GET ^&&%$%$^
            • 0x4c4a:$xc2: GET ^&&%$%$^
            • 0x4c7b:$xc2: GET ^&&%$%$^
            • 0x4cac:$xc2: GET ^&&%$%$^
            • 0x4cdd:$xc2: GET ^&&%$%$^
            • 0x4d0e:$xc2: GET ^&&%$%$^
            • 0x4d3f:$xc2: GET ^&&%$%$^
            • 0x4d70:$xc2: GET ^&&%$%$^
            • 0x4da1:$xc2: GET ^&&%$%$^
            • 0x4dd2:$xc2: GET ^&&%$%$^
            • 0x4e03:$xc2: GET ^&&%$%$^
            • 0x4e34:$xc2: GET ^&&%$%$^
            • 0x4e65:$xc2: GET ^&&%$%$^
            • 0x4e96:$xc2: GET ^&&%$%$^
            • 0x4ec7:$xc2: GET ^&&%$%$^
            • 0x4b51:$n1: .htmGET
            30.0.hrlAF3E.tmp.400000.0.unpackCN_disclosed_20180208_Mal1Detects malware from disclosed CN malware setFlorian Roth
            • 0x74ef:$x2: User-Agent:Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
            30.0.hrlAF3E.tmp.400000.0.unpackMAL_Nitol_Malware_Jan19_1Detects Nitol MalwareFlorian Roth
            • 0x5724:$xc2: GET ^&&%$%$^
            • 0x5755:$xc2: GET ^&&%$%$^
            • 0x5786:$xc2: GET ^&&%$%$^
            • 0x57b7:$xc2: GET ^&&%$%$^
            • 0x57e8:$xc2: GET ^&&%$%$^
            • 0x5819:$xc2: GET ^&&%$%$^
            • 0x584a:$xc2: GET ^&&%$%$^
            • 0x587b:$xc2: GET ^&&%$%$^
            • 0x58ac:$xc2: GET ^&&%$%$^
            • 0x58dd:$xc2: GET ^&&%$%$^
            • 0x590e:$xc2: GET ^&&%$%$^
            • 0x593f:$xc2: GET ^&&%$%$^
            • 0x5970:$xc2: GET ^&&%$%$^
            • 0x59a1:$xc2: GET ^&&%$%$^
            • 0x59d2:$xc2: GET ^&&%$%$^
            • 0x5a03:$xc2: GET ^&&%$%$^
            • 0x5a34:$xc2: GET ^&&%$%$^
            • 0x5a65:$xc2: GET ^&&%$%$^
            • 0x5a96:$xc2: GET ^&&%$%$^
            • 0x5ac7:$xc2: GET ^&&%$%$^
            • 0x5751:$n1: .htmGET
            20.2.rundll32.exe.10004090.2.raw.unpackCN_disclosed_20180208_Mal1Detects malware from disclosed CN malware setFlorian Roth
            • 0x74ef:$x2: User-Agent:Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
            20.2.rundll32.exe.10004090.2.raw.unpackMAL_Nitol_Malware_Jan19_1Detects Nitol MalwareFlorian Roth
            • 0x5724:$xc2: GET ^&&%$%$^
            • 0x5755:$xc2: GET ^&&%$%$^
            • 0x5786:$xc2: GET ^&&%$%$^
            • 0x57b7:$xc2: GET ^&&%$%$^
            • 0x57e8:$xc2: GET ^&&%$%$^
            • 0x5819:$xc2: GET ^&&%$%$^
            • 0x584a:$xc2: GET ^&&%$%$^
            • 0x587b:$xc2: GET ^&&%$%$^
            • 0x58ac:$xc2: GET ^&&%$%$^
            • 0x58dd:$xc2: GET ^&&%$%$^
            • 0x590e:$xc2: GET ^&&%$%$^
            • 0x593f:$xc2: GET ^&&%$%$^
            • 0x5970:$xc2: GET ^&&%$%$^
            • 0x59a1:$xc2: GET ^&&%$%$^
            • 0x59d2:$xc2: GET ^&&%$%$^
            • 0x5a03:$xc2: GET ^&&%$%$^
            • 0x5a34:$xc2: GET ^&&%$%$^
            • 0x5a65:$xc2: GET ^&&%$%$^
            • 0x5a96:$xc2: GET ^&&%$%$^
            • 0x5ac7:$xc2: GET ^&&%$%$^
            • 0x5751:$n1: .htmGET
            Click to see the 42 entries

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\svchost.exe -k DcomLaunch -p, CommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: C:\Users\user\AppData\Local\Temp\hrl97AF.tmp, ParentImage: C:\Users\user\AppData\Local\Temp\hrl97AF.tmp, ParentProcessId: 3388, ParentProcessName: hrl97AF.tmp, ProcessCommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p, ProcessId: 752, ProcessName: svchost.exe
            Source: Process startedAuthor: vburov: Data: Command: winlogon.exe, CommandLine: winlogon.exe, CommandLine|base64offset|contains: , Image: C:\Windows\System32\winlogon.exe, NewProcessName: C:\Windows\System32\winlogon.exe, OriginalFileName: C:\Windows\System32\winlogon.exe, ParentCommandLine: C:\Users\user\AppData\Local\Temp\hrl97AF.tmp, ParentImage: C:\Users\user\AppData\Local\Temp\hrl97AF.tmp, ParentProcessId: 3388, ParentProcessName: hrl97AF.tmp, ProcessCommandLine: winlogon.exe, ProcessId: 584, ProcessName: winlogon.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-19T15:33:35.834773+010020127301A Network Trojan was detected192.168.2.9635151.1.1.153UDP
            2024-12-19T15:34:06.119514+010020127301A Network Trojan was detected192.168.2.9542631.1.1.153UDP
            2024-12-19T15:34:28.135114+010020127301A Network Trojan was detected192.168.2.9620701.1.1.153UDP
            2024-12-19T15:34:36.682015+010020127301A Network Trojan was detected192.168.2.9629831.1.1.153UDP
            2024-12-19T15:35:07.041598+010020127301A Network Trojan was detected192.168.2.9615191.1.1.153UDP
            2024-12-19T15:35:20.667033+010020127301A Network Trojan was detected192.168.2.9571701.1.1.153UDP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-19T15:34:37.104284+010028115771A Network Trojan was detected1.1.1.153192.168.2.950215UDP
            2024-12-19T15:34:38.184663+010028115771A Network Trojan was detected1.1.1.153192.168.2.959736UDP
            2024-12-19T15:35:16.020722+010028115771A Network Trojan was detected1.1.1.153192.168.2.951823UDP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 26B1sczZ88.dllAvira: detected
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpAvira: detection malicious, Label: W32/Virut.Gen
            Source: C:\Users\user\AppData\Local\Temp\hrlBAE7.tmpAvira: detection malicious, Label: W32/Virut.Gen
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpAvira: detection malicious, Label: W32/Virut.Gen
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpAvira: detection malicious, Label: W32/Virut.Gen
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpAvira: detection malicious, Label: W32/Virut.Gen
            Source: C:\Windows\SysWOW64\zvhcfa.exeAvira: detection malicious, Label: W32/Virut.Gen
            Source: C:\Users\user\AppData\Local\Temp\SOFTWARE.LOG (copy)ReversingLabs: Detection: 97%
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpReversingLabs: Detection: 97%
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpReversingLabs: Detection: 97%
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpReversingLabs: Detection: 97%
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpReversingLabs: Detection: 97%
            Source: C:\Users\user\AppData\Local\Temp\hrlBAE7.tmpReversingLabs: Detection: 97%
            Source: C:\Windows\SysWOW64\zvhcfa.exeReversingLabs: Detection: 97%
            Source: 26B1sczZ88.dllReversingLabs: Detection: 97%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\Temp\hrlBAE7.tmpJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpJoe Sandbox ML: detected
            Source: C:\Windows\SysWOW64\zvhcfa.exeJoe Sandbox ML: detected
            Source: 26B1sczZ88.dllJoe Sandbox ML: detected
            Source: 26B1sczZ88.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
            Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdbll source: svchost.exe, 00000018.00000000.1526926841.000002258EC2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2756312554.000002258EC2B000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: @C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000018.00000002.2758587508.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1527020756.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\wctD1EA.tmp.pdb source: svchost.exe, 00000018.00000002.2758587508.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1527020756.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb* source: svchost.exe, 00000018.00000000.1526971073.000002258EC42000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2757685837.000002258EC42000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000018.00000002.2758587508.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1527020756.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: $@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb837 source: svchost.exe, 00000018.00000002.2758587508.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1527020756.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000018.00000000.1526926841.000002258EC2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2756312554.000002258EC2B000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000018.00000000.1526971073.000002258EC42000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2757685837.000002258EC42000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\wct495D.tmp.pdb\* source: svchost.exe, 00000018.00000002.2758587508.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1527020756.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: .@C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000018.00000000.1526926841.000002258EC2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2756312554.000002258EC2B000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.errorl source: svchost.exe, 00000018.00000000.1526926841.000002258EC2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2756312554.000002258EC2B000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\wmsetup.log.pdb source: svchost.exe, 00000018.00000002.2758587508.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1527020756.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb949 source: svchost.exe, 00000018.00000000.1526971073.000002258EC42000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2757685837.000002258EC42000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: &@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000018.00000000.1526926841.000002258EC2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2756312554.000002258EC2B000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000018.00000000.1526971073.000002258EC42000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2757685837.000002258EC42000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A583178b @ source: svchost.exe, 00000018.00000000.1526971073.000002258EC42000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2757685837.000002258EC42000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\wct102E.tmp.pdb source: svchost.exe, 00000018.00000002.2758587508.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1527020756.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: &@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000018.00000000.1526926841.000002258EC2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2756312554.000002258EC2B000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000018.00000002.2758587508.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1527020756.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10001677 WaitForSingleObject,wsprintfW,lstrcpyW,lstrcpyW,lstrcpyW,lstrcpyW,PathAppendW,PathAppendW,FindFirstFileW,lstrcpyW,lstrcmpiW,lstrcmpiW,lstrcmpiW,WaitForSingleObject,lstrcpyW,PathAppendW,FindClose,PathFindExtensionW,lstrcmpiW,lstrcpyW,PathAppendW,GetFileAttributesW,CopyFileW,SetFileAttributesW,lstrcmpiW,lstrcmpiW,lstrcpyW,PathAppendW,WaitForSingleObject,FindNextFileW,0_2_10001677
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10001677 WaitForSingleObject,wsprintfW,lstrcpyW,lstrcpyW,lstrcpyW,lstrcpyW,PathAppendW,PathAppendW,FindFirstFileW,lstrcpyW,lstrcmpiW,lstrcmpiW,lstrcmpiW,WaitForSingleObject,lstrcpyW,PathAppendW,FindClose,PathFindExtensionW,lstrcmpiW,lstrcpyW,PathAppendW,GetFileAttributesW,CopyFileW,SetFileAttributesW,lstrcmpiW,lstrcmpiW,lstrcpyW,PathAppendW,WaitForSingleObject,FindNextFileW,3_2_10001677

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2012730 - Severity 1 - ET MALWARE Known Hostile Domain ilo.brenz .pl Lookup : 192.168.2.9:63515 -> 1.1.1.1:53
            Source: Network trafficSuricata IDS: 2012730 - Severity 1 - ET MALWARE Known Hostile Domain ilo.brenz .pl Lookup : 192.168.2.9:54263 -> 1.1.1.1:53
            Source: Network trafficSuricata IDS: 2012730 - Severity 1 - ET MALWARE Known Hostile Domain ilo.brenz .pl Lookup : 192.168.2.9:62070 -> 1.1.1.1:53
            Source: Network trafficSuricata IDS: 2012730 - Severity 1 - ET MALWARE Known Hostile Domain ilo.brenz .pl Lookup : 192.168.2.9:62983 -> 1.1.1.1:53
            Source: Network trafficSuricata IDS: 2012730 - Severity 1 - ET MALWARE Known Hostile Domain ilo.brenz .pl Lookup : 192.168.2.9:61519 -> 1.1.1.1:53
            Source: Network trafficSuricata IDS: 2012730 - Severity 1 - ET MALWARE Known Hostile Domain ilo.brenz .pl Lookup : 192.168.2.9:57170 -> 1.1.1.1:53
            Source: unknownDNS traffic detected: query: xshsnl.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: acxyxy.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: yhflfd.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: fybyzv.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: yulrvp.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: fxyavq.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: unkwhv.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: ahaotq.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: zemivi.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: rqicen.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: rhwuas.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: qiuifw.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: pyhqpe.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: ihybog.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: oxoimf.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: uycyms.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: iqewjg.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: uquewo.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: pimqle.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: fzlikn.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: raygxc.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: ilommd.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: uxbegb.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: cdqboa.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: qikggc.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: dazrfy.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: evbzsz.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: jhkuku.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: lfsmdz.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: empymm.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: ant.trenz.pl replaycode: Server failure (2)
            Source: unknownDNS traffic detected: query: myivov.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: troslw.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: eqpzuu.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: lacjuz.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: xgjldw.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: gaiuio.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: tlfjcd.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: bsmxax.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: ikuhms.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: ynwpie.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: qeixpq.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: euekdh.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: oaceeo.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: vnunre.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: eoswhi.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: kduiuv.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: yqhfpu.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: isaykc.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: dkevii.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: vdafki.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: engkkn.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: ugiwuc.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: vzvwin.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: frvzle.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: kpyyyy.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: oehqcn.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: gnwvmu.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: ldgoti.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: auieai.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: lniyuv.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: iotqbe.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: giqxuy.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: yokuap.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: qyhuju.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: jzaoby.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: ecbklt.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: zgawte.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: heupjk.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: wxjaht.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: ikxyaq.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: pugtjb.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: fzhchl.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: hxhxsk.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: eekder.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: uergsz.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: wohbil.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: bsfxpd.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: nxygpr.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: nsqixt.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: zitymm.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: cioyuk.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: qnrfpi.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: iapseh.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: ngelut.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: saambd.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: yivmlj.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: ahmeqf.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: nlqjng.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: vbahvh.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: htqqvy.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: phdomu.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: siytue.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: pnfkay.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: tcepna.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: vezeoe.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: anvdkc.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: gqmneh.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: eexjix.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: zdtwjb.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: ilo.brenz.pl replaycode: Server failure (2)
            Source: unknownDNS traffic detected: query: dexric.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: zsinsv.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: hcpgso.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: tpwowx.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: goyzko.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: gjtywo.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: ivsego.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: iaaucc.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: ovprrb.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: wmducp.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: zirafk.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: uepolc.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: smhcbm.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: yirgbw.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: gnxmfg.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: eqoxwa.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: bkydbf.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: raodpi.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: qgwhsw.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: zcuofo.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: jfppeu.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: phhuqd.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: qyflyk.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: ltqjua.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: ogvgft.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: dahwgm.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: cwkzpg.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: nvaijl.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: zuetyk.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: tfagrq.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: eiqljd.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: eupkbf.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: ohkncb.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: heyanh.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: dduavk.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: jsioue.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: agjmxb.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: ymehei.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: ebuspk.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: iqdacv.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: unskbm.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: rmqiuq.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: kgvozz.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: faweja.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: gkbtuu.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: yovyrw.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: iemjen.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: zkfevd.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: uxohei.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: qlclyn.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: ikfdit.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: thjvoi.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: msbfih.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: epgrzo.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: vlscru.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: uahnrk.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: vxpesz.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: hipfhf.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: sjjile.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: jovlax.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: upnevr.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: yfpqxt.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: uzboio.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: bvvknd.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: uqfnkt.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: fncqle.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: xunnfu.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: jeuiac.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: zuotaq.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: apqqgj.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: yoguud.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: wisllh.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: itmffg.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: edtlux.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: ctpiwy.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: fopopy.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: faxkac.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: lanoyi.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: aubtoq.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: aegjss.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: gizyod.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: iezcob.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: qfstid.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: rqmoov.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: glsmii.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: yeaedh.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: zjfiqo.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: naxdur.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: ulodoa.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: gabamf.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: lityoa.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: rraenf.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: qtvtoh.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: fidiow.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: uafdxu.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: oseynl.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: mbixoj.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: ootumr.com replaycode: Name error (3)
            Source: Network trafficSuricata IDS: 2811577 - Severity 1 - ETPRO MALWARE Possible Virut DGA NXDOMAIN Responses (com) : 1.1.1.1:53 -> 192.168.2.9:59736
            Source: Network trafficSuricata IDS: 2811577 - Severity 1 - ETPRO MALWARE Possible Virut DGA NXDOMAIN Responses (com) : 1.1.1.1:53 -> 192.168.2.9:50215
            Source: Network trafficSuricata IDS: 2811577 - Severity 1 - ETPRO MALWARE Possible Virut DGA NXDOMAIN Responses (com) : 1.1.1.1:53 -> 192.168.2.9:51823
            Source: lsass.exe, 00000009.00000002.2760713212.000002A290A4E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/STS%3C/ds:KeyName%3E%3C/ds:KeyInfo%3E%3CCipherData%3E%3CCipherValue%3EM.C506_SN1
            Source: Microsoft-Windows-LiveId%4Operational.evtx.25.drString found in binary or memory: http://Passport.NET/tb
            Source: lsass.exe, 00000009.00000000.1493523293.000002A29123E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digic
            Source: lsass.exe, 00000009.00000002.2778726488.000002A291374000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2779510912.000002A291385000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.1664829310.000002A2912FE000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1493737347.000002A291385000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.1933474324.000002A29134C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1493684808.000002A291300000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
            Source: lsass.exe, 00000009.00000002.2779510912.000002A291385000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1493737347.000002A291385000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
            Source: lsass.exe, 00000009.00000002.2778726488.000002A291374000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.1664829310.000002A2912FE000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.1543267342.000002A2913EE000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.1933474324.000002A29134C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0B
            Source: lsass.exe, 00000009.00000000.1493523293.000002A29123E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1493792866.000002A2913A8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
            Source: lsass.exe, 00000009.00000000.1493523293.000002A29123E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiC8
            Source: lsass.exe, 00000009.00000000.1493523293.000002A29123E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1493792866.000002A2913A8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
            Source: lsass.exe, 00000009.00000002.2779510912.000002A291385000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1493737347.000002A291385000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
            Source: lsass.exe, 00000009.00000002.2778726488.000002A291374000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2779510912.000002A291385000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.1664829310.000002A2912FE000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1493737347.000002A291385000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.1933474324.000002A29134C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1493684808.000002A291300000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
            Source: lsass.exe, 00000009.00000002.2778726488.000002A291374000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.1664829310.000002A2912FE000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.1543267342.000002A2913EE000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.1933474324.000002A29134C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl0
            Source: lsass.exe, 00000009.00000000.1493792866.000002A2913A8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
            Source: lsass.exe, 00000009.00000000.1493684808.000002A291300000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
            Source: lsass.exe, 00000009.00000002.2778726488.000002A291374000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2779510912.000002A291385000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.1664829310.000002A2912FE000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1493737347.000002A291385000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.1933474324.000002A29134C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1493684808.000002A291300000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
            Source: lsass.exe, 00000009.00000000.1493523293.000002A29123E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1493792866.000002A2913A8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
            Source: lsass.exe, 00000009.00000000.1492822482.000002A290A88000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2763076804.000002A290A88000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
            Source: lsass.exe, 00000009.00000000.1492859645.000002A290AC4000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2764296436.000002A290AC4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
            Source: lsass.exe, 00000009.00000000.1492711290.000002A290A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2759839699.000002A290A2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702
            Source: lsass.exe, 00000009.00000002.2760713212.000002A290A4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1492737881.000002A290A4E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512
            Source: lsass.exe, 00000009.00000000.1492711290.000002A290A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2759839699.000002A290A2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
            Source: lsass.exe, 00000009.00000002.2778726488.000002A291374000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1493523293.000002A29123E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2779510912.000002A291385000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.1664829310.000002A2912FE000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1493737347.000002A291385000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.1543267342.000002A2913EE000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.1933474324.000002A29134C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1493684808.000002A291300000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
            Source: lsass.exe, 00000009.00000000.1493684808.000002A291300000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0:
            Source: lsass.exe, 00000009.00000000.1493792866.000002A2913A8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0I
            Source: lsass.exe, 00000009.00000000.1492822482.000002A290A88000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1493684808.000002A291300000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.msocsp.com0
            Source: lsass.exe, 00000009.00000000.1492711290.000002A290A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2759839699.000002A290A2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy
            Source: lsass.exe, 00000009.00000000.1492711290.000002A290A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2759839699.000002A290A2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
            Source: lsass.exe, 00000009.00000002.2760713212.000002A290A4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1492711290.000002A290A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2759839699.000002A290A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1492737881.000002A290A4E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicy
            Source: lsass.exe, 00000009.00000000.1492711290.000002A290A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2759839699.000002A290A2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
            Source: lsass.exe, 00000009.00000002.2759839699.000002A290A2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/
            Source: lsass.exe, 00000009.00000000.1492711290.000002A290A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2759839699.000002A290A2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/P
            Source: hrl97BF.tmp, 00000006.00000002.2017052696.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, hrl97BF.tmp, 00000006.00000002.2016979532.000000007FE10000.00000040.80000000.00040000.00000000.sdmp, hrl97AF.tmp, 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmp, hrl97AF.tmp, 00000007.00000002.2043369977.00000000009B0000.00000040.10000000.00040000.00000000.sdmp, hrl97AF.tmp, 00000007.00000002.2043860940.000000007FE10000.00000040.80000000.00040000.00000000.sdmp, winlogon.exe, 00000008.00000002.2742302542.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, winlogon.exe, 00000008.00000000.1491863951.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, winlogon.exe, 00000008.00000002.2741575463.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, lsass.exe, 00000009.00000002.2742148992.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, lsass.exe, 00000009.00000002.2743236363.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, svchost.exe, 0000000A.00000002.2741589846.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, svchost.exe, 0000000A.00000002.2742275015.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, svchost.exe, 0000000A.00000000.1493902232.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, fontdrvhost.exe, 0000000B.00000002.2741580715.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, fontdrvhost.exe, 0000000B.00000002.2798564614.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, fontdrvhost.exe, 0000000C.00000002.2741587779.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, fontdrvhost.exe, 0000000C.00000002.2798453376.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, svchost.exe, 0000000D.00000002.2743314432.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, svchost.exe, 0000000D.00000002.2742234796.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, svchost.exe, 0000000E.00000002.2741590621.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, svchost.exe, 0000000E.00000002.2742653531.000000007FFF0000.00000040.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.Brenz.pl/rc/
            Source: lsass.exe, 00000009.00000000.1493792866.000002A2913A8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
            Source: svchost.exe, 00000028.00000000.1574005525.000001A4D5EF7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.msftconnecttest.com
            Source: svchost.exe, 00000028.00000000.1574005525.000001A4D5EF7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.msftconnecttest.com/
            Source: svchost.exe, 0000000A.00000002.2790988057.000001A31C087000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.2791515071.000001A31C09B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000A.00000000.1495878213.000001A31C087000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.onenote.net/livetile/?Language=
            Source: svchost.exe, 0000000A.00000002.2789825589.000001A31C054000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000A.00000000.1495785024.000001A31C054000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.cn/shellRESP
            Source: svchost.exe, 0000000A.00000002.2789825589.000001A31C054000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000A.00000000.1495785024.000001A31C054000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com/shell

            System Summary

            barindex
            Source: 26B1sczZ88.dll, type: SAMPLEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 26B1sczZ88.dll, type: SAMPLEMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: 3.2.rundll32.exe.10004090.1.unpack, type: UNPACKEDPEMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: 30.0.hrlAF3E.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 30.0.hrlAF3E.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: 20.2.rundll32.exe.10004090.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 20.2.rundll32.exe.10004090.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: 21.2.hrlA367.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 21.2.hrlA367.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: 0.2.loaddll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 0.2.loaddll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: 34.0.zvhcfa.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 34.0.zvhcfa.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: 7.2.hrl97AF.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 7.2.hrl97AF.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: 20.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 20.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: 30.2.hrlAF3E.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 30.2.hrlAF3E.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: 0.2.loaddll32.exe.10004090.1.unpack, type: UNPACKEDPEMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: 20.2.rundll32.exe.10004090.2.unpack, type: UNPACKEDPEMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: 4.2.rundll32.exe.10004090.1.unpack, type: UNPACKEDPEMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: 7.0.hrl97AF.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 7.0.hrl97AF.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: 3.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 3.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: 28.2.rundll32.exe.10004090.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 28.2.rundll32.exe.10004090.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: 4.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 4.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: 28.2.rundll32.exe.10004090.1.unpack, type: UNPACKEDPEMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: 6.0.hrl97BF.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 6.0.hrl97BF.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: 21.0.hrlA367.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 21.0.hrlA367.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: 28.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 28.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: 4.2.rundll32.exe.10004090.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 4.2.rundll32.exe.10004090.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: 34.2.zvhcfa.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 34.2.zvhcfa.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: 6.2.hrl97BF.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 6.2.hrl97BF.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: 0.2.loaddll32.exe.10004090.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 0.2.loaddll32.exe.10004090.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: 3.2.rundll32.exe.10004090.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 3.2.rundll32.exe.10004090.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: C:\Users\user\AppData\Local\Temp\hrlBAE7.tmp, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: C:\Users\user\AppData\Local\Temp\hrlBAE7.tmp, type: DROPPEDMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmp, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmp, type: DROPPEDMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmp, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmp, type: DROPPEDMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmp, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmp, type: DROPPEDMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmp, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmp, type: DROPPEDMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: C:\Windows\SysWOW64\zvhcfa.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: C:\Windows\SysWOW64\zvhcfa.exe, type: DROPPEDMatched rule: Detects Nitol Malware Author: Florian Roth
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_0047846F lstrcpyW,lstrlenW,NtCreateSection,6_2_0047846F
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_0047619E NtSetInformationProcess,6_2_0047619E
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_004765B3 CloseHandle,GetModuleHandleA,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,CloseHandle,6_2_004765B3
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_004763EE GetModuleHandleA,GetVersion,VirtualAlloc,CloseHandle,SetProcessAffinityMask,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,6_2_004763EE
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_0047740B NtAdjustPrivilegesToken,6_2_0047740B
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_00478438 NtCreateFile,NtCreateFile,NtCreateFile,NtProtectVirtualMemory,NtWriteVirtualMemory,6_2_00478438
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_004784F0 NtOpenSection,6_2_004784F0
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_00478535 NtMapViewOfSection,CloseHandle,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,6_2_00478535
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_00477130 LoadLibraryA,GetModuleHandleA,NtAdjustPrivilegesToken,6_2_00477130
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_004793C6 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,6_2_004793C6
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_004773E3 NtAdjustPrivilegesToken,6_2_004773E3
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_004793A1 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,6_2_004793A1
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_006F2477 NtCreateFile,NtCreateFile,NtCreateFile,NtProtectVirtualMemory,NtWriteVirtualMemory,6_2_006F2477
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_006F042D GetModuleHandleA,GetVersion,VirtualAlloc,CloseHandle,SetProcessAffinityMask,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,6_2_006F042D
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_006F116F LoadLibraryA,GetModuleHandleA,LookupPrivilegeValueA,NtAdjustPrivilegesToken,6_2_006F116F
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_006F2574 NtMapViewOfSection,CloseHandle,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,6_2_006F2574
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_006F252F NtOpenSection,6_2_006F252F
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_006F05F2 CloseHandle,GetModuleHandleA,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CloseHandle,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,CloseHandle,6_2_006F05F2
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_006F144A LookupPrivilegeValueA,NtAdjustPrivilegesToken,6_2_006F144A
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_006F1422 LookupPrivilegeValueA,NtAdjustPrivilegesToken,6_2_006F1422
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_006F3405 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,6_2_006F3405
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_006F24AE lstrcpyW,lstrlenW,NtCreateSection,6_2_006F24AE
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_006F33E0 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,6_2_006F33E0
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_7FE323EE NtCreateFile,NtCreateFile,NtCreateFile,NtProtectVirtualMemory,NtWriteVirtualMemory,6_2_7FE323EE
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_7FE313C1 LookupPrivilegeValueA,NtAdjustPrivilegesToken,6_2_7FE313C1
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_7FE31399 LookupPrivilegeValueA,NtAdjustPrivilegesToken,6_2_7FE31399
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_7FE30601 CloseHandle,GetModuleHandleA,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,CloseHandle,6_2_7FE30601
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_7FE329F1 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,6_2_7FE329F1
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_7FE329CC NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,6_2_7FE329CC
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_7FE324EB NtMapViewOfSection,CloseHandle,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,6_2_7FE324EB
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_7FE324A6 NtOpenSection,6_2_7FE324A6
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_7FE30442 GetModuleHandleA,GetVersion,VirtualAlloc,CloseHandle,SetThreadAffinityMask,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,6_2_7FE30442
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_7FE32425 lstrcpyW,lstrlenW,NtCreateSection,6_2_7FE32425
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_0047D14A GetModuleHandleA,GetVersion,VirtualAlloc,CloseHandle,SetThreadAffinityMask,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,7_2_0047D14A
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_0047F12D lstrcpyW,lstrlenW,NtCreateSection,7_2_0047F12D
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_0047D309 CloseHandle,GetModuleHandleA,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,CloseHandle,7_2_0047D309
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_0047E0C9 NtAdjustPrivilegesToken,7_2_0047E0C9
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_0047F0F6 NtCreateFile,NtCreateFile,NtCreateFile,NtProtectVirtualMemory,NtWriteVirtualMemory,7_2_0047F0F6
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_0047E0A1 NtAdjustPrivilegesToken,7_2_0047E0A1
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_0047F1F3 NtMapViewOfSection,CloseHandle,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,7_2_0047F1F3
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_0047F1AE NtOpenSection,7_2_0047F1AE
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_0047F6D4 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,7_2_0047F6D4
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_0047F6F9 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,7_2_0047F6F9
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_009B24A6 NtOpenSection,7_2_009B24A6
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_009B24EB NtMapViewOfSection,CloseHandle,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,7_2_009B24EB
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_009B0442 GetModuleHandleA,GetVersion,VirtualAlloc,CloseHandle,SetThreadAffinityMask,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,7_2_009B0442
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_009B0601 CloseHandle,GetModuleHandleA,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CloseHandle,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,CloseHandle,7_2_009B0601
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_009B13C1 LookupPrivilegeValueA,NtAdjustPrivilegesToken,7_2_009B13C1
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_009B23EE NtCreateFile,NtCreateFile,NtCreateFile,NtProtectVirtualMemory,NtWriteVirtualMemory,7_2_009B23EE
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_009B2425 lstrcpyW,lstrlenW,NtCreateSection,7_2_009B2425
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_009B29CC NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,7_2_009B29CC
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_009B29F1 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,7_2_009B29F1
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_009B1399 LookupPrivilegeValueA,NtAdjustPrivilegesToken,7_2_009B1399
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_7FE323EE NtCreateFile,NtCreateFile,NtCreateFile,NtProtectVirtualMemory,NtWriteVirtualMemory,7_2_7FE323EE
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_7FE313C1 LookupPrivilegeValueA,NtAdjustPrivilegesToken,7_2_7FE313C1
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_7FE31399 LookupPrivilegeValueA,NtAdjustPrivilegesToken,7_2_7FE31399
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_7FE30601 CloseHandle,GetModuleHandleA,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,CloseHandle,7_2_7FE30601
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_7FE329F1 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,7_2_7FE329F1
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_7FE329CC NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,7_2_7FE329CC
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_7FE324EB NtMapViewOfSection,CloseHandle,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,7_2_7FE324EB
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_7FE324A6 NtOpenSection,7_2_7FE324A6
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_7FE30442 GetModuleHandleA,GetVersion,VirtualAlloc,CloseHandle,SetThreadAffinityMask,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,7_2_7FE30442
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_7FE32425 lstrcpyW,lstrlenW,NtCreateSection,7_2_7FE32425
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_0042887F NtSetInformationProcess,21_2_0042887F
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_0042212D GetModuleHandleA,GetVersion,VirtualAlloc,CloseHandle,SetProcessAffinityMask,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,21_2_0042212D
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_004241AE lstrcpyW,lstrlenW,NtCreateSection,21_2_004241AE
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_004222F2 CloseHandle,GetModuleHandleA,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,CloseHandle,21_2_004222F2
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_0042314A NtAdjustPrivilegesToken,21_2_0042314A
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_00424177 NtCreateFile,NtCreateFile,NtCreateFile,NtProtectVirtualMemory,NtWriteVirtualMemory,21_2_00424177
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_00423122 NtAdjustPrivilegesToken,21_2_00423122
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_00422E6F LoadLibraryA,GetModuleHandleA,NtAdjustPrivilegesToken,21_2_00422E6F
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_00424274 NtMapViewOfSection,CloseHandle,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,21_2_00424274
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_0042422F NtOpenSection,21_2_0042422F
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_00622477 NtCreateFile,NtCreateFile,NtCreateFile,NtProtectVirtualMemory,NtWriteVirtualMemory,21_2_00622477
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_0062042D GetModuleHandleA,GetVersion,VirtualAlloc,CloseHandle,SetProcessAffinityMask,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,21_2_0062042D
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_0062116F LoadLibraryA,GetModuleHandleA,LookupPrivilegeValueA,NtAdjustPrivilegesToken,21_2_0062116F
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_00622574 NtMapViewOfSection,CloseHandle,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,21_2_00622574
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_0062252F NtOpenSection,21_2_0062252F
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_006205F2 CloseHandle,GetModuleHandleA,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CloseHandle,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,CloseHandle,21_2_006205F2
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_0062144A LookupPrivilegeValueA,NtAdjustPrivilegesToken,21_2_0062144A
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_00621422 LookupPrivilegeValueA,NtAdjustPrivilegesToken,21_2_00621422
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_00623405 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,21_2_00623405
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_006224AE lstrcpyW,lstrlenW,NtCreateSection,21_2_006224AE
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_006233E0 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,21_2_006233E0
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_7FE323EE NtCreateFile,NtCreateFile,NtCreateFile,NtProtectVirtualMemory,NtWriteVirtualMemory,21_2_7FE323EE
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_7FE313C1 LookupPrivilegeValueA,NtAdjustPrivilegesToken,21_2_7FE313C1
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_7FE31399 LookupPrivilegeValueA,NtAdjustPrivilegesToken,21_2_7FE31399
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_7FE30601 CloseHandle,GetModuleHandleA,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,CloseHandle,21_2_7FE30601
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_7FE329F1 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,21_2_7FE329F1
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_7FE329CC NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,21_2_7FE329CC
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_7FE324EB NtMapViewOfSection,CloseHandle,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,21_2_7FE324EB
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_7FE324A6 NtOpenSection,21_2_7FE324A6
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_7FE30442 GetModuleHandleA,GetVersion,VirtualAlloc,CloseHandle,SetThreadAffinityMask,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,21_2_7FE30442
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_7FE32425 lstrcpyW,lstrlenW,NtCreateSection,21_2_7FE32425
            Source: C:\Windows\SysWOW64\zvhcfa.exeCode function: 34_2_00A024A6 NtOpenSection,34_2_00A024A6
            Source: C:\Windows\SysWOW64\zvhcfa.exeCode function: 34_2_00A024EB NtMapViewOfSection,CloseHandle,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,34_2_00A024EB
            Source: C:\Windows\SysWOW64\zvhcfa.exeCode function: 34_2_00A023EE NtCreateFile,NtCreateFile,NtCreateFile,NtProtectVirtualMemory,NtWriteVirtualMemory,34_2_00A023EE
            Source: C:\Windows\SysWOW64\zvhcfa.exeCode function: 34_2_00A013C1 LookupPrivilegeValueA,NtAdjustPrivilegesToken,34_2_00A013C1
            Source: C:\Windows\SysWOW64\zvhcfa.exeCode function: 34_2_00A00601 CloseHandle,GetModuleHandleA,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CloseHandle,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,CloseHandle,34_2_00A00601
            Source: C:\Windows\SysWOW64\zvhcfa.exeCode function: 34_2_00A00442 GetModuleHandleA,GetVersion,VirtualAlloc,CloseHandle,SetThreadAffinityMask,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,34_2_00A00442
            Source: C:\Windows\SysWOW64\zvhcfa.exeCode function: 34_2_00A01399 LookupPrivilegeValueA,NtAdjustPrivilegesToken,34_2_00A01399
            Source: C:\Windows\SysWOW64\zvhcfa.exeCode function: 34_2_00A029F1 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,34_2_00A029F1
            Source: C:\Windows\SysWOW64\zvhcfa.exeCode function: 34_2_00A029CC NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,34_2_00A029CC
            Source: C:\Windows\SysWOW64\zvhcfa.exeCode function: 34_2_00A02425 lstrcpyW,lstrlenW,NtCreateSection,34_2_00A02425
            Source: C:\Windows\SysWOW64\zvhcfa.exeCode function: 34_2_7FE423EE NtCreateFile,NtCreateFile,NtCreateFile,NtProtectVirtualMemory,NtWriteVirtualMemory,34_2_7FE423EE
            Source: C:\Windows\SysWOW64\zvhcfa.exeCode function: 34_2_7FE424EB NtMapViewOfSection,CloseHandle,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,34_2_7FE424EB
            Source: C:\Windows\SysWOW64\zvhcfa.exeCode function: 34_2_7FE429F1 NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,34_2_7FE429F1
            Source: C:\Windows\SysWOW64\zvhcfa.exeCode function: 34_2_7FE413C1 LookupPrivilegeValueA,NtAdjustPrivilegesToken,34_2_7FE413C1
            Source: C:\Windows\SysWOW64\zvhcfa.exeCode function: 34_2_7FE429CC NtOpenSection,NtQuerySystemInformation,MapViewOfFile,CloseHandle,UnmapViewOfFile,34_2_7FE429CC
            Source: C:\Windows\SysWOW64\zvhcfa.exeCode function: 34_2_7FE424A6 NtOpenSection,34_2_7FE424A6
            Source: C:\Windows\SysWOW64\zvhcfa.exeCode function: 34_2_7FE41399 LookupPrivilegeValueA,NtAdjustPrivilegesToken,34_2_7FE41399
            Source: C:\Windows\SysWOW64\zvhcfa.exeCode function: 34_2_7FE40442 GetModuleHandleA,GetVersion,VirtualAlloc,CloseHandle,SetThreadAffinityMask,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,34_2_7FE40442
            Source: C:\Windows\SysWOW64\zvhcfa.exeCode function: 34_2_7FE42425 lstrcpyW,lstrlenW,NtCreateSection,34_2_7FE42425
            Source: C:\Windows\SysWOW64\zvhcfa.exeCode function: 34_2_7FE40601 CloseHandle,GetModuleHandleA,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,CloseHandle,34_2_7FE40601
            Source: C:\Windows\System32\lsass.exeFile created: C:\Windows\system32\Microsoft\Protect\S-1-5-18\User\6cac72b7-3651-45b8-933a-942b0f95b1c5Jump to behavior
            Source: C:\Windows\System32\lsass.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5DJump to behavior
            Source: C:\Windows\System32\lsass.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5DJump to behavior
            Source: C:\Windows\System32\lsass.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5DJump to behavior
            Source: C:\Windows\System32\lsass.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5DJump to behavior
            Source: C:\Windows\System32\lsass.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5DJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpFile created: C:\Windows\SysWOW64\zvhcfa.exeJump to behavior
            Source: C:\Windows\System32\lsass.exeFile deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5DJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_00479CE06_2_00479CE0
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_00479CF76_2_00479CF7
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_00479C836_2_00479C83
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_004788896_2_00478889
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_00479CB16_2_00479CB1
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_00479D0C6_2_00479D0C
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_004771306_2_00477130
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_00479BFE6_2_00479BFE
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_006F116F6_2_006F116F
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_006F3C3D6_2_006F3C3D
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_006F3CF06_2_006F3CF0
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_006F28C86_2_006F28C8
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_006F3CC26_2_006F3CC2
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_006F3D4B6_2_006F3D4B
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_006F3D366_2_006F3D36
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_006F3D1F6_2_006F3D1F
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_7FE341126_2_7FE34112
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_00480E1A7_2_00480E1A
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_009B60A77_2_009B60A7
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_009B41127_2_009B4112
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_7FE341127_2_7FE34112
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_0042593D21_2_0042593D
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_004259C221_2_004259C2
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_004245C821_2_004245C8
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_004259F021_2_004259F0
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_00425A4B21_2_00425A4B
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_00422E6F21_2_00422E6F
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_00425A1F21_2_00425A1F
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_00425A3621_2_00425A36
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_0062116F21_2_0062116F
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_00623C3D21_2_00623C3D
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_00623CF021_2_00623CF0
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_00623CC221_2_00623CC2
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_006228C821_2_006228C8
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_00623D4B21_2_00623D4B
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_00623D3621_2_00623D36
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_00623D1F21_2_00623D1F
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_7FE3411221_2_7FE34112
            Source: C:\Windows\SysWOW64\zvhcfa.exeCode function: 34_2_00A0411234_2_00A04112
            Source: C:\Windows\SysWOW64\zvhcfa.exeCode function: 34_2_7FE4411234_2_7FE44112
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: String function: 00403920 appears 34 times
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: String function: 00403920 appears 34 times
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpCode function: String function: 00403920 appears 34 times
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: String function: 00403920 appears 34 times
            Source: 26B1sczZ88.dllStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
            Source: hrlBAE7.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
            Source: hrl97BF.tmp.3.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
            Source: hrl97AF.tmp.4.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
            Source: hrlA367.tmp.20.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
            Source: hrlAF3E.tmp.28.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
            Source: zvhcfa.exe.30.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
            Source: hrl97AF.tmp.4.drStatic PE information: Number of sections : 13 > 10
            Source: hrl97BF.tmp.3.drStatic PE information: Number of sections : 13 > 10
            Source: hrlBAE7.tmp.0.drStatic PE information: Number of sections : 13 > 10
            Source: zvhcfa.exe.30.drStatic PE information: Number of sections : 13 > 10
            Source: hrlAF3E.tmp.28.drStatic PE information: Number of sections : 13 > 10
            Source: hrlA367.tmp.20.drStatic PE information: Number of sections : 13 > 10
            Source: 26B1sczZ88.dllBinary or memory string: OriginalFilenameserver.EXE8 vs 26B1sczZ88.dll
            Source: 26B1sczZ88.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
            Source: 26B1sczZ88.dll, type: SAMPLEMatched rule: CN_disclosed_20180208_Mal1 date = 2018-02-08, hash1 = 173d69164a6df5bced94ab7016435c128ccf7156145f5d26ca59652ef5dcd24e, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 26B1sczZ88.dll, type: SAMPLEMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: 3.2.rundll32.exe.10004090.1.unpack, type: UNPACKEDPEMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: 30.0.hrlAF3E.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_Mal1 date = 2018-02-08, hash1 = 173d69164a6df5bced94ab7016435c128ccf7156145f5d26ca59652ef5dcd24e, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 30.0.hrlAF3E.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: 20.2.rundll32.exe.10004090.2.raw.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_Mal1 date = 2018-02-08, hash1 = 173d69164a6df5bced94ab7016435c128ccf7156145f5d26ca59652ef5dcd24e, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 20.2.rundll32.exe.10004090.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: 21.2.hrlA367.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_Mal1 date = 2018-02-08, hash1 = 173d69164a6df5bced94ab7016435c128ccf7156145f5d26ca59652ef5dcd24e, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 21.2.hrlA367.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: 0.2.loaddll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_Mal1 date = 2018-02-08, hash1 = 173d69164a6df5bced94ab7016435c128ccf7156145f5d26ca59652ef5dcd24e, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.loaddll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: 34.0.zvhcfa.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_Mal1 date = 2018-02-08, hash1 = 173d69164a6df5bced94ab7016435c128ccf7156145f5d26ca59652ef5dcd24e, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 34.0.zvhcfa.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: 7.2.hrl97AF.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_Mal1 date = 2018-02-08, hash1 = 173d69164a6df5bced94ab7016435c128ccf7156145f5d26ca59652ef5dcd24e, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 7.2.hrl97AF.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: 20.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_Mal1 date = 2018-02-08, hash1 = 173d69164a6df5bced94ab7016435c128ccf7156145f5d26ca59652ef5dcd24e, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 20.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: 30.2.hrlAF3E.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_Mal1 date = 2018-02-08, hash1 = 173d69164a6df5bced94ab7016435c128ccf7156145f5d26ca59652ef5dcd24e, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 30.2.hrlAF3E.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: 0.2.loaddll32.exe.10004090.1.unpack, type: UNPACKEDPEMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: 20.2.rundll32.exe.10004090.2.unpack, type: UNPACKEDPEMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: 4.2.rundll32.exe.10004090.1.unpack, type: UNPACKEDPEMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: 7.0.hrl97AF.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_Mal1 date = 2018-02-08, hash1 = 173d69164a6df5bced94ab7016435c128ccf7156145f5d26ca59652ef5dcd24e, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 7.0.hrl97AF.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: 3.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_Mal1 date = 2018-02-08, hash1 = 173d69164a6df5bced94ab7016435c128ccf7156145f5d26ca59652ef5dcd24e, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 3.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: 28.2.rundll32.exe.10004090.1.raw.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_Mal1 date = 2018-02-08, hash1 = 173d69164a6df5bced94ab7016435c128ccf7156145f5d26ca59652ef5dcd24e, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 28.2.rundll32.exe.10004090.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: 4.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_Mal1 date = 2018-02-08, hash1 = 173d69164a6df5bced94ab7016435c128ccf7156145f5d26ca59652ef5dcd24e, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 4.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: 28.2.rundll32.exe.10004090.1.unpack, type: UNPACKEDPEMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: 6.0.hrl97BF.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_Mal1 date = 2018-02-08, hash1 = 173d69164a6df5bced94ab7016435c128ccf7156145f5d26ca59652ef5dcd24e, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 6.0.hrl97BF.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: 21.0.hrlA367.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_Mal1 date = 2018-02-08, hash1 = 173d69164a6df5bced94ab7016435c128ccf7156145f5d26ca59652ef5dcd24e, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 21.0.hrlA367.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: 28.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_Mal1 date = 2018-02-08, hash1 = 173d69164a6df5bced94ab7016435c128ccf7156145f5d26ca59652ef5dcd24e, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 28.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: 4.2.rundll32.exe.10004090.1.raw.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_Mal1 date = 2018-02-08, hash1 = 173d69164a6df5bced94ab7016435c128ccf7156145f5d26ca59652ef5dcd24e, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 4.2.rundll32.exe.10004090.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: 34.2.zvhcfa.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_Mal1 date = 2018-02-08, hash1 = 173d69164a6df5bced94ab7016435c128ccf7156145f5d26ca59652ef5dcd24e, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 34.2.zvhcfa.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: 6.2.hrl97BF.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_Mal1 date = 2018-02-08, hash1 = 173d69164a6df5bced94ab7016435c128ccf7156145f5d26ca59652ef5dcd24e, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 6.2.hrl97BF.tmp.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: 0.2.loaddll32.exe.10004090.1.raw.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_Mal1 date = 2018-02-08, hash1 = 173d69164a6df5bced94ab7016435c128ccf7156145f5d26ca59652ef5dcd24e, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.loaddll32.exe.10004090.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: 3.2.rundll32.exe.10004090.1.raw.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_Mal1 date = 2018-02-08, hash1 = 173d69164a6df5bced94ab7016435c128ccf7156145f5d26ca59652ef5dcd24e, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 3.2.rundll32.exe.10004090.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: C:\Users\user\AppData\Local\Temp\hrlBAE7.tmp, type: DROPPEDMatched rule: CN_disclosed_20180208_Mal1 date = 2018-02-08, hash1 = 173d69164a6df5bced94ab7016435c128ccf7156145f5d26ca59652ef5dcd24e, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: C:\Users\user\AppData\Local\Temp\hrlBAE7.tmp, type: DROPPEDMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmp, type: DROPPEDMatched rule: CN_disclosed_20180208_Mal1 date = 2018-02-08, hash1 = 173d69164a6df5bced94ab7016435c128ccf7156145f5d26ca59652ef5dcd24e, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmp, type: DROPPEDMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmp, type: DROPPEDMatched rule: CN_disclosed_20180208_Mal1 date = 2018-02-08, hash1 = 173d69164a6df5bced94ab7016435c128ccf7156145f5d26ca59652ef5dcd24e, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmp, type: DROPPEDMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmp, type: DROPPEDMatched rule: CN_disclosed_20180208_Mal1 date = 2018-02-08, hash1 = 173d69164a6df5bced94ab7016435c128ccf7156145f5d26ca59652ef5dcd24e, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmp, type: DROPPEDMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmp, type: DROPPEDMatched rule: CN_disclosed_20180208_Mal1 date = 2018-02-08, hash1 = 173d69164a6df5bced94ab7016435c128ccf7156145f5d26ca59652ef5dcd24e, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmp, type: DROPPEDMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: C:\Windows\SysWOW64\zvhcfa.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_Mal1 date = 2018-02-08, hash1 = 173d69164a6df5bced94ab7016435c128ccf7156145f5d26ca59652ef5dcd24e, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: C:\Windows\SysWOW64\zvhcfa.exe, type: DROPPEDMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
            Source: Microsoft-Windows-SmbClient%4Connectivity.evtx.25.drBinary string: \Device\LanmanRedirector
            Source: Microsoft-Windows-CodeIntegrity%4Operational.evtx.25.drBinary string: J\Device\HarddiskVolume3\Users\user\AppData\Local\Temp\JSAMSIProvider64.dll6\Device\HarddiskVolume3\Windows\System32\SIHClient.exe
            Source: Microsoft-Windows-CodeIntegrity%4Operational.evtx.25.drBinary string: J\Device\HarddiskVolume3\Program Files (x86)\Joebox\driver\joeboxdriver.sys
            Source: Security.evtx.25.drBinary string: \Device\HarddiskVolume3\Windows\System32\drivers\filetrace.sysows
            Source: System.evtx.25.drBinary string: \Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exeH
            Source: Microsoft-Windows-SMBServer%4Operational.evtx.25.drBinary string: user-PC WORKGROUP:\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1}
            Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.25.drBinary string: 1\Device\HarddiskVolume3\Windows\System32\curl.exe?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exeH**
            Source: Microsoft-Windows-Security-Mitigations%4KernelMode.evtx.25.drBinary string: A\Device\HarddiskVolume3\Program Files\Mozilla Firefox\firefox.exe
            Source: Microsoft-Windows-SMBServer%4Operational.evtx.25.drBinary string: DESKTOP-AGET0TR WORKGROUP:\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1}
            Source: Microsoft-Windows-SMBServer%4Operational.evtx.25.drBinary string: TINQ-PC WORKGROUP:\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1}
            Source: Security.evtx.25.drBinary string: \Device\HarddiskVolume3\Program Files (x86)\Joebox\driver\joeboxdriver.sysi
            Source: Microsoft-Windows-CodeIntegrity%4Operational.evtx.25.drBinary string: >\Device\HarddiskVolume3\Windows\System32\drivers\filetrace.sys
            Source: Microsoft-Windows-SMBServer%4Operational.evtx.25.drBinary string: \Device\NetbiosSmb
            Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.25.drBinary string: 9\Device\HarddiskVolume3\Windows\System32\msvcp110_win.dll?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
            Source: System.evtx.25.drBinary string: \\?\Volume{5d0fa9fb-e2e8-4263-a849-b22baad6d1d8}\Device\HarddiskVolume4
            Source: Microsoft-Windows-Security-Mitigations%4KernelMode.evtx.25.drBinary string: T\Device\HarddiskVolume3\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
            Source: System.evtx.25.drBinary string: \Device\HarddiskVolume3\Windows\SysWOW64\tzutil.exe(
            Source: Microsoft-Windows-SmbClient%4Connectivity.evtx.25.drBinary string: \Device\LanmanRedirectorH
            Source: System.evtx.25.drBinary string: C:\Device\HarddiskVolume3
            Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.25.drBinary string: 1\Device\HarddiskVolume3\Windows\SysWOW64\curl.exe?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
            Source: Microsoft-Windows-SmbClient%4Connectivity.evtx.25.drBinary string: :\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1}
            Source: Microsoft-Windows-SMBServer%4Operational.evtx.25.drBinary string: WIN-77KHDDR6TT1 WORKGROUP:\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1}
            Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.25.drBinary string: 1\Device\HarddiskVolume3\Windows\System32\curl.exe?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
            Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.25.drBinary string: 9\Device\HarddiskVolume3\Windows\SysWOW64\msvcp110_win.dll?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
            Source: classification engineClassification label: mal100.troj.evad.winDLL@25/72@0/0
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpCode function: LoadLibraryA,GetProcAddress,GetSystemDirectoryA,strncmp,wsprintfA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,lstrcpyA,lstrcatA,OpenSCManagerA,CreateServiceA,GetLastError,StartServiceA,StartServiceA,lstrcpyA,lstrcatA,lstrlenA,30_2_00402B40
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_004765B3 CloseHandle,GetModuleHandleA,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,CloseHandle,6_2_004765B3
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10001193 FindResourceW,SizeofResource,LoadResource,LockResource,GetTempPathW,GetTempFileNameW,CreateFileW,WriteFile,CloseHandle,CloseHandle,RtlZeroMemory,CreateProcessW,CloseHandle,CloseHandle,0_2_10001193
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpCode function: 30_2_00402B40 LoadLibraryA,GetProcAddress,GetSystemDirectoryA,strncmp,wsprintfA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,lstrcpyA,lstrcatA,OpenSCManagerA,CreateServiceA,GetLastError,StartServiceA,StartServiceA,lstrcpyA,lstrcatA,lstrlenA,30_2_00402B40
            Source: C:\Windows\System32\lsass.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Protect\S-1-5-21-2246122658-3693405117-2476756634-1003\1306eb95-1ab6-43bf-b773-ac80ff75f2fcJump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4992:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6472:120:WilError_03
            Source: C:\Windows\SysWOW64\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\100200
            Source: C:\Windows\System32\loaddll32.exeFile created: C:\Users\user\AppData\Local\Temp\hrlBAE7.tmpJump to behavior
            Source: 26B1sczZ88.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\26B1sczZ88.dll,LpkDllInitialize
            Source: 26B1sczZ88.dllReversingLabs: Detection: 97%
            Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\26B1sczZ88.dll"
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\26B1sczZ88.dll",#1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\26B1sczZ88.dll,LpkDllInitialize
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\26B1sczZ88.dll",#1
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Users\user\AppData\Local\Temp\hrl97BF.tmp C:\Users\user\AppData\Local\Temp\hrl97BF.tmp
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Users\user\AppData\Local\Temp\hrl97AF.tmp C:\Users\user\AppData\Local\Temp\hrl97AF.tmp
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\26B1sczZ88.dll,LpkDrawTextEx
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Users\user\AppData\Local\Temp\hrlA367.tmp C:\Users\user\AppData\Local\Temp\hrlA367.tmp
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\26B1sczZ88.dll,LpkEditControl
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmp C:\Users\user\AppData\Local\Temp\hrlAF3E.tmp
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /f /im ZhuDongFangYu.exe /t
            Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Windows\SysWOW64\zvhcfa.exe C:\Windows\SysWOW64\zvhcfa.exe
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\26B1sczZ88.dll",#1Jump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\26B1sczZ88.dll,LpkDllInitializeJump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\26B1sczZ88.dll,LpkDrawTextExJump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\26B1sczZ88.dll,LpkEditControlJump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\26B1sczZ88.dll",#1Jump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Users\user\AppData\Local\Temp\hrl97BF.tmp C:\Users\user\AppData\Local\Temp\hrl97BF.tmpJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Users\user\AppData\Local\Temp\hrl97AF.tmp C:\Users\user\AppData\Local\Temp\hrl97AF.tmpJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Users\user\AppData\Local\Temp\hrlA367.tmp C:\Users\user\AppData\Local\Temp\hrlA367.tmpJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmp C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /f /im ZhuDongFangYu.exe /tJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: lpk.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: mfc42.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: mfc42.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\System32\lsass.exeSection loaded: ngcpopkeysrv.dllJump to behavior
            Source: C:\Windows\System32\lsass.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Windows\System32\lsass.exeSection loaded: pcpksp.dllJump to behavior
            Source: C:\Windows\System32\lsass.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\System32\lsass.exeSection loaded: tbs.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: mfc42.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpSection loaded: mfc42.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\zvhcfa.exeSection loaded: apphelp.dll
            Source: C:\Windows\SysWOW64\zvhcfa.exeSection loaded: mfc42.dll
            Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdbll source: svchost.exe, 00000018.00000000.1526926841.000002258EC2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2756312554.000002258EC2B000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: @C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000018.00000002.2758587508.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1527020756.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\wctD1EA.tmp.pdb source: svchost.exe, 00000018.00000002.2758587508.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1527020756.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb* source: svchost.exe, 00000018.00000000.1526971073.000002258EC42000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2757685837.000002258EC42000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000018.00000002.2758587508.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1527020756.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: $@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb837 source: svchost.exe, 00000018.00000002.2758587508.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1527020756.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000018.00000000.1526926841.000002258EC2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2756312554.000002258EC2B000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000018.00000000.1526971073.000002258EC42000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2757685837.000002258EC42000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\wct495D.tmp.pdb\* source: svchost.exe, 00000018.00000002.2758587508.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1527020756.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: .@C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000018.00000000.1526926841.000002258EC2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2756312554.000002258EC2B000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.errorl source: svchost.exe, 00000018.00000000.1526926841.000002258EC2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2756312554.000002258EC2B000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\wmsetup.log.pdb source: svchost.exe, 00000018.00000002.2758587508.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1527020756.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb949 source: svchost.exe, 00000018.00000000.1526971073.000002258EC42000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2757685837.000002258EC42000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: &@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000018.00000000.1526926841.000002258EC2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2756312554.000002258EC2B000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000018.00000000.1526971073.000002258EC42000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2757685837.000002258EC42000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A583178b @ source: svchost.exe, 00000018.00000000.1526971073.000002258EC42000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2757685837.000002258EC42000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\wct102E.tmp.pdb source: svchost.exe, 00000018.00000002.2758587508.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1527020756.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: &@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000018.00000000.1526926841.000002258EC2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.2756312554.000002258EC2B000.00000004.00000001.00020000.00000000.sdmp
            Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000018.00000002.2758587508.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.1527020756.000002258EC5C000.00000004.00000001.00020000.00000000.sdmp
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_00402430 FindResourceA,LoadLibraryA,GetProcAddress,LoadResource,LockResource,CreateFileA,WriteFile,CloseHandle,6_2_00402430
            Source: initial sampleStatic PE information: section where entry point is pointing to: uuxeujz
            Source: hrlBAE7.tmp.0.drStatic PE information: section name: rhxpypg
            Source: hrlBAE7.tmp.0.drStatic PE information: section name: xcmhltj
            Source: hrlBAE7.tmp.0.drStatic PE information: section name: hnrxhix
            Source: hrlBAE7.tmp.0.drStatic PE information: section name: woslvkg
            Source: hrlBAE7.tmp.0.drStatic PE information: section name: eszpqhx
            Source: hrlBAE7.tmp.0.drStatic PE information: section name: orzkedv
            Source: hrlBAE7.tmp.0.drStatic PE information: section name: zwezcbc
            Source: hrlBAE7.tmp.0.drStatic PE information: section name: uuxeujz
            Source: hrlBAE7.tmp.0.drStatic PE information: section name: xgmlxsd
            Source: hrl97BF.tmp.3.drStatic PE information: section name: rhxpypg
            Source: hrl97BF.tmp.3.drStatic PE information: section name: xcmhltj
            Source: hrl97BF.tmp.3.drStatic PE information: section name: hnrxhix
            Source: hrl97BF.tmp.3.drStatic PE information: section name: woslvkg
            Source: hrl97BF.tmp.3.drStatic PE information: section name: eszpqhx
            Source: hrl97BF.tmp.3.drStatic PE information: section name: orzkedv
            Source: hrl97BF.tmp.3.drStatic PE information: section name: zwezcbc
            Source: hrl97BF.tmp.3.drStatic PE information: section name: uuxeujz
            Source: hrl97BF.tmp.3.drStatic PE information: section name: xgmlxsd
            Source: hrl97AF.tmp.4.drStatic PE information: section name: rhxpypg
            Source: hrl97AF.tmp.4.drStatic PE information: section name: xcmhltj
            Source: hrl97AF.tmp.4.drStatic PE information: section name: hnrxhix
            Source: hrl97AF.tmp.4.drStatic PE information: section name: woslvkg
            Source: hrl97AF.tmp.4.drStatic PE information: section name: eszpqhx
            Source: hrl97AF.tmp.4.drStatic PE information: section name: orzkedv
            Source: hrl97AF.tmp.4.drStatic PE information: section name: zwezcbc
            Source: hrl97AF.tmp.4.drStatic PE information: section name: uuxeujz
            Source: hrl97AF.tmp.4.drStatic PE information: section name: xgmlxsd
            Source: hrlA367.tmp.20.drStatic PE information: section name: rhxpypg
            Source: hrlA367.tmp.20.drStatic PE information: section name: xcmhltj
            Source: hrlA367.tmp.20.drStatic PE information: section name: hnrxhix
            Source: hrlA367.tmp.20.drStatic PE information: section name: woslvkg
            Source: hrlA367.tmp.20.drStatic PE information: section name: eszpqhx
            Source: hrlA367.tmp.20.drStatic PE information: section name: orzkedv
            Source: hrlA367.tmp.20.drStatic PE information: section name: zwezcbc
            Source: hrlA367.tmp.20.drStatic PE information: section name: uuxeujz
            Source: hrlA367.tmp.20.drStatic PE information: section name: xgmlxsd
            Source: hrlAF3E.tmp.28.drStatic PE information: section name: rhxpypg
            Source: hrlAF3E.tmp.28.drStatic PE information: section name: xcmhltj
            Source: hrlAF3E.tmp.28.drStatic PE information: section name: hnrxhix
            Source: hrlAF3E.tmp.28.drStatic PE information: section name: woslvkg
            Source: hrlAF3E.tmp.28.drStatic PE information: section name: eszpqhx
            Source: hrlAF3E.tmp.28.drStatic PE information: section name: orzkedv
            Source: hrlAF3E.tmp.28.drStatic PE information: section name: zwezcbc
            Source: hrlAF3E.tmp.28.drStatic PE information: section name: uuxeujz
            Source: hrlAF3E.tmp.28.drStatic PE information: section name: xgmlxsd
            Source: zvhcfa.exe.30.drStatic PE information: section name: rhxpypg
            Source: zvhcfa.exe.30.drStatic PE information: section name: xcmhltj
            Source: zvhcfa.exe.30.drStatic PE information: section name: hnrxhix
            Source: zvhcfa.exe.30.drStatic PE information: section name: woslvkg
            Source: zvhcfa.exe.30.drStatic PE information: section name: eszpqhx
            Source: zvhcfa.exe.30.drStatic PE information: section name: orzkedv
            Source: zvhcfa.exe.30.drStatic PE information: section name: zwezcbc
            Source: zvhcfa.exe.30.drStatic PE information: section name: uuxeujz
            Source: zvhcfa.exe.30.drStatic PE information: section name: xgmlxsd
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_00405B70 push eax; ret 6_2_00405B9E
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_00405B70 push eax; ret 7_2_00405B9E
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_00405B70 push eax; ret 21_2_00405B9E
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpCode function: 30_2_00405B70 push eax; ret 30_2_00405B9E
            Source: hrlBAE7.tmp.0.drStatic PE information: section name: .rsrc entropy: 7.492461511063864
            Source: hrlBAE7.tmp.0.drStatic PE information: section name: rhxpypg entropy: 7.63278169353373
            Source: hrlBAE7.tmp.0.drStatic PE information: section name: xcmhltj entropy: 7.631443406476418
            Source: hrlBAE7.tmp.0.drStatic PE information: section name: hnrxhix entropy: 7.6346675642622985
            Source: hrlBAE7.tmp.0.drStatic PE information: section name: woslvkg entropy: 7.637402478191515
            Source: hrlBAE7.tmp.0.drStatic PE information: section name: eszpqhx entropy: 7.635747701568092
            Source: hrlBAE7.tmp.0.drStatic PE information: section name: orzkedv entropy: 7.636407908522585
            Source: hrlBAE7.tmp.0.drStatic PE information: section name: zwezcbc entropy: 7.625644621095766
            Source: hrlBAE7.tmp.0.drStatic PE information: section name: uuxeujz entropy: 7.629124904063967
            Source: hrl97BF.tmp.3.drStatic PE information: section name: .rsrc entropy: 7.492461511063864
            Source: hrl97BF.tmp.3.drStatic PE information: section name: rhxpypg entropy: 7.63278169353373
            Source: hrl97BF.tmp.3.drStatic PE information: section name: xcmhltj entropy: 7.631443406476418
            Source: hrl97BF.tmp.3.drStatic PE information: section name: hnrxhix entropy: 7.6346675642622985
            Source: hrl97BF.tmp.3.drStatic PE information: section name: woslvkg entropy: 7.637402478191515
            Source: hrl97BF.tmp.3.drStatic PE information: section name: eszpqhx entropy: 7.635747701568092
            Source: hrl97BF.tmp.3.drStatic PE information: section name: orzkedv entropy: 7.636407908522585
            Source: hrl97BF.tmp.3.drStatic PE information: section name: zwezcbc entropy: 7.625644621095766
            Source: hrl97BF.tmp.3.drStatic PE information: section name: uuxeujz entropy: 7.629124904063967
            Source: hrl97AF.tmp.4.drStatic PE information: section name: .rsrc entropy: 7.492461511063864
            Source: hrl97AF.tmp.4.drStatic PE information: section name: rhxpypg entropy: 7.63278169353373
            Source: hrl97AF.tmp.4.drStatic PE information: section name: xcmhltj entropy: 7.631443406476418
            Source: hrl97AF.tmp.4.drStatic PE information: section name: hnrxhix entropy: 7.6346675642622985
            Source: hrl97AF.tmp.4.drStatic PE information: section name: woslvkg entropy: 7.637402478191515
            Source: hrl97AF.tmp.4.drStatic PE information: section name: eszpqhx entropy: 7.635747701568092
            Source: hrl97AF.tmp.4.drStatic PE information: section name: orzkedv entropy: 7.636407908522585
            Source: hrl97AF.tmp.4.drStatic PE information: section name: zwezcbc entropy: 7.625644621095766
            Source: hrl97AF.tmp.4.drStatic PE information: section name: uuxeujz entropy: 7.629124904063967
            Source: hrlA367.tmp.20.drStatic PE information: section name: .rsrc entropy: 7.492461511063864
            Source: hrlA367.tmp.20.drStatic PE information: section name: rhxpypg entropy: 7.63278169353373
            Source: hrlA367.tmp.20.drStatic PE information: section name: xcmhltj entropy: 7.631443406476418
            Source: hrlA367.tmp.20.drStatic PE information: section name: hnrxhix entropy: 7.6346675642622985
            Source: hrlA367.tmp.20.drStatic PE information: section name: woslvkg entropy: 7.637402478191515
            Source: hrlA367.tmp.20.drStatic PE information: section name: eszpqhx entropy: 7.635747701568092
            Source: hrlA367.tmp.20.drStatic PE information: section name: orzkedv entropy: 7.636407908522585
            Source: hrlA367.tmp.20.drStatic PE information: section name: zwezcbc entropy: 7.625644621095766
            Source: hrlA367.tmp.20.drStatic PE information: section name: uuxeujz entropy: 7.629124904063967
            Source: hrlAF3E.tmp.28.drStatic PE information: section name: .rsrc entropy: 7.492461511063864
            Source: hrlAF3E.tmp.28.drStatic PE information: section name: rhxpypg entropy: 7.63278169353373
            Source: hrlAF3E.tmp.28.drStatic PE information: section name: xcmhltj entropy: 7.631443406476418
            Source: hrlAF3E.tmp.28.drStatic PE information: section name: hnrxhix entropy: 7.6346675642622985
            Source: hrlAF3E.tmp.28.drStatic PE information: section name: woslvkg entropy: 7.637402478191515
            Source: hrlAF3E.tmp.28.drStatic PE information: section name: eszpqhx entropy: 7.635747701568092
            Source: hrlAF3E.tmp.28.drStatic PE information: section name: orzkedv entropy: 7.636407908522585
            Source: hrlAF3E.tmp.28.drStatic PE information: section name: zwezcbc entropy: 7.625644621095766
            Source: hrlAF3E.tmp.28.drStatic PE information: section name: uuxeujz entropy: 7.629124904063967
            Source: zvhcfa.exe.30.drStatic PE information: section name: .rsrc entropy: 7.492461511063864
            Source: zvhcfa.exe.30.drStatic PE information: section name: rhxpypg entropy: 7.63278169353373
            Source: zvhcfa.exe.30.drStatic PE information: section name: xcmhltj entropy: 7.631443406476418
            Source: zvhcfa.exe.30.drStatic PE information: section name: hnrxhix entropy: 7.6346675642622985
            Source: zvhcfa.exe.30.drStatic PE information: section name: woslvkg entropy: 7.637402478191515
            Source: zvhcfa.exe.30.drStatic PE information: section name: eszpqhx entropy: 7.635747701568092
            Source: zvhcfa.exe.30.drStatic PE information: section name: orzkedv entropy: 7.636407908522585
            Source: zvhcfa.exe.30.drStatic PE information: section name: zwezcbc entropy: 7.625644621095766
            Source: zvhcfa.exe.30.drStatic PE information: section name: uuxeujz entropy: 7.629124904063967

            Persistence and Installation Behavior

            barindex
            Source: C:\Windows\System32\lsass.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5DJump to behavior
            Source: C:\Windows\System32\lsass.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5DJump to behavior
            Source: C:\Windows\System32\lsass.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5DJump to behavior
            Source: C:\Windows\System32\lsass.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5DJump to behavior
            Source: C:\Windows\System32\lsass.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5DJump to behavior
            Source: unknownExecutable created and started: C:\Windows\SysWOW64\zvhcfa.exe
            Source: C:\Windows\System32\lsass.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
            Source: C:\Windows\System32\lsass.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpJump to dropped file
            Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\hrlA367.tmpJump to dropped file
            Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpFile created: C:\Users\user\AppData\Local\Temp\SOFTWARE.LOG (copy)Jump to dropped file
            Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpJump to dropped file
            Source: C:\Windows\System32\loaddll32.exeFile created: C:\Users\user\AppData\Local\Temp\hrlBAE7.tmpJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpFile created: C:\Windows\SysWOW64\zvhcfa.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpFile created: C:\Windows\SysWOW64\zvhcfa.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpCode function: 30_2_00402B40 LoadLibraryA,GetProcAddress,GetSystemDirectoryA,strncmp,wsprintfA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,lstrcpyA,lstrcatA,OpenSCManagerA,CreateServiceA,GetLastError,StartServiceA,StartServiceA,lstrcpyA,lstrcatA,lstrlenA,30_2_00402B40
            Source: C:\Windows\System32\lsass.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\zvhcfa.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\zvhcfa.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\zvhcfa.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_0047A1396_2_0047A139
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_006F41786_2_006F4178
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_0062417821_2_00624178
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpEvasive API call chain: CreateMutex,DecisionNodes,ExitProcess
            Source: C:\Windows\SysWOW64\rundll32.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_3-214
            Source: C:\Windows\System32\loaddll32.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_0-214
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpEvasive API call chain: GetVolumeInformation,DecisionNodes,Sleepgraph_7-13632
            Source: C:\Windows\SysWOW64\zvhcfa.exeEvasive API call chain: GetVolumeInformation,DecisionNodes,Sleep
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpEvasive API call chain: GetVolumeInformation,DecisionNodes,Sleepgraph_6-12314
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpEvasive API call chain: GetVolumeInformation,DecisionNodes,Sleepgraph_21-12172
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSpecial instruction interceptor: First address: 482DD0 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSpecial instruction interceptor: First address: 47D1FB instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSpecial instruction interceptor: First address: 4764A5 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSpecial instruction interceptor: First address: 428877 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSpecial instruction interceptor: First address: 4221E4 instructions caused by: Self-modifying code
            Source: C:\Windows\SysWOW64\zvhcfa.exeSpecial instruction interceptor: First address: 482DD0 instructions caused by: Self-modifying code
            Source: C:\Windows\SysWOW64\zvhcfa.exeSpecial instruction interceptor: First address: 47D1FB instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_004763EE rdtsc 6_2_004763EE
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_7-14541
            Source: C:\Windows\SysWOW64\zvhcfa.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpAPI coverage: 6.7 %
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpAPI coverage: 8.1 %
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpAPI coverage: 8.6 %
            Source: C:\Windows\SysWOW64\zvhcfa.exeAPI coverage: 5.4 %
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_0062417821_2_00624178
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_006F41786_2_006F4178
            Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10001677 WaitForSingleObject,wsprintfW,lstrcpyW,lstrcpyW,lstrcpyW,lstrcpyW,PathAppendW,PathAppendW,FindFirstFileW,lstrcpyW,lstrcmpiW,lstrcmpiW,lstrcmpiW,WaitForSingleObject,lstrcpyW,PathAppendW,FindClose,PathFindExtensionW,lstrcmpiW,lstrcpyW,PathAppendW,GetFileAttributesW,CopyFileW,SetFileAttributesW,lstrcmpiW,lstrcmpiW,lstrcpyW,PathAppendW,WaitForSingleObject,FindNextFileW,0_2_10001677
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10001677 WaitForSingleObject,wsprintfW,lstrcpyW,lstrcpyW,lstrcpyW,lstrcpyW,PathAppendW,PathAppendW,FindFirstFileW,lstrcpyW,lstrcmpiW,lstrcmpiW,lstrcmpiW,WaitForSingleObject,lstrcpyW,PathAppendW,FindClose,PathFindExtensionW,lstrcmpiW,lstrcpyW,PathAppendW,GetFileAttributesW,CopyFileW,SetFileAttributesW,lstrcmpiW,lstrcmpiW,lstrcpyW,PathAppendW,WaitForSingleObject,FindNextFileW,3_2_10001677
            Source: Microsoft-Windows-Partition%4Diagnostic.evtx.25.drBinary or memory string: VMwareVirtual disk2.06000c29ca78922693ae6540a85b54b51PCI Slot 32 : Bus 2 : Device 0 : Function 0 : Adapter 0 : Port 0 : Target 0 : LUN 0PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218e0f40&0&00
            Source: svchost.exe, 00000019.00000002.2757622594.0000026F53E2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.1541947592.0000026F53E2B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @Microsoft-Windows-Hyper-V-Hypervisor
            Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.25.drBinary or memory string: nonicVMware Virtual disk 6000c29ca78922693ae6540a85b54b51
            Source: svchost.exe, 00000019.00000000.1542081602.0000026F53E43000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: (@vmci
            Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.25.drBinary or memory string: VMware SATA CD00
            Source: svchost.exe, 00000017.00000002.2760959586.000002938A82B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: zSCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000_0r
            Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.25.drBinary or memory string: NECVMWarVMware SATA CD00
            Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.25.drBinary or memory string: LSI_SASVMware Virtual disk 6000c2942fce4d06663969f532e45d1a
            Source: svchost.exe, 0000000D.00000002.2760164410.0000013A22413000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000D.00000000.1499277820.0000013A22413000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: Microsoft-Windows-Storsvc%4Diagnostic.evtx.25.drBinary or memory string: VMware Virtual disk 2.0 6000c29ca78922693ae6540a85b54b51PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218E0F40&0&00NTFS
            Source: Microsoft-Windows-Storsvc%4Diagnostic.evtx.25.drBinary or memory string: VMware Virtual disk 2.0 6000c2942fce4d06663969f532e45d1aPCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218E0F40&0&00NTFS
            Source: Microsoft-Windows-StorageSpaces-Driver%4Operational.evtx.25.drBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1ap
            Source: svchost.exe, 00000019.00000000.1545950482.0000026F54800000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $value = $pr.Value.replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("VMware Virtual disk", $value).replace("VMware", $value).replace("HARDDISK", "WDC").replace("VIRTUAL_DISK", $value)
            Source: svchost.exe, 0000000E.00000002.2755481906.0000014E2522A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
            Source: System.evtx.25.drBinary or memory string: VMCI: Using capabilities (0x1c).
            Source: svchost.exe, 00000019.00000003.1548329679.0000026F56212000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $value = $pr.Value.replace("VEN_80EE", $value).replace("VEN_15AD", $value).replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("82801FB", $value).replace("82441FX", $value).replace("82371SB", $value).replace("OpenHCD", $value).replace("VMWare", $value).replace("VMware", $value)
            Source: svchost.exe, 0000000A.00000000.1495785024.000001A31C039000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmicshutdown
            Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.25.drBinary or memory string: nonicNECVMWarVMware SATA CD00
            Source: Microsoft-Windows-StorageSpaces-Driver%4Operational.evtx.25.drBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a@
            Source: svchost.exe, 0000000A.00000000.1495275011.000001A31BA33000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmicvss
            Source: svchost.exe, 0000000A.00000000.1495275011.000001A31BA33000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $@vmicshutdown
            Source: Microsoft-Windows-Ntfs%4Operational.evtx.25.drBinary or memory string: VMware
            Source: svchost.exe, 00000019.00000000.1545950482.0000026F54800000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: if(($pr.Name -eq "Caption" -or $pr.Name -eq "Name" -or $pr.Name -eq "PNPDeviceID" -or $pr.Name -eq "AdapterCompatibility" -or $pr.Name -eq "Description" -or $pr.Name -eq "InfSection" -or $pr.Name -eq "VideoProcessor") -and ($pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VirtualBox' -or $pr.Value -match 'VMware' -or $pr.Value -match 'Oracle Corporation' -or $pr.Value -match 'Microsoft Basic Display Adapter'))
            Source: svchost.exe, 0000000A.00000000.1495275011.000001A31BA33000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @vmicshutdown
            Source: svchost.exe, 0000000A.00000000.1495785024.000001A31C039000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
            Source: svchost.exe, 00000019.00000003.1548329679.0000026F56212000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: if(($pr.Name -eq "DeviceId" -or $pr.Name -eq "Caption" -or $pr.Name -eq "Name" -or $pr.Name -eq "PNPDeviceID" -or $pr.Name -eq "Service" -or $pr.Name -eq "Description") -and ($pr.Value -match 'VEN_80EE' -or $pr.Value -match 'VEN_15AD' -or $pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VMWare' -or $pr.Value -match 'VMware' -or $pr.Value -match '82801FB' -or $pr.Value -match '82441FX' -or $pr.Value -match '82371SB' -or $pr.Value -match 'OpenHCD'))
            Source: dwm.exe, 0000000F.00000002.2810768629.00000283DDE43000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&0000007R
            Source: Microsoft-Windows-StorageSpaces-Driver%4Operational.evtx.25.drBinary or memory string: ~VMwareVirtual disk6000c29ca78922693ae6540a85b54b510
            Source: lsass.exe, 00000009.00000002.2763076804.000002A290A88000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicvssNT SERVICE
            Source: svchost.exe, 00000019.00000002.2767956318.0000026F545E0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: ~VMwareVirtual disk6000c29ca78922693ae6540a85b54b51
            Source: Microsoft-Windows-StorageSpaces-Driver%4Operational.evtx.25.drBinary or memory string: ~VMwareVirtual disk6000c29ca78922693ae6540a85b54b518
            Source: Microsoft-Windows-StorageSpaces-Driver%4Operational.evtx.25.drBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a8
            Source: Microsoft-Windows-Partition%4Diagnostic.evtx.25.drBinary or memory string: VMwareVirtual disk2.06000c2942fce4d06663969f532e45d1aPCI Slot 32 : Bus 2 : Device 0 : Function 0 : Adapter 0 : Port 0 : Target 0 : LUN 0PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218e0f40&0&00
            Source: svchost.exe, 0000000A.00000000.1495785024.000001A31C039000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: (@SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
            Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.25.drBinary or memory string: storahciNECVMWarVMware SATA CD00
            Source: lsass.exe, 00000009.00000000.1492685260.000002A290A13000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2759022710.000002A290A13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000E.00000002.2754634469.0000014E25213000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000E.00000000.1503607386.0000014E25213000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000000.1513280730.000001CBD862B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2758675176.000001CBD862B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000013.00000002.2754448913.000001F2BCA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000013.00000000.1517041619.000001F2BCA2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000017.00000002.2761779919.000002938A840000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000017.00000000.1525869537.000002938A840000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.2758414118.0000026F53E43000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: svchost.exe, 00000019.00000002.2773939093.0000026F547CB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmci|To
            Source: lsass.exe, 00000009.00000002.2763076804.000002A290A88000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicshutdownNT SERVICE
            Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.25.drBinary or memory string: LSI_SASVMware Virtual disk 6000c29ca78922693ae6540a85b54b51
            Source: svchost.exe, 0000000D.00000000.1499381207.0000013A2242B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000D.00000002.2760977729.0000013A2242B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
            Source: svchost.exe, 0000000A.00000000.1495275011.000001A31BA33000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $@vmicheartbeat
            Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.25.drBinary or memory string: nonicVMware Virtual disk 6000c2942fce4d06663969f532e45d1a
            Source: svchost.exe, 00000019.00000000.1545950482.0000026F54800000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $value = $pr.Value.replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("VMware", $value).replace("VirtualBox", $value).replace("Oracle Corporation", $value).replace("Microsoft Basic Display Adapter", $value)
            Source: lsass.exe, 00000009.00000002.2779510912.000002A291385000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMWare
            Source: svchost.exe, 00000026.00000000.1567433869.000002389CA02000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
            Source: lsass.exe, 00000009.00000002.2763076804.000002A290A88000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicheartbeatNT SERVICE
            Source: svchost.exe, 0000000E.00000002.2755481906.0000014E2522A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000P
            Source: svchost.exe, 00000019.00000000.1545950482.0000026F54800000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: if(($pr.Name -eq "DeviceId" -or $pr.Name -eq "Caption" -or $pr.Name -eq "Model" -or $pr.Name -eq "PNPDeviceID") -and ($pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VMware'))
            Source: dwm.exe, 0000000F.00000002.2810768629.00000283DDE43000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
            Source: svchost.exe, 0000000A.00000000.1495275011.000001A31BA33000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @vmicheartbeat
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpAPI call chain: ExitProcess graph end nodegraph_6-11817
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpAPI call chain: ExitProcess graph end nodegraph_7-13109
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpAPI call chain: ExitProcess graph end nodegraph_21-11782
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpAPI call chain: ExitProcess graph end node
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpAPI call chain: ExitProcess graph end node
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\System32\svchost.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_004763EE rdtsc 6_2_004763EE
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_7FE35AC1 LdrInitializeThunk,6_2_7FE35AC1
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_00402430 FindResourceA,LoadLibraryA,GetProcAddress,LoadResource,LockResource,CreateFileA,WriteFile,CloseHandle,6_2_00402430
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_0047619E mov edx, dword ptr fs:[00000030h]6_2_0047619E
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_004765B3 mov eax, dword ptr fs:[00000030h]6_2_004765B3
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_004763EE mov eax, dword ptr fs:[00000030h]6_2_004763EE
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_0042887F mov edx, dword ptr fs:[00000030h]6_2_0042887F
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_004369D9 mov edx, dword ptr fs:[00000030h]6_2_004369D9
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_0041A736 mov edx, dword ptr fs:[00000030h]6_2_0041A736
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_006F042D mov eax, dword ptr fs:[00000030h]6_2_006F042D
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_006F05F2 mov eax, dword ptr fs:[00000030h]6_2_006F05F2
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_006F025E mov edx, dword ptr fs:[00000030h]6_2_006F025E
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_7FE30601 mov eax, dword ptr fs:[00000030h]6_2_7FE30601
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_7FE30442 mov eax, dword ptr fs:[00000030h]6_2_7FE30442
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_0047D14A mov eax, dword ptr fs:[00000030h]7_2_0047D14A
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_0047D309 mov eax, dword ptr fs:[00000030h]7_2_0047D309
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_0042887F mov edx, dword ptr fs:[00000030h]7_2_0042887F
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_004369D9 mov edx, dword ptr fs:[00000030h]7_2_004369D9
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_0041A736 mov edx, dword ptr fs:[00000030h]7_2_0041A736
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_009B0442 mov eax, dword ptr fs:[00000030h]7_2_009B0442
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_009B0601 mov eax, dword ptr fs:[00000030h]7_2_009B0601
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_7FE30601 mov eax, dword ptr fs:[00000030h]7_2_7FE30601
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: 7_2_7FE30442 mov eax, dword ptr fs:[00000030h]7_2_7FE30442
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_0042887F mov edx, dword ptr fs:[00000030h]21_2_0042887F
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_0042212D mov eax, dword ptr fs:[00000030h]21_2_0042212D
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_004222F2 mov eax, dword ptr fs:[00000030h]21_2_004222F2
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_004369D9 mov edx, dword ptr fs:[00000030h]21_2_004369D9
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_0041A736 mov edx, dword ptr fs:[00000030h]21_2_0041A736
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_0062042D mov eax, dword ptr fs:[00000030h]21_2_0062042D
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_006205F2 mov eax, dword ptr fs:[00000030h]21_2_006205F2
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_0062025E mov edx, dword ptr fs:[00000030h]21_2_0062025E
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_7FE30601 mov eax, dword ptr fs:[00000030h]21_2_7FE30601
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: 21_2_7FE30442 mov eax, dword ptr fs:[00000030h]21_2_7FE30442
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpCode function: 30_2_0042887F mov edx, dword ptr fs:[00000030h]30_2_0042887F
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpCode function: 30_2_004369D9 mov edx, dword ptr fs:[00000030h]30_2_004369D9
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpCode function: 30_2_0041A736 mov edx, dword ptr fs:[00000030h]30_2_0041A736
            Source: C:\Windows\SysWOW64\zvhcfa.exeCode function: 34_2_00A00601 mov eax, dword ptr fs:[00000030h]34_2_00A00601
            Source: C:\Windows\SysWOW64\zvhcfa.exeCode function: 34_2_00A00442 mov eax, dword ptr fs:[00000030h]34_2_00A00442
            Source: C:\Windows\SysWOW64\zvhcfa.exeCode function: 34_2_7FE40442 mov eax, dword ptr fs:[00000030h]34_2_7FE40442
            Source: C:\Windows\SysWOW64\zvhcfa.exeCode function: 34_2_7FE40601 mov eax, dword ptr fs:[00000030h]34_2_7FE40601
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\SysWOW64\zvhcfa.exeProcess token adjusted: Debug

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542FE0 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542DC0 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77543620 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542F60 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77543710 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542C00 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542FE0 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542DC0 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77543620 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542F60 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77543710 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542C00 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542FE0 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542DC0 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77543620 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542F60 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77543710 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542C00 protect: page execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\zvhcfa.exeMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542FE0 protect: page execute and read and write
            Source: C:\Windows\SysWOW64\zvhcfa.exeMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542DC0 protect: page execute and read and write
            Source: C:\Windows\SysWOW64\zvhcfa.exeMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77543620 protect: page execute and read and write
            Source: C:\Windows\SysWOW64\zvhcfa.exeMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542F60 protect: page execute and read and write
            Source: C:\Windows\SysWOW64\zvhcfa.exeMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77543710 protect: page execute and read and write
            Source: C:\Windows\SysWOW64\zvhcfa.exeMemory protected: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542C00 protect: page execute and read and write
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpThread created: unknown EIP: 7FBD3C38Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpThread created: unknown EIP: 7FBC2FC3Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpThread created: unknown EIP: 7FBB3C38Jump to behavior
            Source: C:\Windows\SysWOW64\zvhcfa.exeThread created: unknown EIP: 7FBA2FC3
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpMemory written: PID: 3504 base: 77542FE0 value: E8Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpMemory written: PID: 3504 base: 77542DC0 value: E8Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpMemory written: PID: 3504 base: 77543620 value: E8Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpMemory written: PID: 3504 base: 77542F60 value: E8Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpMemory written: PID: 3504 base: 77543710 value: E8Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpMemory written: PID: 3504 base: 77542C00 value: E8Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpMemory written: PID: 3504 base: 77542FE0 value: E8Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpMemory written: PID: 3504 base: 77542DC0 value: E8Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpMemory written: PID: 3504 base: 77543620 value: E8Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpMemory written: PID: 3504 base: 77542F60 value: E8Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpMemory written: PID: 3504 base: 77543710 value: E8Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpMemory written: PID: 3504 base: 77542C00 value: E8Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpMemory written: PID: 3504 base: 77542FE0 value: E8Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpMemory written: PID: 3504 base: 77542DC0 value: E8Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpMemory written: PID: 3504 base: 77543620 value: E8Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpMemory written: PID: 3504 base: 77542F60 value: E8Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpMemory written: PID: 3504 base: 77543710 value: E8Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpMemory written: PID: 3504 base: 77542C00 value: E8Jump to behavior
            Source: C:\Windows\SysWOW64\zvhcfa.exeMemory written: PID: 3504 base: 77542FE0 value: E8
            Source: C:\Windows\SysWOW64\zvhcfa.exeMemory written: PID: 3504 base: 77542DC0 value: E8
            Source: C:\Windows\SysWOW64\zvhcfa.exeMemory written: PID: 3504 base: 77543620 value: E8
            Source: C:\Windows\SysWOW64\zvhcfa.exeMemory written: PID: 3504 base: 77542F60 value: E8
            Source: C:\Windows\SysWOW64\zvhcfa.exeMemory written: PID: 3504 base: 77543710 value: E8
            Source: C:\Windows\SysWOW64\zvhcfa.exeMemory written: PID: 3504 base: 77542C00 value: E8
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: C:\Windows\System32\winlogon.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: C:\Windows\System32\lsass.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: C:\Windows\System32\fontdrvhost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: C:\Windows\System32\fontdrvhost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: C:\Windows\System32\dwm.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpSection loaded: \BaseNamedObjects\vdqtVt target: C:\Users\user\AppData\Local\Temp\hrl97AF.tmp protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: C:\Windows\System32\winlogon.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: C:\Windows\System32\lsass.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: C:\Windows\System32\fontdrvhost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: C:\Windows\System32\fontdrvhost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: C:\Windows\System32\dwm.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpSection loaded: \BaseNamedObjects\rnxtVt target: C:\Users\user\AppData\Local\Temp\hrl97BF.tmp protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: C:\Windows\System32\winlogon.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: C:\Windows\System32\lsass.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: C:\Windows\System32\fontdrvhost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: C:\Windows\System32\fontdrvhost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: C:\Windows\System32\dwm.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: C:\Windows\System32\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: unknown protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: C:\Users\user\AppData\Local\Temp\hrl97BF.tmp protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpSection loaded: \BaseNamedObjects\krktVt target: C:\Users\user\AppData\Local\Temp\hrl97AF.tmp protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\zvhcfa.exeSection loaded: \BaseNamedObjects\imktVt target: C:\Windows\System32\winlogon.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\zvhcfa.exeSection loaded: \BaseNamedObjects\imktVt target: C:\Windows\System32\lsass.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\zvhcfa.exeSection loaded: \BaseNamedObjects\imktVt target: C:\Windows\System32\svchost.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\zvhcfa.exeSection loaded: \BaseNamedObjects\imktVt target: C:\Windows\System32\fontdrvhost.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\zvhcfa.exeSection loaded: \BaseNamedObjects\imktVt target: C:\Windows\System32\fontdrvhost.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\zvhcfa.exeSection loaded: \BaseNamedObjects\imktVt target: C:\Windows\System32\svchost.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\zvhcfa.exeSection loaded: \BaseNamedObjects\imktVt target: C:\Windows\System32\svchost.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\zvhcfa.exeSection loaded: \BaseNamedObjects\imktVt target: C:\Windows\System32\dwm.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\zvhcfa.exeSection loaded: \BaseNamedObjects\imktVt target: C:\Windows\System32\svchost.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\zvhcfa.exeSection loaded: \BaseNamedObjects\imktVt target: C:\Windows\System32\svchost.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\zvhcfa.exeSection loaded: \BaseNamedObjects\imktVt target: C:\Windows\System32\svchost.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\zvhcfa.exeSection loaded: \BaseNamedObjects\imktVt target: C:\Windows\System32\svchost.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\zvhcfa.exeSection loaded: \BaseNamedObjects\imktVt target: C:\Windows\System32\svchost.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\zvhcfa.exeSection loaded: \BaseNamedObjects\imktVt target: C:\Windows\System32\svchost.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\zvhcfa.exeSection loaded: \BaseNamedObjects\imktVt target: C:\Windows\System32\svchost.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\zvhcfa.exeSection loaded: \BaseNamedObjects\imktVt target: C:\Windows\System32\svchost.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\zvhcfa.exeSection loaded: \BaseNamedObjects\imktVt target: C:\Windows\System32\svchost.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\zvhcfa.exeSection loaded: \BaseNamedObjects\imktVt target: C:\Windows\System32\svchost.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\zvhcfa.exeSection loaded: \BaseNamedObjects\imktVt target: C:\Windows\System32\svchost.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\zvhcfa.exeSection loaded: \BaseNamedObjects\imktVt target: C:\Windows\System32\svchost.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\zvhcfa.exeSection loaded: \BaseNamedObjects\imktVt target: C:\Windows\System32\svchost.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\zvhcfa.exeSection loaded: \BaseNamedObjects\imktVt target: C:\Windows\System32\svchost.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\zvhcfa.exeSection loaded: \BaseNamedObjects\imktVt target: C:\Windows\System32\svchost.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\zvhcfa.exeSection loaded: \BaseNamedObjects\imktVt target: C:\Windows\System32\svchost.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\zvhcfa.exeSection loaded: \BaseNamedObjects\imktVt target: C:\Windows\System32\svchost.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\zvhcfa.exeSection loaded: \BaseNamedObjects\imktVt target: C:\Windows\System32\svchost.exe protection: execute and read and write
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542FE0Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542DC0Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77543620Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542F60Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77543710Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542C00Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542FE0Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542DC0Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77543620Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542F60Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77543710Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542C00Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1C1C3730000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1C1C3740000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1C1C3740000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1C1C3740000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1C1C3740000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1C1C3740000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1C1C3740000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1C1C3740000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1C1C3740000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1C1C3740000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1C1C3740000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1C1C3740000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1DC09DB0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1DC09DB0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1DC09DB0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1DC09DB0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1DC09DB0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1DC09DB0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1DC09DB0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1DC09DB0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1DC09DB0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1DC09DB0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1DC09DB0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 13A223A0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4140000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4140000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4140000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4140000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4140000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4140000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4140000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4140000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4140000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 4140000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1C1C37B0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5610000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5610000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5610000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5610000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5610000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5610000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5610000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5610000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5610000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5610000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 56E0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 56E0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 56E0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 56E0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 56E0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 56E0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 56E0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 56E0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 56E0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 56E0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5CE0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5CE0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5CE0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5CE0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5CE0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5CE0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5CE0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5CE0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5CE0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\SysWOW64\WerFault.exe base: 5CE0000Jump to behavior
            Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\dwm.exe base: 283E1090000Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542FE0Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542DC0Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77543620Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542F60Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77543710Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542C00Jump to behavior
            Source: C:\Windows\SysWOW64\zvhcfa.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542FE0
            Source: C:\Windows\SysWOW64\zvhcfa.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542DC0
            Source: C:\Windows\SysWOW64\zvhcfa.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77543620
            Source: C:\Windows\SysWOW64\zvhcfa.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542F60
            Source: C:\Windows\SysWOW64\zvhcfa.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77543710
            Source: C:\Windows\SysWOW64\zvhcfa.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 77542C00
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\26B1sczZ88.dll",#1Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /f /im ZhuDongFangYu.exe /tJump to behavior
            Source: winlogon.exe, 00000008.00000000.1492871688.000001F386111000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000008.00000002.2772962986.000001F386111000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 0000000F.00000000.1511520472.00000283DBDF1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
            Source: winlogon.exe, 00000008.00000000.1492871688.000001F386111000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000008.00000002.2772962986.000001F386111000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 0000000F.00000000.1511520472.00000283DBDF1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
            Source: winlogon.exe, 00000008.00000000.1492871688.000001F386111000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000008.00000002.2772962986.000001F386111000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 0000000F.00000000.1511520472.00000283DBDF1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
            Source: winlogon.exe, 00000008.00000000.1492871688.000001F386111000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000008.00000002.2772962986.000001F386111000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 0000000F.00000000.1511520472.00000283DBDF1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
            Source: dwm.exe, 0000000F.00000002.2803042199.00000283DB78C000.00000004.00000020.00020000.00000000.sdmp, dwm.exe, 0000000F.00000000.1510253959.00000283DB78C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerS
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: LoadLibraryA,GetProcAddress,GetLocaleInfoW,GetComputerNameA,lstrcpyA,lstrcpyA,strstr,strstr,strstr,strstr,strstr,strstr,strstr,lstrcpyA,lstrcpyA,GlobalMemoryStatusEx,lstrcpyA,GetTickCount,6_2_00402F70
            Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmpCode function: LoadLibraryA,GetProcAddress,GetLocaleInfoW,GetComputerNameA,lstrcpyA,lstrcpyA,strstr,strstr,strstr,strstr,strstr,strstr,strstr,lstrcpyA,lstrcpyA,GlobalMemoryStatusEx,lstrcpyA,GetTickCount,7_2_00402F70
            Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmpCode function: LoadLibraryA,GetProcAddress,GetLocaleInfoW,GetComputerNameA,lstrcpyA,lstrcpyA,strstr,strstr,strstr,strstr,strstr,strstr,strstr,lstrcpyA,lstrcpyA,GlobalMemoryStatusEx,lstrcpyA,GetTickCount,21_2_00402F70
            Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmpCode function: LoadLibraryA,GetProcAddress,GetLocaleInfoW,GetComputerNameA,lstrcpyA,lstrcpyA,RegOpenKeyExA,strstr,strstr,strstr,strstr,strstr,strstr,strstr,lstrcpyA,lstrcpyA,RegOpenKeyExA,wsprintfA,wsprintfA,GlobalMemoryStatusEx,wsprintfA,lstrcpyA,GetTickCount,30_2_00402F70
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_0047984F GetSystemTime,Sleep,Sleep,6_2_0047984F
            Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmpCode function: 6_2_004763EE GetModuleHandleA,GetVersion,VirtualAlloc,CloseHandle,SetProcessAffinityMask,NtCreateFile,NtOpenFile,NtCreateProcess,NtCreateProcessEx,NtCreateUserProcess,NtQueryInformationProcess,lstrcpyW,lstrcpyW,lstrcatW,NtMapViewOfSection,NtOpenProcessToken,CreateToolhelp32Snapshot,Process32First,Process32Next,OpenProcess,CreateRemoteThread,CloseHandle,6_2_004763EE
            Source: Microsoft-Windows-Diagnostics-Performance%4Operational.evtx.25.drBinary or memory string: MsMpEng.exe
            Source: C:\Windows\SysWOW64\rundll32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
            Source: C:\Windows\SysWOW64\rundll32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 21.2.hrlA367.tmp.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.hrl97BF.tmp.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000026.00000002.2743535164.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001B.00000002.2741797049.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000025.00000002.2743367209.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000018.00000002.2743542686.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.2798846486.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000012.00000002.2742331815.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001F.00000002.2744487406.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000023.00000002.2743363395.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000024.00000002.2743906496.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000000.1516357060.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000026.00000002.2742839099.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001A.00000002.2744241055.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001D.00000002.2741751352.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.2743908241.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2017093698.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000016.00000000.1519926327.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.2798955144.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000027.00000002.2742966295.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000024.00000002.2742677643.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000029.00000002.2745114770.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.2742603638.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.2743903996.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2043911687.000000007FE20000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000027.00000002.2743612981.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000028.00000002.2744408295.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.2743736063.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000019.00000000.1537557780.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2017013687.000000007FE20000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000012.00000000.1514452533.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000015.00000002.2066207224.0000000000620000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000016.00000002.2743037216.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000012.00000002.2742840917.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.2798456887.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.2743087540.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001F.00000000.1550287003.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000011.00000000.1512389471.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000019.00000002.2742759300.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000000.1498055145.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.2741922410.000000007FFD0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000002A.00000002.2741956104.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000015.00000002.2065117221.0000000000422000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000000.1491890758.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000025.00000002.2741930750.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000000.1509606581.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000002.2743461282.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001B.00000002.2742552059.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000000.1522184005.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.2741922176.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000000.1495302635.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001A.00000000.1542306261.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001F.00000002.2742576822.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.2798241222.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000000.1496798093.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.2742703107.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000023.00000002.2742760458.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.2742198516.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000002.2744126681.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000029.00000000.1572545222.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000015.00000002.2066888535.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000029.00000002.2743852596.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000028.00000002.2743091000.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000000.1509586132.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000002.2742914219.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.2741867843.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2043996617.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000000.1491843448.000000007FFD0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.2798238281.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.2798310722.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000018.00000002.2744224357.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.2741748612.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000002.2742335064.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000002A.00000002.2742967559.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000018.00000000.1525893859.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000019.00000002.2742301520.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000011.00000002.2742837753.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001D.00000002.2742525977.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000011.00000002.2743537432.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000016.00000002.2742450602.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.2741745861.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000025.00000000.1564612279.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001A.00000002.2742498334.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: hrl97BF.tmp PID: 5732, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: hrl97AF.tmp PID: 3388, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: winlogon.exe PID: 584, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: lsass.exe PID: 640, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 752, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: fontdrvhost.exe PID: 776, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: fontdrvhost.exe PID: 784, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 880, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 928, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dwm.exe PID: 992, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 436, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 376, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 792, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1028, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: hrlA367.tmp PID: 3916, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1036, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1124, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1148, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1160, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1220, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1336, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1348, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1392, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1408, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1504, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1584, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1640, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1656, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1680, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1800, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1836, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 21.2.hrlA367.tmp.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.hrl97BF.tmp.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000026.00000002.2743535164.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001B.00000002.2741797049.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000025.00000002.2743367209.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000018.00000002.2743542686.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.2798846486.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000012.00000002.2742331815.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001F.00000002.2744487406.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000023.00000002.2743363395.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000024.00000002.2743906496.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000000.1516357060.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000026.00000002.2742839099.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001A.00000002.2744241055.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001D.00000002.2741751352.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.2743908241.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2017093698.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000016.00000000.1519926327.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.2798955144.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000027.00000002.2742966295.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000024.00000002.2742677643.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000029.00000002.2745114770.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.2742603638.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.2743903996.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2043911687.000000007FE20000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000027.00000002.2743612981.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000028.00000002.2744408295.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.2743736063.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000019.00000000.1537557780.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2017013687.000000007FE20000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000012.00000000.1514452533.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000015.00000002.2066207224.0000000000620000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000016.00000002.2743037216.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000012.00000002.2742840917.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.2798456887.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.2743087540.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001F.00000000.1550287003.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000011.00000000.1512389471.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000019.00000002.2742759300.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000000.1498055145.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.2741922410.000000007FFD0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000002A.00000002.2741956104.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000015.00000002.2065117221.0000000000422000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000000.1491890758.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000025.00000002.2741930750.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000000.1509606581.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000002.2743461282.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001B.00000002.2742552059.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000000.1522184005.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.2741922176.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000000.1495302635.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001A.00000000.1542306261.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001F.00000002.2742576822.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.2798241222.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000000.1496798093.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.2742703107.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000023.00000002.2742760458.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.2742198516.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000002.2744126681.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000029.00000000.1572545222.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000015.00000002.2066888535.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000029.00000002.2743852596.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000028.00000002.2743091000.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000000.1509586132.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000002.2742914219.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.2741867843.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2043996617.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000000.1491843448.000000007FFD0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.2798238281.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.2798310722.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000018.00000002.2744224357.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.2741748612.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000002.2742335064.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000002A.00000002.2742967559.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000018.00000000.1525893859.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000019.00000002.2742301520.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000011.00000002.2742837753.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001D.00000002.2742525977.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000011.00000002.2743537432.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000016.00000002.2742450602.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.2741745861.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000025.00000000.1564612279.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001A.00000002.2742498334.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: hrl97BF.tmp PID: 5732, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: hrl97AF.tmp PID: 3388, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: winlogon.exe PID: 584, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: lsass.exe PID: 640, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 752, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: fontdrvhost.exe PID: 776, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: fontdrvhost.exe PID: 784, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 880, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 928, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dwm.exe PID: 992, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 436, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 376, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 792, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1028, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: hrlA367.tmp PID: 3916, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1036, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1124, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1148, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1160, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1220, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1336, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1348, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1392, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1408, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1504, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1584, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1640, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1656, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1680, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1800, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1836, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
            Windows Management Instrumentation
            2
            Windows Service
            2
            Windows Service
            221
            Masquerading
            OS Credential Dumping1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts2
            Service Execution
            1
            DLL Side-Loading
            512
            Process Injection
            1
            Disable or Modify Tools
            LSASS Memory361
            Security Software Discovery
            Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts22
            Native API
            Logon Script (Windows)1
            DLL Side-Loading
            1
            Modify Registry
            Security Account Manager2
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
            Virtualization/Sandbox Evasion
            NTDS3
            Process Discovery
            Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script512
            Process Injection
            LSA Secrets1
            File and Directory Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Deobfuscate/Decode Files or Information
            Cached Domain Credentials234
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items3
            Obfuscated Files or Information
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            Install Root Certificate
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
            Rundll32
            /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
            Software Packing
            Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
            Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
            DLL Side-Loading
            Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
            Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task1
            File Deletion
            KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 1578325 Sample: 26B1sczZ88.dll Startdate: 19/12/2024 Architecture: WINDOWS Score: 100 86 Suricata IDS alerts for network traffic 2->86 88 Malicious sample detected (through community Yara rule) 2->88 90 Antivirus detection for dropped file 2->90 92 9 other signatures 2->92 9 loaddll32.exe 2 2->9         started        13 zvhcfa.exe 2->13         started        process3 file4 76 C:\Users\user\AppData\Local\...\hrlBAE7.tmp, PE32 9->76 dropped 108 Found evasive API chain (may stop execution after checking mutex) 9->108 15 rundll32.exe 1 9->15         started        19 rundll32.exe 1 9->19         started        21 cmd.exe 1 9->21         started        29 2 other processes 9->29 110 Antivirus detection for dropped file 13->110 112 Multi AV Scanner detection for dropped file 13->112 114 Machine Learning detection for dropped file 13->114 116 7 other signatures 13->116 23 svchost.exe 13->23 injected 25 svchost.exe 13->25 injected 27 svchost.exe 13->27 injected signatures5 process6 file7 78 C:\Users\user\AppData\Local\...\hrl97BF.tmp, PE32 15->78 dropped 84 Found evasive API chain (may stop execution after checking mutex) 15->84 31 hrl97BF.tmp 15->31         started        80 C:\Users\user\AppData\Local\...\hrlA367.tmp, PE32 19->80 dropped 34 hrlA367.tmp 19->34         started        36 rundll32.exe 1 21->36         started        82 C:\Users\user\AppData\Local\...\hrlAF3E.tmp, PE32 29->82 dropped 39 hrlAF3E.tmp 1 1 29->39         started        signatures8 process9 file10 118 Antivirus detection for dropped file 31->118 120 Multi AV Scanner detection for dropped file 31->120 122 Machine Learning detection for dropped file 31->122 132 5 other signatures 31->132 41 lsass.exe 19 31->41 injected 44 fontdrvhost.exe 31->44 injected 46 fontdrvhost.exe 31->46 injected 56 8 other processes 31->56 124 Changes memory attributes in foreign processes to executable or writable 34->124 126 Found evasive API chain (may stop execution after checking volume information) 34->126 128 Injects code into the Windows Explorer (explorer.exe) 34->128 48 svchost.exe 34->48 injected 50 svchost.exe 34->50 injected 58 3 other processes 34->58 70 C:\Users\user\AppData\Local\...\hrl97AF.tmp, PE32 36->70 dropped 52 hrl97AF.tmp 36->52         started        72 C:\Windows\SysWOW64\zvhcfa.exe, PE32 39->72 dropped 74 C:\Users\user\AppData\...\SOFTWARE.LOG (copy), PE32 39->74 dropped 130 Found evasive API chain (may stop execution after checking mutex) 39->130 54 taskkill.exe 1 39->54         started        signatures11 process12 signatures13 94 Installs new ROOT certificates 41->94 96 Creates files in the system32 config directory 41->96 98 Writes to foreign memory regions 41->98 100 Antivirus detection for dropped file 52->100 102 Multi AV Scanner detection for dropped file 52->102 104 Machine Learning detection for dropped file 52->104 106 6 other signatures 52->106 60 winlogon.exe 52->60 injected 62 svchost.exe 55 52->62 injected 64 svchost.exe 52->64 injected 68 6 other processes 52->68 66 conhost.exe 54->66         started        process14

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            26B1sczZ88.dll97%ReversingLabsWin32.Backdoor.Nitol
            26B1sczZ88.dll100%AviraTR/Nitol.blanu
            26B1sczZ88.dll100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\hrl97AF.tmp100%AviraW32/Virut.Gen
            C:\Users\user\AppData\Local\Temp\hrlBAE7.tmp100%AviraW32/Virut.Gen
            C:\Users\user\AppData\Local\Temp\hrlAF3E.tmp100%AviraW32/Virut.Gen
            C:\Users\user\AppData\Local\Temp\hrl97BF.tmp100%AviraW32/Virut.Gen
            C:\Users\user\AppData\Local\Temp\hrlA367.tmp100%AviraW32/Virut.Gen
            C:\Windows\SysWOW64\zvhcfa.exe100%AviraW32/Virut.Gen
            C:\Users\user\AppData\Local\Temp\hrl97AF.tmp100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\hrlBAE7.tmp100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\hrlAF3E.tmp100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\hrl97BF.tmp100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\hrlA367.tmp100%Joe Sandbox ML
            C:\Windows\SysWOW64\zvhcfa.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\SOFTWARE.LOG (copy)97%ReversingLabsWin32.Network.Virut
            C:\Users\user\AppData\Local\Temp\hrl97AF.tmp97%ReversingLabsWin32.Network.Virut
            C:\Users\user\AppData\Local\Temp\hrl97BF.tmp97%ReversingLabsWin32.Network.Virut
            C:\Users\user\AppData\Local\Temp\hrlA367.tmp97%ReversingLabsWin32.Network.Virut
            C:\Users\user\AppData\Local\Temp\hrlAF3E.tmp97%ReversingLabsWin32.Network.Virut
            C:\Users\user\AppData\Local\Temp\hrlBAE7.tmp97%ReversingLabsWin32.Network.Virut
            C:\Windows\SysWOW64\zvhcfa.exe97%ReversingLabsWin32.Network.Virut
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            bg.microsoft.map.fastly.net
            199.232.210.172
            truefalse
              high
              NameSourceMaliciousAntivirus DetectionReputation
              http://schemas.xmlsoap.org/ws/2005/07/securitypolicylsass.exe, 00000009.00000002.2760713212.000002A290A4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1492711290.000002A290A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2759839699.000002A290A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1492737881.000002A290A4E000.00000004.00000001.00020000.00000000.sdmpfalse
                high
                http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702lsass.exe, 00000009.00000000.1492711290.000002A290A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2759839699.000002A290A2F000.00000004.00000001.00020000.00000000.sdmpfalse
                  high
                  https://windows.msn.com/shellsvchost.exe, 0000000A.00000002.2789825589.000001A31C054000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000A.00000000.1495785024.000001A31C054000.00000004.00000001.00020000.00000000.sdmpfalse
                    high
                    http://schemas.xmlsoap.org/ws/2004/09/policylsass.exe, 00000009.00000000.1492711290.000002A290A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2759839699.000002A290A2F000.00000004.00000001.00020000.00000000.sdmpfalse
                      high
                      http://schemas.xmlsoap.org/wsdl/soap12/lsass.exe, 00000009.00000002.2759839699.000002A290A2F000.00000004.00000001.00020000.00000000.sdmpfalse
                        high
                        http://Passport.NET/STS%3C/ds:KeyName%3E%3C/ds:KeyInfo%3E%3CCipherData%3E%3CCipherValue%3EM.C506_SN1lsass.exe, 00000009.00000002.2760713212.000002A290A4E000.00000004.00000001.00020000.00000000.sdmpfalse
                          high
                          http://www.Brenz.pl/rc/hrl97BF.tmp, 00000006.00000002.2017052696.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, hrl97BF.tmp, 00000006.00000002.2016979532.000000007FE10000.00000040.80000000.00040000.00000000.sdmp, hrl97AF.tmp, 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmp, hrl97AF.tmp, 00000007.00000002.2043369977.00000000009B0000.00000040.10000000.00040000.00000000.sdmp, hrl97AF.tmp, 00000007.00000002.2043860940.000000007FE10000.00000040.80000000.00040000.00000000.sdmp, winlogon.exe, 00000008.00000002.2742302542.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, winlogon.exe, 00000008.00000000.1491863951.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, winlogon.exe, 00000008.00000002.2741575463.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, lsass.exe, 00000009.00000002.2742148992.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, lsass.exe, 00000009.00000002.2743236363.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, svchost.exe, 0000000A.00000002.2741589846.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, svchost.exe, 0000000A.00000002.2742275015.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, svchost.exe, 0000000A.00000000.1493902232.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, fontdrvhost.exe, 0000000B.00000002.2741580715.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, fontdrvhost.exe, 0000000B.00000002.2798564614.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, fontdrvhost.exe, 0000000C.00000002.2741587779.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, fontdrvhost.exe, 0000000C.00000002.2798453376.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, svchost.exe, 0000000D.00000002.2743314432.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, svchost.exe, 0000000D.00000002.2742234796.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, svchost.exe, 0000000E.00000002.2741590621.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, svchost.exe, 0000000E.00000002.2742653531.000000007FFF0000.00000040.00000001.00040000.00000000.sdmpfalse
                            unknown
                            http://schemas.xmlsoap.org/wsdl/lsass.exe, 00000009.00000000.1492711290.000002A290A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2759839699.000002A290A2F000.00000004.00000001.00020000.00000000.sdmpfalse
                              high
                              http://schemas.xmlsoap.org/wsdl/soap12/Plsass.exe, 00000009.00000000.1492711290.000002A290A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2759839699.000002A290A2F000.00000004.00000001.00020000.00000000.sdmpfalse
                                high
                                https://windows.msn.cn/shellRESPsvchost.exe, 0000000A.00000002.2789825589.000001A31C054000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000A.00000000.1495785024.000001A31C054000.00000004.00000001.00020000.00000000.sdmpfalse
                                  high
                                  http://Passport.NET/tbMicrosoft-Windows-LiveId%4Operational.evtx.25.drfalse
                                    high
                                    http://schemas.xmlsoap.org/ws/2005/02/trustlsass.exe, 00000009.00000000.1492711290.000002A290A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2759839699.000002A290A2F000.00000004.00000001.00020000.00000000.sdmpfalse
                                      high
                                      http://docs.oasis-open.org/ws-sx/ws-trust/200512lsass.exe, 00000009.00000002.2760713212.000002A290A4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1492737881.000002A290A4E000.00000004.00000001.00020000.00000000.sdmpfalse
                                        high
                                        http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdlsass.exe, 00000009.00000000.1492711290.000002A290A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2759839699.000002A290A2F000.00000004.00000001.00020000.00000000.sdmpfalse
                                          high
                                          http://cacerts.digiclsass.exe, 00000009.00000000.1493523293.000002A29123E000.00000004.00000001.00020000.00000000.sdmpfalse
                                            unknown
                                            No contacted IP infos
                                            Joe Sandbox version:41.0.0 Charoite
                                            Analysis ID:1578325
                                            Start date and time:2024-12-19 15:32:14 +01:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 9m 23s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:15
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:28
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:26B1sczZ88.dll
                                            renamed because original name is a hash value
                                            Original Sample Name:6aff1202f53fe4cc6282f9ad3ebdef95bb4cf49f.dll
                                            Detection:MAL
                                            Classification:mal100.troj.evad.winDLL@25/72@0/0
                                            EGA Information:
                                            • Successful, ratio: 100%
                                            HCA Information:
                                            • Successful, ratio: 99%
                                            • Number of executed functions: 69
                                            • Number of non-executed functions: 266
                                            Cookbook Comments:
                                            • Found application associated with file extension: .dll
                                            • Exclude process from analysis (whitelisted): dllhost.exe
                                            • Excluded IPs from analysis (whitelisted): 20.190.177.82, 20.190.177.84, 20.190.147.12, 20.190.147.9, 20.190.177.22, 20.190.147.7, 20.190.177.146, 20.190.177.20, 4.245.163.56, 20.189.173.20, 13.107.246.63
                                            • Excluded domains from analysis (whitelisted): nvaijl.com, fxyavq.com, zemivi.com, eqoxwa.com, qeixpq.com, qfstid.com, gizyod.com, eoswhi.com, sjjile.com, vezeoe.com, pnfkay.com, rraenf.com, fncqle.com, gjtywo.com, yeaedh.com, oseynl.com, lityoa.com, ldgoti.com, zdtwjb.com, bsfxpd.com, rmqiuq.com, vxpesz.com, wohbil.com, faxkac.com, tpwowx.com, gkbtuu.com, nsqixt.com, zuotaq.com, iezcob.com, ikuhms.com, gqmneh.com, apqqgj.com, phdomu.com, cwkzpg.com, hcpgso.com, eekder.com, eiqljd.com, siytue.com, pugtjb.com, faweja.com, anvdkc.com, itmffg.com, fcamil.com, ovprrb.com, rqicen.com, oxoimf.com, iqdacv.com, prdv4a.aadg.msidentity.com, yirgbw.com, iemjen.com, goyzko.com, xunnfu.com, bvvknd.com, yqhfpu.com, maxasl.com, qikggc.com, login.msa.msidentity.com, ihybog.com, ootumr.com, iqewjg.com, ogvgft.com, uxbegb.com, wmducp.com, slscr.update.microsoft.com, gnwvmu.com, ynwpie.com, hxhxsk.com, qnrfpi.com, lacjuz.com, ocsp.digicert.com, login.live.com, cdqboa.com, oehqcn.com, kduiuv.com, vlscru.com, zuetyk.com, eupkbf.co
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                            • Report size exceeded maximum capacity and may have missing disassembly code.
                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                            • Report size getting too big, too many NtWriteVirtualMemory calls found.
                                            • VT rate limit hit for: 26B1sczZ88.dll
                                            No simulations
                                            No context
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            bg.microsoft.map.fastly.netGioia Faggioli-End Of Year-Bonus.docxGet hashmaliciousUnknownBrowse
                                            • 199.232.214.172
                                            https://tfsroanoke.com/home/tfs/public_html/new/ckfinder/userfiles/files/12719803849.pdfGet hashmaliciousPDFPhishBrowse
                                            • 199.232.214.172
                                            jhsdgfjkh236.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                                            • 199.232.214.172
                                            RECOUVREMENT -FACTURER1184521.pdfGet hashmaliciousUnknownBrowse
                                            • 199.232.210.172
                                            QhR8Zp6fZs.lnkGet hashmaliciousRHADAMANTHYSBrowse
                                            • 199.232.214.172
                                            LbtytfWpvx.vbsGet hashmaliciousRemcosBrowse
                                            • 199.232.210.172
                                            YinLHGpoX4.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                                            • 199.232.214.172
                                            gCXzb0K8Ci.ps1Get hashmaliciousUnknownBrowse
                                            • 199.232.210.172
                                            H2PspQWoHE.ps1Get hashmaliciousUnknownBrowse
                                            • 199.232.214.172
                                            H6epOhxoPY.ps1Get hashmaliciousUnknownBrowse
                                            • 199.232.210.172
                                            No context
                                            No context
                                            No context
                                            Process:C:\Windows\System32\lsass.exe
                                            File Type:data
                                            Category:modified
                                            Size (bytes):11136
                                            Entropy (8bit):7.977801559819467
                                            Encrypted:false
                                            SSDEEP:192:LYOYxPxjcZlUqqjOsg2VnyGYsM7NS7RaB7gUf/Qy8Ff+VwCdDpVePY7GDUQESJ:k/xpjcIqqiIVnN7M74igy8BJCN6g7GwW
                                            MD5:526457C3714FD5F9B2DF0221C2659C15
                                            SHA1:158390B936D0F9BB382AA2D0120C77983FC39589
                                            SHA-256:57A74456EBB827DBA8022F7C1F905FD8B640E7E4AF5D1CBF0130D76184FCC551
                                            SHA-512:99B2D3D6F65C74D752E31EC07534B0B263FDF7F14528FC83915DDF1D107F5C7CA4E208A283D262C4DA729170D9EFED3664782643E19D78EA2FB3A6253D600E54
                                            Malicious:false
                                            Preview:....t+..................z..O.............C.s...u..... 0...L.o.c.a.l. .C.r.e.d.e.n.t.i.a.l. .D.a.t.a........f...... ...P8.+...R.;kq)AZ...d9..C"h................. ....."f.}6....w.&....&...p.zB.V y.p*......2..;....[...Le.0....`.D....y..VL.*.i..&..L..o.V..|w...JCi.......|...[...6y[.5.....ra..j~.g.'".<..1g...rc..B.3c.......x....+...7J...`.!:I. .F._._!.....I6..x+.|..*..&=.....S.df.\..H.yh.48m.y....VD"M#.M._.<.<...Y.m.6.....,...E....A.....5.Y.O.l...K.k..G..:D3n.....d.d!.....'x.cKKEp(E.3@......1..j.g&A.).....5..;.y..c<...............P{i ..?sl.TN....rVpws3.ru.xx4.J2x.....n.g.p7...#!N./.#..._J....S.|...B.[6.z?....S.u.6...i*.d..9..-.5.g....N.._...izq...=a9t.P.....f...).?.~.r..Lb.o...Xc...s.iY.?.>.e~...y...H...m"..~DK....1.(.&>2a.t............Q...5........R|....... ...g/Rcv..r.C.j..A%n..E..N..(.....8df7....wz.....<....E.Z.7.G;.o..Q"[".G.G....>m...GQw9.R. f.EC..L0.l}>......e.+...Y..K.......2\..qj..\..RX..R.h_:.yN.........Q......D.......2...z..`,L..[(
                                            Process:C:\Windows\System32\lsass.exe
                                            File Type:very short file (no magic)
                                            Category:dropped
                                            Size (bytes):1
                                            Entropy (8bit):0.0
                                            Encrypted:false
                                            SSDEEP:3::
                                            MD5:93B885ADFE0DA089CDF634904FD59F71
                                            SHA1:5BA93C9DB0CFF93F52B521D7420E43F6EDA2784F
                                            SHA-256:6E340B9CFFB37A989CA544E6BB780A2C78901D3FB33738768511A30617AFA01D
                                            SHA-512:B8244D028981D693AF7B456AF8EFA4CAD63D282E19FF14942C246E50D9351D22704A802A71C3580B6370DE4CEB293C324A8423342557D4E5C38438F0E36910EE
                                            Malicious:false
                                            Preview:.
                                            Process:C:\Users\user\AppData\Local\Temp\hrlAF3E.tmp
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):522752
                                            Entropy (8bit):7.583230633752463
                                            Encrypted:false
                                            SSDEEP:12288:XkdQN/1+XdYg6UMdB7qCzLohmL1BWrLc1t419lcaRto5C5u7d7777784YNt5Ox:XGQ1QXdYgkdBW3hs/W0t419vRP5SE
                                            MD5:F3F920AAF85289A8E532890BC618AADD
                                            SHA1:89DC59B51068D7B0B42404AE0746B0249A7F0410
                                            SHA-256:018B3CD8B7C6D4B100329625C262FF2F2C98DE2F1B41FB259591D99B78E1979A
                                            SHA-512:143222F2F1E0C8F20CC434879811C436C5C1BD04605AC073CDCD49D5E6876B99A011E693A987FCCADE96ED77BFFA804679EA771BAA66ADE035961E9D7237CBBC
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 97%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........C.O.-.O.-.O.-.`&.K.-.h.V.M.-. `'.D.-. `).M.-..c#.L.-.yY).L.-.O.,..-.yY&.H.-.y+.N.-.RichO.-.................PE..L........................N...H.......,.......`....@..........................@...............................................m..P....................................................................................`..x...xi.......................text...BL.......N.................. ..`.rdata.......`.......R..............@..@.data................h..............@....rsrc................x..............`...rhxpypg......0...................... ...xcmhltj............................. ...hnrxhix............................. ...woslvkg............................. ...eszpqhx..............z.............. ...orzkedv..............Z.............. ...zwezcbc......p.......:.............. ...uuxeujz......P...................... ...xgmlxsd......0..................
                                            Process:C:\Windows\SysWOW64\rundll32.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):522752
                                            Entropy (8bit):7.583230633752463
                                            Encrypted:false
                                            SSDEEP:12288:XkdQN/1+XdYg6UMdB7qCzLohmL1BWrLc1t419lcaRto5C5u7d7777784YNt5Ox:XGQ1QXdYgkdBW3hs/W0t419vRP5SE
                                            MD5:F3F920AAF85289A8E532890BC618AADD
                                            SHA1:89DC59B51068D7B0B42404AE0746B0249A7F0410
                                            SHA-256:018B3CD8B7C6D4B100329625C262FF2F2C98DE2F1B41FB259591D99B78E1979A
                                            SHA-512:143222F2F1E0C8F20CC434879811C436C5C1BD04605AC073CDCD49D5E6876B99A011E693A987FCCADE96ED77BFFA804679EA771BAA66ADE035961E9D7237CBBC
                                            Malicious:true
                                            Yara Hits:
                                            • Rule: CN_disclosed_20180208_Mal1, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmp, Author: Florian Roth
                                            • Rule: MAL_Nitol_Malware_Jan19_1, Description: Detects Nitol Malware, Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmp, Author: Florian Roth
                                            Antivirus:
                                            • Antivirus: Avira, Detection: 100%
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            • Antivirus: ReversingLabs, Detection: 97%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........C.O.-.O.-.O.-.`&.K.-.h.V.M.-. `'.D.-. `).M.-..c#.L.-.yY).L.-.O.,..-.yY&.H.-.y+.N.-.RichO.-.................PE..L........................N...H.......,.......`....@..........................@...............................................m..P....................................................................................`..x...xi.......................text...BL.......N.................. ..`.rdata.......`.......R..............@..@.data................h..............@....rsrc................x..............`...rhxpypg......0...................... ...xcmhltj............................. ...hnrxhix............................. ...woslvkg............................. ...eszpqhx..............z.............. ...orzkedv..............Z.............. ...zwezcbc......p.......:.............. ...uuxeujz......P...................... ...xgmlxsd......0..................
                                            Process:C:\Windows\SysWOW64\rundll32.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):522752
                                            Entropy (8bit):7.583230633752463
                                            Encrypted:false
                                            SSDEEP:12288:XkdQN/1+XdYg6UMdB7qCzLohmL1BWrLc1t419lcaRto5C5u7d7777784YNt5Ox:XGQ1QXdYgkdBW3hs/W0t419vRP5SE
                                            MD5:F3F920AAF85289A8E532890BC618AADD
                                            SHA1:89DC59B51068D7B0B42404AE0746B0249A7F0410
                                            SHA-256:018B3CD8B7C6D4B100329625C262FF2F2C98DE2F1B41FB259591D99B78E1979A
                                            SHA-512:143222F2F1E0C8F20CC434879811C436C5C1BD04605AC073CDCD49D5E6876B99A011E693A987FCCADE96ED77BFFA804679EA771BAA66ADE035961E9D7237CBBC
                                            Malicious:true
                                            Yara Hits:
                                            • Rule: CN_disclosed_20180208_Mal1, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmp, Author: Florian Roth
                                            • Rule: MAL_Nitol_Malware_Jan19_1, Description: Detects Nitol Malware, Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmp, Author: Florian Roth
                                            Antivirus:
                                            • Antivirus: Avira, Detection: 100%
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            • Antivirus: ReversingLabs, Detection: 97%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........C.O.-.O.-.O.-.`&.K.-.h.V.M.-. `'.D.-. `).M.-..c#.L.-.yY).L.-.O.,..-.yY&.H.-.y+.N.-.RichO.-.................PE..L........................N...H.......,.......`....@..........................@...............................................m..P....................................................................................`..x...xi.......................text...BL.......N.................. ..`.rdata.......`.......R..............@..@.data................h..............@....rsrc................x..............`...rhxpypg......0...................... ...xcmhltj............................. ...hnrxhix............................. ...woslvkg............................. ...eszpqhx..............z.............. ...orzkedv..............Z.............. ...zwezcbc......p.......:.............. ...uuxeujz......P...................... ...xgmlxsd......0..................
                                            Process:C:\Windows\SysWOW64\rundll32.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):522752
                                            Entropy (8bit):7.583230633752463
                                            Encrypted:false
                                            SSDEEP:12288:XkdQN/1+XdYg6UMdB7qCzLohmL1BWrLc1t419lcaRto5C5u7d7777784YNt5Ox:XGQ1QXdYgkdBW3hs/W0t419vRP5SE
                                            MD5:F3F920AAF85289A8E532890BC618AADD
                                            SHA1:89DC59B51068D7B0B42404AE0746B0249A7F0410
                                            SHA-256:018B3CD8B7C6D4B100329625C262FF2F2C98DE2F1B41FB259591D99B78E1979A
                                            SHA-512:143222F2F1E0C8F20CC434879811C436C5C1BD04605AC073CDCD49D5E6876B99A011E693A987FCCADE96ED77BFFA804679EA771BAA66ADE035961E9D7237CBBC
                                            Malicious:true
                                            Yara Hits:
                                            • Rule: CN_disclosed_20180208_Mal1, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmp, Author: Florian Roth
                                            • Rule: MAL_Nitol_Malware_Jan19_1, Description: Detects Nitol Malware, Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmp, Author: Florian Roth
                                            Antivirus:
                                            • Antivirus: Avira, Detection: 100%
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            • Antivirus: ReversingLabs, Detection: 97%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........C.O.-.O.-.O.-.`&.K.-.h.V.M.-. `'.D.-. `).M.-..c#.L.-.yY).L.-.O.,..-.yY&.H.-.y+.N.-.RichO.-.................PE..L........................N...H.......,.......`....@..........................@...............................................m..P....................................................................................`..x...xi.......................text...BL.......N.................. ..`.rdata.......`.......R..............@..@.data................h..............@....rsrc................x..............`...rhxpypg......0...................... ...xcmhltj............................. ...hnrxhix............................. ...woslvkg............................. ...eszpqhx..............z.............. ...orzkedv..............Z.............. ...zwezcbc......p.......:.............. ...uuxeujz......P...................... ...xgmlxsd......0..................
                                            Process:C:\Windows\SysWOW64\rundll32.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):522752
                                            Entropy (8bit):7.583230633752463
                                            Encrypted:false
                                            SSDEEP:12288:XkdQN/1+XdYg6UMdB7qCzLohmL1BWrLc1t419lcaRto5C5u7d7777784YNt5Ox:XGQ1QXdYgkdBW3hs/W0t419vRP5SE
                                            MD5:F3F920AAF85289A8E532890BC618AADD
                                            SHA1:89DC59B51068D7B0B42404AE0746B0249A7F0410
                                            SHA-256:018B3CD8B7C6D4B100329625C262FF2F2C98DE2F1B41FB259591D99B78E1979A
                                            SHA-512:143222F2F1E0C8F20CC434879811C436C5C1BD04605AC073CDCD49D5E6876B99A011E693A987FCCADE96ED77BFFA804679EA771BAA66ADE035961E9D7237CBBC
                                            Malicious:true
                                            Yara Hits:
                                            • Rule: CN_disclosed_20180208_Mal1, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmp, Author: Florian Roth
                                            • Rule: MAL_Nitol_Malware_Jan19_1, Description: Detects Nitol Malware, Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmp, Author: Florian Roth
                                            Antivirus:
                                            • Antivirus: Avira, Detection: 100%
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            • Antivirus: ReversingLabs, Detection: 97%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........C.O.-.O.-.O.-.`&.K.-.h.V.M.-. `'.D.-. `).M.-..c#.L.-.yY).L.-.O.,..-.yY&.H.-.y+.N.-.RichO.-.................PE..L........................N...H.......,.......`....@..........................@...............................................m..P....................................................................................`..x...xi.......................text...BL.......N.................. ..`.rdata.......`.......R..............@..@.data................h..............@....rsrc................x..............`...rhxpypg......0...................... ...xcmhltj............................. ...hnrxhix............................. ...woslvkg............................. ...eszpqhx..............z.............. ...orzkedv..............Z.............. ...zwezcbc......p.......:.............. ...uuxeujz......P...................... ...xgmlxsd......0..................
                                            Process:C:\Windows\System32\loaddll32.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):522752
                                            Entropy (8bit):7.583230633752463
                                            Encrypted:false
                                            SSDEEP:12288:XkdQN/1+XdYg6UMdB7qCzLohmL1BWrLc1t419lcaRto5C5u7d7777784YNt5Ox:XGQ1QXdYgkdBW3hs/W0t419vRP5SE
                                            MD5:F3F920AAF85289A8E532890BC618AADD
                                            SHA1:89DC59B51068D7B0B42404AE0746B0249A7F0410
                                            SHA-256:018B3CD8B7C6D4B100329625C262FF2F2C98DE2F1B41FB259591D99B78E1979A
                                            SHA-512:143222F2F1E0C8F20CC434879811C436C5C1BD04605AC073CDCD49D5E6876B99A011E693A987FCCADE96ED77BFFA804679EA771BAA66ADE035961E9D7237CBBC
                                            Malicious:true
                                            Yara Hits:
                                            • Rule: CN_disclosed_20180208_Mal1, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Local\Temp\hrlBAE7.tmp, Author: Florian Roth
                                            • Rule: MAL_Nitol_Malware_Jan19_1, Description: Detects Nitol Malware, Source: C:\Users\user\AppData\Local\Temp\hrlBAE7.tmp, Author: Florian Roth
                                            Antivirus:
                                            • Antivirus: Avira, Detection: 100%
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            • Antivirus: ReversingLabs, Detection: 97%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........C.O.-.O.-.O.-.`&.K.-.h.V.M.-. `'.D.-. `).M.-..c#.L.-.yY).L.-.O.,..-.yY&.H.-.y+.N.-.RichO.-.................PE..L........................N...H.......,.......`....@..........................@...............................................m..P....................................................................................`..x...xi.......................text...BL.......N.................. ..`.rdata.......`.......R..............@..@.data................h..............@....rsrc................x..............`...rhxpypg......0...................... ...xcmhltj............................. ...hnrxhix............................. ...woslvkg............................. ...eszpqhx..............z.............. ...orzkedv..............Z.............. ...zwezcbc......p.......:.............. ...uuxeujz......P...................... ...xgmlxsd......0..................
                                            Process:C:\Windows\System32\lsass.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):468
                                            Entropy (8bit):6.321838356895524
                                            Encrypted:false
                                            SSDEEP:12:Vlqic6jwH6b5EoXb02Anp7NvzEe0YYDFT3f8tEr:PqiLjrb5TXQ2ARNvejJbktEr
                                            MD5:34FCD55E39BE1DD6A37972E58853F617
                                            SHA1:A3F8EAC0AB537209F5FFCE183EA9CE7B4A3226A2
                                            SHA-256:3EDAC4AEA4B234C4DAF6719C0C71D232CDFBD9BB87FCE4A98289044F8D726857
                                            SHA-512:4571046E27C6BADACA952E754B31D1486B94D23D9C7A338C01D9273A4F621C7313CEFC6362DFD8B2C0170945F5B639914CCFD3BCEC7C892CA7D8A891FDDD8279
                                            Malicious:false
                                            Preview:............1.3.0.6.e.b.9.5.-.1.a.b.6.-.4.3.b.f.-.b.7.7.3.-.a.c.8.0.f.f.7.5.f.2.f.c...................................................M...<.x.....C.@........f..o..~`.I.*...%.l)y.-.O.......apK..?.'.....G..g?h..L.^>E..5...E......../......V$.Urh...e|....{.....wo.c..rP..c.Q:.U\>Ew.8.6.....@.ha!.~........>6..6x.B...;EG@........f..t...L7>Zr...4.........x...3Q.e....4.^..r-....L].Tv.Z.5.8~/hi...s%I4y.kn..-..v9V.\...0`...MbI.h7.D.....s...>........HL..M..F.}...
                                            Process:C:\Windows\System32\lsass.exe
                                            File Type:OpenPGP Secret Key
                                            Category:dropped
                                            Size (bytes):24
                                            Entropy (8bit):4.501629167387823
                                            Encrypted:false
                                            SSDEEP:3:GfWLN:GE
                                            MD5:8C206B1FEB44A87639D37B5B3BB42CC3
                                            SHA1:DDE021A105CDE051502647CD8BCCB42804B488AE
                                            SHA-256:A5C373CC15106BA0EE6E85E0A651FC95316C7F987B517556D82D3121DD9C3B4D
                                            SHA-512:A060BD26620E88F4025B1C30A76C7310AD5DE6AE21DC93DFCB9BD134CA24B3947411E955BADDAAA2AC20E4CD4A4CB2AD63365457AB32D04ED82502778F92E1E5
                                            Malicious:false
                                            Preview:.......C.s...u.........
                                            Process:C:\Users\user\AppData\Local\Temp\hrlAF3E.tmp
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):522752
                                            Entropy (8bit):7.583230633752463
                                            Encrypted:false
                                            SSDEEP:12288:XkdQN/1+XdYg6UMdB7qCzLohmL1BWrLc1t419lcaRto5C5u7d7777784YNt5Ox:XGQ1QXdYgkdBW3hs/W0t419vRP5SE
                                            MD5:F3F920AAF85289A8E532890BC618AADD
                                            SHA1:89DC59B51068D7B0B42404AE0746B0249A7F0410
                                            SHA-256:018B3CD8B7C6D4B100329625C262FF2F2C98DE2F1B41FB259591D99B78E1979A
                                            SHA-512:143222F2F1E0C8F20CC434879811C436C5C1BD04605AC073CDCD49D5E6876B99A011E693A987FCCADE96ED77BFFA804679EA771BAA66ADE035961E9D7237CBBC
                                            Malicious:true
                                            Yara Hits:
                                            • Rule: CN_disclosed_20180208_Mal1, Description: Detects malware from disclosed CN malware set, Source: C:\Windows\SysWOW64\zvhcfa.exe, Author: Florian Roth
                                            • Rule: MAL_Nitol_Malware_Jan19_1, Description: Detects Nitol Malware, Source: C:\Windows\SysWOW64\zvhcfa.exe, Author: Florian Roth
                                            Antivirus:
                                            • Antivirus: Avira, Detection: 100%
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            • Antivirus: ReversingLabs, Detection: 97%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........C.O.-.O.-.O.-.`&.K.-.h.V.M.-. `'.D.-. `).M.-..c#.L.-.yY).L.-.O.,..-.yY&.H.-.y+.N.-.RichO.-.................PE..L........................N...H.......,.......`....@..........................@...............................................m..P....................................................................................`..x...xi.......................text...BL.......N.................. ..`.rdata.......`.......R..............@..@.data................h..............@....rsrc................x..............`...rhxpypg......0...................... ...xcmhltj............................. ...hnrxhix............................. ...woslvkg............................. ...eszpqhx..............z.............. ...orzkedv..............Z.............. ...zwezcbc......p.......:.............. ...uuxeujz......P...................... ...xgmlxsd......0..................
                                            Process:C:\Windows\System32\lsass.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):468
                                            Entropy (8bit):6.176585217304232
                                            Encrypted:false
                                            SSDEEP:12:nlfkubZezT9bBc0IibnGK01TWf/Y1Jg9r0vpwI4DyG:bbAjcgTgq3ravpF4e
                                            MD5:9B2655A35C60ECFEAF07B879AC295992
                                            SHA1:BCDEDD2973A2BC751FC138AC618E6994F58552EA
                                            SHA-256:AD15CBD628FA38AFAE6D9B5A14C8AAD7CABC0162E91B52424730EE4D60E15D8A
                                            SHA-512:86858807D3BFF727328AD8068381E62A2D11419656D890A931D7AE8FF3B8A7BAD2213A4D0C66E31BD58641FDB1F02757CF1B6E81ED5DD27C34E4DF772190299B
                                            Malicious:false
                                            Preview:............6.c.a.c.7.2.b.7.-.3.6.5.1.-.4.5.b.8.-.9.3.3.a.-.9.4.2.b.0.f.9.5.b.1.c.5....................................................w.'*..Ij.O.g.@........f..Npj./=..P.....~...&....H.8X...!...>LF.j.'mM.Q.8..)...h...u(]N.(`|...M..#..Z=.I.....]7.PV.\..M..T.Z...!!HB..I...}..1.V....-.)...?~.X.!@l..........i.@.o.}YA.C@........f..E.V.)0....&..O.......18.]8Y.|H....Fr............O.[..=h..9.H6c..^.....D.-..MXh......|>.d.....2.9 i...A.R..?.Y....................
                                            Process:C:\Windows\System32\lsass.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):24
                                            Entropy (8bit):4.501629167387824
                                            Encrypted:false
                                            SSDEEP:3:5dzYUeR:YUs
                                            MD5:1C7A9069463873EBC576EDEC5D451B19
                                            SHA1:86B91B81E00B8CDDA233FB8796ECA60861E5D688
                                            SHA-256:E4601391E93653968F3D9329EC5F5475D5A18111399A486DA2981D742BE3BFE1
                                            SHA-512:0D0C1B0DE706722E19C48619266AE9977ECFBEFF78EBA1C016C7DE6FE99735C0CE00B3BB2818020755AFD90927D24EAD8AC4676B5B5ECA841CD746A39E9D8F59
                                            Malicious:false
                                            Preview:.r.lQ6.E.:.+.....%....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                            Category:modified
                                            Size (bytes):4680
                                            Entropy (8bit):3.71107512505382
                                            Encrypted:false
                                            SSDEEP:96:pYMguQII4i166h4aGdinipV9ll7UY5HAmzQ+:9A4E/xne7HO+
                                            MD5:FFA2D66011CECB78FE85DE6DB0E4A13F
                                            SHA1:FE47852A434B8F0AE54AEEB9E965BE6846B3A29F
                                            SHA-256:16391F9186940E7DDB4A035381D5E50656D5EE77275C32FB8DE9BCC1985BBB63
                                            SHA-512:6FFFFB0328231E3BAE63E72E076A1848D429FD45AF826C05B96DA8366C035C672A727528474CA0A0D5ED09B06F925A160A0BDDF77F5DA618A3F635A02B55C768
                                            Malicious:false
                                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.T.a.s.k. .v.e.r.s.i.o.n.=.".1...6.". .x.m.l.n.s.=.".h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n.d.o.w.s./.2.0.0.4./.0.2./.m.i.t./.t.a.s.k.".>..... . .<.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . . . .<.S.o.u.r.c.e.>.$.(.@.%.s.y.s.t.e.m.r.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.p.p.c...d.l.l.,.-.2.0.0.).<./.S.o.u.r.c.e.>..... . . . .<.A.u.t.h.o.r.>.$.(.@.%.s.y.s.t.e.m.r.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.p.p.c...d.l.l.,.-.2.0.0.).<./.A.u.t.h.o.r.>..... . . . .<.V.e.r.s.i.o.n.>.1...0.<./.V.e.r.s.i.o.n.>..... . . . .<.D.e.s.c.r.i.p.t.i.o.n.>.$.(.@.%.s.y.s.t.e.m.r.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.p.p.c...d.l.l.,.-.2.0.1.).<./.D.e.s.c.r.i.p.t.i.o.n.>..... . . . .<.U.R.I.>.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.S.o.f.t.w.a.r.e.P.r.o.t.e.c.t.i.o.n.P.l.a.t.f.o.r.m.\.S.v.c.R.e.s.t.a.r.t.T.a.s.k.<./.U.R.I.>..... . . . .<.S.e.c.u.r.i.t.y.D.e.s.c.r.i.p.t.o.r.>.D.:.P.(.A.;.;.F.A.;.;.;.S.Y.).(.A.;.;.F.A.;.;.;.B.A.).
                                            Process:C:\Windows\System32\lsass.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):11136
                                            Entropy (8bit):7.978267280066255
                                            Encrypted:false
                                            SSDEEP:192:PYvMCnnYV0ZNNv4tGO/dGbvS5nQmhV9/a/cBoSw7/k6ADS5eO7j8R2OeCS41:wvDYV0PBYQbvS5zV9/a4oSwme5V8R2Ob
                                            MD5:76F5DFD4AF291E03129A18536B25B9FE
                                            SHA1:2222956809D19F69BA3924E76D79765B1D1C93B4
                                            SHA-256:E2DE9946CA0C1BDBEE3BBB840DF63E2F5CE0129AD9B2CE85ECA4863611561488
                                            SHA-512:7905202DB3FC789085D755DF6AED5E289241B22340947038902D0F3D3C8567A8847C525F2659E0144C528073DF4D72E5B0BB3008CEDE2305E8342D7ECD809AA7
                                            Malicious:false
                                            Preview:....t+..................z..O.......r.lQ6.E.:.+....... 0...L.o.c.a.l. .C.r.e.d.e.n.t.i.a.l. .D.a.t.a........f...... ...hj.F{.<q.h?..p....f..()..@.e.J............ .....`.....bKo..bM.d......m].F.,. p*...x.>..|..i{.$....F..z.x..i....[z....:}Kq..H7....i...(..R..[.J..<[O..R...}$.......G.Bk.K..bX..4....y&w"..:}8j<,.E....h....q..x6.I.2..........=...fO..*..>1.ay.Us]qr..M.$..9.P.R.w.j..d....AQ.U.$@.. PR..O....E...M..X(..Z?...:........Df.......t..a..i.C..-.s.....n.....O..2V.b_..g.4.%...Z....0.@,.?5g4.F..`..Z.xjkc...v..b..v..B......J.s.+*.....G.[..B...."..``N,...e..%...+c..dIMy.yLM.L.T.;.g. ?.I.*.-ir.+.eQv.....co.T.b......~U..,Y..3>iC..B....(./...kFh9`3'..iR..O...i....a.....5gPan=0`'.ri..$amM....'....W..{?*..D.).K......7%..+.).c...=O.Am.E..).].>O.....+.l...gn.!.%g.c7|W.[.W.v>.......1el*}...9OJ....q..A.t..4~.^~..........e.9i......m...X..[...p.m.....7....d..)...).M.Z>...G...9....Z.M....Z.Nmi.Z. .q0.HI.u!4.........fi.......h.#P....|.G.....7U.....p.E.u.2..".Ky...
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):11120
                                            Entropy (8bit):3.881720177090452
                                            Encrypted:false
                                            SSDEEP:192:uc9WFrAXldf/Ug8bDWm+BinGWm+F4comGQWm+esxeJESbogSkmlO9:uQWYld3/aDWpinGWN4coyWGQ8EJgvmla
                                            MD5:4F96521F65FE3A6EE37708F3CBDC0462
                                            SHA1:DCE41A9008B35AFD852C46D6FBDF4B0771F92A95
                                            SHA-256:FC3F30301C2503AC566CBCC1649CA2D5034D6F39D362BD361759DAC1C3D6F214
                                            SHA-512:9B44E53728B2D096B48057AF1BFC982C3DEE5E0A7B50830437B37AC526D5442EF37DCC3AA1D953F9F521862E932EE586AE8D8D1896E711DA0A97A781F193AFE9
                                            Malicious:false
                                            Preview:ElfChnk.................+.......2...........`....... ......................................................................N..............$...............................=...........................................................................................$...........................R...m...............F...........................t...................M...c...................&.......l...........................................................................N...........................................**......+.......sj.."R........2s..&.......2s...|.Y2....a..........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..`............{..P.r.o.v.i.d.e.r...=....=.......K...N.a.m.e.......A.p.p.l.i.c.a.t.i.o.n. .E.r.r.o.r..A..M............a..E.v.e.n.t.I.D...'............)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:MS Windows Vista Event Log, 3 chunks (no. 2 in use), next record no. 308, DIRTY
                                            Category:dropped
                                            Size (bytes):160616
                                            Entropy (8bit):3.925012130936425
                                            Encrypted:false
                                            SSDEEP:1536:nHi6xadptrX9WPJHi6xadptrX9WPCHi6xadptrX9WP/:YptrX9WPyptrX9WPPptrX9WP/
                                            MD5:057A2AD3683B2C5916C4B4664F7EB096
                                            SHA1:3F86356ABC99C0C53706182EA66820FA5AE83012
                                            SHA-256:2120F9DFD68175295641B02953DA947F71E2B630654A25720E9A562A1B88DA2B
                                            SHA-512:61A064E3A8BA5F0E7F2CA06B2BF78933B9A8E3AB298FB06A6F0CC0A8D4783B1AF4C9250D0EAE0ADD56681C74DC7EC5845EECC2F1279ACE4F60FE7BD4D885CC83
                                            Malicious:false
                                            Preview:ElfFile.................4....................................................................................................T!.ElfChnk.........5...............5.................._.r........................................................................k................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&........r...................m..............qo...................>...;..................**..............4.9...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):4.395899590686579
                                            Encrypted:false
                                            SSDEEP:384:vhngNDwNAVN/NdNlN5N4NNNs7NMNmNFNoNiNzN2NeYNbMNe7N6vGiN7kFIN1O5yj:vENmkkkWehzqqVvKy9JzWc/Tr4
                                            MD5:D856B43262F32A03FBBFC7220F487E91
                                            SHA1:66786F6A43AFBA1FD30F49C2F7F5001B12D2542D
                                            SHA-256:20484562759D4F8E9BE30BC155F5B80629A9C794A564C3B80826F06F3E780AFF
                                            SHA-512:5FBDC3678511622F6537F5A046E96B76EE2782DEFCBBF2C404A5A6C60F4B4622A2BA80F13A602A355ECD36C2D4EA53BA1AA7FCCFC0F623C8BD1282FDC8DDB4C9
                                            Malicious:false
                                            Preview:ElfChnk......................................i...l..F.H.......................................................................YI................*.......................R...=...........................................................................................................................f...............?...........................m...................M...F....................3.......................:..........&.......................}............................\...................7..................**..............4...k.........V...&.......V...."[S<..~..f[........A..z...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):5632
                                            Entropy (8bit):3.846087905182893
                                            Encrypted:false
                                            SSDEEP:96:3q6VbDRYV8lmVnsHZV85BVXyVctVStVd+VPzVb:zV6V8cVyV8rVCVWVsV0VLVb
                                            MD5:ABDC860B22BD1F125E9C95F712EBF79C
                                            SHA1:2BF2F5A7265CAAB282F34F91B8A883525C6AC96F
                                            SHA-256:A2D707F2AF56912899BA9FB3A9BD863C789AC603D85C7C0BE143AFD259B4DAA7
                                            SHA-512:02A147C4882927F932BD0BC85322143A51EEDB7F02DC36646168D6BFD7EF447D0DCCD6BD5C892DC5AC7255B8CA3E97332331893A95823F570EBC4D2D0AF47926
                                            Malicious:false
                                            Preview:ElfChnk.........F...............F...............p...T2......................................................................v..E........................................V...=...........................................................................................................................f...............?...........................m...................M...F.......................................................&....................................................)...............................&......**......?...........l.........V...&...............................................................@.......X..._.!.....E..........@....l......Pl...e..Pl.......T...?....................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.A.p.p.X.D.e.p.l.o.y.m.e.n.t...'..Y.J.R>:..=_M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.A.p.p.X.D.e.p.l.o.y.m.e.n.t./.O.p.e.r.a.t.i.o.n.a.l...f.d.........L...M.i.c.r.o.s.o.f.t...W.i.n.d.o.w.s.A.l.a.r.m.s._.8.w.e.k.y.b.3.d.8.b.b.w.e.....t.-.W....**......@...........l.........V.
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):67008
                                            Entropy (8bit):4.216758591736857
                                            Encrypted:false
                                            SSDEEP:384:Wm6JmBh8mAmehm5+mdkkmpTiMmwmGmemwmbmKmKmOYmcpm9mmm2mjmTrmlmhmYEg:+6pkLTi6euYDxJWHrO+P0zyWD
                                            MD5:98A55F00D6A65615787318E39157EA99
                                            SHA1:F329614C95A2EF8DA5DE3652DF9B6EEBEFDC0734
                                            SHA-256:CDC21397A5EAA5C3C934F4509F937A2B2773FB994BB0F9290CC502AA97207CBD
                                            SHA-512:07EEEC0E84638A6E1C28ACBACD2F4AF7CFC1A0DA8BA2CCF58AECE4373C4D05CB882E04A7C64FF8F838EDE901E12EA23DA188FAC68B5E95A0343E4719ACCD7777
                                            Malicious:false
                                            Preview:ElfChnk.1/......`/......1/......`/..........8........Lz....................................................................._.(.................X...........................=...........................................................................................................................f...............?...........................m...................M...F................................i...&...,..............&............7..................#..............1...[#..s1..c:...................v..........**......_/........l.........V...&...............................................................N.......d..._.!.....[..........@..l......Pl.....Pl...\......._/...................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.A.p.p.X.D.e.p.l.o.y.m.e.n.t.-.S.e.r.v.e.r.9.G?...J...]..-CM.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.A.p.p.X.D.e.p.l.o.y.m.e.n.t.S.e.r.v.e.r./.O.p.e.r.a.t.i.o.n.a.l...e$W..R......................(.....................s.v.c.h.o.s.t...e.x.e.,.S.t.o.r.S.v.c.......A.p....**......
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:MS Windows Vista Event Log, 1 chunks (no. 0 in use), next record no. 4, DIRTY
                                            Category:dropped
                                            Size (bytes):71200
                                            Entropy (8bit):0.8712502427337568
                                            Encrypted:false
                                            SSDEEP:192:PqV7pp8nMLgv5p8nLp8nRv4p8n+V7pp8nMLgv5p8nLp8nRv4p8n:PqhpiMLgRiLiRAi+hpiMLgRiLiRAi
                                            MD5:AAC92D640266FD21C1370FE9E76C2431
                                            SHA1:F984EC1F1C16A677B0950696704470E5657A5B25
                                            SHA-256:D5E8367EBC91B3E87C962C324D706222ADBDC35C905AF21D8681268EF56F66AD
                                            SHA-512:0D03AD359E9C9CDC2E8270C30FA96B2488089078C2B14055D3CFA904313541917EB70841BC813D1BD05BAFA6E77D4C3691B2393C9086792E2820133B38916612
                                            Malicious:false
                                            Preview:ElfFile.........................................................................................................................ElfChnk.....................................H.......x./Z.......................................................................<............................................=...........................................................................................................................f...............?...................................p...........M...F...................................................................n...............................................................&...............**..p...........n.d.............g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):4.553119382038729
                                            Encrypted:false
                                            SSDEEP:768:hPB9TXYa1RFxRaayVadMRFyfqd9xZRta7Ea+5BVZUeaBhN1dJhlBlBJ9xFkogaKw:NXY5nVYIyyqED5BVZUeZ4uvhtxZNHC0
                                            MD5:FE618E338D5C3D28727C2E34CB67B348
                                            SHA1:871AC1687017A92308C10AC0D665EE0C5E86330B
                                            SHA-256:F6F1590ADFBC5766E12DEEEC49C79C61D6E925A006C143F8199DA25E9C228021
                                            SHA-512:DB38A293F9A82002C8B531E4581AD9685D6805D8C52C52BB070C37741800279B7D8D44886A568D162864F9DA45EA8F5F0CFE6115C891659BDDE5858D7981FE2D
                                            Malicious:false
                                            Preview:ElfChnk.........|...............|...................r.......................................................................g...................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F.......................................................F...&...............................................................y.......................**................9..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):94312
                                            Entropy (8bit):2.194134683121392
                                            Encrypted:false
                                            SSDEEP:384:BoOKlo1hdo69CcoTorNorWorbvorTorZorQorNor7orqorlGhorGorZlowGoror6:VDCeJLiDCeJLfA
                                            MD5:0B63F828AEAB4BFEB28F3CA09755C482
                                            SHA1:5ADC3F369D895B1C7E0DA0E9291B74E1517EB4B1
                                            SHA-256:EA7C0AD7DB7B58F79555C19EA3FDC0B7A0D49B9C5E2A7D6ACFF780FB69D5518A
                                            SHA-512:96D4D632A8AE7B837A3742E76A60A2BFA39012D093A37711B8C93B1A685030DD98E18FDA01081A00CFA39AC48309E4CC5839F482B06EF89284F6D2A74FCF59EF
                                            Malicious:false
                                            Preview:ElfChnk......................................-.../..^P.......................................................................R..................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F........................................................"..........................................................U+..............................**................1."R........V...."..............................................................>.......V...X.!..e................1."R.....Pl.....Pl................................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.o.d.e.I.n.t.e.g.r.i.t.y..k.N.<.D..97d>7.M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.o.d.e.I.n.t.e.g.r.i.t.y./.O.p.e.r.a.t.i.o.n.a.l...!>.U+......!>....[.U.....i...........|...:....A..3...b...%....=.......F.i.l.e.N.a.m.e.L.e.n.g.t.h.......A..3...b...%....=.......F.i.l.e.N
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:DIY-Thermocam raw data (Lepton 2.x), scale 10794-0, spot sensor temperature 0.000000, unit celsius, color scheme 17, calibration: offset 0.000488, slope 671170320874568247259693056.000000
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):0.8969278747465751
                                            Encrypted:false
                                            SSDEEP:384:UhAiPA5PNPxPEPHPhPEPmPSPRP3PoPHPc1Px6PEPiP:U2NJn
                                            MD5:216EB14C32C7E1C183C3849992A80F5A
                                            SHA1:40A9C4399982EA1E7325194FB23694A17BCC4021
                                            SHA-256:CE21938B348E147663DB6A985A8007DBA3205D755ADE30C97D5EF2C1C1BC395D
                                            SHA-512:9CCEB4BCECDF95FBCC39CA6C79477ADE937BA8E990839A39381FF45C1837C59C2A5C0AEE9748FF464EEE0B3EEDD33A28BC183D7B28B1446E09616C7C32CF9890
                                            Malicious:false
                                            Preview:ElfChnk......................................'...(..........................................................................1l}................N...........................=...........................................................................................................................f...............?...........................m...................M...F........................................................"..................................................................'.......................**..x.............|..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):0.8892351173604517
                                            Encrypted:false
                                            SSDEEP:384:ihZ21JJgL4JJFiJJ+aeJJ+WBJJ+5vJJ+/UJJ+4fJJ+CwJJ+D2JJ+a2JJ+JtJJ+lz:iWXSYieD+tvgzmMvbJfO5p/
                                            MD5:DB3605F9285639F33537440BE6EDFF19
                                            SHA1:81FCFAF61C34223E458C3FA15D81CCDB526FA7E3
                                            SHA-256:01EE95A72E38B2CD87C963328EF980D6CA8F213EB917FE85D0A8B7516AE6DB7A
                                            SHA-512:E6CCA79CA504AB1F45129BF0800AF3016C95AD1DC4C40820DEC5BCAFDCFF6D2F775C5686B8C3DC68089BBFAFA7272F83656A9FE60B47AE500164234E27DD01CF
                                            Malicious:false
                                            Preview:ElfChnk......................................&...(.........................................................................d.e................F...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&............................!..........................................................................................**..p............zu..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):105696
                                            Entropy (8bit):3.7902678160025047
                                            Encrypted:false
                                            SSDEEP:384:m2KhXhqhSx4h/y4Rhph5h6hNh5hah/hrhbhmhjh/h7hkh8hbhMh9hYwhChwh8hRk:m1bCyhLfILxCrT7AbCyhLfILxCrT77
                                            MD5:B934C23E0E3ABCF3265A91C1D4F96D5C
                                            SHA1:8082D84A328310850E44A5B70D0F2D3860139EFA
                                            SHA-256:A36CA34C1B815B23AA5F9BF8CA449AD33629438C22458DB8C965687A404F77E0
                                            SHA-512:E4C28C28E9F0936B026880177456E7AFDEBDB08B377E45BBAB65942BBD51CA221E374E715C27ABE43CBEBBBF1AF31DC0AE91646A6F25DD8D8B297D6A241245D3
                                            Malicious:false
                                            Preview:ElfChnk.........K...............K............................................................................................-.................6.......................^...=...........................................................................................................................f...............?...........................m...................M...F............................n...........................}..n.......................................................................................**......K.......e..."R........V....}..............................................................<.......T.....!.................e..."R.....Pl...m..Pl...........K....................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.r.y.p.t.o.-.D.P.A.P.I.@.....NF.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.r.y.p.t.o.-.D.P.A.P.I./.O.p.e.r.a.t.i.o.n.a.l....0.............`...Nw....F....._.C.:.\.W.i.n.d.o.w.s.\.s.y.s.t.e.m.3.2.\.M.i.c.r.o.s.o.f.t.\.P.r.o.t.e.c.t.\.S.-.1.-.5.-.1.8.\..............
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):114160
                                            Entropy (8bit):3.7926865225717106
                                            Encrypted:false
                                            SSDEEP:768:LcMhFBuyKskZljdoKXjtT/r18rQXn81E+ABUyxFlt6cMhFBuyKskZljdoKXjtT/M:oMhFBuVdMhFBuVY
                                            MD5:D9D6D3BFBF746F920DF98A2A3831AF06
                                            SHA1:2CD2E8D352C3F076CC5B178DA8954F3609EFA840
                                            SHA-256:EEA11F0583342D188598B59A54059CB635EC91100CA5E46663D86E6209ED8605
                                            SHA-512:1C3A936DED5C0F776E662829FF2DFEC9808253978998D88B8A712C0276EEBE11F70633D6D17402C90CD8427DC3F00DC4A3F3E39F76D3DFA82081885F874D51E5
                                            Malicious:false
                                            Preview:ElfChnk.........N...............N.....................o....................................................................._.8................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F..........................................................&...............m...........................5A..........................................**..x...........,.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):4.893042009855257
                                            Encrypted:false
                                            SSDEEP:768:fLHmQ+uYvAzBCBao/F6Cf2SEqEhwaK41HZayvVjOXJ7MomI:FH
                                            MD5:CA1A392830DC3B6BB7A7177F4064BCEC
                                            SHA1:E70797F4EE08C32A74835AF4000A37132F94CF8C
                                            SHA-256:6B1490490C3235CF3994183473B86A51351219EBED3F0ACBC79472821142440D
                                            SHA-512:ADB326E0B6E4D104D2F78C2F609B690096B0A96483DBEED5D0B1462AF87FC301C2EC23D9CF5D1BB863D532437EFC81E0EAE5250821EBD138A622DF903C74AB69
                                            Malicious:false
                                            Preview:ElfChnk.u.......w.......u.......w...........H...X...HP.......................................................................'1................*.......................R...=...........................................................................................................................f...............?...........................m...................M...F.......................................................&...........................................................................................**..8...u..........l.........V...&.......V...."[S<..~..f[........A..z...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:MS Windows Vista Event Log, 1 chunks (no. 0 in use), next record no. 26, DIRTY
                                            Category:dropped
                                            Size (bytes):93064
                                            Entropy (8bit):2.7531686606889156
                                            Encrypted:false
                                            SSDEEP:768:dDMAP1Qa5AgfQQnFNs07DMAP1Qa5AgfQQnFNs0:dFP1X5Agflc0FP1X5Agflc
                                            MD5:2CAE32140023BE192C5F01D8BA4F704F
                                            SHA1:4553FB486B675DB018FB0D473690EF6351957281
                                            SHA-256:9F3A4F539ECEDE8D30CD3D468AAD7494E75088D9997552CFF2D2C854B7DE766D
                                            SHA-512:DB9DF21CB425D3E99C8C783094B748B9BA4866C0E59BDE9F9CDED2E69745D2100C6EE552576A57662F80605D25CC3E0F7243ADDAD25214797CC8DFDD81F7D08A
                                            Malicious:false
                                            Preview:ElfFile......................................................................................................................jx.ElfChnk......................................h...k..l..e....................................................................w...................b...........................=...........................................................................................................................f...............?...........................m...................M...F............................R...........................[..&........................................&..............;...............................**..x...........HD................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):4.4396814509242954
                                            Encrypted:false
                                            SSDEEP:384:UhHE8EWE83ETsEiEsELEDEZPWEkTbEtE0EZNjExEAuw9E3E8x7EsE3E7TsEqETEJ:U7MDP0NzJAWC9NH4MM92mK
                                            MD5:6DFF4B5C09E627EF26FCBBD2DE75C43F
                                            SHA1:5F4387D1D94268078D7BA6404C86F5B2D8DFFD5C
                                            SHA-256:A2B945C20718767345C44531C294AC30813401944CB2E975ABA3DDB553F7A1C3
                                            SHA-512:D26C941A28AC836705CB600E801A7886917DEB7E99B05CCE9C6EFABEEB5BB97385FB7404D9FE3CBF2172D50635E20AC5C66B830EC766A7896B0F90F1B91D9DEB
                                            Malicious:false
                                            Preview:ElfChnk.o...............o....................\..x]...2EG.......................................................................................".......................J...=...........................................................................................................................f...............?...........................m...................M...F.......................................5'..5...........&...m<...*.........../...,.......)...2..........u................................?... ......**......o..........Kl.........V...&.......V...."[S<..~..f[........A..z...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):3.362503717077114
                                            Encrypted:false
                                            SSDEEP:384:vhYCAKRuKIYKxkKiCKVIAK8sL4K5VKjPKwnKZ/K50K8/0KXAKuWKSlK+NK8t3KlS:v1T4hc2qi
                                            MD5:4C92D93C7F87E4A64DC29463091A42C8
                                            SHA1:D19094A30349985FE09C232BBCC4B878BD6D6AD0
                                            SHA-256:DA8BE077BEF47E81B3E12759DEA5420155BA265493A46658EA13F2F928F72D90
                                            SHA-512:C3A683682B62C8DBA808AB677C2E84AE21DB5BEB3CAA18392EC76FDD5C69D62801C6AEA74AE28356D06F93164FD5E03784025CA2ED3B7107F62F216531F2C859
                                            Malicious:false
                                            Preview:ElfChnk.........m...............m...........@......Q%<Z....................................................................@y./................V.......................T...=...........................................................................................................................f...............?...........................m...................M...F............................|..........................6...&.............................................................../.......................**............... .$..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):2.4849846631124035
                                            Encrypted:false
                                            SSDEEP:384:EhFiDhKxDmqIDrfDYEDdDDDbDOD2DSD+DtDFDxDlDUDEDoDADeDuDx4DWDXDjDfj:EzSKEqsMuy69zW
                                            MD5:2226C05A4399EA005069701F13C50CDF
                                            SHA1:47682BF1A26013DD0AD0CE208EDDA173A3E7DC1F
                                            SHA-256:50777B2EC76C0C3462FE80F41F429A0DC495AFDE5863B88A5BE933D20FFAA72F
                                            SHA-512:9E879918D8840263A4B689A7F7EC1E3D56A24A29108745F12075D0DDA58FD382862CE749D25B34863FA8510A847731C7BDD5FD35A1E4D1014C86DFA4E6A43200
                                            Malicious:false
                                            Preview:ElfChnk.........L...............L...........x..............................................................................LH.................2.......................Z...=...........................................................................................................................f...............?...........................m...................M...F............................`...........................h..........=...............................................................................**...............v?..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):2.1948803970786184
                                            Encrypted:false
                                            SSDEEP:384:2hMLzI9ozTxzFEz3zLzWztCzizQzzz5zqfzDz5z1zkzSz9zEzWz+zQzqbzUTz3ze:2mw9g3LSn
                                            MD5:8A2170B6115170B335F7B2DF888450F5
                                            SHA1:CC01B3B27D4CD98569849918BEFA4C22DB3422CD
                                            SHA-256:88EE4C534A63BC86A5438584171B849D35EDAFACB1E97DF6250257EA71A9C194
                                            SHA-512:73338AC3FB0FB8F4B159CE9D8BEFCE0E4C3622C6BE478D2F8962108DE5EC8F5A176B89359518679AB534573AFBD3D129780A818D6398E51D953DB34DBDF43DA0
                                            Malicious:false
                                            Preview:ElfChnk.........6...............6........... q...r...V.........................................................................%................J.......................r...=...........................................................................................................................f...............?...........................m...................M...F............................X......E...................^`..n.......#...............................................................................**..............j...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):1.9290486353315277
                                            Encrypted:false
                                            SSDEEP:384:ehSIdreMAiIaMIERIhIVIH3ID4IUIVIFNIBeIaI9IjILIMI+I:egR0a
                                            MD5:BE1D04E97F63FA592D815B2E30BFF402
                                            SHA1:BA7066B9A288A05903F98A4D6D4DE078F0C97055
                                            SHA-256:C69017673291C70B6407E3A6A20A668BB0DEC221BBF7FE28DC536875F6CBB544
                                            SHA-512:95A39015B0E3837E5F5A22C1941F63C2DEE1DD1BC3F39D09F6AB3AF9CD32EEB50B1B5D5D06DF2D8121EAA4A029CCB56AB78C8E19F07CD0D8E0607B6665810CF4
                                            Malicious:false
                                            Preview:ElfChnk.K.......L.......K.......L...........p...06...1......................................................................4.>.................".......................J...=...........................................................................................................................f...............?...........................m...................M...F.......................................................&...........................................................................................**..p...K.......]w.Ql.........V...&.......V...."[S<..~..f[........A..z...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:MS Windows Vista Event Log, 14 chunks (no. 13 in use), next record no. 388, DIRTY
                                            Category:dropped
                                            Size (bytes):103112
                                            Entropy (8bit):5.686700124256509
                                            Encrypted:false
                                            SSDEEP:768:2BBMO5HekFNcZlinm51nXVjbHR+3g+p+Y+5K/+td+Xo+OS:gBh5+blinmTnXVjbHRRglgK/8dmoLS
                                            MD5:58459065089D3AA09490162C35CB3FB2
                                            SHA1:BE16539A16A8650F90FA5D917A180BDC0069A836
                                            SHA-256:2A686A28C2B8038A87AF958686C001F5E9D63D8433E297B1A46E1A1726839B41
                                            SHA-512:D4B022202E10EEEA44F984AEB6B520C1434C3DBB48453EF88AE537B84BC5F6DCE4BC732AE3E34952E27AE141B2D0A56A1226867E17A19055420FE49E26C860A3
                                            Malicious:false
                                            Preview:ElfFile.....................................................................................................................Q..ElfChnk.z...............z............................/......................................................................w#..........................................6...=...........................................................................................................................f...............?...........................m...................M...F...........................&.......Q...................."..........................................)H..............................................**......z.......'...j.........R#,.&.......R#,...t\....iR(.........A..z...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):1.0410598219769145
                                            Encrypted:false
                                            SSDEEP:384:Bh1hM7MpMEaMWFMu/Ma2M+AMmGM1cMNF3Mg9Ml7MABMczM0cMKhMDGMbqeMmaZM3:BeJI/
                                            MD5:2A6CB378303A1D981C7B0A302BEE8BD1
                                            SHA1:B4907ECBB48F54714B8AC0258234E8D82E76D84E
                                            SHA-256:A7DAFB2EE13C6310BAD470E94B69B7A684455C719CBFDDF4E5C30C980FF7C2F8
                                            SHA-512:30F7B30A66B94F9C1CB5E84F0CE3357507EE9D487A150B58E201A8221C18DAC1FC2E90C6D7D158EE398045DD43204CCDB7600C7E21AE25AABB55789D5C93DE29
                                            Malicious:false
                                            Preview:ElfChnk......................................-..0/...i.?.....................................................................V_N........................................>...=...........................................................................................................................f...............?...........................m...................M...F............................%...........................(..........................................................................................**..............c...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):4.243738767955284
                                            Encrypted:false
                                            SSDEEP:384:Yhk1EL1I1Vh1C1D161f1f181L1tY1VGm1Q1L1p1VG1U1Z1s1VA141c1Vc1q1tS1B:YBjdjP0cs3ZMgC
                                            MD5:2A5848FF3CA56A36A448877BFDD56309
                                            SHA1:BB2591B44C6643F6F728BEA3FBC86AEA08A5AE9C
                                            SHA-256:DCDC586F358A6D8C852C98BB1FC4A389B6687F9C7274F6B2C6EBE2390F0EF70A
                                            SHA-512:9784C3387618E510F3273678F10B3EF5EB14D55F1809DFC126E052651D6DC4885B2BF1FC37C5D222A1F7D4A75D563E0EC1709672B647C94714E6D4599ECEC92E
                                            Malicious:false
                                            Preview:ElfChnk......................................................................................................................+..................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................A.......................................................**..............*5.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):77088
                                            Entropy (8bit):3.296061569760692
                                            Encrypted:false
                                            SSDEEP:384:z+ITIEITInIlIoIDIDIbcIA2IXkI93jImIEIhIY0sIwIRITKItIIdhDIEQAGxIHl:zrvdZxGTMF/CL
                                            MD5:1359A82CC1412863F44CEAEA7CE635C2
                                            SHA1:BB1CA16FFF57AC9C05490DCA15989E7232F81BDA
                                            SHA-256:8E80FDED165897234C1916122B4A410445EAF3C566531CB0F68C81A9783B339A
                                            SHA-512:7A2D409CF3742A28DB45173C8747E2EB46790255D9E7FFC2DBE574BD40B2AA148E347902645618E8E9C18F4CCC88619E0970964C53625A7CEEE7A99E6443BEE0
                                            Malicious:false
                                            Preview:ElfChnk.T...............T...................P...h.....h.....................................................................KW.........................................>...=...........................................................................................................................f...............?...........................m...................M...F............................(...........................X......................1........................................8..........................**......w........E.."R........V....X..............................................................,.......D.....!........... ....@.E.."R.....Pl...m..Pl...........w....................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.N.t.f.s..z.?..nM.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.N.t.f.s./.O.p.e.r.a.t.i.o.n.a.l.........&.......6p.\.#i....>..........2........A..=...>.../....=.......V.o.l.u.m.e.C.o.r.r.e.l.a.t.i.o.n.I.d.......A..7...>...)....=.......V.o.l.u.m.e.N.a.m.e.L.e.n.g.t.h....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):0.8473964145384382
                                            Encrypted:false
                                            SSDEEP:384:Yeh6iIvcImIvITIQIoIoI3IEIMIoIBIAI8eI1BIBIEVIfI:YeoxYvg
                                            MD5:B8BD729014D16BDCC56875E927045A6D
                                            SHA1:6C96B9607A2E321C85E3140B207C94810642D1DA
                                            SHA-256:FB594E1E9A976C6D83FE17BD5BDA0650EA764C31FD8C904D30BA8FE437203DF1
                                            SHA-512:4A37C748DC246DA1EA4D301BF039EF85B6A649DB883C9D91F39090DDA464952304B09EB4738E6595B175A6C2EBF0E1D8B7A80A3B951B2344E93E09477924A2C4
                                            Malicious:false
                                            Preview:ElfChnk.....................................X$...%....M......................................................................2lJ............................................=...........................................................................................................................f...............?...........................m...................M...F...........................^.......................................................................................................................**..............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):3.037593139626118
                                            Encrypted:false
                                            SSDEEP:768:q4u1n8zfFFU1x4Dk13xIb13xIb13xIt13xIi13xI513xIU13xI013xIF13xIH13V:o
                                            MD5:AE26EB8C86733AA2FBADA4FBB44600F9
                                            SHA1:890480EF814AA1F96C03AC19A8E07EE9331AAFCC
                                            SHA-256:73D13AC531944AE4A35A03D2DB32E856D2515FDCF64DFF0BE521CC7635FBEDBD
                                            SHA-512:816EC597FE628634ADF6A5E99AA8E20CEA64C18064A5892C5DE5F72A664B8FA617FDB2AEA47306B0BDBCFC6D1ED5FE8D594CC3B3C6988BC6BD1DE012C077BCAB
                                            Malicious:false
                                            Preview:ElfChnk.....................................(...8...gn..........................................................................................(.......................P...=...........................................................................................................................f...............?...........................m...................M...F............................................................ ......................................................................................**...............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):4.426245011175516
                                            Encrypted:false
                                            SSDEEP:384:MhhKVKrQoKIKZ8TKnKkKFK9K6GK7VXKR4KVKZKjKSWKtVK4wKnhfKKKP7kKFKKK8:M+R89L3GpVW1/IC1UE1D/eXHTaGjw/Q
                                            MD5:27085F4738F8E522BE8926BFB4A55870
                                            SHA1:69B13B6E4E9958EAF2635A0953170098272E3587
                                            SHA-256:5DFEE2F6C1163169FA03FF8CD1D8685B59D89577BE52673ABDB228A89EFD09DF
                                            SHA-512:AB04F4D58AC32C8A4C77B13E21DB9E873166765EFEFD852226BD86F69E3EB71C8B10994DA09EF273D007C041B4F3628A6685EB8588AAAE2955B01E23906819A9
                                            Malicious:false
                                            Preview:ElfChnk.........>...............>...........................................................................................?-.................l...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................wJ...................-...........................*..........W%...'.................._@.......9.......3..**..............C...l.........V...&.......V...."[S<..~..f[........A..z...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):0.8054444176540313
                                            Encrypted:false
                                            SSDEEP:384:/hP8o8Z85848V8M8g8D8R8E8t82U8fM8j8b8:/Fj
                                            MD5:173544EFADD8E5B22B7B87393BEE28EC
                                            SHA1:7761FA65139D66A37158BB5F22B3C403106E210D
                                            SHA-256:0D00247623A5664C48C2664ECA419CB49F069ABAC75A74CAFBA30BFB3AE1728A
                                            SHA-512:3959BF8F8746BF6DD1C36DC9EF0D1EDEA97B67EBBEA4E00A540860141BEBF7B4CE040F07FB281A99CC18C10A59F5D6D06A5622421CEA4A25AA106579119DF087
                                            Malicious:false
                                            Preview:ElfChnk......................................!..0#....z......................................................................7..........................................V...=...........................................................................................................................f...............?...........................m...................M...F...........................v...............................&.......................................................................................**..(.............................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):66480
                                            Entropy (8bit):3.775158791071695
                                            Encrypted:false
                                            SSDEEP:1536:rXhzUyS+z1VV18o838c8bUc8cVVsz8VX8SoX8aA8cmtpjAiVB18dwE4vjcYoMjn1:rXdnS
                                            MD5:723EAFBA9BD8114E33A0288DDD4A357A
                                            SHA1:9C2CE0CC243F3F8AE0857A0C841FE6C0AA5C4F27
                                            SHA-256:CE7C5B2DC33BDF912E5B70CDD63CEE249C9BC8BFCC6C9D1E64883FCC30E413BD
                                            SHA-512:309AD5E5A0F5533D97577C588B1C778C99DF4E6646B071F5FB4BA50E1CC387A8183E4C05F7F64787810DF354335B5A64F23F3CB2119C6AE0CF475739AAC0CDBB
                                            Malicious:false
                                            Preview:ElfChnk.........(...............(............L..pN...:h......................................................................l.7................v...........................=...........................................................................................................................f...............?...........................m...................M...F............................9..........................vB..&...............................................................O.......................**......(.......V..l.........V...vB..............................................................\.......t.....!................@V..l......}......So...$.......(....................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.R.e.s.o.u.r.c.e.-.E.x.h.a.u.s.t.i.o.n.-.D.e.t.e.c.t.o.r..t....T@...>..$pM.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.R.e.s.o.u.r.c.e.-.E.x.h.a.u.s.t.i.o.n.-.D.e.t.e.c.t.o.r./.O.p.e.r.a.t.i.o.n.a.l......LO..................ElfChnk.........(...............(............L..pN...:h.
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):2.4140097162397725
                                            Encrypted:false
                                            SSDEEP:768:c0VsLY/Z5aFka2aKazzabCafama5Sa0ra6rzaJcavkao9OZaaY1EZ290/u00O0X:wcE
                                            MD5:52D82360FD520B2636848032417269E9
                                            SHA1:EBCEC73783331C56A595EB67FF025FB3D1807B09
                                            SHA-256:D1768EADB19BFA52ADD7DD91D2DD1998743903FD33F6A733298480493894E69D
                                            SHA-512:53A848D4E04EBFAFB129C3939123205CE9F02E916610105E94E446EFBD6720B72A3D4F7B516C7EB0B3FE217096AB8029E26CD33C7801592A44B020251B256103
                                            Malicious:false
                                            Preview:ElfChnk.........>...............>...........@x..pz...........................................................................9..................Q...........................=...........................................................a...............................................................f...............?...2...........................................M...F...........................*...........&............................f...............................................]..........]...................**.............._.............X..&.......X...],T.'tB..E........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):4.117541217096697
                                            Encrypted:false
                                            SSDEEP:384:dhfixkk1bdzpFEVQ35pmixR5p2ixR5yYkzixR5pnsixR5pFok5pbik5pKik5yY5T:dVLpBVi7CPFKDY21mpI0U
                                            MD5:7F49DA8AB5DB6EDF35830BA109A0F38D
                                            SHA1:5CD5A5A9A815FEBFD1C9A54283B6FB6BD7D78AD5
                                            SHA-256:E8D3B6523A85CC2F5883D8B1AD7FB34677E364166B88B10AFB051DE8F9D16EAA
                                            SHA-512:4A3F7977A9052C9DA12179737A841A53F74E2C3C82D898A0788DCE594D900B428044B8AE05C29B690CE25EC4F8BCB28EF6FB1BFE804218E68053C658175213B0
                                            Malicious:false
                                            Preview:ElfChnk.'.......+.......'.......+............$..X+..M%........................................................................4.................T.......................|...=...........................................................................................................................f...............?...........................m...................M...F...........................................-...........&...........................................................................................**......'.......~.uql.........V...&.......V...."[S<..~..f[........A..z...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):4.328442817893915
                                            Encrypted:false
                                            SSDEEP:384:NHD/hDGCyCkCzCRCFCYC5s+CWC8CtCLCTuCqCRC4Cb8CoCuCVC52i62H2ED2M2Dc:NHD/dzA2pAOJ
                                            MD5:5DA76C1D65C494891DD1A12EB8483523
                                            SHA1:4550F2010DBFEB809CA6AEB96AE47DC2D49AF711
                                            SHA-256:5D67CD8B17AEBF94995A1BF97D80BC1409CD8F48BA150BAC19DD4E976B39E022
                                            SHA-512:6F0DE210AB707BDF2357AE5D295DD1D6E9D6EA4E42AF071DC19921D57D1B8AE422012B38CD81D958789C8D498EF5B14C24E852D425E4B50E106715AF75CE1263
                                            Malicious:false
                                            Preview:ElfChnk.U...............U...................X...`...#..3....................................................................z...................F.......................n...=...........................................................................................................................f...............?...........................m...................M...F............................H..........................ny..&................................................x..............is......................**..0...U.........Df..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):4.483935185214427
                                            Encrypted:false
                                            SSDEEP:1536:jbYYysVM8GZEhmw8P9ZltmtO5KdA2mlbdLE3BDgGhUvJX2yvUNGh09rSMjMEOnLl:jbYYysVM8GZEhmw8P9ZltmtO5KdA2ml/
                                            MD5:4C9EAF05DF0A544E5850C34036F8E3FF
                                            SHA1:BDF3CC94443DE28D27ADAA89BB42B5C4B91E0A6E
                                            SHA-256:18ED1D118F7F347FEE9AC706C38CFB061E761E242105EAD1E07FDE111F43B4C8
                                            SHA-512:F674DF8C1AAB03843C3DE30A8933F95534A95C20BEEE84A07B8F49A07FC20D28F5C38E0B25998C2DDED26D906A5773E739CB83B20B4BA27175487516AE7ABBE0
                                            Malicious:false
                                            Preview:ElfChnk.....................................(^..._..........................................................................jf..........................................V...=...........................................................................................................................f...............?...........................m...................M...F...........................&............................O..........................................................................................**.................Ej.........R#,.&.......R#,...t\....iR(.........A..z...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):70808
                                            Entropy (8bit):4.442093941856379
                                            Encrypted:false
                                            SSDEEP:1536:U4lNCSxiYIALLKj0HPufXEkOycycrdVH2C9khXEtIo77W0RUJ6tXGRh3qyPJYqgF:U4lNZxiYIALLKj0H2fXEkOycycrdVH2u
                                            MD5:77F0988FAB2988D8D3F033CC14BFAC32
                                            SHA1:03716B2DDFD43521A5C2FACBAD3D709FBC668A34
                                            SHA-256:CC9AD5D5FA4B90F093536518965F6714C30889060C747B0E79A9450B4BE59617
                                            SHA-512:D3C228C4A95D443D098DBE4639E76C412EC42F973676341716634AB53671CBFDDF417622C6770455F5A5DFC05BAF6A836CEEDF84EC64683335BBA04C7CF5D0FF
                                            Malicious:false
                                            Preview:ElfChnk.(.......k.......(.......k............}...~..$Td........................................................................d........................................V...=...........................................................................................................................f...............?...........................m...................M...F.......................................................&.......................................Ao.......Y..........ir...V..YR..............![......**..x...b.........=."R........V...&...............................................................8.......P.....!....nqm......... ..=."R.."../5@.E...............b........................$.N......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.h.e.l.l.-.C.o.r.e..n30'.|D..Q.R.a.M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.h.e.l.l.-.C.o.r.e./.O.p.e.r.a.t.i.o.n.a.l......LYR..........C.ox...**..(...c........h>."R........V...&...............................................................8.......P.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):2.4811047309915093
                                            Encrypted:false
                                            SSDEEP:384:ch67e7W7r7i7J7O727Z7K7A7B7Bn7u7+7q7O7g7Q7x7x7o787F7K7g7v7L7B7y7r:c7m
                                            MD5:2E6CEC61E2DECF28A9AAC3D02CB02273
                                            SHA1:070D59D523A9170A9CC6573077CC0CE8A695A76C
                                            SHA-256:AACFD64ACB92999F93EFC4ED46F299F47BE3957EC0FD3D4BE1BFB590CEA014D4
                                            SHA-512:F36B3DD188BBADE38FB46E88DDE1D8C63F2A51147692CF81324C4B2B6A7DB0EDA95F293D7D5AE34D3510C3E7A47C052FC55C0FDE96007F9C7DF1535F3BCD912C
                                            Malicious:false
                                            Preview:ElfChnk.....................................Pv.. x..9..M......................................................................]0............................................=...........................................................................................................................f...............?...........................m...................M...F...........................M;..............e4..c........S..................................................................M9......................**..@............MG.j.........R#,.&.......R#,...t\....iR(.........A..z...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):2.4234349311397776
                                            Encrypted:false
                                            SSDEEP:384:Whc+uaNuru+uhuKVuPJu5u9u4ufuTuxuDuvuDuOuXumui+udutui4uTAuFuauinp:W6Ovc0S5UyEeDgLRXjgvXRa8B
                                            MD5:59217658366B2509FA3C5AE2BFFBC088
                                            SHA1:55B8F8A64A65CF082308A18854830EDC21621E5E
                                            SHA-256:DA0E6873717D053523129076B19908B8111FDF193AB01CA9B84D0E66B528EA59
                                            SHA-512:91EC38FA62CA2D8150FAA161B59D5A1F86A687EEAD7ECBB467C0CD350B0B0A7E00A90CF2F058B836A76444790F28EB45FC222C94B38057A5D32AA1A85F9AD825
                                            Malicious:false
                                            Preview:ElfChnk.........B...............B............{...|..!.H.......................................................................A.................,.......................T...=...........................................................................................................................f...............?...........................m...................M...F.................../g......._..........................Fj..........................................................w...............................**...............&3..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):0.862948105155997
                                            Encrypted:false
                                            SSDEEP:384:jhGuZumutu4uEu5uOuDuyb2uPu1uGu7yuw1uzugu:jWA
                                            MD5:C6E3EAAF79B9B74847E15062DBDCBDD2
                                            SHA1:9FCDDE8AE58182517D5AC9D3FC46894BF371E5FA
                                            SHA-256:5641D304842318A93A4A3F51DBA6C48BBDD521CFB52AA6D69F144EA32B49CBD7
                                            SHA-512:7D794DE25E4B2BFC21E9291F73E303CC54D512FB2618E4FC44818867191ECCCA237AD69BB5C0BCB4D571109F1B08B71E2342BEABF729D42213B2E0B14E92B9AF
                                            Malicious:false
                                            Preview:ElfChnk......................................$..x&...U......................................................................R.v.................$.......................L...=...........................................................................................................................f...............?...........................m...................M...F...........................>...............................&.......................................................................................**..............Wy.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):2.3496875518839038
                                            Encrypted:false
                                            SSDEEP:384:iOhGA5AaA5ATrAk3AWAsATdATpATFATIATgATJA4AdA1APAYATuATBAT1ATA0bAk:bNhyY5wo
                                            MD5:0EC3CDA3A528BF0A5729B89E1A358139
                                            SHA1:73604785D78AC69BDED4E0145CBC0A4A2B879D95
                                            SHA-256:5D1AB67361A2BDC834E8DC88AFC5A7BC52427FD0404A0EEDDEBC23B613A21787
                                            SHA-512:DDDC72B157F1EB1716E9FB26D734F1DFF94F9FE4A709E064B6E07A265CA590DEBCC52B6A84F50B978C9A4002CDCF0D2D7B7FE280F976629ED02A74706E9A5850
                                            Malicious:false
                                            Preview:ElfChnk......................................w..Py...........................................................................r..................2.......................Z...=...........................................................................................................................f...............?...........................m...................M...F...........................M]......................5W..&........................................A..........................................UE......**..................k.........V...&.......V...."[S<..~..f[........A..z...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):3.1948897756370673
                                            Encrypted:false
                                            SSDEEP:384:OJhCpj0npRFdpR0VpRblpRi1pR5FpR4FpR/VpRWNpRt5pR8ppRTpR9pRqpR/Z1pO:OJVZfzK
                                            MD5:119A74A6EB4E3DCD24AAC59CDA066CB6
                                            SHA1:9EA2058F915A454FA321572AB1202DF132C61EB0
                                            SHA-256:7ABFFDBEF98597906F5D9190020862061C0D344E8DA3534EB6E93072581C9D49
                                            SHA-512:6B7A7733A034B604B85351BC4B2E5607F6AE4D5DE22C73412426B39B06DCB57C7BEB79992C4F4DE2205D7006D91E1D79ABB8AE1EA1BCFFCACB58BA2EB7787D8A
                                            Malicious:false
                                            Preview:ElfChnk.........'...............'...............x....d......................................................................uS|(........................................8...=...........................................................................................................................f...............?...........................m...................M...F.......................................................&...........................................................................................**..............85E.l.........V...&.......V...."[S<..~..f[........A..z...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):4.05389871156127
                                            Encrypted:false
                                            SSDEEP:384:hhtbpwV1pIvpLfpvQpw2pQYph15pcApLqBpJxTp0qo8psfp4yp4Rphe3p7PpLWBD:hwDoh1VnwAqq6pEPETGwC
                                            MD5:0D68BB9D8D59E1CC578AB776FCEA4BDA
                                            SHA1:0BF5606CB5FE98CDB63E92DBAF8D9511524E27CD
                                            SHA-256:720E52B6452429C30337E6253C1713F83E2F39537C150253416741F87C08FD1A
                                            SHA-512:2E5912C1CB6E7E52634CD1C9C71BEB57F7334F32989B1FEC217660BD6A0CD24F53038165B8FE2097FC0B3F78EC48DE9F0BF66587891B20430A5D5739E78FAA1E
                                            Malicious:false
                                            Preview:ElfChnk.\...............\...................P.........Z......................................................................j................*.......................R...=...........................................................................................................................f...............?...........................m...................M...F...........................^................;..............&...................................i...................................mS..............**..8...\........=..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):1.2109210432370807
                                            Encrypted:false
                                            SSDEEP:384:bhwCCRzCaCkClCzCYC/CyCVCGCMCvCxC5FC4zCxCBCgC:bKFAL
                                            MD5:4E735688182523E4C28E902DE2F33BA6
                                            SHA1:5C74904D115A01F69E260912CAF8B65B0937B3FD
                                            SHA-256:48824D29CF3DB10C4213E4D1C92D8A28E00DA359AE9FC3BBA8BFF346B77C18E1
                                            SHA-512:A9FFDA7C6594605FFC85780BA8151EF4F653B585654C979FC7F562657DD340311CDB289E6BAADF16906370308FA2589164E27800B79F4660C923F402234532D7
                                            Malicious:false
                                            Preview:ElfChnk..................................... 6..X8...).M......................................................................&o................V.......................~...=...........................................................................................................................f...............?...........................m...................M...F...........................v)...........................-....................................................................................../...**..p............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):169616
                                            Entropy (8bit):4.624467808471541
                                            Encrypted:false
                                            SSDEEP:384:tuMIYbMzYCMvYUMvY2M6G3MyvMJM4E/2M/M/M/MPM0MwMCMsMSEMzYnMn+MOfMSl:37zxm1ZDEXfV7zxm1nVDEXfV7zxm1AB
                                            MD5:759E6C3CB93890589215A70E10DBB911
                                            SHA1:6884D08A70E7891C993A64534FDC8CAD9E31E5AC
                                            SHA-256:CB3378482CDDCCB399C8E2164FE5F587D1D3C232216A2E632D7745A9742B0EEE
                                            SHA-512:1ACE605046201A5114DF8EE934C5CE337E52E39EBBA63E005087652AA7BEFDF0AC2ABB61C783B8813F40FDF74F6827F35A83554C23A3177743481D49F4CBC9CF
                                            Malicious:false
                                            Preview:ElfChnk.."......-#......."......-#.......... ..........x.....................................................................I..................0.......................X...=...........................................................................................................................f...............?...........................m...................M...F.......................;4......%}......................&....S...................................E..................c...............................**..`...."......G:..l.........V...&.......................................................................F.....!...A.A...........G:..l......Pl...e..Pl............"...................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.t.o.r.e..7*...\..C.....M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.t.o.r.e./.O.p.e.r.a.t.i.o.n.a.l.......E...........T...'...L...............0....A..%...X........=.......M.e.s.s.a.g.e.......A..'...X........=.......F.u.n.c.t.i.o.n.......A..#...X........=.......S.o.u.r.c
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:MS Windows Vista Event Log, 1 chunks (no. 0 in use), next record no. 14, DIRTY
                                            Category:dropped
                                            Size (bytes):78880
                                            Entropy (8bit):1.813424309005145
                                            Encrypted:false
                                            SSDEEP:384:9ihL6UsE0ZUmxUmgDUmSUmKUmgUmlUmB8UmCUmeUmx9Umy+Um5UmhhL6UsE0ZUm6:EY7LAmSY7LAm
                                            MD5:5832E7D34EA9C548568B1E616BCDDAFB
                                            SHA1:AD1634DE80DFA67FD9BB4E6FFE6581EF9D2CFF0E
                                            SHA-256:215F4A167ADBF2E87D108AFB23E64EE55C9A6CE2FF45BE3EDFB10B2A0F109B6D
                                            SHA-512:FF2374A7B03F944D961F681ABF587A1A02DB1E412839E265903A6A38D59AA09D71A44D19E00E10BD17FE1FD8D5FA67F2751D64FA09DB22CA6D185A28CEB8437B
                                            Malicious:false
                                            Preview:ElfFile.........................................................................................................................ElfChnk......................................1...3...&.......................................................................g.................. .......................H...=...........................................................................................................................f...............?...........................m...................M...F............................(...........................,..........................................................................................**..............a...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):67776
                                            Entropy (8bit):0.3664563325397789
                                            Encrypted:false
                                            SSDEEP:48:M1oWm7rP+wQNRBEZWTENO4b3BEoL/6q/oWm7rP+wQNRBEZWTENO4b3BEoL/6q:UkaNVaO82oL/6q/kaNVaO82oL/6q
                                            MD5:66E02E3E8F0FEB92AA22BA57CA6BBEBE
                                            SHA1:E136D43BADE2F4F6FEAE6090DD49F7EA6AE5168D
                                            SHA-256:D96EDEB850C538E6787328D4832A9C2F7432C3B26C9ADC4E539750464DFCB754
                                            SHA-512:BFD6DBE8459ED48A42EB1FBE8D0CA1D1DB010ED21B04441D283A512B4DFFDCD38679B93D338788662384D79CC73B47E8C0C4016A77F5AA37BB731A3FEC192DB5
                                            Malicious:false
                                            Preview:ElfChnk..............................................p......................................................................x...........................................F...=...........................................................................................................................f...............?...........................m...................M...F.......................................................&...........................................................................................**..................l.........V...&.......V...."[S<..~..f[........A..z...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):4.105856407104524
                                            Encrypted:false
                                            SSDEEP:384:VhBPiv5iKiR2ioAiRipipikiGi1iYiTi5i6inihm8i7zi+i0/iri8i2iaiI9ibis:VGqsD1dAsM9QSp
                                            MD5:A49BEAB6C1B19025A42FDA1F613A48B7
                                            SHA1:E81E83A5FC860D057E9DC0BEAECC2257CF0F4861
                                            SHA-256:DC7F1C66EFECACEBB1AEAB916298491FA4BBCEA0C3B075603F165BB4907A2D0B
                                            SHA-512:B2A1B0E69668A7A8C94490DCA1484E40478B3FE4ADE81301659EC74C50CCEF6F9BFA2668142A120EA2A05ED96DC795D2C6F025E0AB0BE41B8072E7E37F2B7938
                                            Malicious:false
                                            Preview:ElfChnk.y...............y....................j...l..........................................................................w8Vl................F...."......................=.......................#...................i%...................#...................................%......................f...............?.......................P.......................M...F............................/..................."...%...A..v........5..............................................................<...............**......y........~p.h...........g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):3.3849536655991894
                                            Encrypted:false
                                            SSDEEP:768:hHaIPeaQaEa8aIasakaEakaYaIaIa8agasakaMa4asagaEaIasaQaMa0asaAasaL:hP
                                            MD5:D71A358C3C595A0960A939DFACCEEB3F
                                            SHA1:0D93271B65FFAF422C4A29B8AFD27C5912064437
                                            SHA-256:33F1917163C6D5AE98821C7B9CA76BCCF2853A5430AEDA7E0E96373087CF2816
                                            SHA-512:3C7796AB6DDE3181B8C5BE899B83A9653CA1C2B4C0A45CD5D61CE40C5C535FBFD6C9EEBBE970159D3B8B8B34E74291B5BE6858FD0D077C9ACE8FF592B059E3F9
                                            Malicious:false
                                            Preview:ElfChnk.........@...............@...............`....f`H.....................................................................'<.................^...........................=...........................................................................................................................f...............?...........................m...................M...F.......................................................&.......................................................7...................................**..H...........c...l.........V...&.......V...."[S<..~..f[........A..z...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):1.4082854814444645
                                            Encrypted:false
                                            SSDEEP:384:3haXJb4+XJcXJsXJrXJQXJIXJdXJkXJuXJyXJLMXJxXJ4pXJFXJeLXJDXJ9XJoXJ:3Q0yUkNYwD8imLEH4fretljQ
                                            MD5:629A54AB1C62EAB7DA6A00D6578F6F0B
                                            SHA1:C35F7F57428072D1A5C2A44454B8C75ECBE64088
                                            SHA-256:FBB078238BC25506FA5D37F15738E022F1430464466858D9E52C015C2D0E6F53
                                            SHA-512:7848A78D5EECE8069A80600AE3283FA91E592A2393F5A82A6670BD830332544E688A2B1193C08A9DEB3568D69133169ECA86E061A7D63D1E6E0A1B1484E343E1
                                            Malicious:false
                                            Preview:ElfChnk......................................C...F..3.Jf....................................................................z...................j...........................=...........................................................................................................................f...............?...........................m...................M...F............................0...........................8..&...........................................................C...........................**..............@V.$..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):4.348490523569564
                                            Encrypted:false
                                            SSDEEP:384:+hxxmZmCmsmzmZmTmomSm/mjm/memGmhmAm9mYmQm2qmwmHmLmlm9mGmdmpm3mfd:+ODcxlzYWs
                                            MD5:0F1B8CD5ED26A4DA771BDB5F454D870F
                                            SHA1:88458537CA9E4E22BAD7415C10A235C25EEB9BFD
                                            SHA-256:4C56B53599E7A5EC677A3BC99EEF1F6F0CE83317441C0F8FE74425C069D4C7DD
                                            SHA-512:C00CB2197D4B1D2137B445C285EFF456D36181ADAFA7474069B6F008EBB764475E8B53090BFBAFA03A8DC4ECA6BAB556552568C6B600439EFE925D1A50819CAC
                                            Malicious:false
                                            Preview:ElfChnk......................................*..h,............................................................................v................X...........................=...........................................................................................................................f...............?...........................m...................M...F...............................................k.......&.......................1...........K.......................................................**..................k.........V...&.......V...."[S<..~..f[........A..z...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):0.7468847878197933
                                            Encrypted:false
                                            SSDEEP:384:ihm2j082AO2q2G2Z2f2V2h2d2h2B212x2:id
                                            MD5:2168C775D5DCCC582516B831034AC93B
                                            SHA1:8495CA0064C23D131CC4A6C5126CBC42BF93017F
                                            SHA-256:D396096CC0189B3FBAD27A5D019B698423C9382746402945F26A0635F46082FE
                                            SHA-512:E767798650253E41EEAAAEF1FD21453BD23DCAFFA3BAC651F83D6C7458CA1EABE6B2D4BD8D61F398587118918676451E9428DFF304F02D64F5E0FD56A5474720
                                            Malicious:false
                                            Preview:ElfChnk.........................................H ...q.....................................................................~'.................J.......................r...=...........................................................................................................................f...............?...........................m...................M...F...............................#.......................&...........................................................................................**................b.l.........V...&.......V...."[S<..~..f[........A..z...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:MS Windows Vista Event Log, 1 chunks (no. 0 in use), next record no. 11, DIRTY
                                            Category:modified
                                            Size (bytes):69632
                                            Entropy (8bit):1.3034811700787372
                                            Encrypted:false
                                            SSDEEP:768:uhEpP9JcY6+g4+Ga6ouepLP6xIb13xIt13xI:uypP9JcY6+g4+Ga6
                                            MD5:6FFA7AF617C069392F3EF90A5F3129F9
                                            SHA1:D79FC5528541BE012CFE0E6558DACBAB09C96F7A
                                            SHA-256:3D4D281C309E1BFB40544D61AF0564F6DC69DB4D04C1E671E1E25FF450EB42F3
                                            SHA-512:4A4CC09226BC71331EDF0C148E17B2FEF10A1343345F4C4C069DA4652ED76A95C9D9D2FD35B4F9F06192CAE4D0CCA3F1062BA07DD551B0D9F969130F0927C197
                                            Malicious:false
                                            Preview:ElfFile.......................................................................................................................|.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):111168
                                            Entropy (8bit):4.378848486770145
                                            Encrypted:false
                                            SSDEEP:384:VhRRVwGRA6RGRwR7R3ReRuRIRcRDR6bRgRwRcRgRpRZR+R+RlRcRqRmRRiR5Rkml:Vq/f2Lvxrakq/f2Lvxu
                                            MD5:AF0EA78545A33BCD509F345A3014ABFE
                                            SHA1:1BC48568D7CA4D0DBF2DD217C045216308D06082
                                            SHA-256:72D9267BA1F74BBEDA83768BA8F4DD5414CC8A18C2A1BD87EFB2D56B30B1713F
                                            SHA-512:B9DFAD0C8310930867C6F101DB28B4C2FDA5615F1CA3B592D4B487A3BF11091B630AA0EFB9AC368AD97922DBC00AF4D024D320E0E5C1B903CB7FA2FF7E0469B5
                                            Malicious:false
                                            Preview:ElfChnk.<.......l.......<.......l...........P...P...q.c.....................................................................le>.....................z...................T...=.......................................8.......................M...#...........................................m......pl..f...X.......dm..?.......................8........m......=.......M...F...1m..........{...................................Il..............................................................&...........................a...**......<........*zDj.........._.X&........_.X...S.p...f........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):4.280894283545869
                                            Encrypted:false
                                            SSDEEP:384:Nth1hghdzhkh7hVhmh2h+hchuhshqh9hihXhMhxhzhwhohGh5h3hShChWhzhLhaE:TIFpkBmPVvZhJv
                                            MD5:895B188A8622F9F4BE91C41E1A439BA0
                                            SHA1:9D6561EEC77A9BAAF282C1FAD7D10E01C3160053
                                            SHA-256:7DCA11C307B9304783F9C4C8FD228387D2953CFED9364B9EA0A932534A325E8F
                                            SHA-512:927D18C0DE78188A23B35F2A8A56CCDC7F46C334790426693C20A182D84890305C7A8C62EABA12C96A84BA1C8A8AF6D0865FCF4BA76AC661B0BB968BFDBA045E
                                            Malicious:false
                                            Preview:ElfChnk.........................................(.....T.....................................................................|5s.........................................6...=...........................................................................................................................f...............?...........................m...................M...F.......................................................&...........................................................................................**..............X..Kl.........V...&.......V...."[S<..~..f[........A..z...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):1.3017357672937786
                                            Encrypted:false
                                            SSDEEP:384:V+hOVPiVcVCVC7VNVtVEV3Vob7V5VXVmVbVoV/VEVptVtVBVnVOVUVYVu0VmVfUz:V+yjbSJU
                                            MD5:A608DDAE2F87380F0D3A7DBCCD47792A
                                            SHA1:2D65DB93A142AC092546172DA7D77CBDB76EBA08
                                            SHA-256:845D0D62A98B3134E1843B276752963E215AD9CBB220114F4554CFC5239E610C
                                            SHA-512:54CA61E208040019268703ED1FD29B0E6F2C76E734387E47792120753595C9127FF41546822B96950C9B7523636EF7CD2E7B6BA244E64FD821D4BFB9ED4BD556
                                            Malicious:false
                                            Preview:ElfChnk........."..............."...........`:...;..........................................................................v...................&...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&*..............................v.......................................................................................**..P...........y................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:MS Windows Vista Event Log, 1 chunks (no. 0 in use), next record no. 5, DIRTY
                                            Category:dropped
                                            Size (bytes):5304
                                            Entropy (8bit):4.0810688176375765
                                            Encrypted:false
                                            SSDEEP:96:E0fRNVaO8sow/sTYS5oz/sTf/sTpUrrjjPA/sTnmrrjj/u3/sTz:E0LV7Xk8kozkDkNMvIkSvUkf
                                            MD5:4F086BB12F00301D9F6C30D6BBA4F7C0
                                            SHA1:3CFB3DE459E7C4DEEF20A55763436F4F50189BA2
                                            SHA-256:381A1FF1BA79546704E07CFA9BC2CF843085A82920D9907BA21C168E51CCFA64
                                            SHA-512:8F95B303C616C90BD8B3E49B4B452DC56C4EDDE07E544700B1AFB4F9FD630402F9ADE0DC9176B0B5C23602BCC74203242A34BAF396AE128396CDD8DDAAA69827
                                            Malicious:false
                                            Preview:ElfFile......................................................................................................................RyNElfChnk.........................................8...B.R........................................................................................\...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................5...............&.......................................................................................**..............r..!..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):69528
                                            Entropy (8bit):4.210192374961083
                                            Encrypted:false
                                            SSDEEP:384:z8BwBYBwBpBwBJBwBcjBwBAhhmBwBeKb3XkBwB0AVBwB0LuBwB0yeBwB0yxBwB0S:AraKbRaFTB
                                            MD5:7E6374D37098136D8B83FFC48269099F
                                            SHA1:8889FE1C32AEC313456C933D166E2016BED6BD1A
                                            SHA-256:BBA86525747073CEA12B1E591CBD4C6D4A3841CBF46DC961E73A6FE9EE600E1E
                                            SHA-512:01AE2E4A9A8CA186B34143B4C657C18FC2008BBBFE39EFB50E974702152E034FCB658304C7A3C72DCE5A5EA138D5F7C0284D1B11C90A50801AC502725B927EAB
                                            Malicious:false
                                            Preview:ElfChnk.R...............R...........................d..-.....................................................................L..............................................=...........................................................................................................................f...............?...........................m...................M...F.............................................../.......&...................................................................g.......................**..h...............l.........V...&...............................................................r.............!.....................l......Pl.....Pl.......d........................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.W.i.n.d.o.w.s. .F.i.r.e.w.a.l.l. .W.i.t.h. .A.d.v.a.n.c.e.d. .S.e.c.u.r.i.t.y.....*qM.F...M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.W.i.n.d.o.w.s. .F.i.r.e.w.a.l.l. .W.i.t.h. .A.d.v.a.n.c.e.d. .S.e.c.u.r.i.t.y./.F.i.r.e.w.a.l.l....8m.....................................<
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):4.428253354580031
                                            Encrypted:false
                                            SSDEEP:384:zhtUEXUEINZUEIsUEI7UEIJUEIXoUEVUEmUEIvUEISUEIbUEIvUEIZUEIuUEIIUI:zAq3mQ6y5GyAN7nuo0pjGQQwjx
                                            MD5:CDA410A4B6EDA4F017D994EE4A4CBB2C
                                            SHA1:8D59FDD6C7117BF0A66EAF7A013AE0AB94686374
                                            SHA-256:28EC2D562E65B029F4D656D81ACFD470690880C5B74DF96A9D16B9DF64AC375E
                                            SHA-512:41206C9DB1937DBA09E1F00AAA1AAB4541DFE0EBD24067D3291E2618E4C47C567F96FAEEB3EE98C2716EF600AC0AD732BE9C1BC4C32872FCE8D561C7978AAA6B
                                            Malicious:false
                                            Preview:ElfChnk......................................'..()..uK.8..............................................................................................................>...=...........................................................................................................................f...............?...........................m...................M...F.......................................................&...........................................................................................**...............e.Kl.........V...&.......V...."[S<..~..f[........A..z...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):131584
                                            Entropy (8bit):4.345029325788873
                                            Encrypted:false
                                            SSDEEP:768:J4i3wAElSZMQNGWjuMoBmHiVD52I569Sgw:n3/ElSCYoBmHiVAI569SF
                                            MD5:0F5627F52D337074B3352CB8367C66DA
                                            SHA1:026FEE4F39D345D46E9F555A501DEAE422E95465
                                            SHA-256:BA40BE2FBAD61F501BA41F13428A5DADF48D7B0F83C2911C533F000605717B22
                                            SHA-512:117135B11B89E1F86A89F15A32C7BD19A2A7EA5430D54AF4A35AD750FD567BA1921EFDBE748503084A82955C5B743ECCD4FC0B13AC5B64BF83940510C710991B
                                            Malicious:false
                                            Preview:ElfChnk.................8.......8...................=........................................................................).;....................s...h...............N...=...................................................N...............................................w.......2.......................+...................................Y...........).......M...P...:...........................................................................................&...................................................**......8.......F.C."R........t[..&.......t[..)}.P..1s..R.=.......A..1...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.....Z...........oT..S.y.s.t.e.m....A...............{..P.r.o.v.i.d.e.r.......F=.......K...N.a.m.e.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.E.v.e.n.t.l.o.g..........)...G.u.i.d.....&.{.f.c.6.5.d.d.d.8.-.d.6.e.f.-.4.9.6.2.-.8.3.d.5.-.6.e.5.c.f.e.9.c.e.1.
                                            Process:C:\Windows\System32\svchost.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):77896
                                            Entropy (8bit):4.359283077425977
                                            Encrypted:false
                                            SSDEEP:384:5FRcX9FRcXN8w49ADd9MtBr86FgF11nVOaMyhMUxqyfujn+RkCvp7RsrZQA+TRSi:TmLnLOZvEd4t2pLP5YDlYRPc6Qv
                                            MD5:4CE4BF0A347328B0FC0519BE0DDD5750
                                            SHA1:560445D7209ECBC8543D8D89F36E3FCB5B30014E
                                            SHA-256:8BF7BAC0FEB3224ABE0C4F11BB795ABF229468EFB32476035AEF0E69D4629AAA
                                            SHA-512:EBCB6C0E557DF57F1FD5306D34B7243A1AD86A276D09C5FEDEC88733BE607F9892A857636C82B1CC05A5142497152346CD759B58AD62DDA1076B7B1E8CBB403B
                                            Malicious:false
                                            Preview:ElfChnk.....................................p................................................................................UP.....................s...h...............N...=...................................................N...............................................w...............................C...................................U...........).......M...1...:...................................................................................................................................&...........**..(...........F.C."R............&............`.Wv..|+.7W9.......A..-...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.....V...........oT..S.y.s.t.e.m....A...............{..P.r.o.v.i.d.e.r.......F=.......K...N.a.m.e.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.E.v.e.n.t.l.o.g..........)...G.u.i.d.....&.{.f.c.6.5.d.d.d.8.-.d.6.e.f.-.4.9.6.2.-.8.3.d.5.-.6.e.5.c.f.e.9.c.e.1.
                                            File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Entropy (8bit):7.566303383962769
                                            TrID:
                                            • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                            • Generic Win/DOS Executable (2004/3) 0.20%
                                            • DOS Executable Generic (2002/1) 0.20%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:26B1sczZ88.dll
                                            File size:530'432 bytes
                                            MD5:51ac05b8af0e9e0a2180f230588e795f
                                            SHA1:6aff1202f53fe4cc6282f9ad3ebdef95bb4cf49f
                                            SHA256:68f9c7084a93f5b0487210704343acb69339b5bd16921cf1dae0c20966911df0
                                            SHA512:60ab6f3d620cb09771469a7117b8978432f61a252073462b275dd66f21e48333af1cf462d1268c1e46611752d79387c21dafe929b263f99fbe6179e23e6f9075
                                            SSDEEP:12288:NrkdQN/1+XdYg6UMdB7qCzLohmL1BWrLc1t419lcaRto5C5u7d7777784YNt5Ox:NrGQ1QXdYgkdBW3hs/W0t419vRP5SE
                                            TLSH:82B41282F692C4F4C02341B029378A7BD276CD75085E92AECF90DF906D38656F465AEB
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ur:.1.T.1.T.1.T.../.8.T.1.U...T./A..0.T./A..0.T./A..0.T./A..0.T.Rich1.T.........PE..L......L...........!................2......
                                            Icon Hash:7ae282899bbab082
                                            Entrypoint:0x10001a32
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x10000000
                                            Subsystem:windows gui
                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
                                            DLL Characteristics:NO_SEH
                                            Time Stamp:0x4C0E1488 [Tue Jun 8 09:59:36 2010 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:5
                                            OS Version Minor:0
                                            File Version Major:5
                                            File Version Minor:0
                                            Subsystem Version Major:5
                                            Subsystem Version Minor:0
                                            Import Hash:00c5fd00087020a0645079ce30f4148b
                                            Instruction
                                            cmp dword ptr [esp+08h], 01h
                                            push esi
                                            jne 00007F056085A4F1h
                                            mov esi, dword ptr [esp+08h]
                                            push 00000104h
                                            push 10003018h
                                            push esi
                                            mov dword ptr [10003290h], esi
                                            call dword ptr [10002058h]
                                            push esi
                                            call dword ptr [100020ACh]
                                            call 00007F0560859B58h
                                            cmp eax, 01h
                                            jne 00007F056085A4BEh
                                            call 00007F0560859D52h
                                            test eax, eax
                                            jne 00007F056085A490h
                                            call 00007F0560859CCEh
                                            test eax, eax
                                            jne 00007F056085A487h
                                            call 00007F0560859B9Bh
                                            call 00007F0560859CF9h
                                            cmp eax, 01h
                                            jne 00007F056085A49Dh
                                            push 00000000h
                                            push 00000000h
                                            push eax
                                            push 00000000h
                                            call dword ptr [100020A8h]
                                            mov dword ptr [1000329Ch], eax
                                            test eax, eax
                                            je 00007F056085A487h
                                            call 00007F056085A3C9h
                                            call 00007F0560859AACh
                                            jmp 00007F056085A4C5h
                                            cmp dword ptr [esp+0Ch], 00000000h
                                            jne 00007F056085A4BBh
                                            mov eax, dword ptr [1000329Ch]
                                            test eax, eax
                                            je 00007F056085A4ADh
                                            push eax
                                            call dword ptr [100020A4h]
                                            push FFFFFFFFh
                                            push dword ptr [10003298h]
                                            call dword ptr [10002064h]
                                            push dword ptr [10003298h]
                                            mov esi, dword ptr [10002038h]
                                            call esi
                                            push dword ptr [1000329Ch]
                                            call esi
                                            call 00007F0560859ABFh
                                            xor eax, eax
                                            inc eax
                                            pop esi
                                            retn 000Ch
                                            jmp dword ptr [10003244h]
                                            jmp dword ptr [00003014h]
                                            Programming Language:
                                            • [IMP] VS2005 build 50727
                                            • [C++] VS2008 build 21022
                                            • [EXP] VS2008 build 21022
                                            • [RES] VS2008 build 21022
                                            • [LNK] VS2008 build 21022
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x28700x159.rdata
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x23800x64.rdata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x7fa90.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x840000x164.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000xe4.rdata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000xb2c0xc00c9b6b9fbded3d4764666702b145428d1False0.5309244791666666data5.5469519714251785IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rdata0x20000x9c90xa006951ee1a0ff3a7f5a44727b4713506a3False0.45625data4.848258137282876IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .data0x30000x2a00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rsrc0x40000x7fa900x7fc00f159957b21522c25ce75e01a9f8424afFalse0.8357769691780822data7.582701442901576IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0x840000x1ee0x200cfa8d04dd000bb30ab126902176ed40dFalse0.7265625data5.091827714746989IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_RCDATA0x40880x7ASCII text, with no line terminators2.142857142857143
                                            RT_RCDATA0x40900x7fa00PE32 executable (GUI) Intel 80386, for MS Windows0.8364559102595495
                                            DLLImport
                                            KERNEL32.dllExitProcess, GetProcAddress, RtlMoveMemory, LoadLibraryW, lstrcatW, GetSystemDirectoryW, FreeLibrary, lstrcpynA, LockResource, LoadResource, SizeofResource, FindResourceW, CreateProcessW, RtlZeroMemory, CloseHandle, WriteFile, CreateFileW, GetTempFileNameW, GetTempPathW, GetLastError, CreateMutexA, lstrcmpiW, GetModuleFileNameW, GetExitCodeProcess, TerminateProcess, WaitForSingleObject, GetCurrentThreadId, GetFileAttributesW, lstrcpyW, GetTickCount, GetLogicalDrives, FindNextFileW, SetFileAttributesW, CopyFileW, FindClose, FindFirstFileW, WaitForMultipleObjects, TerminateThread, ResumeThread, SetThreadPriority, CreateThread, SetEvent, CreateEventW, DisableThreadLibraryCalls
                                            USER32.dllwsprintfW
                                            SHELL32.dll
                                            SHLWAPI.dllSHRegGetValueW, PathFindExtensionW, PathFindFileNameW, PathAppendW, PathRemoveFileSpecW, StrStrIW
                                            NameOrdinalAddress
                                            LpkDllInitialize20x10001af6
                                            LpkDrawTextEx30x10001afc
                                            LpkEditControl40x10003250
                                            LpkExtTextOut50x10001b02
                                            LpkGetCharacterPlacement60x10001b08
                                            LpkGetTextExtentExPoint70x10001b0e
                                            LpkInitialize80x10001b14
                                            LpkPSMTextOut90x10001b1a
                                            LpkTabbedTextOut10x10001af0
                                            LpkUseGDIWidthCache100x10001b20
                                            ftsWordBreak110x10001b26
                                            TimestampSource PortDest PortSource IPDest IP
                                            Dec 19, 2024 15:33:35.972465992 CET53635151.1.1.1192.168.2.9
                                            Dec 19, 2024 15:33:36.111417055 CET53619361.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:06.362107992 CET53542631.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:06.602019072 CET53533011.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:28.379374981 CET53620701.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:28.631716013 CET53518681.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:36.300059080 CET53639671.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:36.312489986 CET53550481.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:36.520984888 CET53549031.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:36.543800116 CET53505331.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:36.701775074 CET53554291.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:36.788747072 CET53500151.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:36.824377060 CET53629831.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:36.923343897 CET53515851.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:36.963341951 CET53547751.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:37.007343054 CET53590521.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:37.104284048 CET53502151.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:37.188019991 CET53634531.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:37.325867891 CET53551581.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:37.422174931 CET53524691.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:37.507220030 CET53506221.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:37.648045063 CET53550191.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:37.725368023 CET53594331.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:37.874320030 CET53495941.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:37.962702990 CET53620031.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:38.109944105 CET53581171.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:38.184663057 CET53597361.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:38.329371929 CET53549541.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:38.402184010 CET53598661.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:38.510868073 CET53597221.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:38.634977102 CET53610011.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:38.691390038 CET53543141.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:38.816154003 CET53539841.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:38.920789957 CET53655161.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:38.998225927 CET53635041.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:39.101792097 CET53615901.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:39.181293011 CET53592681.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:39.320240974 CET53647111.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:39.367644072 CET53548511.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:39.538873911 CET53558141.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:39.616287947 CET53546311.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:39.721647024 CET53559701.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:39.859559059 CET53552561.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:39.948848963 CET53562061.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:40.089364052 CET53651751.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:40.168636084 CET53579531.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:40.278978109 CET53552991.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:40.421591043 CET53547101.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:40.518163919 CET53520851.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:40.640398979 CET53540571.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:40.754545927 CET53549501.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:40.825968981 CET53633341.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:40.979640961 CET53633701.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:41.060724020 CET53515691.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:41.211901903 CET53527811.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:41.279735088 CET53541211.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:41.440488100 CET53563501.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:41.462709904 CET53649381.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:41.671998024 CET53597431.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:41.701421976 CET53546071.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:41.898536921 CET53544301.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:42.079987049 CET53561361.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:42.311870098 CET53594041.1.1.1192.168.2.9
                                            Dec 19, 2024 15:34:42.536526918 CET53617291.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:03.350871086 CET53549361.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:03.394823074 CET53502651.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:03.578607082 CET53588381.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:03.582566977 CET53567361.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:03.770586967 CET53555411.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:03.800800085 CET53546571.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:03.952553988 CET53524861.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:04.033925056 CET53550081.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:04.139137030 CET53501861.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:04.238678932 CET53594391.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:04.395212889 CET53598921.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:04.467956066 CET53536741.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:04.638103008 CET53555481.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:04.682588100 CET53546291.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:04.864712000 CET53536161.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:04.883445024 CET53607491.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:05.045619965 CET53536321.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:05.068346977 CET53493621.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:05.245019913 CET53517511.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:05.249295950 CET53631281.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:05.427812099 CET53505851.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:05.433959961 CET53503681.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:05.609544992 CET53627971.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:05.668299913 CET53599051.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:05.834417105 CET53647981.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:05.892966032 CET53491821.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:06.055741072 CET53557971.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:06.074935913 CET53600471.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:06.289144993 CET53557791.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:06.306397915 CET53572101.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:06.518754959 CET53569261.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:06.536212921 CET53534741.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:06.699908018 CET53511901.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:06.754856110 CET53519351.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:06.943458080 CET53597171.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:06.974953890 CET53597771.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:07.160556078 CET53543721.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:07.205284119 CET53588271.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:07.282627106 CET53615191.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:07.341500044 CET53596341.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:07.442260981 CET53575891.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:07.534462929 CET53534011.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:07.560956955 CET53611851.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:07.622987986 CET53635651.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:07.789011955 CET53564721.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:07.804516077 CET53530921.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:07.977781057 CET53493281.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:08.032006979 CET53562681.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:08.171752930 CET53567451.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:08.268048048 CET53650741.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:08.352608919 CET53616581.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:08.503804922 CET53649561.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:08.533628941 CET53653721.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:08.685610056 CET53635741.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:08.716984987 CET53556901.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:08.876835108 CET53559881.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:08.900669098 CET53602931.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:09.094142914 CET53621751.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:09.149358988 CET53586681.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:09.317775011 CET53538301.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:09.331675053 CET53518031.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:09.542273998 CET53516281.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:09.637557983 CET53589991.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:09.822566032 CET53576421.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:09.858601093 CET53525821.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:10.026566029 CET53527561.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:10.087979078 CET53640201.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:10.255309105 CET53571221.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:10.271501064 CET53494711.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:10.439230919 CET53567191.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:10.453130960 CET53648361.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:10.634955883 CET53566691.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:10.664942980 CET53624161.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:10.815491915 CET53647121.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:10.888297081 CET53557491.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:11.034111023 CET53559861.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:11.118899107 CET53618831.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:11.215780020 CET53529121.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:11.355884075 CET53613361.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:11.451107025 CET53615171.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:11.536396980 CET53643491.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:11.687649012 CET53572261.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:11.775365114 CET53541801.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:11.909569025 CET53632951.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:11.997375965 CET53517011.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:12.139534950 CET53530301.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:12.178018093 CET53540451.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:12.332071066 CET53635351.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:12.401361942 CET53597821.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:12.567636967 CET53580191.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:12.626651049 CET53555491.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:12.793734074 CET53505181.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:12.860377073 CET53571941.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:13.033847094 CET53630361.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:13.082411051 CET53491651.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:13.215399027 CET53506891.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:13.265539885 CET53616301.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:13.451244116 CET53492461.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:13.494138956 CET53584041.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:13.686276913 CET53504401.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:13.722259998 CET53582761.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:13.869555950 CET53613031.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:13.975040913 CET53631881.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:14.104053974 CET53578671.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:14.239650965 CET53653661.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:14.288609982 CET53558441.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:14.421652079 CET53514621.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:14.469636917 CET53566261.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:14.651031017 CET53494011.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:14.713499069 CET53562601.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:14.887837887 CET53620181.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:14.943367958 CET53574371.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:15.108603001 CET53612571.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:15.162457943 CET53631871.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:15.291383028 CET53541051.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:15.397140980 CET53624091.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:15.511097908 CET53517601.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:15.616491079 CET53620111.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:15.732256889 CET53522861.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:15.839611053 CET53499931.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:15.914638042 CET53588311.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:16.020721912 CET53518231.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:16.141273022 CET53654031.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:16.201673985 CET53518811.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:16.371999979 CET53625271.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:16.432153940 CET53536101.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:16.594228029 CET53551951.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:16.668313980 CET53519201.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:16.817848921 CET53584141.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:16.849843979 CET53500741.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:17.036968946 CET53575871.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:17.086853027 CET53530171.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:17.268016100 CET53559981.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:17.497692108 CET53548751.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:17.678555965 CET53513811.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:18.261238098 CET53630191.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:18.261274099 CET53630191.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:18.494995117 CET53641721.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:18.729051113 CET53641761.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:18.958005905 CET53537671.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:19.186500072 CET53624761.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:19.426672935 CET53653161.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:19.607605934 CET53553951.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:19.789875031 CET53573461.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:20.012708902 CET53608511.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:20.804527998 CET53571701.1.1.1192.168.2.9
                                            Dec 19, 2024 15:35:20.943695068 CET53538301.1.1.1192.168.2.9
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Dec 19, 2024 15:33:30.426660061 CET1.1.1.1192.168.2.90xbc9cNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:33:30.426660061 CET1.1.1.1192.168.2.90xbc9cNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:33:35.972465992 CET1.1.1.1192.168.2.90x76aeServer failure (2)ilo.brenz.plnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:33:36.111417055 CET1.1.1.1192.168.2.90x39e8Server failure (2)ant.trenz.plnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:06.362107992 CET1.1.1.1192.168.2.90xa43fServer failure (2)ilo.brenz.plnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:06.602019072 CET1.1.1.1192.168.2.90x2285Server failure (2)ant.trenz.plnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:28.379374981 CET1.1.1.1192.168.2.90xf3dcServer failure (2)ilo.brenz.plnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:28.631716013 CET1.1.1.1192.168.2.90x84c9Server failure (2)ant.trenz.plnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:36.300059080 CET1.1.1.1192.168.2.90x7a0fName error (3)vdafki.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:36.312489986 CET1.1.1.1192.168.2.90x9b31Name error (3)eqoxwa.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:36.520984888 CET1.1.1.1192.168.2.90x70edName error (3)aubtoq.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:36.543800116 CET1.1.1.1192.168.2.90x6dabName error (3)acxyxy.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:36.701775074 CET1.1.1.1192.168.2.90x803aName error (3)myivov.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:36.788747072 CET1.1.1.1192.168.2.90x3ed4Name error (3)rmqiuq.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:36.824377060 CET1.1.1.1192.168.2.90x3811Server failure (2)ilo.brenz.plnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:36.923343897 CET1.1.1.1192.168.2.90xa31aName error (3)zgawte.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:36.963341951 CET1.1.1.1192.168.2.90xf726Server failure (2)ant.trenz.plnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:37.007343054 CET1.1.1.1192.168.2.90x842aName error (3)gkbtuu.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:37.104284048 CET1.1.1.1192.168.2.90x82b3Name error (3)dkevii.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:37.188019991 CET1.1.1.1192.168.2.90x592cName error (3)qfstid.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:37.325867891 CET1.1.1.1192.168.2.90xcbc1Name error (3)jsioue.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:37.422174931 CET1.1.1.1192.168.2.90x192bName error (3)nlqjng.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:37.507220030 CET1.1.1.1192.168.2.90x1d27Name error (3)vlscru.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:37.648045063 CET1.1.1.1192.168.2.90x84e0Name error (3)ctpiwy.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:37.725368023 CET1.1.1.1192.168.2.90x4d95Name error (3)wohbil.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:37.874320030 CET1.1.1.1192.168.2.90x9f37Name error (3)pyhqpe.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:37.962702990 CET1.1.1.1192.168.2.90x6e81Name error (3)rqmoov.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:38.109944105 CET1.1.1.1192.168.2.90x9895Name error (3)qyhuju.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:38.184663057 CET1.1.1.1192.168.2.90x54d5Name error (3)tcepna.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:38.329371929 CET1.1.1.1192.168.2.90x49a2Name error (3)uepolc.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:38.402184010 CET1.1.1.1192.168.2.90xeccaName error (3)faxkac.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:38.510868073 CET1.1.1.1192.168.2.90xc083Name error (3)qtvtoh.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:38.634977102 CET1.1.1.1192.168.2.90x7393Name error (3)dazrfy.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:38.691390038 CET1.1.1.1192.168.2.90x3bf9Name error (3)engkkn.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:38.816154003 CET1.1.1.1192.168.2.90x59b4Name error (3)xshsnl.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:38.920789957 CET1.1.1.1192.168.2.90x7e19Name error (3)eekder.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:38.998225927 CET1.1.1.1192.168.2.90xe865Name error (3)qgwhsw.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:39.101792097 CET1.1.1.1192.168.2.90xe748Name error (3)goyzko.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:39.181293011 CET1.1.1.1192.168.2.90xf305Name error (3)uquewo.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:39.320240974 CET1.1.1.1192.168.2.90xe309Name error (3)jzaoby.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:39.367644072 CET1.1.1.1192.168.2.90xe666Name error (3)hxhxsk.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:39.538873911 CET1.1.1.1192.168.2.90xd7b2Name error (3)eoswhi.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:39.616287947 CET1.1.1.1192.168.2.90x66a9Name error (3)ilommd.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:39.721647024 CET1.1.1.1192.168.2.90x3911Name error (3)ugiwuc.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:39.859559059 CET1.1.1.1192.168.2.90x1130Name error (3)ecbklt.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:39.948848963 CET1.1.1.1192.168.2.90x6a98Name error (3)lniyuv.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:40.089364052 CET1.1.1.1192.168.2.90xbb45Name error (3)fopopy.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:40.168636084 CET1.1.1.1192.168.2.90x8979Name error (3)vbahvh.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:40.278978109 CET1.1.1.1192.168.2.90x74d6Name error (3)kpyyyy.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:40.421591043 CET1.1.1.1192.168.2.90x3c66Name error (3)uxbegb.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:40.518163919 CET1.1.1.1192.168.2.90xeca0Name error (3)giqxuy.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:40.640398979 CET1.1.1.1192.168.2.90x2d89Name error (3)kgvozz.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:40.754545927 CET1.1.1.1192.168.2.90x56c9Name error (3)sjjile.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:40.825968981 CET1.1.1.1192.168.2.90x36a7Name error (3)uergsz.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:40.979640961 CET1.1.1.1192.168.2.90xfa5cName error (3)itmffg.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:41.060724020 CET1.1.1.1192.168.2.90xb824Name error (3)yivmlj.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:41.211901903 CET1.1.1.1192.168.2.90x6eceName error (3)jeuiac.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:41.279735088 CET1.1.1.1192.168.2.90x6f2bName error (3)uzboio.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:41.440488100 CET1.1.1.1192.168.2.90xd86cName error (3)vxpesz.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:41.462709904 CET1.1.1.1192.168.2.90xc3d5Name error (3)tpwowx.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:41.671998024 CET1.1.1.1192.168.2.90x2273Name error (3)raodpi.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:41.701421976 CET1.1.1.1192.168.2.90x3b69Name error (3)lfsmdz.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:41.898536921 CET1.1.1.1192.168.2.90x9dabName error (3)rhwuas.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:42.079987049 CET1.1.1.1192.168.2.90x7e07Name error (3)fybyzv.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:42.311870098 CET1.1.1.1192.168.2.90xa3fdName error (3)epgrzo.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:42.536526918 CET1.1.1.1192.168.2.90x14c7Name error (3)zuetyk.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:47.136909008 CET1.1.1.1192.168.2.90x8a77No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:34:47.136909008 CET1.1.1.1192.168.2.90x8a77No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:03.350871086 CET1.1.1.1192.168.2.90x7991Name error (3)iqdacv.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:03.394823074 CET1.1.1.1192.168.2.90xcc0eName error (3)ootumr.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:03.578607082 CET1.1.1.1192.168.2.90xe23bName error (3)smhcbm.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:03.582566977 CET1.1.1.1192.168.2.90x3252Name error (3)hipfhf.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:03.770586967 CET1.1.1.1192.168.2.90x8dd2Name error (3)raygxc.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:03.800800085 CET1.1.1.1192.168.2.90x8862Name error (3)ahaotq.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:03.952553988 CET1.1.1.1192.168.2.90x37a5Name error (3)dahwgm.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:04.033925056 CET1.1.1.1192.168.2.90x8948Name error (3)ngelut.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:04.139137030 CET1.1.1.1192.168.2.90x5ebeName error (3)vnunre.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:04.238678932 CET1.1.1.1192.168.2.90x946bName error (3)eupkbf.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:04.395212889 CET1.1.1.1192.168.2.90xd72Name error (3)fxyavq.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:04.467956066 CET1.1.1.1192.168.2.90xdb50Name error (3)nvaijl.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:04.638103008 CET1.1.1.1192.168.2.90xdd56Name error (3)yovyrw.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:04.682588100 CET1.1.1.1192.168.2.90xf4c4Name error (3)gqmneh.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:04.864712000 CET1.1.1.1192.168.2.90xf163Name error (3)yqhfpu.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:04.883445024 CET1.1.1.1192.168.2.90xa098Name error (3)oxoimf.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:05.045619965 CET1.1.1.1192.168.2.90x8aebName error (3)ikuhms.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:05.068346977 CET1.1.1.1192.168.2.90x8e23Name error (3)bkydbf.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:05.245019913 CET1.1.1.1192.168.2.90xfc21Name error (3)siytue.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:05.249295950 CET1.1.1.1192.168.2.90xd32fName error (3)kduiuv.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:05.427812099 CET1.1.1.1192.168.2.90x87b1Name error (3)jfppeu.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:05.433959961 CET1.1.1.1192.168.2.90x3001Name error (3)zjfiqo.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:05.609544992 CET1.1.1.1192.168.2.90x4c69Name error (3)phhuqd.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:05.668299913 CET1.1.1.1192.168.2.90x968cName error (3)uxohei.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:05.834417105 CET1.1.1.1192.168.2.90xb84cName error (3)tfagrq.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:05.892966032 CET1.1.1.1192.168.2.90xa920Name error (3)iezcob.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:06.055741072 CET1.1.1.1192.168.2.90xa743Name error (3)fncqle.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:06.074935913 CET1.1.1.1192.168.2.90x7465Name error (3)zirafk.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:06.289144993 CET1.1.1.1192.168.2.90x72aeName error (3)gaiuio.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:06.306397915 CET1.1.1.1192.168.2.90xe331Name error (3)nsqixt.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:06.518754959 CET1.1.1.1192.168.2.90x1a8eName error (3)cioyuk.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:06.536212921 CET1.1.1.1192.168.2.90xdb1bName error (3)yirgbw.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:06.699908018 CET1.1.1.1192.168.2.90xbe8cName error (3)lityoa.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:06.754856110 CET1.1.1.1192.168.2.90xa165Name error (3)ohkncb.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:06.943458080 CET1.1.1.1192.168.2.90x20adName error (3)pugtjb.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:06.974953890 CET1.1.1.1192.168.2.90xc7bcName error (3)evbzsz.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:07.160556078 CET1.1.1.1192.168.2.90x8bebName error (3)gjtywo.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:07.205284119 CET1.1.1.1192.168.2.90x208eName error (3)xunnfu.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:07.282627106 CET1.1.1.1192.168.2.90x4d8fServer failure (2)ilo.brenz.plnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:07.341500044 CET1.1.1.1192.168.2.90x87dName error (3)zemivi.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:07.442260981 CET1.1.1.1192.168.2.90x7cb3Name error (3)heupjk.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:07.534462929 CET1.1.1.1192.168.2.90xf243Server failure (2)ant.trenz.plnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:07.560956955 CET1.1.1.1192.168.2.90x6843Name error (3)bsfxpd.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:07.622987986 CET1.1.1.1192.168.2.90xe884Name error (3)qlclyn.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:07.789011955 CET1.1.1.1192.168.2.90x6087Name error (3)zcuofo.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:07.804516077 CET1.1.1.1192.168.2.90x393aName error (3)zdtwjb.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:07.977781057 CET1.1.1.1192.168.2.90xeafdName error (3)oehqcn.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:08.032006979 CET1.1.1.1192.168.2.90xb1e1Name error (3)iqewjg.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:08.171752930 CET1.1.1.1192.168.2.90xa9e0Name error (3)tlfjcd.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:08.268048048 CET1.1.1.1192.168.2.90x537cName error (3)zuotaq.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:08.352608919 CET1.1.1.1192.168.2.90xfab6Name error (3)apqqgj.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:08.503804922 CET1.1.1.1192.168.2.90x7ffcName error (3)oaceeo.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:08.533628941 CET1.1.1.1192.168.2.90x74dName error (3)lacjuz.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:08.685610056 CET1.1.1.1192.168.2.90xe2f2Name error (3)uqfnkt.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:08.716984987 CET1.1.1.1192.168.2.90x850bName error (3)vezeoe.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:08.876835108 CET1.1.1.1192.168.2.90xac35Name error (3)unskbm.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:08.900669098 CET1.1.1.1192.168.2.90x8d6eName error (3)pimqle.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:09.094142914 CET1.1.1.1192.168.2.90xe93Name error (3)ivsego.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:09.149358988 CET1.1.1.1192.168.2.90x29e2Name error (3)ahmeqf.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:09.317775011 CET1.1.1.1192.168.2.90xadc4Name error (3)ltqjua.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:09.331675053 CET1.1.1.1192.168.2.90x3f6aName error (3)ovprrb.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:09.542273998 CET1.1.1.1192.168.2.90x8ab1Name error (3)zkfevd.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:09.637557983 CET1.1.1.1192.168.2.90x88d6Name error (3)heyanh.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:09.822566032 CET1.1.1.1192.168.2.90x9937Name error (3)edtlux.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:09.858601093 CET1.1.1.1192.168.2.90xcbf8Name error (3)bvvknd.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:10.026566029 CET1.1.1.1192.168.2.90xc48aName error (3)ikfdit.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:10.087979078 CET1.1.1.1192.168.2.90x32e9Name error (3)troslw.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:10.255309105 CET1.1.1.1192.168.2.90x6393Name error (3)mbixoj.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:10.271501064 CET1.1.1.1192.168.2.90x43feName error (3)isaykc.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:10.439230919 CET1.1.1.1192.168.2.90x52d8Name error (3)ebuspk.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:10.453130960 CET1.1.1.1192.168.2.90xd9e7Name error (3)ynwpie.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:10.634955883 CET1.1.1.1192.168.2.90xe3bfName error (3)rraenf.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:10.664942980 CET1.1.1.1192.168.2.90x14f1Name error (3)ymehei.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:10.815491915 CET1.1.1.1192.168.2.90x7883Name error (3)yeaedh.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:10.888297081 CET1.1.1.1192.168.2.90x4417Name error (3)rqicen.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:11.034111023 CET1.1.1.1192.168.2.90xb5c8Name error (3)frvzle.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:11.118899107 CET1.1.1.1192.168.2.90xe755Name error (3)wmducp.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:11.215780020 CET1.1.1.1192.168.2.90x2b9dName error (3)lanoyi.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:11.355884075 CET1.1.1.1192.168.2.90xdfd9Name error (3)faweja.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:11.451107025 CET1.1.1.1192.168.2.90x4201Name error (3)oseynl.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:11.536396980 CET1.1.1.1192.168.2.90x5c1eName error (3)msbfih.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:11.687649012 CET1.1.1.1192.168.2.90xa31aName error (3)yhflfd.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:11.775365114 CET1.1.1.1192.168.2.90x20c4Name error (3)htqqvy.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:11.909569025 CET1.1.1.1192.168.2.90x9ed2Name error (3)glsmii.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:11.997375965 CET1.1.1.1192.168.2.90x9a41Name error (3)upnevr.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:12.139534950 CET1.1.1.1192.168.2.90xa570Name error (3)yulrvp.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:12.178018093 CET1.1.1.1192.168.2.90x998fName error (3)eexjix.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:12.332071066 CET1.1.1.1192.168.2.90x2c86Name error (3)saambd.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:12.401361942 CET1.1.1.1192.168.2.90x7ed5Name error (3)ihybog.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:12.567636967 CET1.1.1.1192.168.2.90x3ecbName error (3)qiuifw.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:12.626651049 CET1.1.1.1192.168.2.90x16f8Name error (3)ikxyaq.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:12.793734074 CET1.1.1.1192.168.2.90x2de9Name error (3)iemjen.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:12.860377073 CET1.1.1.1192.168.2.90x39a9Name error (3)wxjaht.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:13.033847094 CET1.1.1.1192.168.2.90xbd1eName error (3)eqpzuu.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:13.082411051 CET1.1.1.1192.168.2.90x4917Name error (3)agjmxb.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:13.215399027 CET1.1.1.1192.168.2.90xee84Name error (3)ogvgft.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:13.265539885 CET1.1.1.1192.168.2.90xbdf7Name error (3)fidiow.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:13.451244116 CET1.1.1.1192.168.2.90x3e8cName error (3)euekdh.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:13.494138956 CET1.1.1.1192.168.2.90x3120Name error (3)zitymm.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:13.686276913 CET1.1.1.1192.168.2.90xc76cName error (3)cdqboa.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:13.722259998 CET1.1.1.1192.168.2.90xa235Name error (3)naxdur.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:13.869555950 CET1.1.1.1192.168.2.90x3dfaName error (3)fzhchl.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:13.975040913 CET1.1.1.1192.168.2.90x2a5Name error (3)pnfkay.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:14.104053974 CET1.1.1.1192.168.2.90x854cName error (3)phdomu.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:14.239650965 CET1.1.1.1192.168.2.90x90d1Name error (3)dexric.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:14.288609982 CET1.1.1.1192.168.2.90x650cName error (3)uycyms.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:14.421652079 CET1.1.1.1192.168.2.90xdf57Name error (3)jovlax.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:14.469636917 CET1.1.1.1192.168.2.90xe5bbName error (3)qnrfpi.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:14.651031017 CET1.1.1.1192.168.2.90x48a9Name error (3)uahnrk.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:14.713499069 CET1.1.1.1192.168.2.90x9d97Name error (3)cwkzpg.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:14.887837887 CET1.1.1.1192.168.2.90xd0d9Name error (3)hcpgso.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:14.943367958 CET1.1.1.1192.168.2.90xbeccName error (3)qeixpq.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:15.108603001 CET1.1.1.1192.168.2.90xbee6Name error (3)iaaucc.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:15.162457943 CET1.1.1.1192.168.2.90x41a6Name error (3)gizyod.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:15.291383028 CET1.1.1.1192.168.2.90x9845Name error (3)unkwhv.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:15.397140980 CET1.1.1.1192.168.2.90xdb95Name error (3)gabamf.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:15.511097908 CET1.1.1.1192.168.2.90xb95bName error (3)yoguud.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:15.616491079 CET1.1.1.1192.168.2.90x7b77Name error (3)bsmxax.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:15.732256889 CET1.1.1.1192.168.2.90xcb3cName error (3)xgjldw.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:15.839611053 CET1.1.1.1192.168.2.90x8922Name error (3)aegjss.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:15.914638042 CET1.1.1.1192.168.2.90x4572Name error (3)vzvwin.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:16.020721912 CET1.1.1.1192.168.2.90x2c73Name error (3)iotqbe.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:16.141273022 CET1.1.1.1192.168.2.90xc472Name error (3)iapseh.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:16.201673985 CET1.1.1.1192.168.2.90x5a0eName error (3)zsinsv.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:16.371999979 CET1.1.1.1192.168.2.90x6a77Name error (3)gnxmfg.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:16.432153940 CET1.1.1.1192.168.2.90xdf30Name error (3)ulodoa.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:16.594228029 CET1.1.1.1192.168.2.90xcb1aName error (3)empymm.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:16.668313980 CET1.1.1.1192.168.2.90xf06fName error (3)gnwvmu.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:16.817848921 CET1.1.1.1192.168.2.90x839dName error (3)uafdxu.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:16.849843979 CET1.1.1.1192.168.2.90x3306Name error (3)anvdkc.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:17.036968946 CET1.1.1.1192.168.2.90x14f3Name error (3)wisllh.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:17.086853027 CET1.1.1.1192.168.2.90x1924Name error (3)thjvoi.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:17.268016100 CET1.1.1.1192.168.2.90x50adName error (3)yokuap.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:17.497692108 CET1.1.1.1192.168.2.90x55aName error (3)nxygpr.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:17.678555965 CET1.1.1.1192.168.2.90x14d8Name error (3)auieai.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:18.494995117 CET1.1.1.1192.168.2.90x9c27Name error (3)ldgoti.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:18.729051113 CET1.1.1.1192.168.2.90x5fffName error (3)fzlikn.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:18.958005905 CET1.1.1.1192.168.2.90x57e1Name error (3)dduavk.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:19.186500072 CET1.1.1.1192.168.2.90x5c20Name error (3)qikggc.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:19.426672935 CET1.1.1.1192.168.2.90x93d0Name error (3)qyflyk.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:19.607605934 CET1.1.1.1192.168.2.90x3e99Name error (3)jhkuku.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:19.789875031 CET1.1.1.1192.168.2.90xc8bfName error (3)eiqljd.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:20.012708902 CET1.1.1.1192.168.2.90xeb3Name error (3)yfpqxt.comnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:20.804527998 CET1.1.1.1192.168.2.90x2b1cServer failure (2)ilo.brenz.plnonenoneA (IP address)IN (0x0001)false
                                            Dec 19, 2024 15:35:20.943695068 CET1.1.1.1192.168.2.90x5dServer failure (2)ant.trenz.plnonenoneA (IP address)IN (0x0001)false

                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:09:33:24
                                            Start date:19/12/2024
                                            Path:C:\Windows\System32\loaddll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:loaddll32.exe "C:\Users\user\Desktop\26B1sczZ88.dll"
                                            Imagebase:0x3c0000
                                            File size:126'464 bytes
                                            MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:1
                                            Start time:09:33:24
                                            Start date:19/12/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff70f010000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:2
                                            Start time:09:33:24
                                            Start date:19/12/2024
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\26B1sczZ88.dll",#1
                                            Imagebase:0xc50000
                                            File size:236'544 bytes
                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:3
                                            Start time:09:33:24
                                            Start date:19/12/2024
                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:rundll32.exe C:\Users\user\Desktop\26B1sczZ88.dll,LpkDllInitialize
                                            Imagebase:0x960000
                                            File size:61'440 bytes
                                            MD5 hash:889B99C52A60DD49227C5E485A016679
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:4
                                            Start time:09:33:24
                                            Start date:19/12/2024
                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:rundll32.exe "C:\Users\user\Desktop\26B1sczZ88.dll",#1
                                            Imagebase:0x960000
                                            File size:61'440 bytes
                                            MD5 hash:889B99C52A60DD49227C5E485A016679
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:6
                                            Start time:09:33:24
                                            Start date:19/12/2024
                                            Path:C:\Users\user\AppData\Local\Temp\hrl97BF.tmp
                                            Wow64 process (32bit):true
                                            Commandline:C:\Users\user\AppData\Local\Temp\hrl97BF.tmp
                                            Imagebase:0x400000
                                            File size:522'752 bytes
                                            MD5 hash:F3F920AAF85289A8E532890BC618AADD
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000006.00000002.2017093698.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000006.00000002.2017013687.000000007FE20000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, Author: Joe Security
                                            • Rule: CN_disclosed_20180208_Mal1, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmp, Author: Florian Roth
                                            • Rule: MAL_Nitol_Malware_Jan19_1, Description: Detects Nitol Malware, Source: C:\Users\user\AppData\Local\Temp\hrl97BF.tmp, Author: Florian Roth
                                            Antivirus matches:
                                            • Detection: 100%, Avira
                                            • Detection: 100%, Joe Sandbox ML
                                            • Detection: 97%, ReversingLabs
                                            Reputation:low
                                            Has exited:true

                                            Target ID:7
                                            Start time:09:33:24
                                            Start date:19/12/2024
                                            Path:C:\Users\user\AppData\Local\Temp\hrl97AF.tmp
                                            Wow64 process (32bit):true
                                            Commandline:C:\Users\user\AppData\Local\Temp\hrl97AF.tmp
                                            Imagebase:0x400000
                                            File size:522'752 bytes
                                            MD5 hash:F3F920AAF85289A8E532890BC618AADD
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000007.00000002.2043911687.000000007FE20000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000007.00000002.2043996617.000000007FE40000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: CN_disclosed_20180208_Mal1, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmp, Author: Florian Roth
                                            • Rule: MAL_Nitol_Malware_Jan19_1, Description: Detects Nitol Malware, Source: C:\Users\user\AppData\Local\Temp\hrl97AF.tmp, Author: Florian Roth
                                            Antivirus matches:
                                            • Detection: 100%, Avira
                                            • Detection: 100%, Joe Sandbox ML
                                            • Detection: 97%, ReversingLabs
                                            Reputation:low
                                            Has exited:true

                                            Target ID:8
                                            Start time:09:33:24
                                            Start date:19/12/2024
                                            Path:C:\Windows\System32\winlogon.exe
                                            Wow64 process (32bit):false
                                            Commandline:winlogon.exe
                                            Imagebase:0x7ff7f7550000
                                            File size:906'240 bytes
                                            MD5 hash:F8B41A1B3E569E7E6F990567F21DCE97
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000008.00000002.2741922410.000000007FFD0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000008.00000000.1491843448.000000007FFD0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000008.00000002.2741748612.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            Reputation:moderate
                                            Has exited:false

                                            Target ID:9
                                            Start time:09:33:24
                                            Start date:19/12/2024
                                            Path:C:\Windows\System32\lsass.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\lsass.exe
                                            Imagebase:0x7ff7bf4f0000
                                            File size:59'456 bytes
                                            MD5 hash:A1CC00332BBF370654EE3DC8CDC8C95A
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000009.00000002.2742603638.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000009.00000002.2743903996.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000009.00000000.1491890758.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            Reputation:moderate
                                            Has exited:false

                                            Target ID:10
                                            Start time:09:33:25
                                            Start date:19/12/2024
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\svchost.exe -k DcomLaunch -p
                                            Imagebase:0x7ff77afe0000
                                            File size:55'320 bytes
                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000000A.00000002.2741922176.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000000A.00000002.2741745861.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            Reputation:high
                                            Has exited:false

                                            Target ID:11
                                            Start time:09:33:25
                                            Start date:19/12/2024
                                            Path:C:\Windows\System32\fontdrvhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:"fontdrvhost.exe"
                                            Imagebase:0x7ff6791b0000
                                            File size:827'408 bytes
                                            MD5 hash:BBCB897697B3442657C7D6E3EDDBD25F
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000000B.00000002.2798955144.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000000B.00000000.1495302635.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000000B.00000002.2798310722.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            Reputation:moderate
                                            Has exited:false

                                            Target ID:12
                                            Start time:09:33:25
                                            Start date:19/12/2024
                                            Path:C:\Windows\System32\fontdrvhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:"fontdrvhost.exe"
                                            Imagebase:0x7ff6791b0000
                                            File size:827'408 bytes
                                            MD5 hash:BBCB897697B3442657C7D6E3EDDBD25F
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000000C.00000002.2798846486.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000000C.00000000.1496798093.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000000C.00000002.2798238281.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            Has exited:false

                                            Target ID:13
                                            Start time:09:33:25
                                            Start date:19/12/2024
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\svchost.exe -k RPCSS -p
                                            Imagebase:0x7ff77afe0000
                                            File size:55'320 bytes
                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                            Has elevated privileges:true
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000000D.00000002.2743908241.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000000D.00000000.1498055145.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000000D.00000002.2742703107.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            Has exited:false

                                            Target ID:14
                                            Start time:09:33:25
                                            Start date:19/12/2024
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
                                            Imagebase:0x7ff77afe0000
                                            File size:55'320 bytes
                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000000E.00000002.2742198516.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000000E.00000002.2741867843.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            Has exited:false

                                            Target ID:15
                                            Start time:09:33:26
                                            Start date:19/12/2024
                                            Path:C:\Windows\System32\dwm.exe
                                            Wow64 process (32bit):false
                                            Commandline:"dwm.exe"
                                            Imagebase:0x7ff6f73e0000
                                            File size:94'720 bytes
                                            MD5 hash:5C27608411832C5B39BA04E33D53536C
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000000F.00000002.2798456887.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000000F.00000002.2798241222.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000000F.00000000.1509586132.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            Has exited:false

                                            Target ID:16
                                            Start time:09:33:26
                                            Start date:19/12/2024
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                                            Imagebase:0x7ff77afe0000
                                            File size:55'320 bytes
                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000010.00000002.2743736063.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000010.00000002.2743087540.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000010.00000000.1509606581.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            Has exited:false

                                            Target ID:17
                                            Start time:09:33:26
                                            Start date:19/12/2024
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                                            Imagebase:0x7ff77afe0000
                                            File size:55'320 bytes
                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000011.00000000.1512389471.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000011.00000002.2742837753.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000011.00000002.2743537432.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            Has exited:false

                                            Target ID:18
                                            Start time:09:33:27
                                            Start date:19/12/2024
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p
                                            Imagebase:0x7ff77afe0000
                                            File size:55'320 bytes
                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                            Has elevated privileges:true
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000012.00000002.2742331815.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000012.00000000.1514452533.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000012.00000002.2742840917.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            Has exited:false

                                            Target ID:19
                                            Start time:09:33:27
                                            Start date:19/12/2024
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                            Imagebase:0x7ff77afe0000
                                            File size:55'320 bytes
                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000013.00000000.1516357060.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000013.00000002.2743461282.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000013.00000002.2744126681.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            Has exited:false

                                            Target ID:20
                                            Start time:09:33:27
                                            Start date:19/12/2024
                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:rundll32.exe C:\Users\user\Desktop\26B1sczZ88.dll,LpkDrawTextEx
                                            Imagebase:0x960000
                                            File size:61'440 bytes
                                            MD5 hash:889B99C52A60DD49227C5E485A016679
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:21
                                            Start time:09:33:27
                                            Start date:19/12/2024
                                            Path:C:\Users\user\AppData\Local\Temp\hrlA367.tmp
                                            Wow64 process (32bit):true
                                            Commandline:C:\Users\user\AppData\Local\Temp\hrlA367.tmp
                                            Imagebase:0x400000
                                            File size:522'752 bytes
                                            MD5 hash:F3F920AAF85289A8E532890BC618AADD
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000015.00000002.2066207224.0000000000620000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000015.00000002.2065117221.0000000000422000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000015.00000002.2066888535.000000007FE40000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: CN_disclosed_20180208_Mal1, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmp, Author: Florian Roth
                                            • Rule: MAL_Nitol_Malware_Jan19_1, Description: Detects Nitol Malware, Source: C:\Users\user\AppData\Local\Temp\hrlA367.tmp, Author: Florian Roth
                                            Antivirus matches:
                                            • Detection: 100%, Avira
                                            • Detection: 100%, Joe Sandbox ML
                                            • Detection: 97%, ReversingLabs
                                            Has exited:true

                                            Target ID:22
                                            Start time:09:33:27
                                            Start date:19/12/2024
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                                            Imagebase:0x7ff77afe0000
                                            File size:55'320 bytes
                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000016.00000000.1519926327.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000016.00000002.2743037216.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000016.00000002.2742450602.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            Has exited:false

                                            Target ID:23
                                            Start time:09:33:27
                                            Start date:19/12/2024
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                                            Imagebase:0x7ff77afe0000
                                            File size:55'320 bytes
                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000017.00000000.1522184005.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000017.00000002.2742914219.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000017.00000002.2742335064.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            Has exited:false

                                            Target ID:24
                                            Start time:09:33:28
                                            Start date:19/12/2024
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                                            Imagebase:0x7ff77afe0000
                                            File size:55'320 bytes
                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000018.00000002.2743542686.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000018.00000002.2744224357.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000018.00000000.1525893859.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            Has exited:false

                                            Target ID:25
                                            Start time:09:33:29
                                            Start date:19/12/2024
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                            Imagebase:0x7ff77afe0000
                                            File size:55'320 bytes
                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                            Has elevated privileges:true
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000019.00000000.1537557780.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000019.00000002.2742759300.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000019.00000002.2742301520.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            Has exited:false

                                            Target ID:26
                                            Start time:09:33:29
                                            Start date:19/12/2024
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                            Imagebase:0x7ff77afe0000
                                            File size:55'320 bytes
                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000001A.00000002.2744241055.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000001A.00000000.1542306261.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000001A.00000002.2742498334.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            Has exited:false

                                            Target ID:27
                                            Start time:09:33:30
                                            Start date:19/12/2024
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                            Imagebase:0x7ff77afe0000
                                            File size:55'320 bytes
                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                            Has elevated privileges:true
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000001B.00000002.2741797049.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000001B.00000002.2742552059.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            Has exited:false

                                            Target ID:28
                                            Start time:09:33:30
                                            Start date:19/12/2024
                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:rundll32.exe C:\Users\user\Desktop\26B1sczZ88.dll,LpkEditControl
                                            Imagebase:0x960000
                                            File size:61'440 bytes
                                            MD5 hash:889B99C52A60DD49227C5E485A016679
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:29
                                            Start time:09:33:30
                                            Start date:19/12/2024
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                            Imagebase:0x7ff77afe0000
                                            File size:55'320 bytes
                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                            Has elevated privileges:true
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000001D.00000002.2741751352.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000001D.00000002.2742525977.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            Has exited:false

                                            Target ID:30
                                            Start time:09:33:30
                                            Start date:19/12/2024
                                            Path:C:\Users\user\AppData\Local\Temp\hrlAF3E.tmp
                                            Wow64 process (32bit):true
                                            Commandline:C:\Users\user\AppData\Local\Temp\hrlAF3E.tmp
                                            Imagebase:0x400000
                                            File size:522'752 bytes
                                            MD5 hash:F3F920AAF85289A8E532890BC618AADD
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: CN_disclosed_20180208_Mal1, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmp, Author: Florian Roth
                                            • Rule: MAL_Nitol_Malware_Jan19_1, Description: Detects Nitol Malware, Source: C:\Users\user\AppData\Local\Temp\hrlAF3E.tmp, Author: Florian Roth
                                            Antivirus matches:
                                            • Detection: 100%, Avira
                                            • Detection: 100%, Joe Sandbox ML
                                            • Detection: 97%, ReversingLabs
                                            Has exited:true

                                            Target ID:31
                                            Start time:09:33:30
                                            Start date:19/12/2024
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                            Imagebase:0x7ff77afe0000
                                            File size:55'320 bytes
                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                            Has elevated privileges:true
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000001F.00000002.2744487406.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000001F.00000000.1550287003.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000001F.00000002.2742576822.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            Has exited:false

                                            Target ID:32
                                            Start time:09:33:31
                                            Start date:19/12/2024
                                            Path:C:\Windows\SysWOW64\taskkill.exe
                                            Wow64 process (32bit):true
                                            Commandline:taskkill /f /im ZhuDongFangYu.exe /t
                                            Imagebase:0xf80000
                                            File size:74'240 bytes
                                            MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:33
                                            Start time:09:33:31
                                            Start date:19/12/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff70f010000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:34
                                            Start time:09:33:31
                                            Start date:19/12/2024
                                            Path:C:\Windows\SysWOW64\zvhcfa.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\SysWOW64\zvhcfa.exe
                                            Imagebase:0x400000
                                            File size:522'752 bytes
                                            MD5 hash:F3F920AAF85289A8E532890BC618AADD
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: CN_disclosed_20180208_Mal1, Description: Detects malware from disclosed CN malware set, Source: C:\Windows\SysWOW64\zvhcfa.exe, Author: Florian Roth
                                            • Rule: MAL_Nitol_Malware_Jan19_1, Description: Detects Nitol Malware, Source: C:\Windows\SysWOW64\zvhcfa.exe, Author: Florian Roth
                                            Antivirus matches:
                                            • Detection: 100%, Avira
                                            • Detection: 100%, Joe Sandbox ML
                                            • Detection: 97%, ReversingLabs
                                            Has exited:true

                                            Target ID:35
                                            Start time:09:33:31
                                            Start date:19/12/2024
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                            Imagebase:0x7ff77afe0000
                                            File size:55'320 bytes
                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000023.00000002.2743363395.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000023.00000002.2742760458.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            Has exited:false

                                            Target ID:36
                                            Start time:09:33:31
                                            Start date:19/12/2024
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                            Imagebase:0x7ff77afe0000
                                            File size:55'320 bytes
                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                            Has elevated privileges:true
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000024.00000002.2743906496.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000024.00000002.2742677643.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            Has exited:false

                                            Target ID:37
                                            Start time:09:33:32
                                            Start date:19/12/2024
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                            Imagebase:0x7ff77afe0000
                                            File size:55'320 bytes
                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000025.00000002.2743367209.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000025.00000002.2741930750.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000025.00000000.1564612279.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            Has exited:false

                                            Target ID:38
                                            Start time:09:33:32
                                            Start date:19/12/2024
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                            Imagebase:0x7ff77afe0000
                                            File size:55'320 bytes
                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000026.00000002.2743535164.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000026.00000002.2742839099.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            Has exited:false

                                            Target ID:39
                                            Start time:09:33:32
                                            Start date:19/12/2024
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache
                                            Imagebase:0x7ff77afe0000
                                            File size:55'320 bytes
                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                            Has elevated privileges:true
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000027.00000002.2742966295.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000027.00000002.2743612981.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            Has exited:false

                                            Target ID:40
                                            Start time:09:33:32
                                            Start date:19/12/2024
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                            Imagebase:0x7ff77afe0000
                                            File size:55'320 bytes
                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                            Has elevated privileges:true
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000028.00000002.2744408295.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000028.00000002.2743091000.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            Has exited:false

                                            Target ID:41
                                            Start time:09:33:33
                                            Start date:19/12/2024
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                            Imagebase:0x7ff77afe0000
                                            File size:55'320 bytes
                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                            Has elevated privileges:true
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000029.00000002.2745114770.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000029.00000000.1572545222.000000007FFF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 00000029.00000002.2743852596.000000007FFC0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            Has exited:false

                                            Target ID:42
                                            Start time:09:33:33
                                            Start date:19/12/2024
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                            Imagebase:0x7ff77afe0000
                                            File size:55'320 bytes
                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                            Has elevated privileges:true
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000002A.00000002.2741956104.000000007FFB0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Virut, Description: Yara detected Virut, Source: 0000002A.00000002.2742967559.000000007FFD0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            Has exited:false

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:32.7%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:25.4%
                                              Total number of Nodes:138
                                              Total number of Limit Nodes:5
                                              execution_graph 181 10001a32 182 10001aa9 181->182 183 10001a3a GetModuleFileNameW DisableThreadLibraryCalls 181->183 184 10001aa7 182->184 186 10001ae4 182->186 187 10001ab9 SetEvent WaitForSingleObject CloseHandle CloseHandle 182->187 203 10001134 FindResourceW 183->203 235 10001123 186->235 187->186 190 10001aa2 231 100010ce GetSystemDirectoryW lstrcatW LoadLibraryW 190->231 194 10001a7d 226 100012f6 GetModuleFileNameW PathFindFileNameW lstrcmpiW 194->226 197 10001a82 197->190 199 10001a87 CreateEventW 197->199 198 10001a74 198->194 217 10001193 FindResourceW 198->217 199->190 201 10001a9d 199->201 227 100019e6 CreateThread SetThreadPriority 201->227 204 1000118d 203->204 205 1000114e SizeofResource LoadResource 203->205 204->190 209 10001338 GetModuleFileNameW PathFindFileNameW 204->209 205->204 206 1000116f 205->206 206->204 207 10001173 LockResource 206->207 207->204 208 1000117e lstrcpynA 207->208 208->204 210 10001391 209->210 211 10001368 209->211 210->194 214 100012bd CreateMutexA 210->214 211->210 212 10001376 PathFindExtensionW 211->212 212->210 213 10001381 lstrcmpiW 212->213 213->210 215 100012d3 214->215 216 100012d6 GetLastError CloseHandle 214->216 215->198 216->198 218 100011bd SizeofResource LoadResource 217->218 222 100012b5 217->222 219 100011e2 218->219 218->222 220 100011eb LockResource 219->220 219->222 221 100011fd GetTempPathW GetTempFileNameW CreateFileW 220->221 220->222 221->222 223 10001246 WriteFile CloseHandle 221->223 222->194 223->222 224 1000126c RtlZeroMemory CreateProcessW 223->224 224->222 225 100012ab CloseHandle CloseHandle 224->225 225->222 226->197 228 10001a0c ResumeThread 227->228 229 10001a1d TerminateThread 227->229 238 100018d3 RtlZeroMemory 227->238 228->229 230 10001a30 228->230 229->230 230->190 232 10001111 231->232 233 10001116 231->233 310 1000101f 232->310 233->184 236 10001133 235->236 237 1000112c FreeLibrary 235->237 236->184 237->236 239 100018ec 238->239 240 10001901 DriveType 239->240 242 1000196c WaitForMultipleObjects 239->242 249 10001948 239->249 240->239 241 10001910 CreateThread 240->241 241->239 243 1000192d SetThreadPriority 241->243 260 10001677 WaitForSingleObject 241->260 244 10001982 RtlZeroMemory 242->244 242->249 246 10001952 TerminateThread 243->246 247 1000193b ResumeThread 243->247 248 10001993 CloseHandle 244->248 244->249 246->239 247->246 247->249 248->248 248->249 249->239 250 100019b2 249->250 254 10001606 GetLogicalDrives GetTickCount WaitForSingleObject 249->254 251 100019b6 WaitForMultipleObjects 250->251 252 100019db 250->252 251->252 253 100019cc CloseHandle 251->253 253->252 253->253 257 10001645 254->257 255 10001669 255->249 256 1000163d GetTickCount 256->255 256->257 257->255 257->256 258 10001650 GetLogicalDrives 257->258 258->255 259 1000165c WaitForSingleObject 258->259 259->257 261 100016a3 260->261 265 1000169c 260->265 262 100016bc lstrcpyW 261->262 263 100016cd lstrcpyW 261->263 264 100016d1 lstrcpyW PathAppendW FindFirstFileW 262->264 263->264 264->265 266 10001718 lstrcpyW 264->266 267 1000172e lstrcmpiW 266->267 268 10001744 lstrcmpiW 267->268 269 100018b5 FindNextFileW 267->269 268->269 270 1000175a 268->270 269->267 271 100018ce 269->271 272 100017c3 PathFindExtensionW 270->272 273 10001763 WaitForSingleObject 270->273 274 100017db lstrcmpiW 272->274 275 1000189c WaitForSingleObject 272->275 276 10001778 lstrcpyW PathAppendW 273->276 277 100017ac FindClose 273->277 278 100017e7 lstrcpyW PathAppendW GetFileAttributesW 274->278 279 1000183e lstrcmpiW 274->279 275->269 275->277 280 10001677 22 API calls 276->280 277->265 278->269 281 1000181b CopyFileW SetFileAttributesW 278->281 282 1000185a 279->282 283 1000184c lstrcmpiW 279->283 284 100017a4 280->284 281->279 282->275 285 1000186f lstrcpyW PathAppendW 282->285 283->275 283->282 284->269 284->277 287 1000142b SHRegGetValueW 285->287 288 10001464 287->288 289 100015f5 287->289 290 10001477 lstrcpyW StrStrIW 288->290 291 100015fc 288->291 289->282 290->289 292 100014a6 PathRemoveFileSpecW PathAppendW GetFileAttributesW 290->292 292->289 293 100014e0 PathGetShortPath GetTempPathW GetCurrentThreadId GetTempFileNameW wsprintfW 292->293 304 10001398 RtlZeroMemory CreateProcessW 293->304 296 10001563 wsprintfW 297 10001398 8 API calls 296->297 298 10001593 297->298 299 10001677 34 API calls 298->299 300 100015a2 wsprintfW 299->300 301 10001398 8 API calls 300->301 302 100015d3 wsprintfW 301->302 303 10001398 8 API calls 302->303 303->289 305 100013e3 WaitForSingleObject 304->305 306 100013db GetLastError 304->306 308 10001401 GetExitCodeProcess CloseHandle CloseHandle 305->308 309 100013f3 TerminateProcess 305->309 307 10001428 306->307 307->289 307->296 308->307 309->308 333 10001000 GetProcAddress 310->333 313 10001000 2 API calls 314 10001038 313->314 315 10001000 2 API calls 314->315 316 10001047 315->316 317 10001000 2 API calls 316->317 318 10001058 RtlMoveMemory 317->318 319 10001000 2 API calls 318->319 320 1000106e 319->320 321 10001000 2 API calls 320->321 322 1000107d 321->322 323 10001000 2 API calls 322->323 324 1000108c 323->324 325 10001000 2 API calls 324->325 326 1000109b 325->326 327 10001000 2 API calls 326->327 328 100010aa 327->328 329 10001000 2 API calls 328->329 330 100010b9 329->330 331 10001000 2 API calls 330->331 332 100010c8 331->332 332->233 334 10001014 ExitProcess 333->334 335 1000101c 333->335 335->313

                                              Callgraph

                                              Control-flow Graph

                                              APIs
                                              • FindResourceW.KERNEL32(00000066,0000000A,?,00000001), ref: 100011AD
                                              • SizeofResource.KERNEL32(00000000,?,00000001), ref: 100011C4
                                              • LoadResource.KERNEL32(00000000,?,00000001), ref: 100011D4
                                              • LockResource.KERNEL32(00000000,?,00000001), ref: 100011EC
                                              • GetTempPathW.KERNEL32(00000104,?,?,?,00000001), ref: 1000120A
                                              • GetTempFileNameW.KERNELBASE(?,hrl,00000000,?,?,?,00000001), ref: 1000121E
                                              • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000002,00000000,00000000,?,?,00000001), ref: 10001239
                                              • WriteFile.KERNELBASE(00000000,?,00000001,?,00000000,?,?,00000001), ref: 10001255
                                              • CloseHandle.KERNEL32(00000000,?,?,00000001), ref: 10001265
                                              • RtlZeroMemory.KERNEL32(?,00000044,?,?,00000001), ref: 10001272
                                              • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,00000001), ref: 1000129E
                                              • CloseHandle.KERNEL32(?,?,?,00000001), ref: 100012AE
                                              • CloseHandle.KERNEL32(?,?,?,00000001), ref: 100012B3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1582939076.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000000.00000002.1582878842.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1582987564.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1583149831.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
                                              Similarity
                                              • API ID: Resource$CloseFileHandle$CreateTemp$FindLoadLockMemoryNamePathProcessSizeofWriteZero
                                              • String ID: D$hrl
                                              • API String ID: 3860286866-1539874146
                                              • Opcode ID: 4d7fa836e7c1b89c7a2dc873b2d0427aa4d1f5576468e1d68e679cf7da32b867
                                              • Instruction ID: 7e218033b22d9d8325d54e1b04e0e1002b9ec3418c8ade03e82d96821e86f301
                                              • Opcode Fuzzy Hash: 4d7fa836e7c1b89c7a2dc873b2d0427aa4d1f5576468e1d68e679cf7da32b867
                                              • Instruction Fuzzy Hash: 0A31E8B1D01228ABEB11EFA0CC8CEEE7BBDEB49791F104566F605E2165D7344A54CB60

                                              Control-flow Graph

                                              APIs
                                              • GetModuleFileNameW.KERNEL32(00000001,10003018,00000104), ref: 10001A4F
                                              • DisableThreadLibraryCalls.KERNEL32(00000001), ref: 10001A56
                                                • Part of subcall function 10001134: FindResourceW.KERNEL32(00000065,0000000A,00000001,?,10001A61), ref: 10001142
                                                • Part of subcall function 10001134: SizeofResource.KERNEL32(00000000,?,?,10001A61), ref: 10001156
                                                • Part of subcall function 10001134: LoadResource.KERNEL32(00000000,?,?,10001A61), ref: 10001165
                                                • Part of subcall function 10001134: LockResource.KERNEL32(00000000,?,?,10001A61), ref: 10001174
                                                • Part of subcall function 10001134: lstrcpynA.KERNEL32(10003220,00000000,00000020,?,?,10001A61), ref: 10001186
                                                • Part of subcall function 10001338: GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 1000134F
                                                • Part of subcall function 10001338: PathFindFileNameW.SHLWAPI(?), ref: 1000135C
                                                • Part of subcall function 10001338: PathFindExtensionW.SHLWAPI(00000000), ref: 10001377
                                                • Part of subcall function 10001338: lstrcmpiW.KERNEL32(00000000,.TMP), ref: 10001387
                                              • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000), ref: 10001A8E
                                                • Part of subcall function 100012BD: CreateMutexA.KERNELBASE(00000000,00000000,10003220,?,10001A74), ref: 100012C7
                                                • Part of subcall function 10001193: FindResourceW.KERNEL32(00000066,0000000A,?,00000001), ref: 100011AD
                                                • Part of subcall function 10001193: SizeofResource.KERNEL32(00000000,?,00000001), ref: 100011C4
                                                • Part of subcall function 10001193: LoadResource.KERNEL32(00000000,?,00000001), ref: 100011D4
                                                • Part of subcall function 10001193: LockResource.KERNEL32(00000000,?,00000001), ref: 100011EC
                                                • Part of subcall function 10001193: GetTempPathW.KERNEL32(00000104,?,?,?,00000001), ref: 1000120A
                                                • Part of subcall function 10001193: GetTempFileNameW.KERNELBASE(?,hrl,00000000,?,?,?,00000001), ref: 1000121E
                                                • Part of subcall function 10001193: CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000002,00000000,00000000,?,?,00000001), ref: 10001239
                                                • Part of subcall function 10001193: WriteFile.KERNELBASE(00000000,?,00000001,?,00000000,?,?,00000001), ref: 10001255
                                                • Part of subcall function 10001193: CloseHandle.KERNEL32(00000000,?,?,00000001), ref: 10001265
                                                • Part of subcall function 10001193: RtlZeroMemory.KERNEL32(?,00000044,?,?,00000001), ref: 10001272
                                                • Part of subcall function 10001193: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,00000001), ref: 1000129E
                                                • Part of subcall function 10001193: CloseHandle.KERNEL32(?,?,?,00000001), ref: 100012AE
                                                • Part of subcall function 10001193: CloseHandle.KERNEL32(?,?,?,00000001), ref: 100012B3
                                              • SetEvent.KERNEL32(?), ref: 10001ABA
                                              • WaitForSingleObject.KERNEL32(000000FF), ref: 10001AC8
                                              • CloseHandle.KERNEL32 ref: 10001ADA
                                              • CloseHandle.KERNEL32 ref: 10001AE2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1582939076.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000000.00000002.1582878842.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1582987564.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1583149831.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
                                              Similarity
                                              • API ID: Resource$File$CloseHandle$CreateFindName$Path$EventLoadLockModuleSizeofTemp$CallsDisableExtensionLibraryMemoryMutexObjectProcessSingleThreadWaitWriteZerolstrcmpilstrcpyn
                                              • String ID:
                                              • API String ID: 3535865480-0
                                              • Opcode ID: 9463e6314e2ffea4b211b81d2ab195e89bd7a5a57881afda2ee0c205d14b84f9
                                              • Instruction ID: ffd36879a7497b368e77efcd0eb173f2275a3137c17b7fd903d544f692c8100a
                                              • Opcode Fuzzy Hash: 9463e6314e2ffea4b211b81d2ab195e89bd7a5a57881afda2ee0c205d14b84f9
                                              • Instruction Fuzzy Hash: 78115B34606332AAF612EBA18C89BCF3BACEF023E5F118116F554D10ADDB609950CA63

                                              Control-flow Graph

                                              APIs
                                              • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 100010E3
                                              • lstrcatW.KERNEL32(?,\lpk), ref: 100010F5
                                              • LoadLibraryW.KERNELBASE(?), ref: 10001102
                                                • Part of subcall function 1000101F: RtlMoveMemory.KERNEL32(10003250,00000000,LpkEditControl,00000040,LpkDrawTextEx,LpkDllInitialize,LpkTabbedTextOut,10001116), ref: 1000105E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1582939076.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000000.00000002.1582878842.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1582987564.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1583149831.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
                                              Similarity
                                              • API ID: DirectoryLibraryLoadMemoryMoveSystemlstrcat
                                              • String ID: \lpk
                                              • API String ID: 3372298440-336436324
                                              • Opcode ID: da33033e2e221ff141f50507f8a04e5c7ee6db60748155a8461eceed5cf1bc2c
                                              • Instruction ID: be4007e3f20e417fa77d5d5c324e07ec6705456ad939ec99c1b7038da3bba866
                                              • Opcode Fuzzy Hash: da33033e2e221ff141f50507f8a04e5c7ee6db60748155a8461eceed5cf1bc2c
                                              • Instruction Fuzzy Hash: B2E0127480032A9BFB50EBB08C8EAC777BCE704381F000562E755D206AEF74D585CB50

                                              Control-flow Graph

                                              APIs
                                              • GetModuleFileNameW.KERNEL32(?,00000104), ref: 10001311
                                              • PathFindFileNameW.SHLWAPI(?), ref: 1000131E
                                              • lstrcmpiW.KERNELBASE(00000000,lpk.dll), ref: 1000132A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1582939076.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000000.00000002.1582878842.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1582987564.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1583149831.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
                                              Similarity
                                              • API ID: FileName$FindModulePathlstrcmpi
                                              • String ID: lpk.dll
                                              • API String ID: 1239673384-3066363995
                                              • Opcode ID: 6ddba052437873c055f84e44d424d8da0386140e72b76d5d1097730297a1a48a
                                              • Instruction ID: 2c49bb99bc8642171fc9961312980d4ab0a4eef97db440158d685f58edb63067
                                              • Opcode Fuzzy Hash: 6ddba052437873c055f84e44d424d8da0386140e72b76d5d1097730297a1a48a
                                              • Instruction Fuzzy Hash: 35E0127554032D6BEB116B70CC8DDD7376CA700745F004251F65AD20BADA74958DCF50

                                              Control-flow Graph

                                              APIs
                                              • CreateThread.KERNELBASE(00000000,00000000,100018D3,00000000,00000004,00000000), ref: 100019F4
                                              • SetThreadPriority.KERNELBASE(00000000,000000F1), ref: 10001A02
                                              • ResumeThread.KERNELBASE ref: 10001A12
                                              • TerminateThread.KERNEL32(00000000), ref: 10001A24
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1582939076.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000000.00000002.1582878842.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1582987564.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1583149831.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
                                              Similarity
                                              • API ID: Thread$CreatePriorityResumeTerminate
                                              • String ID:
                                              • API String ID: 2154424394-0
                                              • Opcode ID: 3913cdfa09b60b7149b9d1de93706da214591cc2ab76757be7511d577559ebbf
                                              • Instruction ID: e961737a7aae76fd0c4580525259ff7f5de2b8d71232f79ea42e210bb63285d4
                                              • Opcode Fuzzy Hash: 3913cdfa09b60b7149b9d1de93706da214591cc2ab76757be7511d577559ebbf
                                              • Instruction Fuzzy Hash: AFE07570502230BAFA119B769C8CB873F6AEB076F1B554316F62E915BAC7204581CBA1

                                              Control-flow Graph

                                              APIs
                                              • CreateMutexA.KERNELBASE(00000000,00000000,10003220,?,10001A74), ref: 100012C7
                                              • GetLastError.KERNEL32(00000001,?,10001A74), ref: 100012D7
                                              • CloseHandle.KERNELBASE(00000000,?,10001A74), ref: 100012EB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1582939076.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000000.00000002.1582878842.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1582987564.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1583149831.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
                                              Similarity
                                              • API ID: CloseCreateErrorHandleLastMutex
                                              • String ID:
                                              • API String ID: 4294037311-0
                                              • Opcode ID: 679afb9bc1ba41874d318fcbe5ee5d611c016a16ab61a98bcb540af40b34feda
                                              • Instruction ID: 226164d0f01b805de613a55782abc57cedde5fe5c7c82aa8690d380dee59acf0
                                              • Opcode Fuzzy Hash: 679afb9bc1ba41874d318fcbe5ee5d611c016a16ab61a98bcb540af40b34feda
                                              • Instruction Fuzzy Hash: 1BD05E3660873067F212937CBC0CB8F2A35EBC5BF2F128265FE4AD229CCB24490685D5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 50 10001000-10001012 GetProcAddress 51 10001014-10001016 ExitProcess 50->51 52 1000101c 50->52
                                              APIs
                                              • GetProcAddress.KERNEL32(10001116,10001029), ref: 1000100A
                                              • ExitProcess.KERNEL32 ref: 10001016
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1582939076.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000000.00000002.1582878842.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1582987564.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1583149831.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
                                              Similarity
                                              • API ID: AddressExitProcProcess
                                              • String ID:
                                              • API String ID: 2796388413-0
                                              • Opcode ID: d6c54ef09a1c41390c756e13bcc0c54c78fbecb98ee2d0f10b5980c889cfc44d
                                              • Instruction ID: 5188076986118a0aee3e910be33b50d7ca781def4220dbbbf73b176a37f9c490
                                              • Opcode Fuzzy Hash: d6c54ef09a1c41390c756e13bcc0c54c78fbecb98ee2d0f10b5980c889cfc44d
                                              • Instruction Fuzzy Hash: F6C04C35104261ABFA11AB618E8CB067B66AB547D1B114215E255800BED6318450EA15

                                              Control-flow Graph

                                              APIs
                                              • WaitForSingleObject.KERNEL32(00000000), ref: 1000168F
                                              • lstrcpyW.KERNEL32(?,A:\,0000EA60,753C73E0), ref: 100016C2
                                              • lstrcpyW.KERNEL32(?,?), ref: 100016DF
                                              • PathAppendW.SHLWAPI(?,10002374), ref: 100016F3
                                              • FindFirstFileW.KERNEL32(?,?), ref: 10001703
                                              • PathFindExtensionW.SHLWAPI(?), ref: 100017CA
                                              • lstrcmpiW.KERNEL32(00000000,.EXE), ref: 100017E1
                                              • lstrcpyW.KERNEL32(?,?), ref: 100017F5
                                              • PathAppendW.SHLWAPI(?,lpk.dll), ref: 10001803
                                              • GetFileAttributesW.KERNEL32(?), ref: 1000180C
                                              • CopyFileW.KERNEL32(10003018,?,00000001), ref: 10001829
                                              • SetFileAttributesW.KERNEL32(?,00000007), ref: 10001838
                                              • lstrcmpiW.KERNEL32(100015A2,.RAR), ref: 10001846
                                              • lstrcmpiW.KERNEL32(100015A2,.ZIP), ref: 10001854
                                              • lstrcpyW.KERNEL32(?,?), ref: 1000187D
                                              • PathAppendW.SHLWAPI(?,?), ref: 1000188D
                                              • WaitForSingleObject.KERNEL32(00000014), ref: 100018A4
                                              • FindNextFileW.KERNEL32(100015A2,?), ref: 100018BF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1582939076.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000000.00000002.1582878842.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1582987564.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1583149831.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
                                              Similarity
                                              • API ID: File$Pathlstrcpy$AppendFindlstrcmpi$AttributesObjectSingleWait$CopyExtensionFirstNext
                                              • String ID: .EXE$.RAR$.ZIP$A:\$lpk.dll
                                              • API String ID: 3771388200-3932496361
                                              • Opcode ID: c6fda171f6056316e2428e6f33dc1771b38d5d81fbede9409986d606e9291121
                                              • Instruction ID: 14b84c573bc6bfc0103a48903cae28372ea9a580d345985b263a6e171d24a783
                                              • Opcode Fuzzy Hash: c6fda171f6056316e2428e6f33dc1771b38d5d81fbede9409986d606e9291121
                                              • Instruction Fuzzy Hash: 5651DDB290022DAAEB10DBA4CC88BDE77BDEB44390F1445A6E605E2055DB75DB84CFA0

                                              Control-flow Graph

                                              APIs
                                              • SHRegGetValueW.SHLWAPI(80000000,WinRAR\shell\open\command,00000000,00000002,00000000,?,?), ref: 10001456
                                              • lstrcpyW.KERNEL32(00000022,?), ref: 10001485
                                              • StrStrIW.SHLWAPI(00000022,1000230C), ref: 10001498
                                              • PathRemoveFileSpecW.SHLWAPI(00000022), ref: 100014B2
                                              • PathAppendW.SHLWAPI(00000022,rar.exe), ref: 100014C4
                                              • GetFileAttributesW.KERNEL32(00000022), ref: 100014D1
                                              • PathGetShortPath.SHELL32(00000022), ref: 100014E9
                                              • GetTempPathW.KERNEL32(00000104,?), ref: 100014FB
                                              • GetCurrentThreadId.KERNEL32 ref: 10001508
                                              • GetTempFileNameW.KERNEL32(?,IRAR,00000000), ref: 1000151B
                                              • wsprintfW.USER32 ref: 10001544
                                                • Part of subcall function 10001398: RtlZeroMemory.KERNEL32(?,00000044), ref: 100013A7
                                                • Part of subcall function 10001398: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 100013D1
                                                • Part of subcall function 10001398: GetLastError.KERNEL32 ref: 100013DB
                                              • wsprintfW.USER32 ref: 10001580
                                                • Part of subcall function 10001398: WaitForSingleObject.KERNEL32(?,?), ref: 100013E9
                                                • Part of subcall function 10001398: TerminateProcess.KERNEL32(?,000005B4), ref: 100013FB
                                                • Part of subcall function 10001398: GetExitCodeProcess.KERNEL32(?,?), ref: 1000140F
                                                • Part of subcall function 10001398: CloseHandle.KERNEL32(?), ref: 1000141E
                                                • Part of subcall function 10001398: CloseHandle.KERNEL32(?), ref: 10001423
                                                • Part of subcall function 10001677: WaitForSingleObject.KERNEL32(00000000), ref: 1000168F
                                              • wsprintfW.USER32 ref: 100015C0
                                              • wsprintfW.USER32 ref: 100015E6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1582939076.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000000.00000002.1582878842.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1582987564.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1583149831.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
                                              Similarity
                                              • API ID: Path$wsprintf$FileProcess$CloseHandleObjectSingleTempWait$AppendAttributesCodeCreateCurrentErrorExitLastMemoryNameRemoveShortSpecTerminateThreadValueZerolstrcpy
                                              • String ID: "$"%s" a -r -ep1"%s" "%s" "%s\lpk.dll"$"%s" x "%s" *.exe "%s\"$IRAR$WinRAR\shell\open\command$cmd /c %s vb "%s" lpk.dll|find /i "lpk.dll"$cmd /c RD /s /q "%s"$rar.exe$s<u
                                              • API String ID: 2025278562-1424356315
                                              • Opcode ID: 142c22ba32e87d5e21e1317ff34b13b051766c503af886549bf79c5699618864
                                              • Instruction ID: 53c986b37aabe2969284ac0dd55f15aa40eaa0efec7de0ac8071c71bfebae4df
                                              • Opcode Fuzzy Hash: 142c22ba32e87d5e21e1317ff34b13b051766c503af886549bf79c5699618864
                                              • Instruction Fuzzy Hash: 1041C4B690021DAAEF10DB90CD48EDA77BCEB44340F1045A2B619D6055E674EB85CFB1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 104 1000101f 105 10001024-100010cd call 10001000 * 4 RtlMoveMemory call 10001000 * 7 104->105
                                              APIs
                                                • Part of subcall function 10001000: GetProcAddress.KERNEL32(10001116,10001029), ref: 1000100A
                                                • Part of subcall function 10001000: ExitProcess.KERNEL32 ref: 10001016
                                              • RtlMoveMemory.KERNEL32(10003250,00000000,LpkEditControl,00000040,LpkDrawTextEx,LpkDllInitialize,LpkTabbedTextOut,10001116), ref: 1000105E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1582939076.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000000.00000002.1582878842.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1582987564.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1583149831.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
                                              Similarity
                                              • API ID: AddressExitMemoryMoveProcProcess
                                              • String ID: LpkDllInitialize$LpkDrawTextEx$LpkEditControl$LpkExtTextOut$LpkGetCharacterPlacement$LpkGetTextExtentExPoint$LpkInitialize$LpkPSMTextOut$LpkTabbedTextOut$LpkUseGDIWidthCache$ftsWordBreak
                                              • API String ID: 598812106-3128392633
                                              • Opcode ID: 7b87169acbeb48b0e10738be1b64164151dc3c35c96d6f7d10ce1f3cc01630ac
                                              • Instruction ID: aa075801c4fef1efc4910219ef897301fe87f4caca160f87edb01903a9b0afcb
                                              • Opcode Fuzzy Hash: 7b87169acbeb48b0e10738be1b64164151dc3c35c96d6f7d10ce1f3cc01630ac
                                              • Instruction Fuzzy Hash: 48015474C0239065FB27EFB14D95BCA3B54E7196C1F10C515F3446712EDBB470849B59

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 127 100018d3-100018e6 RtlZeroMemory 128 100018ec-100018f3 127->128 129 100018fb-100018ff 128->129 130 10001901-1000190e DriveType 129->130 131 1000195c-10001964 129->131 130->131 133 10001910-1000192b CreateThread 130->133 131->129 132 10001966-1000196a 131->132 134 100019a4-100019ac call 10001606 132->134 135 1000196c-10001980 WaitForMultipleObjects 132->135 133->131 136 1000192d-10001939 SetThreadPriority 133->136 134->128 145 100019b2-100019b4 134->145 135->134 137 10001982-10001991 RtlZeroMemory 135->137 139 10001952-10001956 TerminateThread 136->139 140 1000193b-10001946 ResumeThread 136->140 141 100019a2 137->141 142 10001993-100019a0 CloseHandle 137->142 139->131 140->139 144 10001948-10001950 140->144 141->134 142->141 142->142 144->131 146 100019b6-100019ca WaitForMultipleObjects 145->146 147 100019db-100019e5 145->147 146->147 148 100019cc-100019d9 CloseHandle 146->148 148->147 148->148
                                              APIs
                                              • RtlZeroMemory.KERNEL32(?,00000060), ref: 100018E6
                                              • DriveType.SHELL32(00000002), ref: 10001902
                                              • CreateThread.KERNEL32(00000000,00000000,10001677,00000002,00000004,00000000), ref: 1000191D
                                              • SetThreadPriority.KERNEL32(00000000,000000F1), ref: 10001930
                                              • ResumeThread.KERNEL32(?), ref: 1000193D
                                              • TerminateThread.KERNEL32(?,00000000), ref: 10001956
                                              • WaitForMultipleObjects.KERNEL32(00000000,?,00000001,00000000), ref: 10001975
                                              • RtlZeroMemory.KERNEL32(?,00000060), ref: 10001989
                                              • CloseHandle.KERNEL32(?), ref: 10001997
                                              • WaitForMultipleObjects.KERNEL32(00000000,?,00000001,000000FF), ref: 100019C0
                                              • CloseHandle.KERNEL32(?), ref: 100019D0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1582939076.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000000.00000002.1582878842.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1582987564.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1583149831.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
                                              Similarity
                                              • API ID: Thread$CloseHandleMemoryMultipleObjectsWaitZero$CreateDrivePriorityResumeTerminateType
                                              • String ID:
                                              • API String ID: 1898017378-0
                                              • Opcode ID: 71ecf636f0081dbd197aaeebedbcf1e6d536c32a25ba8b4cc3754e929457f104
                                              • Instruction ID: a0013d5da517d4d5a33f6e42946cb667d24e2e6983c8dbf7389f749baf9380a9
                                              • Opcode Fuzzy Hash: 71ecf636f0081dbd197aaeebedbcf1e6d536c32a25ba8b4cc3754e929457f104
                                              • Instruction Fuzzy Hash: A631B671540721ABF712EB20CC98BAB7BEEEF807D0F500615F6A6D10A9C772C945C762

                                              Control-flow Graph

                                              APIs
                                              • RtlZeroMemory.KERNEL32(?,00000044), ref: 100013A7
                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 100013D1
                                              • GetLastError.KERNEL32 ref: 100013DB
                                              • WaitForSingleObject.KERNEL32(?,?), ref: 100013E9
                                              • TerminateProcess.KERNEL32(?,000005B4), ref: 100013FB
                                              • GetExitCodeProcess.KERNEL32(?,?), ref: 1000140F
                                              • CloseHandle.KERNEL32(?), ref: 1000141E
                                              • CloseHandle.KERNEL32(?), ref: 10001423
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1582939076.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000000.00000002.1582878842.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1582987564.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1583149831.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
                                              Similarity
                                              • API ID: Process$CloseHandle$CodeCreateErrorExitLastMemoryObjectSingleTerminateWaitZero
                                              • String ID:
                                              • API String ID: 479851863-0
                                              • Opcode ID: 3ed73109c565a90064a559c7f12dc2adb11bdd3152a3d3fb5de7734ac646d6f3
                                              • Instruction ID: 7f4f93b674e2ec955674b2195e50ebeabb8675a41d593902dc04bf7fa736d272
                                              • Opcode Fuzzy Hash: 3ed73109c565a90064a559c7f12dc2adb11bdd3152a3d3fb5de7734ac646d6f3
                                              • Instruction Fuzzy Hash: 4411E271900229EBEB01EFE1CD88ADE7FB9EF08791F104011EA05A6169D6319A54DBA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 155 10001606-1000163b GetLogicalDrives GetTickCount WaitForSingleObject 156 10001665-10001667 155->156 157 10001669 156->157 158 1000163d-10001643 GetTickCount 156->158 159 1000166b-10001671 157->159 160 10001672-10001675 158->160 161 10001645-1000164e 158->161 160->159 161->160 162 10001650-1000165a GetLogicalDrives 161->162 162->160 163 1000165c-10001663 WaitForSingleObject 162->163 163->156
                                              APIs
                                              • GetLogicalDrives.KERNEL32 ref: 1000160C
                                              • GetTickCount.KERNEL32 ref: 1000161C
                                              • WaitForSingleObject.KERNEL32(00001388,?,?,100019A9), ref: 10001634
                                              • GetTickCount.KERNEL32 ref: 1000163D
                                              • GetLogicalDrives.KERNEL32 ref: 10001650
                                              • WaitForSingleObject.KERNEL32(00001388,?,?,100019A9), ref: 10001663
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1582939076.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000000.00000002.1582878842.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1582987564.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1583149831.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
                                              Similarity
                                              • API ID: CountDrivesLogicalObjectSingleTickWait
                                              • String ID:
                                              • API String ID: 42545375-0
                                              • Opcode ID: 2f4c3f1a3b6afdf214a9756a201ba7ea0d71bd53a76343712a0b17754985ecb0
                                              • Instruction ID: 3f6e6b7f54fa11ca4b0782ed1666a21edfd725203009cfb413e51542acf73e8d
                                              • Opcode Fuzzy Hash: 2f4c3f1a3b6afdf214a9756a201ba7ea0d71bd53a76343712a0b17754985ecb0
                                              • Instruction Fuzzy Hash: 56F0F6319083259FF700EF30ECC886FBBEDEB802D5B25492FF500C2158C632AC049A61

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 164 10001338-10001366 GetModuleFileNameW PathFindFileNameW 165 10001394-10001397 164->165 166 10001368-1000136d 164->166 166->165 167 1000136f-10001374 166->167 167->165 168 10001376-1000137f PathFindExtensionW 167->168 168->165 169 10001381-1000138f lstrcmpiW 168->169 169->165 170 10001391-10001393 169->170
                                              APIs
                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 1000134F
                                              • PathFindFileNameW.SHLWAPI(?), ref: 1000135C
                                              • PathFindExtensionW.SHLWAPI(00000000), ref: 10001377
                                              • lstrcmpiW.KERNEL32(00000000,.TMP), ref: 10001387
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1582939076.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000000.00000002.1582878842.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1582987564.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1583149831.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
                                              Similarity
                                              • API ID: FileFindNamePath$ExtensionModulelstrcmpi
                                              • String ID: .TMP
                                              • API String ID: 597247504-614523329
                                              • Opcode ID: b46ec49155dca4e4acb181e031907566a4278cfaff318f8430b02358fa9435f5
                                              • Instruction ID: 1fd35f4ed13ad4ccd143400fde8a975121882a3ba8c08806c051296bf98cdfa8
                                              • Opcode Fuzzy Hash: b46ec49155dca4e4acb181e031907566a4278cfaff318f8430b02358fa9435f5
                                              • Instruction Fuzzy Hash: 43F03760A003159AFB50AF608D4DED737FCEB003C5F028555E559D74AAEBF4CAC9CA60

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 171 10001134-1000114c FindResourceW 172 1000118e-10001192 171->172 173 1000114e-1000116d SizeofResource LoadResource 171->173 174 1000118d 173->174 175 1000116f-10001171 173->175 174->172 175->174 176 10001173-1000117c LockResource 175->176 176->174 177 1000117e-1000118c lstrcpynA 176->177 177->174
                                              APIs
                                              • FindResourceW.KERNEL32(00000065,0000000A,00000001,?,10001A61), ref: 10001142
                                              • SizeofResource.KERNEL32(00000000,?,?,10001A61), ref: 10001156
                                              • LoadResource.KERNEL32(00000000,?,?,10001A61), ref: 10001165
                                              • LockResource.KERNEL32(00000000,?,?,10001A61), ref: 10001174
                                              • lstrcpynA.KERNEL32(10003220,00000000,00000020,?,?,10001A61), ref: 10001186
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1582939076.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000000.00000002.1582878842.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1582987564.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1583149831.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
                                              Similarity
                                              • API ID: Resource$FindLoadLockSizeoflstrcpyn
                                              • String ID:
                                              • API String ID: 3315616855-0
                                              • Opcode ID: 177b28840c69342d611e61a706d029771a620c0a2154c7c66a29e914538ba66c
                                              • Instruction ID: 8471c72c1caef8166e4ab4b94a4b144f79c53e762d3decfbeebc5ecea59f4515
                                              • Opcode Fuzzy Hash: 177b28840c69342d611e61a706d029771a620c0a2154c7c66a29e914538ba66c
                                              • Instruction Fuzzy Hash: 99F01C35A01334BBFB261BA59CCCF973FADEB497D5F01C126FA05D21A9DA21C815C660

                                              Execution Graph

                                              Execution Coverage:32%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:0%
                                              Total number of Nodes:138
                                              Total number of Limit Nodes:6
                                              execution_graph 181 10001a32 182 10001aa9 181->182 183 10001a3a GetModuleFileNameW DisableThreadLibraryCalls 181->183 184 10001aa7 182->184 186 10001ae4 182->186 187 10001ab9 SetEvent WaitForSingleObject CloseHandle CloseHandle 182->187 203 10001134 FindResourceW 183->203 235 10001123 186->235 187->186 190 10001aa2 231 100010ce GetSystemDirectoryW lstrcatW LoadLibraryW 190->231 194 10001a7d 226 100012f6 GetModuleFileNameW PathFindFileNameW lstrcmpiW 194->226 197 10001a82 197->190 199 10001a87 CreateEventW 197->199 198 10001a74 198->194 217 10001193 FindResourceW 198->217 199->190 201 10001a9d 199->201 227 100019e6 CreateThread SetThreadPriority 201->227 204 1000118d 203->204 205 1000114e SizeofResource LoadResource 203->205 204->190 209 10001338 GetModuleFileNameW PathFindFileNameW 204->209 205->204 206 1000116f 205->206 206->204 207 10001173 LockResource 206->207 207->204 208 1000117e lstrcpynA 207->208 208->204 210 10001391 209->210 211 10001368 209->211 210->194 214 100012bd CreateMutexA 210->214 211->210 212 10001376 PathFindExtensionW 211->212 212->210 213 10001381 lstrcmpiW 212->213 213->210 215 100012d3 214->215 216 100012d6 GetLastError CloseHandle 214->216 215->198 216->198 218 100011bd SizeofResource LoadResource 217->218 222 100012b5 217->222 219 100011e2 218->219 218->222 220 100011eb LockResource 219->220 219->222 221 100011fd GetTempPathW GetTempFileNameW CreateFileW 220->221 220->222 221->222 223 10001246 WriteFile CloseHandle 221->223 222->194 223->222 224 1000126c RtlZeroMemory CreateProcessW 223->224 224->222 225 100012ab CloseHandle CloseHandle 224->225 225->222 226->197 228 10001a0c ResumeThread 227->228 229 10001a1d TerminateThread 227->229 238 100018d3 RtlZeroMemory 227->238 228->229 230 10001a30 228->230 229->230 230->190 232 10001111 231->232 233 10001116 231->233 310 1000101f 232->310 233->184 236 10001133 235->236 237 1000112c FreeLibrary 235->237 236->184 237->236 239 100018ec 238->239 240 10001901 DriveType 239->240 242 1000196c WaitForMultipleObjects 239->242 249 10001948 239->249 240->239 241 10001910 CreateThread 240->241 241->239 243 1000192d SetThreadPriority 241->243 260 10001677 WaitForSingleObject 241->260 244 10001982 RtlZeroMemory 242->244 242->249 246 10001952 TerminateThread 243->246 247 1000193b ResumeThread 243->247 248 10001993 CloseHandle 244->248 244->249 246->239 247->246 247->249 248->248 248->249 249->239 250 100019b2 249->250 254 10001606 GetLogicalDrives GetTickCount WaitForSingleObject 249->254 251 100019b6 WaitForMultipleObjects 250->251 252 100019db 250->252 251->252 253 100019cc CloseHandle 251->253 253->252 253->253 257 10001645 254->257 255 10001669 255->249 256 1000163d GetTickCount 256->255 256->257 257->255 257->256 258 10001650 GetLogicalDrives 257->258 258->255 259 1000165c WaitForSingleObject 258->259 259->257 261 100016a3 260->261 265 1000169c 260->265 262 100016bc lstrcpyW 261->262 263 100016cd lstrcpyW 261->263 264 100016d1 lstrcpyW PathAppendW FindFirstFileW 262->264 263->264 264->265 266 10001718 lstrcpyW 264->266 267 1000172e lstrcmpiW 266->267 268 10001744 lstrcmpiW 267->268 269 100018b5 FindNextFileW 267->269 268->269 270 1000175a 268->270 269->267 271 100018ce 269->271 272 100017c3 PathFindExtensionW 270->272 273 10001763 WaitForSingleObject 270->273 274 100017db lstrcmpiW 272->274 275 1000189c WaitForSingleObject 272->275 276 10001778 lstrcpyW PathAppendW 273->276 277 100017ac FindClose 273->277 278 100017e7 lstrcpyW PathAppendW GetFileAttributesW 274->278 279 1000183e lstrcmpiW 274->279 275->269 275->277 280 10001677 22 API calls 276->280 277->265 278->269 281 1000181b CopyFileW SetFileAttributesW 278->281 282 1000185a 279->282 283 1000184c lstrcmpiW 279->283 284 100017a4 280->284 281->279 282->275 285 1000186f lstrcpyW PathAppendW 282->285 283->275 283->282 284->269 284->277 287 1000142b SHRegGetValueW 285->287 288 10001464 287->288 289 100015f5 287->289 290 10001477 lstrcpyW StrStrIW 288->290 291 100015fc 288->291 289->282 290->289 292 100014a6 PathRemoveFileSpecW PathAppendW GetFileAttributesW 290->292 292->289 293 100014e0 PathGetShortPath GetTempPathW GetCurrentThreadId GetTempFileNameW wsprintfW 292->293 304 10001398 RtlZeroMemory CreateProcessW 293->304 296 10001563 wsprintfW 297 10001398 8 API calls 296->297 298 10001593 297->298 299 10001677 34 API calls 298->299 300 100015a2 wsprintfW 299->300 301 10001398 8 API calls 300->301 302 100015d3 wsprintfW 301->302 303 10001398 8 API calls 302->303 303->289 305 100013e3 WaitForSingleObject 304->305 306 100013db GetLastError 304->306 308 10001401 GetExitCodeProcess CloseHandle CloseHandle 305->308 309 100013f3 TerminateProcess 305->309 307 10001428 306->307 307->289 307->296 308->307 309->308 333 10001000 GetProcAddress 310->333 313 10001000 2 API calls 314 10001038 313->314 315 10001000 2 API calls 314->315 316 10001047 315->316 317 10001000 2 API calls 316->317 318 10001058 RtlMoveMemory 317->318 319 10001000 2 API calls 318->319 320 1000106e 319->320 321 10001000 2 API calls 320->321 322 1000107d 321->322 323 10001000 2 API calls 322->323 324 1000108c 323->324 325 10001000 2 API calls 324->325 326 1000109b 325->326 327 10001000 2 API calls 326->327 328 100010aa 327->328 329 10001000 2 API calls 328->329 330 100010b9 329->330 331 10001000 2 API calls 330->331 332 100010c8 331->332 332->233 334 10001014 ExitProcess 333->334 335 1000101c 333->335 335->313

                                              Callgraph

                                              Control-flow Graph

                                              APIs
                                              • FindResourceW.KERNEL32(00000066,0000000A,?,00000001), ref: 100011AD
                                              • SizeofResource.KERNEL32(00000000,?,00000001), ref: 100011C4
                                              • LoadResource.KERNEL32(00000000,?,00000001), ref: 100011D4
                                              • LockResource.KERNEL32(00000000,?,00000001), ref: 100011EC
                                              • GetTempPathW.KERNEL32(00000104,?,?,?,00000001), ref: 1000120A
                                              • GetTempFileNameW.KERNELBASE(?,hrl,00000000,?,?,?,00000001), ref: 1000121E
                                              • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000002,00000000,00000000,?,?,00000001), ref: 10001239
                                              • WriteFile.KERNELBASE(00000000,?,00000001,?,00000000,?,?,00000001), ref: 10001255
                                              • CloseHandle.KERNEL32(00000000,?,?,00000001), ref: 10001265
                                              • RtlZeroMemory.KERNEL32(?,00000044,?,?,00000001), ref: 10001272
                                              • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,00000001), ref: 1000129E
                                              • CloseHandle.KERNEL32(?,?,?,00000001), ref: 100012AE
                                              • CloseHandle.KERNEL32(?,?,?,00000001), ref: 100012B3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.1491575185.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.1491536404.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.1491624613.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.1491660157.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Resource$CloseFileHandle$CreateTemp$FindLoadLockMemoryNamePathProcessSizeofWriteZero
                                              • String ID: D$hrl
                                              • API String ID: 3860286866-1539874146
                                              • Opcode ID: 4d7fa836e7c1b89c7a2dc873b2d0427aa4d1f5576468e1d68e679cf7da32b867
                                              • Instruction ID: 7e218033b22d9d8325d54e1b04e0e1002b9ec3418c8ade03e82d96821e86f301
                                              • Opcode Fuzzy Hash: 4d7fa836e7c1b89c7a2dc873b2d0427aa4d1f5576468e1d68e679cf7da32b867
                                              • Instruction Fuzzy Hash: 0A31E8B1D01228ABEB11EFA0CC8CEEE7BBDEB49791F104566F605E2165D7344A54CB60

                                              Control-flow Graph

                                              APIs
                                              • GetModuleFileNameW.KERNEL32(00000001,10003018,00000104), ref: 10001A4F
                                              • DisableThreadLibraryCalls.KERNEL32(00000001), ref: 10001A56
                                                • Part of subcall function 10001134: FindResourceW.KERNEL32(00000065,0000000A,00000001,?,10001A61), ref: 10001142
                                                • Part of subcall function 10001134: SizeofResource.KERNEL32(00000000,?,?,10001A61), ref: 10001156
                                                • Part of subcall function 10001134: LoadResource.KERNEL32(00000000,?,?,10001A61), ref: 10001165
                                                • Part of subcall function 10001134: LockResource.KERNEL32(00000000,?,?,10001A61), ref: 10001174
                                                • Part of subcall function 10001134: lstrcpynA.KERNEL32(10003220,00000000,00000020,?,?,10001A61), ref: 10001186
                                                • Part of subcall function 10001338: GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 1000134F
                                                • Part of subcall function 10001338: PathFindFileNameW.SHLWAPI(?), ref: 1000135C
                                                • Part of subcall function 10001338: PathFindExtensionW.SHLWAPI(00000000), ref: 10001377
                                                • Part of subcall function 10001338: lstrcmpiW.KERNEL32(00000000,.TMP), ref: 10001387
                                              • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000), ref: 10001A8E
                                                • Part of subcall function 100012BD: CreateMutexA.KERNELBASE(00000000,00000000,10003220,?,10001A74), ref: 100012C7
                                                • Part of subcall function 10001193: FindResourceW.KERNEL32(00000066,0000000A,?,00000001), ref: 100011AD
                                                • Part of subcall function 10001193: SizeofResource.KERNEL32(00000000,?,00000001), ref: 100011C4
                                                • Part of subcall function 10001193: LoadResource.KERNEL32(00000000,?,00000001), ref: 100011D4
                                                • Part of subcall function 10001193: LockResource.KERNEL32(00000000,?,00000001), ref: 100011EC
                                                • Part of subcall function 10001193: GetTempPathW.KERNEL32(00000104,?,?,?,00000001), ref: 1000120A
                                                • Part of subcall function 10001193: GetTempFileNameW.KERNELBASE(?,hrl,00000000,?,?,?,00000001), ref: 1000121E
                                                • Part of subcall function 10001193: CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000002,00000000,00000000,?,?,00000001), ref: 10001239
                                                • Part of subcall function 10001193: WriteFile.KERNELBASE(00000000,?,00000001,?,00000000,?,?,00000001), ref: 10001255
                                                • Part of subcall function 10001193: CloseHandle.KERNEL32(00000000,?,?,00000001), ref: 10001265
                                                • Part of subcall function 10001193: RtlZeroMemory.KERNEL32(?,00000044,?,?,00000001), ref: 10001272
                                                • Part of subcall function 10001193: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,00000001), ref: 1000129E
                                                • Part of subcall function 10001193: CloseHandle.KERNEL32(?,?,?,00000001), ref: 100012AE
                                                • Part of subcall function 10001193: CloseHandle.KERNEL32(?,?,?,00000001), ref: 100012B3
                                              • SetEvent.KERNEL32(?), ref: 10001ABA
                                              • WaitForSingleObject.KERNEL32(000000FF), ref: 10001AC8
                                              • CloseHandle.KERNEL32 ref: 10001ADA
                                              • CloseHandle.KERNEL32 ref: 10001AE2
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.1491575185.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.1491536404.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.1491624613.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.1491660157.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Resource$File$CloseHandle$CreateFindName$Path$EventLoadLockModuleSizeofTemp$CallsDisableExtensionLibraryMemoryMutexObjectProcessSingleThreadWaitWriteZerolstrcmpilstrcpyn
                                              • String ID:
                                              • API String ID: 3535865480-0
                                              • Opcode ID: 9463e6314e2ffea4b211b81d2ab195e89bd7a5a57881afda2ee0c205d14b84f9
                                              • Instruction ID: ffd36879a7497b368e77efcd0eb173f2275a3137c17b7fd903d544f692c8100a
                                              • Opcode Fuzzy Hash: 9463e6314e2ffea4b211b81d2ab195e89bd7a5a57881afda2ee0c205d14b84f9
                                              • Instruction Fuzzy Hash: 78115B34606332AAF612EBA18C89BCF3BACEF023E5F118116F554D10ADDB609950CA63

                                              Control-flow Graph

                                              APIs
                                              • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 100010E3
                                              • lstrcatW.KERNEL32(?,\lpk), ref: 100010F5
                                              • LoadLibraryW.KERNELBASE(?), ref: 10001102
                                                • Part of subcall function 1000101F: RtlMoveMemory.KERNEL32(10003250,00000000,LpkEditControl,00000040,LpkDrawTextEx,LpkDllInitialize,LpkTabbedTextOut,10001116), ref: 1000105E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.1491575185.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.1491536404.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.1491624613.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.1491660157.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: DirectoryLibraryLoadMemoryMoveSystemlstrcat
                                              • String ID: \lpk
                                              • API String ID: 3372298440-336436324
                                              • Opcode ID: da33033e2e221ff141f50507f8a04e5c7ee6db60748155a8461eceed5cf1bc2c
                                              • Instruction ID: be4007e3f20e417fa77d5d5c324e07ec6705456ad939ec99c1b7038da3bba866
                                              • Opcode Fuzzy Hash: da33033e2e221ff141f50507f8a04e5c7ee6db60748155a8461eceed5cf1bc2c
                                              • Instruction Fuzzy Hash: B2E0127480032A9BFB50EBB08C8EAC777BCE704381F000562E755D206AEF74D585CB50

                                              Control-flow Graph

                                              APIs
                                              • GetModuleFileNameW.KERNEL32(?,00000104), ref: 10001311
                                              • PathFindFileNameW.SHLWAPI(?), ref: 1000131E
                                              • lstrcmpiW.KERNELBASE(00000000,lpk.dll), ref: 1000132A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.1491575185.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.1491536404.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.1491624613.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.1491660157.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: FileName$FindModulePathlstrcmpi
                                              • String ID: lpk.dll
                                              • API String ID: 1239673384-3066363995
                                              • Opcode ID: 6ddba052437873c055f84e44d424d8da0386140e72b76d5d1097730297a1a48a
                                              • Instruction ID: 2c49bb99bc8642171fc9961312980d4ab0a4eef97db440158d685f58edb63067
                                              • Opcode Fuzzy Hash: 6ddba052437873c055f84e44d424d8da0386140e72b76d5d1097730297a1a48a
                                              • Instruction Fuzzy Hash: 35E0127554032D6BEB116B70CC8DDD7376CA700745F004251F65AD20BADA74958DCF50

                                              Control-flow Graph

                                              APIs
                                              • CreateThread.KERNELBASE(00000000,00000000,100018D3,00000000,00000004,00000000), ref: 100019F4
                                              • SetThreadPriority.KERNELBASE(00000000,000000F1), ref: 10001A02
                                              • ResumeThread.KERNELBASE ref: 10001A12
                                              • TerminateThread.KERNEL32(00000000), ref: 10001A24
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.1491575185.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.1491536404.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.1491624613.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.1491660157.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Thread$CreatePriorityResumeTerminate
                                              • String ID:
                                              • API String ID: 2154424394-0
                                              • Opcode ID: 3913cdfa09b60b7149b9d1de93706da214591cc2ab76757be7511d577559ebbf
                                              • Instruction ID: e961737a7aae76fd0c4580525259ff7f5de2b8d71232f79ea42e210bb63285d4
                                              • Opcode Fuzzy Hash: 3913cdfa09b60b7149b9d1de93706da214591cc2ab76757be7511d577559ebbf
                                              • Instruction Fuzzy Hash: AFE07570502230BAFA119B769C8CB873F6AEB076F1B554316F62E915BAC7204581CBA1

                                              Control-flow Graph

                                              APIs
                                              • CreateMutexA.KERNELBASE(00000000,00000000,10003220,?,10001A74), ref: 100012C7
                                              • GetLastError.KERNEL32(00000001,?,10001A74), ref: 100012D7
                                              • CloseHandle.KERNEL32(00000000,?,10001A74), ref: 100012EB
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.1491575185.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.1491536404.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.1491624613.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.1491660157.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: CloseCreateErrorHandleLastMutex
                                              • String ID:
                                              • API String ID: 4294037311-0
                                              • Opcode ID: 679afb9bc1ba41874d318fcbe5ee5d611c016a16ab61a98bcb540af40b34feda
                                              • Instruction ID: 226164d0f01b805de613a55782abc57cedde5fe5c7c82aa8690d380dee59acf0
                                              • Opcode Fuzzy Hash: 679afb9bc1ba41874d318fcbe5ee5d611c016a16ab61a98bcb540af40b34feda
                                              • Instruction Fuzzy Hash: 1BD05E3660873067F212937CBC0CB8F2A35EBC5BF2F128265FE4AD229CCB24490685D5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 50 10001000-10001012 GetProcAddress 51 10001014-10001016 ExitProcess 50->51 52 1000101c 50->52
                                              APIs
                                              • GetProcAddress.KERNEL32(10001116,10001029), ref: 1000100A
                                              • ExitProcess.KERNEL32 ref: 10001016
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.1491575185.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.1491536404.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.1491624613.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.1491660157.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: AddressExitProcProcess
                                              • String ID:
                                              • API String ID: 2796388413-0
                                              • Opcode ID: d6c54ef09a1c41390c756e13bcc0c54c78fbecb98ee2d0f10b5980c889cfc44d
                                              • Instruction ID: 5188076986118a0aee3e910be33b50d7ca781def4220dbbbf73b176a37f9c490
                                              • Opcode Fuzzy Hash: d6c54ef09a1c41390c756e13bcc0c54c78fbecb98ee2d0f10b5980c889cfc44d
                                              • Instruction Fuzzy Hash: F6C04C35104261ABFA11AB618E8CB067B66AB547D1B114215E255800BED6318450EA15

                                              Control-flow Graph

                                              APIs
                                              • WaitForSingleObject.KERNEL32(00000000), ref: 1000168F
                                              • lstrcpyW.KERNEL32(?,A:\,0000EA60,753C73E0), ref: 100016C2
                                              • lstrcpyW.KERNEL32(?,?), ref: 100016DF
                                              • PathAppendW.SHLWAPI(?,10002374), ref: 100016F3
                                              • FindFirstFileW.KERNEL32(?,?), ref: 10001703
                                              • PathFindExtensionW.SHLWAPI(?), ref: 100017CA
                                              • lstrcmpiW.KERNEL32(00000000,.EXE), ref: 100017E1
                                              • lstrcpyW.KERNEL32(?,?), ref: 100017F5
                                              • PathAppendW.SHLWAPI(?,lpk.dll), ref: 10001803
                                              • GetFileAttributesW.KERNEL32(?), ref: 1000180C
                                              • CopyFileW.KERNEL32(10003018,?,00000001), ref: 10001829
                                              • SetFileAttributesW.KERNEL32(?,00000007), ref: 10001838
                                              • lstrcmpiW.KERNEL32(100015A2,.RAR), ref: 10001846
                                              • lstrcmpiW.KERNEL32(100015A2,.ZIP), ref: 10001854
                                              • lstrcpyW.KERNEL32(?,?), ref: 1000187D
                                              • PathAppendW.SHLWAPI(?,?), ref: 1000188D
                                              • WaitForSingleObject.KERNEL32(00000014), ref: 100018A4
                                              • FindNextFileW.KERNEL32(100015A2,?), ref: 100018BF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.1491575185.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.1491536404.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.1491624613.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.1491660157.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: File$Pathlstrcpy$AppendFindlstrcmpi$AttributesObjectSingleWait$CopyExtensionFirstNext
                                              • String ID: .EXE$.RAR$.ZIP$A:\$lpk.dll
                                              • API String ID: 3771388200-3932496361
                                              • Opcode ID: c6fda171f6056316e2428e6f33dc1771b38d5d81fbede9409986d606e9291121
                                              • Instruction ID: 14b84c573bc6bfc0103a48903cae28372ea9a580d345985b263a6e171d24a783
                                              • Opcode Fuzzy Hash: c6fda171f6056316e2428e6f33dc1771b38d5d81fbede9409986d606e9291121
                                              • Instruction Fuzzy Hash: 5651DDB290022DAAEB10DBA4CC88BDE77BDEB44390F1445A6E605E2055DB75DB84CFA0

                                              Control-flow Graph

                                              APIs
                                              • SHRegGetValueW.SHLWAPI(80000000,WinRAR\shell\open\command,00000000,00000002,00000000,?,?), ref: 10001456
                                              • lstrcpyW.KERNEL32(00000022,?), ref: 10001485
                                              • StrStrIW.SHLWAPI(00000022,1000230C), ref: 10001498
                                              • PathRemoveFileSpecW.SHLWAPI(00000022), ref: 100014B2
                                              • PathAppendW.SHLWAPI(00000022,rar.exe), ref: 100014C4
                                              • GetFileAttributesW.KERNEL32(00000022), ref: 100014D1
                                              • PathGetShortPath.SHELL32(00000022), ref: 100014E9
                                              • GetTempPathW.KERNEL32(00000104,?), ref: 100014FB
                                              • GetCurrentThreadId.KERNEL32 ref: 10001508
                                              • GetTempFileNameW.KERNEL32(?,IRAR,00000000), ref: 1000151B
                                              • wsprintfW.USER32 ref: 10001544
                                                • Part of subcall function 10001398: RtlZeroMemory.KERNEL32(?,00000044), ref: 100013A7
                                                • Part of subcall function 10001398: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 100013D1
                                                • Part of subcall function 10001398: GetLastError.KERNEL32 ref: 100013DB
                                              • wsprintfW.USER32 ref: 10001580
                                                • Part of subcall function 10001398: WaitForSingleObject.KERNEL32(?,?), ref: 100013E9
                                                • Part of subcall function 10001398: TerminateProcess.KERNEL32(?,000005B4), ref: 100013FB
                                                • Part of subcall function 10001398: GetExitCodeProcess.KERNEL32(?,?), ref: 1000140F
                                                • Part of subcall function 10001398: CloseHandle.KERNEL32(?), ref: 1000141E
                                                • Part of subcall function 10001398: CloseHandle.KERNEL32(?), ref: 10001423
                                                • Part of subcall function 10001677: WaitForSingleObject.KERNEL32(00000000), ref: 1000168F
                                              • wsprintfW.USER32 ref: 100015C0
                                              • wsprintfW.USER32 ref: 100015E6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.1491575185.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.1491536404.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.1491624613.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.1491660157.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Path$wsprintf$FileProcess$CloseHandleObjectSingleTempWait$AppendAttributesCodeCreateCurrentErrorExitLastMemoryNameRemoveShortSpecTerminateThreadValueZerolstrcpy
                                              • String ID: "$"%s" a -r -ep1"%s" "%s" "%s\lpk.dll"$"%s" x "%s" *.exe "%s\"$IRAR$WinRAR\shell\open\command$cmd /c %s vb "%s" lpk.dll|find /i "lpk.dll"$cmd /c RD /s /q "%s"$rar.exe$s<u
                                              • API String ID: 2025278562-1424356315
                                              • Opcode ID: 142c22ba32e87d5e21e1317ff34b13b051766c503af886549bf79c5699618864
                                              • Instruction ID: 53c986b37aabe2969284ac0dd55f15aa40eaa0efec7de0ac8071c71bfebae4df
                                              • Opcode Fuzzy Hash: 142c22ba32e87d5e21e1317ff34b13b051766c503af886549bf79c5699618864
                                              • Instruction Fuzzy Hash: 1041C4B690021DAAEF10DB90CD48EDA77BCEB44340F1045A2B619D6055E674EB85CFB1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 104 1000101f 105 10001024-100010cd call 10001000 * 4 RtlMoveMemory call 10001000 * 7 104->105
                                              APIs
                                                • Part of subcall function 10001000: GetProcAddress.KERNEL32(10001116,10001029), ref: 1000100A
                                                • Part of subcall function 10001000: ExitProcess.KERNEL32 ref: 10001016
                                              • RtlMoveMemory.KERNEL32(10003250,00000000,LpkEditControl,00000040,LpkDrawTextEx,LpkDllInitialize,LpkTabbedTextOut,10001116), ref: 1000105E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.1491575185.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.1491536404.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.1491624613.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.1491660157.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: AddressExitMemoryMoveProcProcess
                                              • String ID: LpkDllInitialize$LpkDrawTextEx$LpkEditControl$LpkExtTextOut$LpkGetCharacterPlacement$LpkGetTextExtentExPoint$LpkInitialize$LpkPSMTextOut$LpkTabbedTextOut$LpkUseGDIWidthCache$ftsWordBreak
                                              • API String ID: 598812106-3128392633
                                              • Opcode ID: 7b87169acbeb48b0e10738be1b64164151dc3c35c96d6f7d10ce1f3cc01630ac
                                              • Instruction ID: aa075801c4fef1efc4910219ef897301fe87f4caca160f87edb01903a9b0afcb
                                              • Opcode Fuzzy Hash: 7b87169acbeb48b0e10738be1b64164151dc3c35c96d6f7d10ce1f3cc01630ac
                                              • Instruction Fuzzy Hash: 48015474C0239065FB27EFB14D95BCA3B54E7196C1F10C515F3446712EDBB470849B59

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 127 100018d3-100018e6 RtlZeroMemory 128 100018ec-100018f3 127->128 129 100018fb-100018ff 128->129 130 10001901-1000190e DriveType 129->130 131 1000195c-10001964 129->131 130->131 133 10001910-1000192b CreateThread 130->133 131->129 132 10001966-1000196a 131->132 134 100019a4-100019ac call 10001606 132->134 135 1000196c-10001980 WaitForMultipleObjects 132->135 133->131 136 1000192d-10001939 SetThreadPriority 133->136 134->128 145 100019b2-100019b4 134->145 135->134 137 10001982-10001991 RtlZeroMemory 135->137 139 10001952-10001956 TerminateThread 136->139 140 1000193b-10001946 ResumeThread 136->140 141 100019a2 137->141 142 10001993-100019a0 CloseHandle 137->142 139->131 140->139 144 10001948-10001950 140->144 141->134 142->141 142->142 144->131 146 100019b6-100019ca WaitForMultipleObjects 145->146 147 100019db-100019e5 145->147 146->147 148 100019cc-100019d9 CloseHandle 146->148 148->147 148->148
                                              APIs
                                              • RtlZeroMemory.KERNEL32(?,00000060), ref: 100018E6
                                              • DriveType.SHELL32(00000002), ref: 10001902
                                              • CreateThread.KERNEL32(00000000,00000000,10001677,00000002,00000004,00000000), ref: 1000191D
                                              • SetThreadPriority.KERNEL32(00000000,000000F1), ref: 10001930
                                              • ResumeThread.KERNEL32(?), ref: 1000193D
                                              • TerminateThread.KERNEL32(?,00000000), ref: 10001956
                                              • WaitForMultipleObjects.KERNEL32(00000000,?,00000001,00000000), ref: 10001975
                                              • RtlZeroMemory.KERNEL32(?,00000060), ref: 10001989
                                              • CloseHandle.KERNEL32(?), ref: 10001997
                                              • WaitForMultipleObjects.KERNEL32(00000000,?,00000001,000000FF), ref: 100019C0
                                              • CloseHandle.KERNEL32(?), ref: 100019D0
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.1491575185.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.1491536404.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.1491624613.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.1491660157.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Thread$CloseHandleMemoryMultipleObjectsWaitZero$CreateDrivePriorityResumeTerminateType
                                              • String ID:
                                              • API String ID: 1898017378-0
                                              • Opcode ID: 71ecf636f0081dbd197aaeebedbcf1e6d536c32a25ba8b4cc3754e929457f104
                                              • Instruction ID: a0013d5da517d4d5a33f6e42946cb667d24e2e6983c8dbf7389f749baf9380a9
                                              • Opcode Fuzzy Hash: 71ecf636f0081dbd197aaeebedbcf1e6d536c32a25ba8b4cc3754e929457f104
                                              • Instruction Fuzzy Hash: A631B671540721ABF712EB20CC98BAB7BEEEF807D0F500615F6A6D10A9C772C945C762

                                              Control-flow Graph

                                              APIs
                                              • RtlZeroMemory.KERNEL32(?,00000044), ref: 100013A7
                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 100013D1
                                              • GetLastError.KERNEL32 ref: 100013DB
                                              • WaitForSingleObject.KERNEL32(?,?), ref: 100013E9
                                              • TerminateProcess.KERNEL32(?,000005B4), ref: 100013FB
                                              • GetExitCodeProcess.KERNEL32(?,?), ref: 1000140F
                                              • CloseHandle.KERNEL32(?), ref: 1000141E
                                              • CloseHandle.KERNEL32(?), ref: 10001423
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.1491575185.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.1491536404.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.1491624613.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.1491660157.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Process$CloseHandle$CodeCreateErrorExitLastMemoryObjectSingleTerminateWaitZero
                                              • String ID:
                                              • API String ID: 479851863-0
                                              • Opcode ID: 3ed73109c565a90064a559c7f12dc2adb11bdd3152a3d3fb5de7734ac646d6f3
                                              • Instruction ID: 7f4f93b674e2ec955674b2195e50ebeabb8675a41d593902dc04bf7fa736d272
                                              • Opcode Fuzzy Hash: 3ed73109c565a90064a559c7f12dc2adb11bdd3152a3d3fb5de7734ac646d6f3
                                              • Instruction Fuzzy Hash: 4411E271900229EBEB01EFE1CD88ADE7FB9EF08791F104011EA05A6169D6319A54DBA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 155 10001606-1000163b GetLogicalDrives GetTickCount WaitForSingleObject 156 10001665-10001667 155->156 157 10001669 156->157 158 1000163d-10001643 GetTickCount 156->158 159 1000166b-10001671 157->159 160 10001672-10001675 158->160 161 10001645-1000164e 158->161 160->159 161->160 162 10001650-1000165a GetLogicalDrives 161->162 162->160 163 1000165c-10001663 WaitForSingleObject 162->163 163->156
                                              APIs
                                              • GetLogicalDrives.KERNEL32 ref: 1000160C
                                              • GetTickCount.KERNEL32 ref: 1000161C
                                              • WaitForSingleObject.KERNEL32(00001388,?,?,100019A9), ref: 10001634
                                              • GetTickCount.KERNEL32 ref: 1000163D
                                              • GetLogicalDrives.KERNEL32 ref: 10001650
                                              • WaitForSingleObject.KERNEL32(00001388,?,?,100019A9), ref: 10001663
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.1491575185.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.1491536404.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.1491624613.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.1491660157.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: CountDrivesLogicalObjectSingleTickWait
                                              • String ID:
                                              • API String ID: 42545375-0
                                              • Opcode ID: 2f4c3f1a3b6afdf214a9756a201ba7ea0d71bd53a76343712a0b17754985ecb0
                                              • Instruction ID: 3f6e6b7f54fa11ca4b0782ed1666a21edfd725203009cfb413e51542acf73e8d
                                              • Opcode Fuzzy Hash: 2f4c3f1a3b6afdf214a9756a201ba7ea0d71bd53a76343712a0b17754985ecb0
                                              • Instruction Fuzzy Hash: 56F0F6319083259FF700EF30ECC886FBBEDEB802D5B25492FF500C2158C632AC049A61

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 164 10001338-10001366 GetModuleFileNameW PathFindFileNameW 165 10001394-10001397 164->165 166 10001368-1000136d 164->166 166->165 167 1000136f-10001374 166->167 167->165 168 10001376-1000137f PathFindExtensionW 167->168 168->165 169 10001381-1000138f lstrcmpiW 168->169 169->165 170 10001391-10001393 169->170
                                              APIs
                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 1000134F
                                              • PathFindFileNameW.SHLWAPI(?), ref: 1000135C
                                              • PathFindExtensionW.SHLWAPI(00000000), ref: 10001377
                                              • lstrcmpiW.KERNEL32(00000000,.TMP), ref: 10001387
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.1491575185.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.1491536404.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.1491624613.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.1491660157.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: FileFindNamePath$ExtensionModulelstrcmpi
                                              • String ID: .TMP
                                              • API String ID: 597247504-614523329
                                              • Opcode ID: b46ec49155dca4e4acb181e031907566a4278cfaff318f8430b02358fa9435f5
                                              • Instruction ID: 1fd35f4ed13ad4ccd143400fde8a975121882a3ba8c08806c051296bf98cdfa8
                                              • Opcode Fuzzy Hash: b46ec49155dca4e4acb181e031907566a4278cfaff318f8430b02358fa9435f5
                                              • Instruction Fuzzy Hash: 43F03760A003159AFB50AF608D4DED737FCEB003C5F028555E559D74AAEBF4CAC9CA60

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 171 10001134-1000114c FindResourceW 172 1000118e-10001192 171->172 173 1000114e-1000116d SizeofResource LoadResource 171->173 174 1000118d 173->174 175 1000116f-10001171 173->175 174->172 175->174 176 10001173-1000117c LockResource 175->176 176->174 177 1000117e-1000118c lstrcpynA 176->177 177->174
                                              APIs
                                              • FindResourceW.KERNEL32(00000065,0000000A,00000001,?,10001A61), ref: 10001142
                                              • SizeofResource.KERNEL32(00000000,?,?,10001A61), ref: 10001156
                                              • LoadResource.KERNEL32(00000000,?,?,10001A61), ref: 10001165
                                              • LockResource.KERNEL32(00000000,?,?,10001A61), ref: 10001174
                                              • lstrcpynA.KERNEL32(10003220,00000000,00000020,?,?,10001A61), ref: 10001186
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.1491575185.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.1491536404.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.1491624613.0000000010002000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000003.00000002.1491660157.0000000010004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Resource$FindLoadLockSizeoflstrcpyn
                                              • String ID:
                                              • API String ID: 3315616855-0
                                              • Opcode ID: 177b28840c69342d611e61a706d029771a620c0a2154c7c66a29e914538ba66c
                                              • Instruction ID: 8471c72c1caef8166e4ab4b94a4b144f79c53e762d3decfbeebc5ecea59f4515
                                              • Opcode Fuzzy Hash: 177b28840c69342d611e61a706d029771a620c0a2154c7c66a29e914538ba66c
                                              • Instruction Fuzzy Hash: 99F01C35A01334BBFB261BA59CCCF973FADEB497D5F01C126FA05D21A9DA21C815C660

                                              Execution Graph

                                              Execution Coverage:3.1%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:32.6%
                                              Total number of Nodes:1579
                                              Total number of Limit Nodes:14
                                              execution_graph 11774 6f116f LoadLibraryA 11779 6f1196 GetProcAddress 11774->11779 11776 6f1180 11777 6f1277 11776->11777 11778 6f142f LookupPrivilegeValueA NtAdjustPrivilegesToken 11776->11778 11779->11776 12007 401040 12008 401048 12007->12008 12009 401058 12008->12009 12010 40104f #825 12008->12010 12010->12009 12765 6f2665 12767 6f266b CreateThread CloseHandle 12765->12767 12768 6f3c38 12767->12768 12770 6f3c3d 12768->12770 12771 6f3ca9 12770->12771 12774 6f3c5b GetWindowsDirectoryA 12770->12774 12825 6f252f NtOpenSection 12771->12825 12773 6f3cae 12776 6f3cfb GetSystemDirectoryA 12773->12776 12826 6f3cc2 GetModuleHandleA 12773->12826 12778 6f3d11 12774->12778 12875 6f3d1f lstrcat 12776->12875 12917 6f3d36 LoadLibraryA 12778->12917 12825->12773 12827 6f3ccc 12826->12827 12828 6f3cde 12826->12828 12830 6f3cd4 GetProcAddress 12827->12830 12958 6f3cf0 GetModuleHandleA 12828->12958 12830->12828 12876 6f3d26 12875->12876 12877 6f3d36 151 API calls 12876->12877 12878 6f3d2a GetProcAddress LoadLibraryA 12877->12878 12880 6f10ce 2 API calls 12878->12880 12881 6f3d7d 12880->12881 12882 6f3d92 GetTickCount 12881->12882 12883 6f3daa 12882->12883 12884 6f3e47 GetVolumeInformationA 12883->12884 12885 6f3e7a 12884->12885 12886 6f3f25 12885->12886 12887 6f3eb5 96 API calls 12885->12887 12888 6f3f4f 12886->12888 12889 6f3f31 CreateThread CloseHandle 12886->12889 12890 6f3ea9 12887->12890 12891 6f3f60 43 API calls 12888->12891 12889->12888 12890->12886 12893 6f3eca GetModuleFileNameA wsprintfA 12890->12893 12892 6f3f54 12891->12892 12894 6f10ce 2 API calls 12892->12894 12896 6f3f14 12893->12896 12895 6f3f7e 12894->12895 12897 6f3f8f 23 API calls 12895->12897 12896->12886 12899 6f3405 5 API calls 12896->12899 12898 6f3f83 12897->12898 12900 6f3ffa CreateEventA 12898->12900 12901 6f3fd3 CreateThread CloseHandle 12898->12901 12899->12886 12904 6f4012 12900->12904 12901->12900 12902 6f4056 lstrlen 12902->12902 12903 6f4065 gethostbyname 12902->12903 12903->12904 12904->12902 12904->12903 12905 6f4081 socket 12904->12905 12906 6f4320 RtlExitUserThread 12904->12906 12908 6f42d0 SetEvent 12904->12908 12909 6f42b7 closesocket 12904->12909 12910 6f42f2 Sleep ResetEvent 12904->12910 12911 6f40ef GetVersionExA 12904->12911 12912 6f4172 wsprintfA 12904->12912 12913 6f41a7 CreateThread CloseHandle 12904->12913 12914 6f41f6 GetTickCount 12904->12914 12915 6f4288 Sleep 12904->12915 12905->12904 12907 6f40a6 connect 12905->12907 12907->12904 12907->12909 12908->12904 12909->12904 12910->12904 12911->12904 12912->12904 12913->12904 12914->12904 12915->12904 12916 6f4294 GetTickCount 12915->12916 12916->12904 13121 6f3d4b GetProcAddress LoadLibraryA 12917->13121 12959 6f3cfb GetSystemDirectoryA 12958->12959 13003 6f26d4 12958->13003 12961 6f3d1f 179 API calls 12959->12961 12962 6f3d11 12961->12962 12963 6f3d36 151 API calls 12962->12963 12964 6f3d2a GetProcAddress LoadLibraryA 12963->12964 13005 6f10ce 12964->13005 12967 6f3d7d 12968 6f3d92 GetTickCount 12967->12968 12969 6f3daa 12968->12969 12970 6f3e47 GetVolumeInformationA 12969->12970 12971 6f3e7a 12970->12971 12972 6f3f25 12971->12972 13009 6f3eb5 LoadLibraryA 12971->13009 12974 6f3f4f 12972->12974 12975 6f3f31 CreateThread CloseHandle 12972->12975 13041 6f3f60 LoadLibraryA 12974->13041 12975->12974 13004 6f26c8 13003->13004 13004->12959 13006 6f10db 13005->13006 13006->13005 13007 6f115c 13006->13007 13008 6f1133 GetModuleHandleA GetProcAddress 13006->13008 13007->12967 13008->13006 13063 6f3ecc GetProcAddress GetModuleFileNameA wsprintfA 13009->13063 13042 6f3f7e 13041->13042 13043 6f10ce 2 API calls 13041->13043 13044 6f3f8f 23 API calls 13042->13044 13043->13042 13045 6f3f83 13044->13045 13046 6f3ffa CreateEventA 13045->13046 13047 6f3fd3 CreateThread CloseHandle 13045->13047 13060 6f4012 13046->13060 13047->13046 13048 6f4056 lstrlen 13048->13048 13049 6f4065 gethostbyname 13048->13049 13049->13060 13050 6f4081 socket 13052 6f40a6 connect 13050->13052 13050->13060 13051 6f4320 RtlExitUserThread 13054 6f42b7 closesocket 13052->13054 13052->13060 13053 6f42d0 SetEvent 13053->13060 13054->13060 13055 6f42f2 Sleep ResetEvent 13055->13060 13056 6f40ef GetVersionExA 13056->13060 13057 6f4172 wsprintfA 13057->13060 13058 6f41a7 CreateThread CloseHandle 13058->13060 13059 6f41f6 GetTickCount 13059->13060 13060->13048 13060->13049 13060->13050 13060->13051 13060->13053 13060->13054 13060->13055 13060->13056 13060->13057 13060->13058 13060->13059 13061 6f4288 Sleep 13060->13061 13061->13060 13062 6f4294 GetTickCount 13061->13062 13062->13060 13064 6f3f14 13063->13064 13065 6f3f25 13064->13065 13092 6f3405 13064->13092 13067 6f3f4f 13065->13067 13068 6f3f31 CreateThread CloseHandle 13065->13068 13069 6f3f60 43 API calls 13067->13069 13068->13067 13070 6f3f54 13069->13070 13071 6f10ce 2 API calls 13070->13071 13072 6f3f7e 13071->13072 13100 6f3f8f LoadLibraryA 13072->13100 13093 6f343b 13092->13093 13093->13093 13094 6f3440 NtOpenSection 13093->13094 13095 6f345f NtQuerySystemInformation 13094->13095 13099 6f35f3 13094->13099 13096 6f346f MapViewOfFile CloseHandle 13095->13096 13098 6f34b0 13096->13098 13096->13099 13097 6f34b7 UnmapViewOfFile 13097->13099 13098->13097 13098->13099 13099->13065 13101 6f3f9d 13100->13101 13102 6f4320 RtlExitUserThread 13100->13102 13103 6f10ce 2 API calls 13101->13103 13104 6f3fb5 13103->13104 13104->13102 13105 6f3fc2 WSAStartup CreateThread CloseHandle 13104->13105 13106 6f3ffa CreateEventA 13105->13106 13118 6f4012 13106->13118 13107 6f4056 lstrlen 13107->13107 13108 6f4065 gethostbyname 13107->13108 13108->13118 13109 6f4081 socket 13110 6f40a6 connect 13109->13110 13109->13118 13112 6f42b7 closesocket 13110->13112 13110->13118 13111 6f42d0 SetEvent 13111->13118 13112->13118 13113 6f42f2 Sleep ResetEvent 13113->13118 13114 6f40ef GetVersionExA 13114->13118 13115 6f4172 wsprintfA 13115->13118 13116 6f41a7 CreateThread CloseHandle 13116->13118 13117 6f41f6 GetTickCount 13117->13118 13118->13102 13118->13107 13118->13108 13118->13109 13118->13111 13118->13112 13118->13113 13118->13114 13118->13115 13118->13116 13118->13117 13119 6f4288 Sleep 13118->13119 13119->13118 13120 6f4294 GetTickCount 13119->13120 13120->13118 13122 6f3d7d 13121->13122 13123 6f10ce 2 API calls 13121->13123 13124 6f3d92 GetTickCount 13122->13124 13123->13122 13125 6f3daa 13124->13125 13126 6f3e47 GetVolumeInformationA 13125->13126 13127 6f3e7a 13126->13127 13128 6f3f25 13127->13128 13129 6f3eb5 96 API calls 13127->13129 13130 6f3f4f 13128->13130 13131 6f3f31 CreateThread CloseHandle 13128->13131 13132 6f3ea9 13129->13132 13133 6f3f60 43 API calls 13130->13133 13131->13130 13132->13128 13135 6f3eca GetModuleFileNameA wsprintfA 13132->13135 13134 6f3f54 13133->13134 13136 6f10ce 2 API calls 13134->13136 13138 6f3f14 13135->13138 13137 6f3f7e 13136->13137 13139 6f3f8f 23 API calls 13137->13139 13138->13128 13141 6f3405 5 API calls 13138->13141 13140 6f3f83 13139->13140 13142 6f3ffa CreateEventA 13140->13142 13143 6f3fd3 CreateThread CloseHandle 13140->13143 13141->13128 13156 6f4012 13142->13156 13143->13142 13144 6f4056 lstrlen 13144->13144 13145 6f4065 gethostbyname 13144->13145 13145->13156 13146 6f4081 socket 13148 6f40a6 connect 13146->13148 13146->13156 13147 6f4320 RtlExitUserThread 13150 6f42b7 closesocket 13148->13150 13148->13156 13149 6f42d0 SetEvent 13149->13156 13150->13156 13151 6f42f2 Sleep ResetEvent 13151->13156 13152 6f40ef GetVersionExA 13152->13156 13153 6f4172 wsprintfA 13153->13156 13154 6f41a7 CreateThread CloseHandle 13154->13156 13155 6f41f6 GetTickCount 13155->13156 13156->13144 13156->13145 13156->13146 13156->13147 13156->13149 13156->13150 13156->13151 13156->13152 13156->13153 13156->13154 13156->13155 13157 6f4288 Sleep 13156->13157 13157->13156 13158 6f4294 GetTickCount 13157->13158 13158->13156 12011 40384d 12012 403814 12011->12012 12012->12011 12014 403920 12012->12014 12015 40397e 12014->12015 12016 4039c3 LoadLibraryA 12015->12016 12018 403a13 InterlockedExchange 12015->12018 12019 403a35 12015->12019 12029 403a91 12015->12029 12017 4039d2 GetLastError 12016->12017 12016->12018 12021 4039f2 RaiseException 12017->12021 12022 4039e4 12017->12022 12023 403a21 12018->12023 12024 403a47 FreeLibrary 12018->12024 12020 403aa5 GetProcAddress 12019->12020 12019->12029 12026 403ab5 GetLastError 12020->12026 12020->12029 12021->12029 12022->12018 12022->12021 12023->12019 12025 403a27 LocalAlloc 12023->12025 12024->12019 12025->12019 12027 403ac7 12026->12027 12028 403ad5 RaiseException 12027->12028 12027->12029 12028->12029 12029->12012 12030 479849 12032 47984f GetSystemTime 12030->12032 12035 479893 12032->12035 12033 4798cd Sleep 12033->12035 12034 4799f3 12035->12033 12035->12034 12036 47997a Sleep 12035->12036 12036->12035 13159 40364f 13161 403628 13159->13161 13160 403920 9 API calls 13160->13161 13161->13159 13161->13160 13802 405b51 13803 405b56 13802->13803 13806 405b28 #1168 13803->13806 13807 405b42 _setmbcp 13806->13807 13808 405b4b 13806->13808 13807->13808 13812 47935a 13814 479363 13812->13814 13815 47936a Sleep 13814->13815 13815->13815 12040 403c60 12048 403b40 GetTickCount rand 12040->12048 12042 403c85 12049 403b40 GetTickCount rand 12042->12049 12044 403d63 ExitThread 12045 403c94 12045->12044 12046 403d51 Sleep 12045->12046 12046->12045 12047 403d62 12046->12047 12047->12044 12048->12042 12049->12045 11825 7fe35ac1 11828 7fe35ace 11825->11828 11829 7fe35acb 11828->11829 11830 7fe35ad9 11828->11830 11832 7fe35adf 11830->11832 11835 7fe324eb 11832->11835 11854 7fe324a6 NtOpenSection 11835->11854 11837 7fe324f3 11838 7fe324f9 NtMapViewOfSection CloseHandle 11837->11838 11839 7fe325d8 11837->11839 11838->11839 11841 7fe32531 11838->11841 11839->11829 11840 7fe32566 11856 7fe323ee NtProtectVirtualMemory NtWriteVirtualMemory 11840->11856 11841->11840 11855 7fe323ee NtProtectVirtualMemory NtWriteVirtualMemory 11841->11855 11844 7fe32577 11857 7fe323ee NtProtectVirtualMemory NtWriteVirtualMemory 11844->11857 11846 7fe32588 11858 7fe323ee NtProtectVirtualMemory NtWriteVirtualMemory 11846->11858 11848 7fe32599 11849 7fe325ae 11848->11849 11859 7fe323ee NtProtectVirtualMemory NtWriteVirtualMemory 11848->11859 11851 7fe325c3 11849->11851 11860 7fe323ee NtProtectVirtualMemory NtWriteVirtualMemory 11849->11860 11851->11839 11861 7fe323ee NtProtectVirtualMemory NtWriteVirtualMemory 11851->11861 11854->11837 11855->11840 11856->11844 11857->11846 11858->11848 11859->11849 11860->11851 11861->11839 12050 7fe32fcb 12051 7fe32ff0 12050->12051 12098 7fe330be lstrcat CreateFileA 12051->12098 12054 7fe33102 12143 7fe33112 LoadLibraryA 12054->12143 12055 7fe330df WriteFile CloseHandle 12055->12054 12060 7fe33159 12061 7fe3316e GetTickCount 12060->12061 12062 7fe33186 12061->12062 12063 7fe33223 GetVolumeInformationA 12062->12063 12064 7fe33256 12063->12064 12065 7fe3329a 12064->12065 12067 7fe33285 Sleep DeleteFileA 12064->12067 12066 7fe33328 12065->12066 12190 7fe332b8 LoadLibraryA 12065->12190 12069 7fe33352 12066->12069 12070 7fe33334 CreateThread CloseHandle 12066->12070 12067->12065 12067->12067 12230 7fe33363 LoadLibraryA 12069->12230 12070->12069 12073 7fe31079 2 API calls 12074 7fe33381 12073->12074 12254 7fe33392 LoadLibraryA 12074->12254 12079 7fe31079 2 API calls 12080 7fe333b8 12079->12080 12081 7fe333c5 WSAStartup 12080->12081 12082 7fe3365e 12080->12082 12087 7fe333dd 12081->12087 12083 7fe333ee Sleep 12083->12087 12084 7fe33411 gethostbyname 12085 7fe3341c lstrlen 12084->12085 12084->12087 12085->12084 12085->12087 12086 7fe3344d socket 12086->12087 12088 7fe33462 connect 12086->12088 12087->12082 12087->12083 12087->12084 12087->12086 12089 7fe3363e closesocket 12087->12089 12090 7fe3364e Sleep 12087->12090 12096 7fe3360f Sleep 12087->12096 12088->12089 12093 7fe3347b 12088->12093 12089->12087 12090->12087 12091 7fe334ab GetVersionExA 12091->12093 12093->12091 12275 7fe33537 wsprintfA 12093->12275 12292 7fe33565 wsprintfA 12093->12292 12096->12087 12097 7fe3361b GetTickCount 12096->12097 12097->12087 12099 7fe33102 12098->12099 12100 7fe330df WriteFile CloseHandle 12098->12100 12101 7fe33112 129 API calls 12099->12101 12100->12099 12102 7fe33107 GetProcAddress LoadLibraryA 12101->12102 12104 7fe31079 2 API calls 12102->12104 12105 7fe33159 12104->12105 12106 7fe3316e GetTickCount 12105->12106 12107 7fe33186 12106->12107 12108 7fe33223 GetVolumeInformationA 12107->12108 12109 7fe33256 12108->12109 12110 7fe3329a 12109->12110 12112 7fe33285 Sleep DeleteFileA 12109->12112 12111 7fe33328 12110->12111 12113 7fe332b8 88 API calls 12110->12113 12114 7fe33352 12111->12114 12115 7fe33334 CreateThread CloseHandle 12111->12115 12112->12110 12112->12112 12120 7fe332ac 12113->12120 12116 7fe33363 51 API calls 12114->12116 12115->12114 12117 7fe33357 12116->12117 12118 7fe31079 2 API calls 12117->12118 12119 7fe33381 12118->12119 12121 7fe33392 38 API calls 12119->12121 12120->12111 12123 7fe329f1 5 API calls 12120->12123 12122 7fe33386 12121->12122 12124 7fe31079 2 API calls 12122->12124 12123->12111 12125 7fe333b8 12124->12125 12126 7fe333c5 WSAStartup 12125->12126 12127 7fe330b7 CreateFileA 12125->12127 12132 7fe333dd 12126->12132 12127->12054 12127->12055 12128 7fe333ee Sleep 12128->12132 12129 7fe33411 gethostbyname 12130 7fe3341c lstrlen 12129->12130 12129->12132 12130->12129 12130->12132 12131 7fe3344d socket 12131->12132 12133 7fe33462 connect 12131->12133 12132->12127 12132->12128 12132->12129 12132->12131 12134 7fe3363e closesocket 12132->12134 12135 7fe3364e Sleep 12132->12135 12141 7fe3360f Sleep 12132->12141 12133->12134 12138 7fe3347b 12133->12138 12134->12132 12135->12132 12136 7fe334ab GetVersionExA 12136->12138 12137 7fe33537 23 API calls 12137->12138 12138->12136 12138->12137 12139 7fe33565 23 API calls 12138->12139 12140 7fe3355d wsprintfA 12139->12140 12140->12132 12141->12132 12142 7fe3361b GetTickCount 12141->12142 12142->12132 12309 7fe33127 GetProcAddress LoadLibraryA 12143->12309 12147 7fe31079 2 API calls 12148 7fe33159 12147->12148 12149 7fe3316e GetTickCount 12148->12149 12150 7fe33186 12149->12150 12151 7fe33223 GetVolumeInformationA 12150->12151 12152 7fe33256 12151->12152 12153 7fe3329a 12152->12153 12155 7fe33285 Sleep DeleteFileA 12152->12155 12154 7fe33328 12153->12154 12156 7fe332b8 88 API calls 12153->12156 12157 7fe33352 12154->12157 12158 7fe33334 CreateThread CloseHandle 12154->12158 12155->12153 12155->12155 12160 7fe332ac 12156->12160 12159 7fe33363 51 API calls 12157->12159 12158->12157 12161 7fe33357 12159->12161 12160->12154 12166 7fe329f1 5 API calls 12160->12166 12162 7fe31079 2 API calls 12161->12162 12163 7fe33381 12162->12163 12164 7fe33392 38 API calls 12163->12164 12165 7fe33386 12164->12165 12167 7fe31079 2 API calls 12165->12167 12166->12154 12168 7fe333b8 12167->12168 12169 7fe333c5 WSAStartup 12168->12169 12170 7fe33107 GetProcAddress LoadLibraryA 12168->12170 12173 7fe333dd 12169->12173 12186 7fe31079 12170->12186 12171 7fe333ee Sleep 12171->12173 12172 7fe33411 gethostbyname 12172->12173 12174 7fe3341c lstrlen 12172->12174 12173->12170 12173->12171 12173->12172 12175 7fe3344d socket 12173->12175 12177 7fe3363e closesocket 12173->12177 12178 7fe3364e Sleep 12173->12178 12184 7fe3360f Sleep 12173->12184 12174->12172 12174->12173 12175->12173 12176 7fe33462 connect 12175->12176 12176->12177 12181 7fe3347b 12176->12181 12177->12173 12178->12173 12179 7fe334ab GetVersionExA 12179->12181 12180 7fe33537 23 API calls 12180->12181 12181->12179 12181->12180 12182 7fe33565 23 API calls 12181->12182 12183 7fe3355d wsprintfA 12182->12183 12183->12173 12184->12173 12185 7fe3361b GetTickCount 12184->12185 12185->12173 12187 7fe31086 12186->12187 12187->12186 12188 7fe31107 12187->12188 12189 7fe310de GetModuleHandleA GetProcAddress 12187->12189 12188->12060 12189->12187 12349 7fe332cf GetProcAddress GetModuleFileNameA wsprintfA 12190->12349 12192 7fe33328 12193 7fe33352 12192->12193 12194 7fe33334 CreateThread CloseHandle 12192->12194 12196 7fe33363 51 API calls 12193->12196 12194->12193 12197 7fe33357 12196->12197 12199 7fe31079 2 API calls 12197->12199 12198 7fe329f1 5 API calls 12198->12192 12200 7fe33381 12199->12200 12201 7fe33392 38 API calls 12200->12201 12202 7fe33386 12201->12202 12203 7fe31079 2 API calls 12202->12203 12204 7fe333b8 12203->12204 12205 7fe333c5 WSAStartup 12204->12205 12206 7fe332ac 12204->12206 12219 7fe333dd 12205->12219 12206->12066 12222 7fe329f1 12206->12222 12207 7fe333ee Sleep 12207->12219 12208 7fe33411 gethostbyname 12209 7fe3341c lstrlen 12208->12209 12208->12219 12209->12208 12209->12219 12210 7fe3344d socket 12211 7fe33462 connect 12210->12211 12210->12219 12212 7fe3363e closesocket 12211->12212 12216 7fe3347b 12211->12216 12212->12219 12213 7fe3364e Sleep 12213->12219 12214 7fe334ab GetVersionExA 12214->12216 12215 7fe33537 23 API calls 12215->12216 12216->12214 12216->12215 12217 7fe33565 23 API calls 12216->12217 12218 7fe3355d wsprintfA 12217->12218 12218->12219 12219->12206 12219->12207 12219->12208 12219->12210 12219->12212 12219->12213 12220 7fe3360f Sleep 12219->12220 12220->12219 12221 7fe3361b GetTickCount 12220->12221 12221->12219 12223 7fe32a27 12222->12223 12223->12223 12224 7fe32a2c NtOpenSection 12223->12224 12225 7fe32a4b NtQuerySystemInformation 12224->12225 12229 7fe32bdf 12224->12229 12226 7fe32a5b MapViewOfFile CloseHandle 12225->12226 12228 7fe32a9c 12226->12228 12226->12229 12227 7fe32aa3 UnmapViewOfFile 12227->12229 12228->12227 12228->12229 12229->12066 12231 7fe33381 12230->12231 12232 7fe31079 2 API calls 12230->12232 12233 7fe33392 38 API calls 12231->12233 12232->12231 12234 7fe33386 12233->12234 12235 7fe31079 2 API calls 12234->12235 12236 7fe333b8 12235->12236 12237 7fe333c5 WSAStartup 12236->12237 12238 7fe33357 12236->12238 12251 7fe333dd 12237->12251 12238->12073 12239 7fe333ee Sleep 12239->12251 12240 7fe33411 gethostbyname 12241 7fe3341c lstrlen 12240->12241 12240->12251 12241->12240 12241->12251 12242 7fe3344d socket 12243 7fe33462 connect 12242->12243 12242->12251 12244 7fe3363e closesocket 12243->12244 12248 7fe3347b 12243->12248 12244->12251 12245 7fe3364e Sleep 12245->12251 12246 7fe334ab GetVersionExA 12246->12248 12247 7fe33537 23 API calls 12247->12248 12248->12246 12248->12247 12249 7fe33565 23 API calls 12248->12249 12250 7fe3355d wsprintfA 12249->12250 12250->12251 12251->12238 12251->12239 12251->12240 12251->12242 12251->12244 12251->12245 12252 7fe3360f Sleep 12251->12252 12252->12251 12253 7fe3361b GetTickCount 12252->12253 12253->12251 12255 7fe333a0 12254->12255 12256 7fe33386 12254->12256 12257 7fe333b8 12255->12257 12258 7fe31079 2 API calls 12255->12258 12256->12079 12257->12256 12259 7fe333c5 WSAStartup 12257->12259 12258->12257 12272 7fe333dd 12259->12272 12260 7fe333ee Sleep 12260->12272 12261 7fe33411 gethostbyname 12262 7fe3341c lstrlen 12261->12262 12261->12272 12262->12261 12262->12272 12263 7fe3344d socket 12264 7fe33462 connect 12263->12264 12263->12272 12265 7fe3363e closesocket 12264->12265 12269 7fe3347b 12264->12269 12265->12272 12266 7fe3364e Sleep 12266->12272 12267 7fe334ab GetVersionExA 12267->12269 12268 7fe33537 23 API calls 12268->12269 12269->12267 12269->12268 12270 7fe33565 23 API calls 12269->12270 12271 7fe3355d wsprintfA 12270->12271 12271->12272 12272->12256 12272->12260 12272->12261 12272->12263 12272->12265 12272->12266 12273 7fe3360f Sleep 12272->12273 12273->12272 12274 7fe3361b GetTickCount 12273->12274 12274->12272 12276 7fe3347b 12275->12276 12277 7fe33565 11 API calls 12276->12277 12288 7fe334ab GetVersionExA 12276->12288 12291 7fe33537 11 API calls 12276->12291 12278 7fe3355d wsprintfA 12277->12278 12285 7fe333dd 12278->12285 12279 7fe3363e closesocket 12279->12285 12280 7fe3365e 12280->12093 12281 7fe3364e Sleep 12281->12285 12282 7fe333ee Sleep 12282->12285 12283 7fe33411 gethostbyname 12284 7fe3341c lstrlen 12283->12284 12283->12285 12284->12283 12284->12285 12285->12279 12285->12280 12285->12281 12285->12282 12285->12283 12286 7fe3344d socket 12285->12286 12289 7fe3360f Sleep 12285->12289 12286->12285 12287 7fe33462 connect 12286->12287 12287->12276 12287->12279 12288->12276 12289->12285 12290 7fe3361b GetTickCount 12289->12290 12290->12285 12291->12276 12301 7fe333dd 12292->12301 12293 7fe3363e closesocket 12293->12301 12294 7fe3355d wsprintfA 12294->12087 12295 7fe3364e Sleep 12295->12301 12296 7fe333ee Sleep 12296->12301 12297 7fe33411 gethostbyname 12298 7fe3341c lstrlen 12297->12298 12297->12301 12298->12297 12298->12301 12299 7fe3344d socket 12300 7fe33462 connect 12299->12300 12299->12301 12300->12293 12306 7fe3347b 12300->12306 12301->12293 12301->12294 12301->12295 12301->12296 12301->12297 12301->12299 12303 7fe3360f Sleep 12301->12303 12302 7fe334ab GetVersionExA 12302->12306 12303->12301 12304 7fe3361b GetTickCount 12303->12304 12304->12301 12305 7fe33537 12 API calls 12305->12306 12306->12302 12306->12305 12307 7fe33565 12 API calls 12306->12307 12308 7fe3355d wsprintfA 12307->12308 12308->12301 12310 7fe33159 12309->12310 12311 7fe31079 2 API calls 12309->12311 12312 7fe3316e GetTickCount 12310->12312 12311->12310 12313 7fe33186 12312->12313 12314 7fe33223 GetVolumeInformationA 12313->12314 12315 7fe33256 12314->12315 12316 7fe3329a 12315->12316 12318 7fe33285 Sleep DeleteFileA 12315->12318 12317 7fe33328 12316->12317 12319 7fe332b8 88 API calls 12316->12319 12320 7fe33352 12317->12320 12321 7fe33334 CreateThread CloseHandle 12317->12321 12318->12316 12318->12318 12326 7fe332ac 12319->12326 12322 7fe33363 51 API calls 12320->12322 12321->12320 12323 7fe33357 12322->12323 12324 7fe31079 2 API calls 12323->12324 12325 7fe33381 12324->12325 12327 7fe33392 38 API calls 12325->12327 12326->12317 12329 7fe329f1 5 API calls 12326->12329 12328 7fe33386 12327->12328 12330 7fe31079 2 API calls 12328->12330 12329->12317 12331 7fe333b8 12330->12331 12332 7fe333c5 WSAStartup 12331->12332 12333 7fe3311d GetProcAddress LoadLibraryA 12331->12333 12346 7fe333dd 12332->12346 12333->12147 12334 7fe333ee Sleep 12334->12346 12335 7fe33411 gethostbyname 12336 7fe3341c lstrlen 12335->12336 12335->12346 12336->12335 12336->12346 12337 7fe3344d socket 12338 7fe33462 connect 12337->12338 12337->12346 12339 7fe3363e closesocket 12338->12339 12343 7fe3347b 12338->12343 12339->12346 12340 7fe3364e Sleep 12340->12346 12341 7fe334ab GetVersionExA 12341->12343 12342 7fe33537 23 API calls 12342->12343 12343->12341 12343->12342 12344 7fe33565 23 API calls 12343->12344 12345 7fe3355d wsprintfA 12344->12345 12345->12346 12346->12333 12346->12334 12346->12335 12346->12337 12346->12339 12346->12340 12347 7fe3360f Sleep 12346->12347 12347->12346 12348 7fe3361b GetTickCount 12347->12348 12348->12346 12350 7fe33317 12349->12350 12351 7fe33328 12350->12351 12352 7fe329f1 5 API calls 12350->12352 12353 7fe33352 12351->12353 12354 7fe33334 CreateThread CloseHandle 12351->12354 12352->12351 12355 7fe33363 51 API calls 12353->12355 12354->12353 12356 7fe33357 12355->12356 12357 7fe31079 2 API calls 12356->12357 12358 7fe33381 12357->12358 12359 7fe33392 38 API calls 12358->12359 12360 7fe33386 12359->12360 12361 7fe31079 2 API calls 12360->12361 12362 7fe333b8 12361->12362 12363 7fe333c5 WSAStartup 12362->12363 12364 7fe332c3 12362->12364 12367 7fe333dd 12363->12367 12364->12192 12364->12198 12365 7fe333ee Sleep 12365->12367 12366 7fe33411 gethostbyname 12366->12367 12368 7fe3341c lstrlen 12366->12368 12367->12364 12367->12365 12367->12366 12369 7fe3344d socket 12367->12369 12371 7fe3363e closesocket 12367->12371 12372 7fe3364e Sleep 12367->12372 12378 7fe3360f Sleep 12367->12378 12368->12366 12368->12367 12369->12367 12370 7fe33462 connect 12369->12370 12370->12371 12375 7fe3347b 12370->12375 12371->12367 12372->12367 12373 7fe334ab GetVersionExA 12373->12375 12374 7fe33537 23 API calls 12374->12375 12375->12373 12375->12374 12376 7fe33565 23 API calls 12375->12376 12377 7fe3355d wsprintfA 12376->12377 12377->12367 12378->12367 12379 7fe3361b GetTickCount 12378->12379 12379->12367 12593 403d6b 12595 403db8 12593->12595 12594 403e81 ExitThread 12595->12594 12596 403b40 GetTickCount rand 12595->12596 12597 403e6b Sleep 12595->12597 12596->12595 12597->12595 12380 482c65 12381 482c67 12380->12381 12382 482c7e CloseHandle 12381->12382 12383 482c91 12382->12383 12384 401070 12385 401075 12384->12385 12388 40343c 12385->12388 12391 403410 12388->12391 12390 40109a 12392 403425 __dllonexit 12391->12392 12393 403419 _onexit 12391->12393 12392->12390 12393->12390 13819 47737b 13820 477340 NtAdjustPrivilegesToken 13819->13820 13184 7fe325dc 13186 7fe325e2 CreateThread CloseHandle 13184->13186 13187 7fe32fc3 13186->13187 13188 7fe32fc9 13187->13188 13825 401300 Sleep 13189 6f662d 13192 6f6647 13189->13192 13193 6f6637 13192->13193 13194 6f6652 13192->13194 13196 6f6658 13194->13196 13199 6f2574 13196->13199 13218 6f252f NtOpenSection 13199->13218 13201 6f257c 13202 6f2582 NtMapViewOfSection CloseHandle 13201->13202 13203 6f2661 13201->13203 13202->13203 13204 6f25ba 13202->13204 13203->13193 13205 6f25ef 13204->13205 13219 6f2477 NtProtectVirtualMemory NtWriteVirtualMemory 13204->13219 13220 6f2477 NtProtectVirtualMemory NtWriteVirtualMemory 13205->13220 13208 6f2600 13221 6f2477 NtProtectVirtualMemory NtWriteVirtualMemory 13208->13221 13210 6f2611 13222 6f2477 NtProtectVirtualMemory NtWriteVirtualMemory 13210->13222 13212 6f2622 13213 6f2637 13212->13213 13223 6f2477 NtProtectVirtualMemory NtWriteVirtualMemory 13212->13223 13215 6f264c 13213->13215 13224 6f2477 NtProtectVirtualMemory NtWriteVirtualMemory 13213->13224 13215->13203 13225 6f2477 NtProtectVirtualMemory NtWriteVirtualMemory 13215->13225 13218->13201 13219->13205 13220->13208 13221->13210 13222->13212 13223->13213 13224->13215 13225->13203 13826 7fe330ab lstrcat 13827 7fe330b2 13826->13827 13828 7fe330be 153 API calls 13827->13828 13829 7fe330b7 CreateFileA 13828->13829 13830 7fe33102 13829->13830 13831 7fe330df WriteFile CloseHandle 13829->13831 13832 7fe33112 129 API calls 13830->13832 13831->13830 13833 7fe33107 GetProcAddress LoadLibraryA 13832->13833 13835 7fe31079 2 API calls 13833->13835 13836 7fe33159 13835->13836 13837 7fe3316e GetTickCount 13836->13837 13838 7fe33186 13837->13838 13839 7fe33223 GetVolumeInformationA 13838->13839 13840 7fe33256 13839->13840 13841 7fe3329a 13840->13841 13843 7fe33285 Sleep DeleteFileA 13840->13843 13842 7fe33328 13841->13842 13844 7fe332b8 88 API calls 13841->13844 13845 7fe33352 13842->13845 13846 7fe33334 CreateThread CloseHandle 13842->13846 13843->13841 13843->13843 13851 7fe332ac 13844->13851 13847 7fe33363 51 API calls 13845->13847 13846->13845 13848 7fe33357 13847->13848 13849 7fe31079 2 API calls 13848->13849 13850 7fe33381 13849->13850 13852 7fe33392 38 API calls 13850->13852 13851->13842 13854 7fe329f1 5 API calls 13851->13854 13853 7fe33386 13852->13853 13855 7fe31079 2 API calls 13853->13855 13854->13842 13856 7fe333b8 13855->13856 13857 7fe333c5 WSAStartup 13856->13857 13858 7fe3365e 13856->13858 13861 7fe333dd 13857->13861 13859 7fe333ee Sleep 13859->13861 13860 7fe33411 gethostbyname 13860->13861 13862 7fe3341c lstrlen 13860->13862 13861->13858 13861->13859 13861->13860 13863 7fe3344d socket 13861->13863 13865 7fe3363e closesocket 13861->13865 13866 7fe3364e Sleep 13861->13866 13872 7fe3360f Sleep 13861->13872 13862->13860 13862->13861 13863->13861 13864 7fe33462 connect 13863->13864 13864->13865 13869 7fe3347b 13864->13869 13865->13861 13866->13861 13867 7fe334ab GetVersionExA 13867->13869 13868 7fe33537 23 API calls 13868->13869 13869->13867 13869->13868 13870 7fe33565 23 API calls 13869->13870 13871 7fe3355d wsprintfA 13870->13871 13871->13861 13872->13861 13873 7fe3361b GetTickCount 13872->13873 13873->13861 12402 6f443b 12405 6f144a LookupPrivilegeValueA NtAdjustPrivilegesToken 12402->12405 12404 6f4441 12405->12404 13877 404715 13896 403c10 GetSystemDirectoryA lstrcatA lstrcpyA 13877->13896 13879 40477f 13880 40480e CreateProcessA 13879->13880 13891 4047e0 13879->13891 13881 404850 13880->13881 13882 404838 Sleep 13880->13882 13897 403b40 GetTickCount rand 13881->13897 13882->13881 13884 404995 ExitThread 13885 404856 13886 4048f4 13885->13886 13887 4048b9 13885->13887 13885->13891 13900 403b40 GetTickCount rand 13886->13900 13898 403b40 GetTickCount rand 13887->13898 13890 4048be 13899 403b40 GetTickCount rand 13890->13899 13891->13884 13895 40498b Sleep 13891->13895 13892 4048f9 13901 403b40 GetTickCount rand 13892->13901 13895->13891 13896->13879 13897->13885 13898->13890 13899->13891 13900->13892 13901->13891 13902 436719 13903 43671e 13902->13903 13904 43675d 13902->13904 13903->13904 13906 4369d9 13903->13906 13910 4366ea 13906->13910 13909 4368ec 13909->13904 13911 436700 GetPEB 13910->13911 13911->13909 13232 40361c 13233 403628 13232->13233 13234 403920 9 API calls 13233->13234 13234->13233 12406 41a81c 12407 41a820 12406->12407 12408 41a8f0 12407->12408 12410 41a736 12407->12410 12414 41a9ee 12410->12414 12413 41a755 12413->12408 12415 41a740 GetPEB 12414->12415 12415->12413 12416 401020 #561 13235 405620 13238 405685 13235->13238 13236 40589b 13237 405894 ExitThread 13238->13236 13238->13237 13239 403b40 GetTickCount rand 13238->13239 13240 405885 Sleep 13238->13240 13239->13238 13240->13238 13241 478626 13243 47862c CreateThread CloseHandle 13241->13243 13244 479bf9 13243->13244 13246 479bfe 13244->13246 13247 479c6a 13246->13247 13250 479c1c GetWindowsDirectoryA 13246->13250 13297 4784f0 NtOpenSection 13247->13297 13249 479c6f 13252 479c76 13249->13252 13253 479cbc GetSystemDirectoryA 13249->13253 13255 479ce7 13250->13255 13298 479c83 GetModuleHandleA 13252->13298 13338 479ce0 lstrcatA 13253->13338 13376 479cf7 LoadLibraryA 13255->13376 13297->13249 13299 479c9f 13298->13299 13300 479c8d 13298->13300 13413 479cb1 GetModuleHandleA 13299->13413 13302 479c95 GetProcAddress 13300->13302 13302->13299 13339 479ce7 13338->13339 13340 479cf7 127 API calls 13339->13340 13341 479cec GetProcAddress LoadLibraryA 13340->13341 13343 47708f 2 API calls 13341->13343 13344 479d3e 13343->13344 13345 479d53 GetTickCount 13344->13345 13346 479d6b 13345->13346 13347 479e08 GetVolumeInformationA 13346->13347 13348 479e3b 13347->13348 13349 479ee6 13348->13349 13350 479e76 84 API calls 13348->13350 13351 479ef2 CreateThread CloseHandle 13349->13351 13352 479f10 13349->13352 13353 479e6a 13350->13353 13351->13352 13354 479f21 43 API calls 13352->13354 13353->13349 13356 479e8b GetModuleFileNameA 13353->13356 13355 479f15 13354->13355 13357 47708f 2 API calls 13355->13357 13359 479ebe 13356->13359 13358 479f3f 13357->13358 13360 479f50 28 API calls 13358->13360 13359->13349 13364 4793c6 5 API calls 13359->13364 13361 479f44 13360->13361 13362 479f94 CreateThread CloseHandle 13361->13362 13363 479fbb CreateEventA 13361->13363 13362->13363 13373 479fd3 13363->13373 13364->13349 13365 47a017 lstrlenA 13365->13365 13365->13373 13366 47a2e1 ExitThread 13367 47a291 SetEvent 13367->13373 13368 47a2b3 Sleep ResetEvent 13368->13373 13369 47a0b0 GetVersionExA 13369->13373 13370 47a139 11 API calls 13370->13373 13371 47a168 CreateThread CloseHandle 13371->13373 13372 47a1b7 GetTickCount 13372->13373 13373->13365 13373->13366 13373->13367 13373->13368 13373->13369 13373->13370 13373->13371 13373->13372 13374 47a249 Sleep 13373->13374 13374->13373 13375 47a255 GetTickCount 13374->13375 13375->13373 13561 479d0c GetProcAddress LoadLibraryA 13376->13561 13452 478695 13413->13452 13416 479ce0 149 API calls 13417 479cd3 GetProcAddress LoadLibraryA 13416->13417 13419 47708f 2 API calls 13417->13419 13420 479d3e 13419->13420 13421 479d53 GetTickCount 13420->13421 13422 479d6b 13421->13422 13423 479e08 GetVolumeInformationA 13422->13423 13424 479e3b 13423->13424 13425 479ee6 13424->13425 13454 479e76 LoadLibraryA 13424->13454 13427 479ef2 CreateThread CloseHandle 13425->13427 13428 479f10 13425->13428 13427->13428 13482 479f21 LoadLibraryA 13428->13482 13453 478689 GetSystemDirectoryA 13452->13453 13453->13416 13500 479e8d GetProcAddress GetModuleFileNameA 13454->13500 13483 479f3f 13482->13483 13484 47708f 2 API calls 13482->13484 13485 479f50 28 API calls 13483->13485 13484->13483 13486 479f44 13485->13486 13487 479f94 CreateThread CloseHandle 13486->13487 13488 479fbb CreateEventA 13486->13488 13487->13488 13497 479fd3 13488->13497 13489 47a017 lstrlenA 13489->13489 13489->13497 13490 47a2e1 ExitThread 13491 47a291 SetEvent 13491->13497 13492 47a2b3 Sleep ResetEvent 13492->13497 13493 47a0b0 GetVersionExA 13493->13497 13494 47a139 11 API calls 13494->13497 13495 47a168 CreateThread CloseHandle 13495->13497 13496 47a1b7 GetTickCount 13496->13497 13497->13489 13497->13490 13497->13491 13497->13492 13497->13493 13497->13494 13497->13495 13497->13496 13498 47a249 Sleep 13497->13498 13498->13497 13499 47a255 GetTickCount 13498->13499 13499->13497 13501 479ebe 13500->13501 13502 479ee6 13501->13502 13525 4793c6 13501->13525 13504 479ef2 CreateThread CloseHandle 13502->13504 13505 479f10 13502->13505 13504->13505 13506 479f21 43 API calls 13505->13506 13507 479f15 13506->13507 13508 47708f 2 API calls 13507->13508 13509 479f3f 13508->13509 13533 479f50 LoadLibraryA 13509->13533 13526 4793fc 13525->13526 13526->13526 13527 479401 NtOpenSection 13526->13527 13528 479420 NtQuerySystemInformation 13527->13528 13532 4795b4 13527->13532 13529 479430 MapViewOfFile CloseHandle 13528->13529 13531 479471 13529->13531 13529->13532 13530 479478 UnmapViewOfFile 13530->13532 13531->13530 13531->13532 13532->13502 13534 47a2e1 ExitThread 13533->13534 13535 479f5e 13533->13535 13536 47708f 2 API calls 13535->13536 13537 479f76 13536->13537 13537->13534 13538 479f95 CreateThread CloseHandle 13537->13538 13539 479fbb CreateEventA 13538->13539 13547 479fd3 13539->13547 13540 47a017 lstrlenA 13540->13540 13540->13547 13541 47a291 SetEvent 13541->13547 13542 47a2b3 Sleep ResetEvent 13542->13547 13543 47a0b0 GetVersionExA 13543->13547 13545 47a168 CreateThread CloseHandle 13545->13547 13546 47a1b7 GetTickCount 13546->13547 13547->13534 13547->13540 13547->13541 13547->13542 13547->13543 13547->13545 13547->13546 13548 47a249 Sleep 13547->13548 13550 47a139 13547->13550 13548->13547 13549 47a255 GetTickCount 13548->13549 13549->13547 13560 479fd3 13550->13560 13551 47a168 CreateThread CloseHandle 13551->13560 13552 47a1b7 GetTickCount 13552->13560 13553 47a2e1 ExitThread 13554 47a291 SetEvent 13554->13560 13555 47a2b3 Sleep ResetEvent 13555->13560 13556 47a017 lstrlenA 13556->13556 13556->13560 13557 47a249 Sleep 13558 47a255 GetTickCount 13557->13558 13557->13560 13558->13560 13559 47a0b0 GetVersionExA 13559->13560 13560->13551 13560->13552 13560->13553 13560->13554 13560->13555 13560->13556 13560->13557 13560->13559 13562 479d3e 13561->13562 13563 47708f 2 API calls 13561->13563 13564 479d53 GetTickCount 13562->13564 13563->13562 13565 479d6b 13564->13565 13566 479e08 GetVolumeInformationA 13565->13566 13567 479e3b 13566->13567 13568 479ee6 13567->13568 13569 479e76 84 API calls 13567->13569 13570 479ef2 CreateThread CloseHandle 13568->13570 13571 479f10 13568->13571 13572 479e6a 13569->13572 13570->13571 13573 479f21 43 API calls 13571->13573 13572->13568 13575 479e8b GetModuleFileNameA 13572->13575 13574 479f15 13573->13574 13576 47708f 2 API calls 13574->13576 13578 479ebe 13575->13578 13577 479f3f 13576->13577 13579 479f50 28 API calls 13577->13579 13578->13568 13583 4793c6 5 API calls 13578->13583 13580 479f44 13579->13580 13581 479f94 CreateThread CloseHandle 13580->13581 13582 479fbb CreateEventA 13580->13582 13581->13582 13592 479fd3 13582->13592 13583->13568 13584 47a017 lstrlenA 13584->13584 13584->13592 13585 47a2e1 ExitThread 13586 47a291 SetEvent 13586->13592 13587 47a2b3 Sleep ResetEvent 13587->13592 13588 47a0b0 GetVersionExA 13588->13592 13589 47a139 11 API calls 13589->13592 13590 47a168 CreateThread CloseHandle 13590->13592 13591 47a1b7 GetTickCount 13591->13592 13592->13584 13592->13585 13592->13586 13592->13587 13592->13588 13592->13589 13592->13590 13592->13591 13593 47a249 Sleep 13592->13593 13593->13592 13594 47a255 GetTickCount 13593->13594 13594->13592 13915 478723 13917 478729 13915->13917 13918 478741 GetTempPathA 13917->13918 13919 4787ea 13917->13919 13925 478768 GetTempFileNameA CreateFileA 13918->13925 13922 47878f 13923 4787bf CloseHandle CreateProcessA 13922->13923 13924 4787ab WriteFile 13922->13924 13923->13919 13924->13922 13924->13923 13926 47878f 13925->13926 13927 478764 CreateFileA 13925->13927 13928 4787bf CloseHandle CreateProcessA 13926->13928 13929 4787ab WriteFile 13926->13929 13927->13919 13927->13922 13928->13927 13929->13926 13929->13928 13599 47622f 13600 476232 13599->13600 13601 47619e 64 API calls 13600->13601 13602 476284 13600->13602 13601->13602 12420 6f0000 12421 6f0004 12420->12421 12422 6f00a1 12421->12422 12424 6f025e 12421->12424 12428 6f0105 12424->12428 12427 6f0278 12427->12422 12429 6f0116 GetPEB 12428->12429 12429->12427 12430 402430 FindResourceA LoadLibraryA GetProcAddress 12431 402472 LoadResource 12430->12431 12432 4024e9 12430->12432 12431->12432 12434 402484 12431->12434 12434->12432 12435 402488 LockResource 12434->12435 12435->12432 12436 402495 CreateFileA 12435->12436 12436->12432 12438 4024ca WriteFile CloseHandle 12436->12438 12438->12432 12623 404530 12624 404595 12623->12624 12625 40464f 12623->12625 12638 403c10 GetSystemDirectoryA lstrcatA lstrcpyA 12624->12638 12639 403b40 GetTickCount rand 12625->12639 12628 4045a2 12631 404647 ExitThread 12628->12631 12632 404607 CreateProcessA 12628->12632 12629 404655 12636 40465c 12629->12636 12640 403b40 GetTickCount rand 12629->12640 12633 404641 Sleep 12632->12633 12634 40462d Sleep 12632->12634 12633->12628 12634->12633 12635 40470d ExitThread 12636->12635 12637 404702 Sleep 12636->12637 12637->12636 12638->12628 12639->12629 12640->12636 13930 402730 13931 40274a Sleep 13930->13931 13933 4027c1 CreateMutexA GetLastError 13931->13933 13934 4027e6 13933->13934 13935 4027db ExitProcess 13933->13935 13945 402500 EnumResourceNamesA 13934->13945 13937 4027eb 13946 402520 lstrcpyA lstrcatA 13937->13946 13939 402807 13940 401980 LoadLibraryA 13939->13940 13941 40280c 13940->13941 13969 4012b0 CreateThread 13941->13969 13943 40285c WaitForSingleObject CloseHandle 13944 402878 Sleep 13943->13944 13944->13941 13945->13937 13947 402565 13946->13947 13948 402575 RtlZeroMemory 13947->13948 13949 402569 13947->13949 13950 4025ab 13948->13950 13949->13939 13951 4025af 13950->13951 13952 4025d1 GetFileAttributesA 13950->13952 13951->13939 13953 4025e1 13952->13953 13954 4025ed CreateFileA 13952->13954 13953->13939 13955 40261a GetFileSize 13954->13955 13956 40260e 13954->13956 13957 40262b CloseHandle 13955->13957 13958 40263e GlobalAlloc 13955->13958 13956->13939 13957->13939 13959 402660 ReadFile 13958->13959 13960 40264d CloseHandle 13958->13960 13961 402692 CloseHandle BeginUpdateResourceA 13959->13961 13962 402678 GlobalFree CloseHandle 13959->13962 13960->13939 13963 4026c2 UpdateResourceA 13961->13963 13964 4026af GlobalFree 13961->13964 13962->13939 13965 4026fb EndUpdateResourceA 13963->13965 13966 4026de lstrlenA UpdateResourceA 13963->13966 13964->13939 13967 40270a GlobalFree 13965->13967 13968 40271c GlobalFree 13965->13968 13966->13965 13967->13939 13968->13939 13969->13943 12439 6f3819 12441 6f381f WaitForSingleObject 12439->12441 12442 6f383b closesocket 12441->12442 12443 6f3845 12441->12443 12442->12443 12656 477130 LoadLibraryA 12661 477157 GetProcAddress 12656->12661 12658 477238 12659 477141 12659->12658 12660 477421 NtAdjustPrivilegesToken 12659->12660 12661->12659 13973 428735 13974 428739 13973->13974 13975 4287db 13974->13975 13976 42887f GetPEB 13974->13976 13976->13975 12444 7fe31399 LookupPrivilegeValueA NtAdjustPrivilegesToken 11866 476239 11869 476252 11866->11869 11868 47c9a5 GetPEB 11868->11869 11870 47c9ff 11869->11870 11871 4763ee 11869->11871 11906 47708f 11871->11906 11874 476467 11876 476471 GetModuleHandleA 11874->11876 11875 47649e 11877 4764b9 GetVersion 11875->11877 11876->11875 11878 4764d0 VirtualAlloc 11877->11878 11879 47658b 11877->11879 11880 47656a CloseHandle 11878->11880 11886 4764f3 11878->11886 11879->11880 11881 476594 SetProcessAffinityMask 11879->11881 11883 4765b3 GetModuleHandleA 11880->11883 11910 4765b3 GetModuleHandleA 11881->11910 11884 47708f 2 API calls 11883->11884 11885 4765cf 11884->11885 11885->11880 11889 4765ad 11885->11889 11886->11880 11937 47657b 11886->11937 11887 4766bd lstrcpyW 11934 47846f lstrcpyW lstrlenW 11887->11934 11889->11880 11889->11887 11891 47670d NtMapViewOfSection 11889->11891 11892 4766d8 GetPEB lstrcpyW lstrcatW 11889->11892 11891->11880 11903 47673c 11891->11903 11893 47846f 3 API calls 11892->11893 11893->11889 11894 476741 NtOpenProcessToken 11895 476786 CreateToolhelp32Snapshot Process32First 11894->11895 11894->11903 11896 47679f 11895->11896 11899 4767ac Process32Next 11896->11899 11901 4767be OpenProcess 11896->11901 11896->11903 11899->11896 11900 476826 CloseHandle 11899->11900 11900->11880 11901->11899 11901->11903 11902 47681d CloseHandle 11902->11899 11903->11894 11903->11895 11903->11896 11903->11902 11904 4767f5 CreateRemoteThread 11903->11904 11905 47657b Sleep 11903->11905 11940 47676d 11903->11940 11962 478535 11903->11962 11904->11902 11904->11903 11905->11902 11908 47709c 11906->11908 11907 476450 11907->11874 11907->11875 11908->11906 11908->11907 11909 4770f4 GetModuleHandleA GetProcAddress 11908->11909 11909->11908 11911 47708f 2 API calls 11910->11911 11913 4765cf 11911->11913 11912 47656a CloseHandle 11912->11910 11913->11912 11914 4766bd lstrcpyW 11913->11914 11916 47670d NtMapViewOfSection 11913->11916 11917 4766d8 GetPEB lstrcpyW lstrcatW 11913->11917 11915 47846f 3 API calls 11914->11915 11915->11913 11916->11912 11921 47673c 11916->11921 11918 47846f 3 API calls 11917->11918 11918->11913 11919 476741 NtOpenProcessToken 11920 476786 CreateToolhelp32Snapshot Process32First 11919->11920 11919->11921 11928 47675c 11920->11928 11921->11919 11924 47676d 29 API calls 11921->11924 11922 476778 11922->11920 11923 478535 5 API calls 11922->11923 11926 4767d5 11923->11926 11924->11928 11925 4767ac Process32Next 11927 476826 CloseHandle 11925->11927 11925->11928 11930 47681d CloseHandle 11926->11930 11931 4767e3 11926->11931 11927->11912 11928->11922 11928->11925 11929 4767be OpenProcess 11928->11929 11929->11922 11929->11925 11930->11925 11931->11930 11932 4767f5 CreateRemoteThread 11931->11932 11933 47657b Sleep 11931->11933 11932->11930 11932->11931 11933->11930 11981 47606f 11934->11981 11938 476580 Sleep 11937->11938 11939 47658a 11937->11939 11938->11937 11939->11880 11983 47740b 11940->11983 11942 476773 FreeLibrary CloseHandle 11943 476786 CreateToolhelp32Snapshot Process32First 11942->11943 11960 4765cf 11943->11960 11944 478535 5 API calls 11944->11960 11945 4767ac Process32Next 11946 476826 CloseHandle 11945->11946 11945->11960 11949 47656a CloseHandle 11946->11949 11947 4767be OpenProcess 11947->11945 11947->11960 11948 47681d CloseHandle 11948->11945 11951 4765b3 GetModuleHandleA 11949->11951 11950 4767f5 CreateRemoteThread 11950->11948 11950->11960 11952 47708f 2 API calls 11951->11952 11952->11960 11953 47657b Sleep 11953->11948 11954 4766bd lstrcpyW 11955 47846f 3 API calls 11954->11955 11955->11960 11956 47670d NtMapViewOfSection 11956->11949 11956->11960 11957 4766d8 GetPEB lstrcpyW lstrcatW 11958 47846f 3 API calls 11957->11958 11958->11960 11959 476741 NtOpenProcessToken 11959->11943 11959->11960 11960->11943 11960->11944 11960->11945 11960->11947 11960->11948 11960->11949 11960->11950 11960->11953 11960->11954 11960->11956 11960->11957 11960->11959 11961 47676d 12 API calls 11960->11961 11961->11960 11985 4784f0 NtOpenSection 11962->11985 11964 47853d 11965 478543 NtMapViewOfSection CloseHandle 11964->11965 11966 478622 11964->11966 11965->11966 11969 47857b 11965->11969 11966->11903 11967 4785b0 11987 478438 NtProtectVirtualMemory NtWriteVirtualMemory 11967->11987 11969->11967 11986 478438 NtProtectVirtualMemory NtWriteVirtualMemory 11969->11986 11970 4785c1 11988 478438 NtProtectVirtualMemory NtWriteVirtualMemory 11970->11988 11973 4785d2 11989 478438 NtProtectVirtualMemory NtWriteVirtualMemory 11973->11989 11975 4785e3 11976 4785f8 11975->11976 11990 478438 NtProtectVirtualMemory NtWriteVirtualMemory 11975->11990 11978 47860d 11976->11978 11991 478438 NtProtectVirtualMemory NtWriteVirtualMemory 11976->11991 11978->11966 11992 478438 NtProtectVirtualMemory NtWriteVirtualMemory 11978->11992 11982 47607b NtCreateSection 11981->11982 11982->11889 11984 477421 NtAdjustPrivilegesToken 11983->11984 11984->11942 11985->11964 11986->11967 11987->11970 11988->11973 11989->11975 11990->11976 11991->11978 11992->11966 12662 4019c0 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 12687 401660 strstr 12662->12687 12664 402254 12665 401a45 12665->12664 12691 402f70 GetLocaleInfoW GetComputerNameA lstrcpyA 12665->12691 12669 401acc 12670 401c3e CloseHandle LoadLibraryA 12683 401a80 12670->12683 12671 401820 GetProcAddress 12671->12683 12672 40222c 12672->12664 12673 40224d CloseHandle 12672->12673 12673->12664 12674 401c01 CloseHandle 12674->12683 12675 401e2a lstrcpynA lstrlenA lstrcpynA 12682 4015d0 CreateThread 12675->12682 12676 401d4e lstrcpynA 12680 401330 CreateThread 12676->12680 12677 401d9f lstrcpynA lstrlenA lstrcpynA 12681 4014f0 CreateThread 12677->12681 12678 401eff 6 API calls 12679 401f45 ReleaseMutex CloseHandle 12678->12679 12678->12683 12679->12683 12680->12683 12681->12683 12682->12683 12683->12669 12683->12670 12683->12671 12683->12672 12683->12674 12683->12675 12683->12676 12683->12677 12683->12678 12684 40206e lstrcatA LoadLibraryA GetProcAddress 12683->12684 12685 401f77 LoadLibraryA GetProcAddress 12683->12685 12686 4020af WinExec 12684->12686 12685->12683 12686->12683 12688 401712 atoi 12687->12688 12689 4016b4 strcspn strncpy strcspn 12687->12689 12690 40176f 12688->12690 12689->12688 12690->12665 12692 402fdd strstr 12691->12692 12694 403048 strstr 12692->12694 12696 40302d lstrcpyA lstrcpyA 12692->12696 12695 40306b strstr 12694->12695 12694->12696 12695->12696 12698 403096 strstr 12695->12698 12700 40315d GlobalMemoryStatusEx 12696->12700 12698->12696 12699 4030bd strstr 12698->12699 12699->12696 12701 4030e1 strstr 12699->12701 12703 4031dd 12700->12703 12701->12696 12704 4031f2 lstrcpyA 12703->12704 12705 401a78 12704->12705 12706 40320c GetTickCount 12704->12706 12707 401980 12705->12707 12706->12705 12708 401998 LoadLibraryA 12707->12708 12708->12683 12448 41a8c0 12449 41a8c8 12448->12449 12450 41a736 GetPEB 12449->12450 12451 41a8f0 12449->12451 12450->12451 13981 4043c1 13982 404413 13981->13982 13983 404454 13981->13983 13993 403b40 GetTickCount rand 13982->13993 13995 403b40 GetTickCount rand 13983->13995 13986 404461 13996 403b40 GetTickCount rand 13986->13996 13987 40441f 13994 403b40 GetTickCount rand 13987->13994 13990 4044f4 ExitThread 13991 40442d 13991->13990 13992 4044ea Sleep 13991->13992 13992->13991 13993->13987 13994->13991 13995->13986 13996->13991 12709 4041cf 12710 40420b 12709->12710 12711 404246 malloc 12710->12711 12714 4042ab 12711->12714 12712 4043b9 ExitThread 12713 403b40 GetTickCount rand 12713->12714 12714->12712 12714->12713 12715 404304 sprintf 12714->12715 12716 404336 sprintf 12714->12716 12715->12714 12716->12714 13620 4012d0 13621 4012e0 LoadLibraryA GetProcAddress 13620->13621 13622 6f02fe 13623 6f0415 13622->13623 13627 6f006b 13623->13627 13625 6f0421 13631 6f042d 13625->13631 13628 6f008f 13627->13628 13629 6f025e GetPEB 13628->13629 13630 6f00a1 13628->13630 13629->13630 13630->13625 13632 6f10ce 2 API calls 13631->13632 13633 6f048f 13632->13633 13634 6f04dd 13633->13634 13635 6f04b0 GetModuleHandleA 13633->13635 13636 6f04f8 GetVersion 13634->13636 13635->13634 13637 6f050f VirtualAlloc 13636->13637 13642 6f05ca 13636->13642 13638 6f05a9 CloseHandle 13637->13638 13641 6f0532 13637->13641 13638->13642 13639 6f05d3 SetProcessAffinityMask 13663 6f05f2 GetModuleHandleA 13639->13663 13641->13638 13660 6f05ba 13641->13660 13642->13638 13642->13639 13643 6f06fc lstrcpyW 13642->13643 13645 6f074c NtMapViewOfSection 13642->13645 13646 6f0717 GetPEB lstrcpyW lstrcatW 13642->13646 13649 6f0780 NtOpenProcessToken 13642->13649 13651 6f07eb Process32Next 13642->13651 13653 6f07fd OpenProcess 13642->13653 13655 6f2574 5 API calls 13642->13655 13656 6f07b7 CreateToolhelp32Snapshot Process32First 13642->13656 13657 6f085c CloseHandle 13642->13657 13658 6f0834 CreateRemoteThread 13642->13658 13659 6f05ba Sleep 13642->13659 13688 6f07ac 13642->13688 13685 6f24ae lstrcpyW lstrlenW 13643->13685 13645->13638 13645->13642 13647 6f24ae 3 API calls 13646->13647 13647->13642 13649->13642 13650 6f07c5 CreateToolhelp32Snapshot Process32First 13649->13650 13650->13651 13651->13642 13652 6f0865 CloseHandle 13651->13652 13652->13638 13653->13642 13653->13651 13655->13642 13656->13651 13657->13651 13658->13642 13658->13657 13659->13657 13661 6f05bf Sleep 13660->13661 13662 6f05c9 13660->13662 13661->13660 13662->13638 13664 6f10ce 2 API calls 13663->13664 13680 6f05ca 13664->13680 13665 6f05a9 CloseHandle 13665->13680 13666 6f05d3 SetProcessAffinityMask 13667 6f05f2 30 API calls 13666->13667 13667->13680 13668 6f06fc lstrcpyW 13669 6f24ae 3 API calls 13668->13669 13669->13680 13670 6f074c NtMapViewOfSection 13670->13665 13670->13680 13671 6f0717 GetPEB lstrcpyW lstrcatW 13672 6f24ae 3 API calls 13671->13672 13672->13680 13673 6f0780 NtOpenProcessToken 13674 6f07c5 CreateToolhelp32Snapshot Process32First 13673->13674 13673->13680 13675 6f07eb Process32Next 13674->13675 13676 6f0865 CloseHandle 13675->13676 13675->13680 13676->13665 13677 6f07fd OpenProcess 13677->13675 13677->13680 13678 6f07ac 30 API calls 13678->13680 13679 6f2574 5 API calls 13679->13680 13680->13665 13680->13666 13680->13668 13680->13670 13680->13671 13680->13673 13680->13675 13680->13677 13680->13678 13680->13679 13681 6f07b7 CreateToolhelp32Snapshot Process32First 13680->13681 13682 6f085c CloseHandle 13680->13682 13683 6f0834 CreateRemoteThread 13680->13683 13684 6f05ba Sleep 13680->13684 13681->13675 13682->13675 13683->13680 13683->13682 13684->13682 13686 6f00ae 13685->13686 13687 6f24ea NtCreateSection 13686->13687 13687->13642 13711 6f144a LookupPrivilegeValueA NtAdjustPrivilegesToken 13688->13711 13690 6f07b2 FreeLibrary CloseHandle 13691 6f07c5 CreateToolhelp32Snapshot Process32First 13690->13691 13692 6f07eb Process32Next 13691->13692 13693 6f0865 CloseHandle 13692->13693 13701 6f05ca 13692->13701 13695 6f05a9 CloseHandle 13693->13695 13694 6f07fd OpenProcess 13694->13692 13694->13701 13695->13701 13696 6f2574 5 API calls 13696->13701 13697 6f05d3 SetProcessAffinityMask 13698 6f05f2 29 API calls 13697->13698 13698->13701 13699 6f085c CloseHandle 13699->13692 13700 6f0834 CreateRemoteThread 13700->13699 13700->13701 13701->13692 13701->13694 13701->13695 13701->13696 13701->13697 13701->13699 13701->13700 13702 6f05ba Sleep 13701->13702 13703 6f06fc lstrcpyW 13701->13703 13705 6f074c NtMapViewOfSection 13701->13705 13706 6f0717 GetPEB lstrcpyW lstrcatW 13701->13706 13708 6f0780 NtOpenProcessToken 13701->13708 13709 6f07ac 29 API calls 13701->13709 13710 6f07b7 CreateToolhelp32Snapshot Process32First 13701->13710 13702->13699 13704 6f24ae 3 API calls 13703->13704 13704->13701 13705->13695 13705->13701 13707 6f24ae 3 API calls 13706->13707 13707->13701 13708->13691 13708->13701 13709->13701 13710->13692 13711->13690 12455 4020d3 OpenMutexA 12456 4020f9 12455->12456 12457 4020eb ReleaseMutex CloseHandle 12455->12457 12472 403b40 GetTickCount rand 12456->12472 12457->12456 12459 402147 12473 403b40 GetTickCount rand 12459->12473 12461 402155 12474 403b40 GetTickCount rand 12461->12474 12463 402163 12475 403b40 GetTickCount rand 12463->12475 12465 402171 12476 403b40 GetTickCount rand 12465->12476 12467 40217f lstrcatA 12469 4021b9 GetProcAddress 12467->12469 12470 4021da WinExec ExitProcess 12469->12470 12472->12459 12473->12461 12474->12463 12475->12465 12476->12467 14011 4797da 14013 4797e0 WaitForSingleObject 14011->14013 14014 4797fc 14013->14014 14015 7fe3307c GetModuleHandleA 14063 7fe3264b 14015->14063 14018 7fe3309e CreateFileA 14019 7fe33102 14018->14019 14020 7fe330df WriteFile CloseHandle 14018->14020 14021 7fe33112 129 API calls 14019->14021 14020->14019 14022 7fe33107 GetProcAddress LoadLibraryA 14021->14022 14024 7fe31079 2 API calls 14022->14024 14025 7fe33159 14024->14025 14026 7fe3316e GetTickCount 14025->14026 14027 7fe33186 14026->14027 14028 7fe33223 GetVolumeInformationA 14027->14028 14029 7fe33256 14028->14029 14030 7fe3329a 14029->14030 14032 7fe33285 Sleep DeleteFileA 14029->14032 14031 7fe33328 14030->14031 14033 7fe332b8 88 API calls 14030->14033 14034 7fe33352 14031->14034 14035 7fe33334 CreateThread CloseHandle 14031->14035 14032->14030 14032->14032 14040 7fe332ac 14033->14040 14036 7fe33363 51 API calls 14034->14036 14035->14034 14037 7fe33357 14036->14037 14038 7fe31079 2 API calls 14037->14038 14039 7fe33381 14038->14039 14041 7fe33392 38 API calls 14039->14041 14040->14031 14043 7fe329f1 5 API calls 14040->14043 14042 7fe33386 14041->14042 14044 7fe31079 2 API calls 14042->14044 14043->14031 14045 7fe333b8 14044->14045 14046 7fe333c5 WSAStartup 14045->14046 14047 7fe3365e 14045->14047 14052 7fe333dd 14046->14052 14048 7fe333ee Sleep 14048->14052 14049 7fe33411 gethostbyname 14050 7fe3341c lstrlen 14049->14050 14049->14052 14050->14049 14050->14052 14051 7fe3344d socket 14051->14052 14053 7fe33462 connect 14051->14053 14052->14047 14052->14048 14052->14049 14052->14051 14054 7fe3363e closesocket 14052->14054 14055 7fe3364e Sleep 14052->14055 14061 7fe3360f Sleep 14052->14061 14053->14054 14058 7fe3347b 14053->14058 14054->14052 14055->14052 14056 7fe334ab GetVersionExA 14056->14058 14057 7fe33537 23 API calls 14057->14058 14058->14056 14058->14057 14059 7fe33565 23 API calls 14058->14059 14060 7fe3355d wsprintfA 14059->14060 14060->14052 14061->14052 14062 7fe3361b GetTickCount 14061->14062 14062->14052 14064 7fe3263f GetSystemDirectoryA 14063->14064 14064->14018 11780 4029e0 #4710 SendMessageA SendMessageA 11781 402a1b SetWindowLongA #6197 WinExec 11780->11781 11791 402ad0 lstrcpyA lstrcatA 11781->11791 11785 402a9d 11793 402b40 LoadLibraryA GetProcAddress 11785->11793 11786 402a6e 11788 402ab1 11788->11786 11815 402330 LoadLibraryA GetProcAddress 11788->11815 11792 402a68 11791->11792 11792->11785 11792->11786 11794 402c13 GetSystemDirectoryA strncmp 11793->11794 11795 402c55 11794->11795 11800 402d26 11794->11800 11819 403b40 GetTickCount rand 11795->11819 11797 402c5c 11820 403b40 GetTickCount rand 11797->11820 11799 402e2c 11799->11788 11800->11799 11805 402d8f GetLastError 11800->11805 11806 402d9c 11800->11806 11801 402c6a 11821 403b40 GetTickCount rand 11801->11821 11803 402c78 11822 403b40 GetTickCount rand 11803->11822 11805->11806 11806->11799 11810 402dd5 lstrcpyA lstrcatA 11806->11810 11807 402c86 11823 403b40 GetTickCount rand 11807->11823 11809 402c94 11824 403b40 GetTickCount rand 11809->11824 11813 402e0a lstrlenA 11810->11813 11812 402ca2 lstrcatA lstrcatA CopyFileA lstrcpyA 11812->11800 11813->11799 11816 4023d1 GetTempPathA lstrcatA MoveFileExA 11815->11816 11817 402420 ExitProcess 11816->11817 11818 402412 MoveFileExA 11816->11818 11818->11817 11819->11797 11820->11801 11821->11803 11822->11807 11823->11809 11824->11812 12717 4035e1 _exit 13715 7fe31141 GetProcAddress 14065 4027e2 14066 4027e6 14065->14066 14076 402500 EnumResourceNamesA 14066->14076 14068 4027eb 14069 402520 21 API calls 14068->14069 14070 402807 14069->14070 14071 401980 LoadLibraryA 14070->14071 14072 40280c 14071->14072 14077 4012b0 CreateThread 14072->14077 14074 40285c WaitForSingleObject CloseHandle 14075 402878 Sleep 14074->14075 14075->14072 14076->14068 14077->14074 12718 47c5e1 12721 47c608 12718->12721 12722 47c613 12721->12722 12723 47c5eb 12721->12723 12725 47c619 12722->12725 12726 478535 5 API calls 12725->12726 12727 47c62b 12726->12727 12727->12723 12728 47c5ee 12729 47c608 5 API calls 12728->12729 12730 47c5f8 12729->12730 14081 4037e9 14082 4037f4 14081->14082 14083 403920 9 API calls 14082->14083 14084 4037fe 14083->14084 12487 4040f0 12489 404115 12487->12489 12488 404144 ExitThread 12489->12488 12490 404138 Sleep 12489->12490 12490->12489 14089 47a3fc 14090 47740b NtAdjustPrivilegesToken 14089->14090 14091 47a402 14090->14091 13719 402e80 13720 402e90 13719->13720 13721 402f27 #2379 13720->13721 13722 402e98 #470 SendMessageA 13720->13722 13723 402ecb #755 13722->13723 13728 403e89 13729 403ebd 13728->13729 13730 403f1b 13729->13730 13738 403b40 GetTickCount rand 13729->13738 13732 403f3d 13739 403b40 GetTickCount rand 13732->13739 13734 403f4c 13735 403fa2 ExitThread 13734->13735 13736 403f9c Sleep 13734->13736 13736->13734 13738->13732 13739->13734 14092 7fe3042a 14093 7fe30436 14092->14093 14095 7fe30442 14093->14095 14096 7fe31079 2 API calls 14095->14096 14097 7fe304a4 14096->14097 14098 7fe304ec 14097->14098 14099 7fe304c5 GetModuleHandleA 14097->14099 14100 7fe30507 GetVersion 14098->14100 14099->14098 14101 7fe305d9 14100->14101 14102 7fe3051e VirtualAlloc 14100->14102 14103 7fe305b8 CloseHandle 14101->14103 14104 7fe305e2 SetThreadAffinityMask 14101->14104 14102->14103 14110 7fe30541 14102->14110 14107 7fe30601 GetModuleHandleA 14103->14107 14131 7fe30601 GetModuleHandleA 14104->14131 14109 7fe31079 2 API calls 14107->14109 14112 7fe3061d 14109->14112 14110->14103 14128 7fe305c9 14110->14128 14111 7fe3070b lstrcpyW 14150 7fe32425 lstrcpyW lstrlenW 14111->14150 14112->14103 14112->14111 14115 7fe30726 GetPEB lstrcpyW lstrcatW 14112->14115 14116 7fe30755 NtMapViewOfSection 14112->14116 14118 7fe30789 NtOpenProcessToken 14112->14118 14119 7fe307ce CreateToolhelp32Snapshot Process32First 14112->14119 14120 7fe307f4 Process32Next 14112->14120 14122 7fe30806 OpenProcess 14112->14122 14124 7fe324eb 5 API calls 14112->14124 14125 7fe30865 CloseHandle 14112->14125 14126 7fe3083d CreateRemoteThread 14112->14126 14127 7fe305c9 Sleep 14112->14127 14153 7fe307b5 14112->14153 14117 7fe32425 3 API calls 14115->14117 14116->14103 14116->14112 14117->14112 14118->14112 14118->14119 14119->14120 14120->14112 14121 7fe3086e CloseHandle 14120->14121 14121->14103 14122->14112 14122->14120 14124->14112 14125->14120 14126->14112 14126->14125 14127->14125 14129 7fe305d8 14128->14129 14130 7fe305ce Sleep 14128->14130 14129->14103 14130->14128 14132 7fe31079 2 API calls 14131->14132 14142 7fe3061d 14132->14142 14133 7fe305b8 CloseHandle 14133->14131 14134 7fe3070b lstrcpyW 14135 7fe32425 3 API calls 14134->14135 14135->14142 14136 7fe30726 GetPEB lstrcpyW lstrcatW 14138 7fe32425 3 API calls 14136->14138 14137 7fe30755 NtMapViewOfSection 14137->14133 14137->14142 14138->14142 14139 7fe30789 NtOpenProcessToken 14140 7fe307ce CreateToolhelp32Snapshot Process32First 14139->14140 14139->14142 14141 7fe307f4 Process32Next 14140->14141 14141->14142 14143 7fe3086e CloseHandle 14141->14143 14142->14133 14142->14134 14142->14136 14142->14137 14142->14139 14142->14140 14142->14141 14144 7fe30806 OpenProcess 14142->14144 14145 7fe307b5 30 API calls 14142->14145 14146 7fe324eb 5 API calls 14142->14146 14147 7fe30865 CloseHandle 14142->14147 14148 7fe3083d CreateRemoteThread 14142->14148 14149 7fe305c9 Sleep 14142->14149 14143->14133 14144->14141 14144->14142 14145->14142 14146->14142 14147->14141 14148->14142 14148->14147 14149->14147 14151 7fe360a7 14150->14151 14152 7fe32461 NtCreateSection 14151->14152 14152->14112 14175 7fe313c1 LookupPrivilegeValueA NtAdjustPrivilegesToken 14153->14175 14155 7fe307bb FreeLibrary CloseHandle 14156 7fe307ce CreateToolhelp32Snapshot Process32First 14155->14156 14157 7fe307f4 Process32Next 14156->14157 14158 7fe3086e CloseHandle 14157->14158 14174 7fe3061d 14157->14174 14160 7fe305b8 CloseHandle 14158->14160 14159 7fe30806 OpenProcess 14159->14157 14159->14174 14161 7fe30601 GetModuleHandleA 14160->14161 14163 7fe31079 2 API calls 14161->14163 14162 7fe324eb 5 API calls 14162->14174 14163->14174 14164 7fe30865 CloseHandle 14164->14157 14165 7fe3083d CreateRemoteThread 14165->14164 14165->14174 14166 7fe305c9 Sleep 14166->14164 14167 7fe3070b lstrcpyW 14168 7fe32425 3 API calls 14167->14168 14168->14174 14169 7fe30726 GetPEB lstrcpyW lstrcatW 14171 7fe32425 3 API calls 14169->14171 14170 7fe30755 NtMapViewOfSection 14170->14160 14170->14174 14171->14174 14172 7fe30789 NtOpenProcessToken 14172->14156 14172->14174 14173 7fe307b5 13 API calls 14173->14174 14174->14156 14174->14157 14174->14159 14174->14160 14174->14162 14174->14164 14174->14165 14174->14166 14174->14167 14174->14169 14174->14170 14174->14172 14174->14173 14175->14155 11993 40348f __set_app_type __p__fmode __p__commode 11994 4034fe 11993->11994 11995 403512 11994->11995 11996 403506 __setusermatherr 11994->11996 12005 403600 _controlfp 11995->12005 11996->11995 11998 403517 _initterm __getmainargs _initterm 11999 40356b GetStartupInfoA 11998->11999 12001 40359f GetModuleHandleA 11999->12001 12006 405b10 #1576 12001->12006 12004 4035c3 exit _XcptFilter 12005->11998 12006->12004 12496 402890 12497 4029b4 12496->12497 12498 4028a5 12496->12498 12498->12497 12499 402921 Sleep 12498->12499 12500 402973 Sleep 12498->12500 12501 4028ac Sleep 12498->12501 12505 40296f 12499->12505 12500->12497 12506 40291d 12501->12506 14179 476f97 14182 477061 14179->14182 14180 47711d 14181 4770f4 GetModuleHandleA GetProcAddress 14181->14182 14182->14180 14182->14181 13740 404a93 13742 404ad2 13740->13742 13741 404ea9 13742->13741 13752 403b40 GetTickCount rand 13742->13752 13744 404bcb 13753 403b40 GetTickCount rand 13744->13753 13746 404c0a 13754 403b40 GetTickCount rand 13746->13754 13748 404ea2 ExitThread 13749 403b40 GetTickCount rand 13750 404c2f 13749->13750 13750->13748 13750->13749 13751 404e95 Sleep 13750->13751 13751->13750 13752->13744 13753->13746 13754->13750 14183 6f13ba 14185 6f137f LookupPrivilegeValueA NtAdjustPrivilegesToken 14183->14185 12510 7fe33735 12515 7fe313c1 LookupPrivilegeValueA NtAdjustPrivilegesToken 12510->12515 12512 7fe3373b 12516 7fe33752 12512->12516 12515->12512 12521 7fe313c1 LookupPrivilegeValueA NtAdjustPrivilegesToken 12516->12521 12518 7fe33758 12522 7fe33775 12518->12522 12521->12518 12525 7fe313c1 LookupPrivilegeValueA NtAdjustPrivilegesToken 12522->12525 12524 7fe33740 12525->12524 13758 401e9c 13759 401ea9 lstrlenA 13758->13759 13774 401b79 13758->13774 13759->13774 13760 401c3e CloseHandle LoadLibraryA 13760->13774 13761 401820 GetProcAddress 13761->13774 13762 40222c 13763 402254 13762->13763 13764 40224d CloseHandle 13762->13764 13764->13763 13765 401c01 CloseHandle 13765->13774 13766 401e2a lstrcpynA lstrlenA lstrcpynA 13773 4015d0 CreateThread 13766->13773 13767 401d4e lstrcpynA 13771 401330 CreateThread 13767->13771 13768 401d9f lstrcpynA lstrlenA lstrcpynA 13772 4014f0 CreateThread 13768->13772 13769 401eff 6 API calls 13770 401f45 ReleaseMutex CloseHandle 13769->13770 13769->13774 13770->13774 13771->13774 13772->13774 13773->13774 13774->13760 13774->13761 13774->13762 13774->13765 13774->13766 13774->13767 13774->13768 13774->13769 13775 40206e lstrcatA LoadLibraryA GetProcAddress 13774->13775 13776 401f77 LoadLibraryA GetProcAddress 13774->13776 13777 4020af WinExec 13775->13777 13776->13774 13777->13774 11862 482cae 11863 482c67 11862->11863 11864 482c91 11863->11864 11865 482c7e CloseHandle 11863->11865 11865->11864 14189 4793a1 14190 4793a6 14189->14190 14191 479430 MapViewOfFile CloseHandle 14190->14191 14193 479401 NtOpenSection 14190->14193 14192 4795b4 14191->14192 14196 479471 14191->14196 14193->14192 14195 479420 NtQuerySystemInformation 14193->14195 14194 479478 UnmapViewOfFile 14194->14192 14195->14191 14196->14192 14196->14194 12529 6f3888 12531 6f388e GetSystemTime 12529->12531 12534 6f38d2 12531->12534 12532 6f390c Sleep 12532->12534 12533 6f3a32 12534->12532 12534->12533 12535 6f3954 gethostbyname 12534->12535 12538 6f3a1f closesocket 12534->12538 12535->12534 12536 6f397a socket 12535->12536 12536->12534 12537 6f3990 ioctlsocket connect Sleep 12536->12537 12537->12534 12538->12534 12752 4761ad 12754 4761b1 12752->12754 12753 476284 12754->12753 12756 47619e 12754->12756 12757 4761a8 12756->12757 12758 47c9a5 GetPEB 12757->12758 12759 47c9ff 12757->12759 12760 4763ee 63 API calls 12757->12760 12758->12757 12760->12758 11770 4010b0 #1134 11773 4011f0 #324 #1168 #1146 LoadIconA 11770->11773 11772 4010ed #2514 #641 11773->11772 14197 403fb1 14198 403fca 14197->14198 14199 40400f 14198->14199 14200 40402c GetTickCount 14198->14200 14206 403b40 GetTickCount rand 14200->14206 14202 40407d 14207 403b40 GetTickCount rand 14202->14207 14205 40408c ExitThread 14206->14202 14207->14205 12539 401cb5 12540 401ce5 CreateFileA 12539->12540 12543 401b79 12539->12543 12541 401d0b 12540->12541 12540->12543 12542 401d36 CloseHandle 12541->12542 12541->12543 12542->12543 12544 401c3e CloseHandle LoadLibraryA 12543->12544 12546 40222c 12543->12546 12549 401c01 CloseHandle 12543->12549 12550 401e2a lstrcpynA lstrlenA lstrcpynA 12543->12550 12551 401d4e lstrcpynA 12543->12551 12552 401d9f lstrcpynA lstrlenA lstrcpynA 12543->12552 12553 401eff 6 API calls 12543->12553 12558 40206e lstrcatA LoadLibraryA GetProcAddress 12543->12558 12559 401f77 LoadLibraryA GetProcAddress 12543->12559 12561 401820 GetProcAddress 12543->12561 12544->12543 12547 402254 12546->12547 12548 40224d CloseHandle 12546->12548 12548->12547 12549->12543 12575 4015d0 12550->12575 12563 401330 12551->12563 12569 4014f0 12552->12569 12553->12543 12554 401f45 ReleaseMutex CloseHandle 12553->12554 12554->12543 12560 4020af WinExec 12558->12560 12559->12543 12560->12543 12562 40183f 12561->12562 12562->12543 12564 401482 12563->12564 12566 40134c 12563->12566 12564->12543 12565 401471 12582 4012b0 CreateThread 12565->12582 12566->12565 12581 4012b0 CreateThread 12566->12581 12570 4015ac 12569->12570 12572 401510 12569->12572 12570->12543 12571 40159b 12583 4012b0 CreateThread 12571->12583 12572->12571 12574 4012b0 CreateThread 12572->12574 12574->12572 12576 401651 12575->12576 12578 401612 12575->12578 12576->12543 12577 401640 12585 4012b0 CreateThread 12577->12585 12578->12577 12584 4012b0 CreateThread 12578->12584 12581->12566 12582->12564 12583->12570 12584->12578 12585->12576

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 4763ee-476465 call 47708f 3 476467-47649c call 4786fd GetModuleHandleA 0->3 4 47649e 0->4 6 4764a5-4764ca call 478711 GetVersion 3->6 4->6 10 4764d0-4764f1 VirtualAlloc 6->10 11 47658b-476592 6->11 12 4764f3-476523 call 4762c6 10->12 13 47656a-4765d6 CloseHandle GetModuleHandleA call 47708f 10->13 11->13 14 476594-4765a8 SetProcessAffinityMask call 4765b3 11->14 12->13 26 476525-47653c 12->26 29 4765d8-4765f1 13->29 17 4765ad-4765bd 14->17 20 4765e2-4765f1 17->20 21 4765bf-4765dd 17->21 27 4765f3 20->27 28 4765fa-476613 20->28 21->20 26->13 34 47653e-476565 26->34 27->28 28->13 30 476619-476632 28->30 29->27 29->28 30->13 31 476638-476651 30->31 31->13 33 476657-47665d 31->33 35 47665f-476672 33->35 36 476699-47669f 33->36 34->13 46 476565 call 47657b 34->46 35->13 37 476678-47667e 35->37 38 4766a1-4766b4 36->38 39 4766bd-4766d6 lstrcpyW call 47846f 36->39 37->36 41 476680-476693 37->41 38->39 42 4766b6 38->42 47 47670d-476736 NtMapViewOfSection 39->47 48 4766d8-476707 GetPEB lstrcpyW lstrcatW call 47846f 39->48 41->13 41->36 42->39 46->13 47->13 49 47673c-476750 call 4762c6 NtOpenProcessToken 47->49 48->13 48->47 54 476786-47679d CreateToolhelp32Snapshot Process32First 49->54 55 476752-476764 call 47711e call 47676d 49->55 57 47679f-4767a8 54->57 71 476766 55->71 72 4767cf-4767d0 55->72 59 4767d1-4767d9 call 478535 57->59 60 4767aa 57->60 69 47681d-476824 CloseHandle 59->69 70 4767db-4767e1 59->70 63 4767ac-4767b6 Process32Next 60->63 66 476826-476833 CloseHandle 63->66 67 4767b8-4767bc 63->67 66->13 67->63 68 4767be-4767ce OpenProcess 67->68 68->63 68->72 69->63 70->69 73 4767e3-4767f3 70->73 71->59 74 476768-476776 71->74 72->59 73->69 75 4767f5-47680c CreateRemoteThread 73->75 74->57 76 476778-476785 74->76 75->69 77 47680e-476818 call 47657b 75->77 76->54 77->69
                                              APIs
                                              • GetModuleHandleA.KERNEL32(00000000,?), ref: 0047647F
                                              • GetVersion.KERNEL32 ref: 004764C1
                                              • VirtualAlloc.KERNEL32(00000000,000077C4,08001000,00000040), ref: 004764E9
                                              • CloseHandle.KERNEL32(?), ref: 0047656E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Handle$AllocCloseModuleVersionVirtual
                                              • String ID: \BaseNamedObjects\vdqtVt$\BaseNamedObjects\vdqtVt$csrs
                                              • API String ID: 3017432202-1320403132
                                              • Opcode ID: 8b4b9989ffec3ff2179909fafd33efe618d113b3788b376b09cf37aa3b332c1b
                                              • Instruction ID: b2214ec55225f7a82e0de8efb69309d9a098271a0192643b3b6eeede7f5d5e80
                                              • Opcode Fuzzy Hash: 8b4b9989ffec3ff2179909fafd33efe618d113b3788b376b09cf37aa3b332c1b
                                              • Instruction Fuzzy Hash: 8CB1DD31504609FFEB259F24C84ABEA3BAEEF44714F11802AE90D9E181C7F89F45DB19

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 79 6f042d-6f04a4 call 6f10ce 82 6f04dd 79->82 83 6f04a6-6f04db call 6f273c GetModuleHandleA 79->83 85 6f04e4-6f0509 call 6f2750 GetVersion 82->85 83->85 89 6f050f-6f0530 VirtualAlloc 85->89 90 6f05ca-6f05d1 85->90 91 6f05a9-6f05b3 CloseHandle 89->91 92 6f0532-6f0562 call 6f0305 89->92 90->91 93 6f05d3-6f05fc SetProcessAffinityMask call 6f05f2 90->93 91->90 92->91 106 6f0564-6f057b 92->106 98 6f05fe-6f061c 93->98 99 6f0621-6f0623 93->99 98->99 100 6f064c-6f0652 99->100 101 6f0625-6f0630 99->101 100->91 105 6f0658-6f0671 100->105 103 6f0639-6f0648 101->103 104 6f0632 101->104 103->100 104->103 105->91 107 6f0677-6f0690 105->107 106->91 110 6f057d-6f05a4 call 6f05ba 106->110 107->91 109 6f0696-6f069c 107->109 111 6f069e-6f06b1 109->111 112 6f06d8-6f06de 109->112 110->91 111->91 113 6f06b7-6f06bd 111->113 114 6f06fc-6f0715 lstrcpyW call 6f24ae 112->114 115 6f06e0-6f06f3 112->115 113->112 117 6f06bf-6f06d2 113->117 121 6f074c-6f0775 NtMapViewOfSection 114->121 122 6f0717-6f0746 GetPEB lstrcpyW lstrcatW call 6f24ae 114->122 115->114 118 6f06f5 115->118 117->91 117->112 118->114 121->91 125 6f077b-6f078f call 6f0305 NtOpenProcessToken 121->125 122->91 122->121 130 6f07c5-6f07e4 CreateToolhelp32Snapshot Process32First 125->130 131 6f0791-6f07a3 call 6f115d call 6f07ac 125->131 133 6f07eb-6f07f5 Process32Next 130->133 142 6f080e-6f080f 131->142 143 6f07a5 131->143 134 6f07f7-6f07fb 133->134 135 6f0865-6f0872 CloseHandle 133->135 134->133 137 6f07fd-6f080d OpenProcess 134->137 135->91 137->133 139 6f080f 137->139 141 6f0810-6f0818 call 6f2574 139->141 148 6f085c-6f0863 CloseHandle 141->148 149 6f081a-6f0820 141->149 142->141 143->141 145 6f07a7-6f07e4 CreateToolhelp32Snapshot Process32First 143->145 145->133 148->133 149->148 150 6f0822-6f0832 149->150 150->148 151 6f0834-6f084b CreateRemoteThread 150->151 151->148 152 6f084d-6f0857 call 6f05ba 151->152 152->148
                                              APIs
                                              • GetModuleHandleA.KERNEL32(00000000), ref: 006F04BE
                                              • GetVersion.KERNEL32 ref: 006F0500
                                              • VirtualAlloc.KERNEL32(00000000,000077C4,08001000,00000040), ref: 006F0528
                                              • CloseHandle.KERNELBASE(?), ref: 006F05AD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, Offset: 006F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6f0000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Handle$AllocCloseModuleVersionVirtual
                                              • String ID: \BaseNamedObjects\vdqtVt$\BaseNamedObjects\vdqtVt$csrs
                                              • API String ID: 3017432202-1320403132
                                              • Opcode ID: 8b4b9989ffec3ff2179909fafd33efe618d113b3788b376b09cf37aa3b332c1b
                                              • Instruction ID: b7e80f6b41d3972bc84599bf2e04bb2586e44e29e50e8907319ca1a3aa2665a7
                                              • Opcode Fuzzy Hash: 8b4b9989ffec3ff2179909fafd33efe618d113b3788b376b09cf37aa3b332c1b
                                              • Instruction Fuzzy Hash: 52B18E71505249FFFB21AF24C80ABFA3BAEEF45311F104128EA099E182C7F09F558B59

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 154 4765b3-4765c9 GetModuleHandleA 155 4765ca-4765d6 call 47708f 154->155 157 47656a-476574 CloseHandle 155->157 158 4765d8-4765f1 155->158 157->154 159 4765f3 158->159 160 4765fa-476613 158->160 159->160 160->157 161 476619-476632 160->161 161->157 162 476638-476651 161->162 162->157 163 476657-47665d 162->163 164 47665f-476672 163->164 165 476699-47669f 163->165 164->157 166 476678-47667e 164->166 167 4766a1-4766b4 165->167 168 4766bd-4766d6 lstrcpyW call 47846f 165->168 166->165 169 476680-476693 166->169 167->168 170 4766b6 167->170 173 47670d-476736 NtMapViewOfSection 168->173 174 4766d8-476707 GetPEB lstrcpyW lstrcatW call 47846f 168->174 169->157 169->165 170->168 173->157 175 47673c-476750 call 4762c6 NtOpenProcessToken 173->175 174->157 174->173 180 476786-47679d CreateToolhelp32Snapshot Process32First 175->180 181 476752-476757 call 47711e call 47676d 175->181 183 47679f-4767a8 180->183 191 47675c-476764 181->191 185 4767d1 call 478535 183->185 186 4767aa 183->186 190 4767d5-4767d9 185->190 189 4767ac-4767b6 Process32Next 186->189 192 476826-476833 CloseHandle 189->192 193 4767b8-4767bc 189->193 195 47681d-476824 CloseHandle 190->195 196 4767db-4767e1 190->196 197 476766 191->197 198 4767cf-4767d0 191->198 192->157 193->189 194 4767be-4767ce OpenProcess 193->194 194->189 194->198 195->189 196->195 199 4767e3-4767f3 196->199 197->185 200 476768-476776 197->200 198->185 199->195 201 4767f5-47680c CreateRemoteThread 199->201 200->183 202 476778-476785 200->202 201->195 203 47680e-476818 call 47657b 201->203 202->180 203->195
                                              APIs
                                              • CloseHandle.KERNEL32(?), ref: 0047656E
                                              • GetModuleHandleA.KERNEL32(004765AD), ref: 004765B3
                                              • lstrcpyW.KERNEL32(\BaseNamedObjects\vdqtVt,\BaseNamedObjects\vdqtVt,?,?,?,?), ref: 004766CB
                                              • lstrcpyW.KERNEL32(\BaseNamedObjects\vdqtVt,?), ref: 004766EE
                                              • lstrcatW.KERNEL32(\BaseNamedObjects\vdqtVt,\vdqtVt), ref: 004766FC
                                              • NtMapViewOfSection.NTDLL(00000000,000000FF,?,00000000,000077C4,00000000,?,00000002,00000000,00000040), ref: 0047672C
                                              • NtOpenProcessToken.NTDLL(000000FF,00000020), ref: 00476747
                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 0047678A
                                              • Process32First.KERNEL32 ref: 0047679D
                                              • Process32Next.KERNEL32 ref: 004767AE
                                              • OpenProcess.KERNEL32(0000002A,00000000,?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 004767C6
                                              • CreateRemoteThread.KERNEL32(?,00000000,00000000,-00003C38,00000002,00000000), ref: 00476803
                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 0047681E
                                              • CloseHandle.KERNEL32 ref: 0047682D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Handle$Close$CreateOpenProcessProcess32lstrcpy$FirstModuleNextRemoteSectionSnapshotThreadTokenToolhelp32Viewlstrcat
                                              • String ID: \BaseNamedObjects\vdqtVt$\BaseNamedObjects\vdqtVt$csrs
                                              • API String ID: 1545766225-1320403132
                                              • Opcode ID: c9f9a788b574020a046f2f8eb09419938f2a217e05aeedc795e489f146aaeb0c
                                              • Instruction ID: 356e14d9aa96dc34d10faba124a34068aed7816a61563f236a7792669a3c4cbc
                                              • Opcode Fuzzy Hash: c9f9a788b574020a046f2f8eb09419938f2a217e05aeedc795e489f146aaeb0c
                                              • Instruction Fuzzy Hash: 9C71BB31104605FFEB25AF10C84ABEA3B6EEF44758F12802AE80D9E191C7B99F05DA5D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 205 6f05f2-6f0615 GetModuleHandleA call 6f10ce 208 6f05a9-6f05b3 CloseHandle 205->208 209 6f0617-6f0630 205->209 213 6f05ca-6f05d1 208->213 210 6f0639-6f0648 209->210 211 6f0632 209->211 212 6f064c-6f0652 210->212 211->210 212->208 214 6f0658-6f0671 212->214 213->208 215 6f05d3-6f05fc SetProcessAffinityMask call 6f05f2 213->215 214->208 216 6f0677-6f0690 214->216 222 6f05fe-6f061c 215->222 223 6f0621-6f0623 215->223 216->208 218 6f0696-6f069c 216->218 220 6f069e-6f06b1 218->220 221 6f06d8-6f06de 218->221 220->208 225 6f06b7-6f06bd 220->225 226 6f06fc-6f0715 lstrcpyW call 6f24ae 221->226 227 6f06e0-6f06f3 221->227 222->223 223->212 224 6f0625-6f0630 223->224 224->210 224->211 225->221 228 6f06bf-6f06d2 225->228 232 6f074c-6f0775 NtMapViewOfSection 226->232 233 6f0717-6f0746 GetPEB lstrcpyW lstrcatW call 6f24ae 226->233 227->226 229 6f06f5 227->229 228->208 228->221 229->226 232->208 235 6f077b-6f078f call 6f0305 NtOpenProcessToken 232->235 233->208 233->232 239 6f07c5-6f07e4 CreateToolhelp32Snapshot Process32First 235->239 240 6f0791-6f07a3 call 6f115d call 6f07ac 235->240 242 6f07eb-6f07f5 Process32Next 239->242 251 6f080e-6f080f 240->251 252 6f07a5 240->252 243 6f07f7-6f07fb 242->243 244 6f0865-6f0872 CloseHandle 242->244 243->242 246 6f07fd-6f080d OpenProcess 243->246 244->208 246->242 248 6f080f 246->248 250 6f0810-6f0818 call 6f2574 248->250 257 6f085c-6f0863 CloseHandle 250->257 258 6f081a-6f0820 250->258 251->250 252->250 254 6f07a7-6f07e4 CreateToolhelp32Snapshot Process32First 252->254 254->242 257->242 258->257 259 6f0822-6f0832 258->259 259->257 260 6f0834-6f084b CreateRemoteThread 259->260 260->257 261 6f084d-6f0857 call 6f05ba 260->261 261->257
                                              APIs
                                              • CloseHandle.KERNELBASE(?), ref: 006F05AD
                                              • GetModuleHandleA.KERNEL32(006F05EC), ref: 006F05F2
                                              • lstrcpyW.KERNEL32(\BaseNamedObjects\vdqtVt,\BaseNamedObjects\vdqtVt,?,?,?,?), ref: 006F070A
                                              • lstrcpyW.KERNEL32(\BaseNamedObjects\vdqtVt,?), ref: 006F072D
                                              • lstrcatW.KERNEL32(\BaseNamedObjects\vdqtVt,\vdqtVt), ref: 006F073B
                                              • NtMapViewOfSection.NTDLL(00000000,000000FF,?,00000000,000077C4,00000000,?,00000002,00000000,00000040), ref: 006F076B
                                              • NtOpenProcessToken.NTDLL(000000FF,00000020), ref: 006F0786
                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 006F07C9
                                              • Process32First.KERNEL32 ref: 006F07DC
                                              • Process32Next.KERNEL32 ref: 006F07ED
                                              • OpenProcess.KERNEL32(0000002A,00000000,?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 006F0805
                                              • CreateRemoteThread.KERNELBASE(?,00000000,00000000,-00003C38,00000002,00000000), ref: 006F0842
                                              • CloseHandle.KERNELBASE(?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 006F085D
                                              • CloseHandle.KERNEL32 ref: 006F086C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, Offset: 006F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6f0000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Handle$Close$CreateOpenProcessProcess32lstrcpy$FirstModuleNextRemoteSectionSnapshotThreadTokenToolhelp32Viewlstrcat
                                              • String ID: \BaseNamedObjects\vdqtVt$\BaseNamedObjects\vdqtVt$csrs
                                              • API String ID: 1545766225-1320403132
                                              • Opcode ID: c9f9a788b574020a046f2f8eb09419938f2a217e05aeedc795e489f146aaeb0c
                                              • Instruction ID: 4e9b729cfaeb4f12e6412b01c5e0653b5e29cd41d3bf7b6abd92d35aaf52a3a7
                                              • Opcode Fuzzy Hash: c9f9a788b574020a046f2f8eb09419938f2a217e05aeedc795e489f146aaeb0c
                                              • Instruction Fuzzy Hash: 5D718B32505209FFEB21AF14CC4AABE3B6EEF45311F104068EE099E192C7F59F459B69

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 334 6f116f-6f1187 LoadLibraryA call 6f1196 337 6f1189 334->337 338 6f11f2 334->338 339 6f118b-6f1192 337->339 340 6f11f4-6f11f8 337->340 338->340 341 6f11f9-6f120f 339->341 342 6f1194-6f11a0 339->342 340->341 343 6f11ef 341->343 344 6f1211-6f1215 341->344 345 6f11c9-6f11d8 342->345 346 6f11a2-6f11b9 342->346 351 6f125f-6f126a 343->351 352 6f11f1 343->352 347 6f127f-6f1286 344->347 348 6f1216-6f121e 344->348 356 6f11bb-6f11c7 345->356 357 6f11da-6f11dc 345->357 346->356 353 6f1287-6f129e 347->353 354 6f11e0-6f11ec 348->354 355 6f1220-6f1230 348->355 358 6f126b-6f1272 351->358 352->338 365 6f129f-6f12a4 353->365 354->343 366 6f1237-6f123a 355->366 356->345 357->354 360 6f1273 358->360 360->348 364 6f1275 360->364 367 6f123c-6f125c 364->367 368 6f1277 364->368 369 6f12a7-6f12ad 365->369 366->367 367->351 370 6f130f-6f1311 369->370 371 6f12af-6f12b1 369->371 375 6f1303-6f1305 370->375 376 6f1313-6f1315 370->376 373 6f1323-6f1325 371->373 374 6f12b3-6f12b5 371->374 377 6f1357 373->377 378 6f1327-6f1329 373->378 374->366 379 6f12b7-6f12b9 374->379 375->353 380 6f1307-6f1309 375->380 376->378 381 6f1317-6f1319 376->381 384 6f135b-6f135d 377->384 385 6f137b 378->385 386 6f132b-6f1331 378->386 382 6f12bb-6f12bc 379->382 383 6f131b-6f131d 379->383 387 6f136b-6f136d 380->387 388 6f130b-6f130d 380->388 381->382 381->383 396 6f12bd 382->396 389 6f138f 383->389 390 6f131f-6f1321 383->390 391 6f13cf-6f13d1 384->391 392 6f135f-6f1361 384->392 397 6f137f-6f1382 385->397 386->375 393 6f1333-6f1335 386->393 394 6f133f-6f1341 387->394 395 6f136f-6f1375 387->395 388->365 388->370 407 6f1393-6f1396 389->407 390->373 398 6f1383-6f138e 390->398 401 6f1403-6f140a 391->401 402 6f13d3-6f13d5 391->402 399 6f1353-6f1355 392->399 400 6f1363-6f1367 392->400 403 6f12c7-6f12c9 393->403 404 6f1337-6f1339 393->404 394->407 408 6f1343 394->408 405 6f1347-6f1349 395->405 406 6f1377-6f1379 395->406 409 6f12ff-6f1301 396->409 410 6f12bf-6f12c1 396->410 397->398 398->389 399->377 399->406 400->387 419 6f142f-6f1474 LookupPrivilegeValueA NtAdjustPrivilegesToken 401->419 411 6f13e7 402->411 412 6f13d7-6f13e5 402->412 403->386 420 6f12cb-6f12cd 403->420 404->387 413 6f133b-6f133c 404->413 417 6f13bb-6f13c5 405->417 418 6f134b-6f134d 405->418 406->385 406->386 422 6f1397-6f13a1 407->422 414 6f133d 408->414 415 6f1345 408->415 409->375 409->393 410->360 416 6f12c3 410->416 426 6f13eb-6f13ed 411->426 412->411 432 6f13f7-6f13f9 412->432 413->414 414->390 414->394 415->380 415->405 416->396 427 6f12c5 416->427 423 6f13a7-6f13af 417->423 424 6f13c7-6f13c9 417->424 418->392 428 6f134f 418->428 420->409 429 6f12cf-6f12d1 420->429 430 6f13a3-6f13a6 422->430 423->417 424->426 431 6f13cb-6f13cd 424->431 426->397 433 6f13ef-6f13f5 426->433 427->369 427->403 428->399 429->375 434 6f12d3-6f12d5 429->434 430->423 431->391 431->419 432->426 436 6f13fb-6f1401 432->436 433->422 433->432 434->353 437 6f12d7-6f12d9 434->437 436->401 436->430 437->358 438 6f12db-6f12e1 437->438 439 6f12f3-6f12f5 438->439 440 6f12e3-6f12e9 438->440 439->380 442 6f12f7-6f12f9 439->442 440->384 441 6f12eb-6f12ed 440->441 441->429 443 6f12ef-6f12f1 441->443 442->384 444 6f12fb-6f12fd 442->444 443->439 443->440 444->347 444->409
                                              APIs
                                              • LoadLibraryA.KERNELBASE(006F1162,006F0796,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 006F116F
                                                • Part of subcall function 006F1196: GetProcAddress.KERNEL32(00000000,006F1180), ref: 006F1197
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, Offset: 006F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6f0000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: \vdqtVt
                                              • API String ID: 2574300362-4079102830
                                              • Opcode ID: d8ba3b69591c402f79a20eb3bdefb2c50bddf4c0cdf9a81ca726f874e9dd14bc
                                              • Instruction ID: 4878d350a6e4e9447f634a2a235d3ecd2eef6ff9bd0175d41d1164e66517ee44
                                              • Opcode Fuzzy Hash: d8ba3b69591c402f79a20eb3bdefb2c50bddf4c0cdf9a81ca726f874e9dd14bc
                                              • Instruction Fuzzy Hash: 40A1A923C58689DBC735AAB488954FE7FA3EB137D1708018ED7A18FB42C6A1DE478341

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 445 47846f-4784ef lstrcpyW lstrlenW call 47606f NtCreateSection
                                              APIs
                                              • lstrcpyW.KERNEL32(?,\BaseNamedObjects\vdqtVt), ref: 0047847B
                                              • lstrlenW.KERNEL32(?), ref: 00478482
                                              • NtCreateSection.NTDLL(?,0000000E,?,?,00000040,08000000,00000000), ref: 004784D7
                                              Strings
                                              • \BaseNamedObjects\vdqtVt, xrefs: 00478479
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CreateSectionlstrcpylstrlen
                                              • String ID: \BaseNamedObjects\vdqtVt
                                              • API String ID: 2597515329-3506632634
                                              • Opcode ID: 2f6cf96f82f790236297447ba5dc02a169e9e9b983f3ded4cb8cf908fcd29746
                                              • Instruction ID: f9603c71b26aefd643ab68b75b204eefc2f9b5c1b6412fedc899a5374ac3e62e
                                              • Opcode Fuzzy Hash: 2f6cf96f82f790236297447ba5dc02a169e9e9b983f3ded4cb8cf908fcd29746
                                              • Instruction Fuzzy Hash: B80181B0781344BAF7309B29CC4BF5B7929DF81B50F548558F608AE1C5DAB89A0483A9

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 451 6f252f-6f2573 NtOpenSection
                                              APIs
                                              • NtOpenSection.NTDLL(?,0000000E), ref: 006F255E
                                              Strings
                                              • \BaseNamedObjects\vdqtVt, xrefs: 006F254B
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, Offset: 006F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6f0000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: OpenSection
                                              • String ID: \BaseNamedObjects\vdqtVt
                                              • API String ID: 1950954290-3506632634
                                              • Opcode ID: 070b698a65d812778bebda462e03455ac2d4d74c25fc029a23958a9dd811b266
                                              • Instruction ID: cc492c20b74137972e1aeb42a549193fdcd5baff80c1f90c3202c4eb3a6ea2fd
                                              • Opcode Fuzzy Hash: 070b698a65d812778bebda462e03455ac2d4d74c25fc029a23958a9dd811b266
                                              • Instruction Fuzzy Hash: A1E0DFF1342105BAFB288B19CC07FB7220DCBC0600F048604F918DA090E6F4AF104278

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 452 6f2574-6f257c call 6f252f 455 6f2582-6f25b4 NtMapViewOfSection CloseHandle 452->455 456 6f2661-6f2664 452->456 455->456 457 6f25ba-6f25c0 455->457 458 6f25ce-6f25d8 457->458 459 6f25c2-6f25cb 457->459 460 6f25ef-6f262a call 6f2477 * 3 458->460 461 6f25da-6f25e2 458->461 459->458 470 6f262c-6f2632 call 6f2477 460->470 471 6f2637-6f263f 460->471 461->460 462 6f25e4-6f25ea call 6f2477 461->462 462->460 470->471 473 6f264c-6f2654 471->473 474 6f2641-6f2647 call 6f2477 471->474 473->456 475 6f2656-6f265c call 6f2477 473->475 474->473 475->456
                                              APIs
                                                • Part of subcall function 006F252F: NtOpenSection.NTDLL(?,0000000E), ref: 006F255E
                                              • NtMapViewOfSection.NTDLL(00000000,?,?,00000000,0000B7C4,00000000,?,00000002,00100000,00000040), ref: 006F25A4
                                              • CloseHandle.KERNELBASE(00000000,0000B7C4,00000000,?,00000002,00100000,00000040,00000000,0000B7C4,00000000,?,006F0815), ref: 006F25AC
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, Offset: 006F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6f0000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Section$CloseHandleOpenView
                                              • String ID:
                                              • API String ID: 2731707328-0
                                              • Opcode ID: 7e6d81ae67240a40e11905e7904a542b9946b97cc322a4af05470e0a41c17acf
                                              • Instruction ID: d6a2eb20d717170667e0730434efb86677d4db145f6e6a2ac42c7ae5f87b5801
                                              • Opcode Fuzzy Hash: 7e6d81ae67240a40e11905e7904a542b9946b97cc322a4af05470e0a41c17acf
                                              • Instruction Fuzzy Hash: E521097030054BABDB24DE25CCA6FB9776AAF80744F40011CFA198E294DBB1AE14CA18

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 478 6f1422-6f1474 LookupPrivilegeValueA NtAdjustPrivilegesToken
                                              APIs
                                              • LookupPrivilegeValueA.ADVAPI32(00000000,?,?,00000001,00000000,00000000,00000002), ref: 006F145A
                                              • NtAdjustPrivilegesToken.NTDLL(?,00000000,?,00000000,00000000,00000000,?,00000001,00000000,00000000,00000002), ref: 006F146A
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, Offset: 006F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6f0000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AdjustLookupPrivilegePrivilegesTokenValue
                                              • String ID:
                                              • API String ID: 3615134276-0
                                              • Opcode ID: 4d961b29825b6918877cf0b8ca3bbdf1a1a783037955428b050f6265267c3a26
                                              • Instruction ID: ddbff97e699881e74d61e2820170bd54818263a6fff0c1519b9bac5ac29647fb
                                              • Opcode Fuzzy Hash: 4d961b29825b6918877cf0b8ca3bbdf1a1a783037955428b050f6265267c3a26
                                              • Instruction Fuzzy Hash: 5BF0AE36542510BBD7205F56CD8EED77F28EF533A0F144556F4484E151C2624BA5D3F4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 480 6f2477-6f24ad NtProtectVirtualMemory NtWriteVirtualMemory
                                              APIs
                                              • NtProtectVirtualMemory.NTDLL(?,?,?,00000040), ref: 006F249B
                                              • NtWriteVirtualMemory.NTDLL ref: 006F24A4
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, Offset: 006F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6f0000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: MemoryVirtual$ProtectWrite
                                              • String ID:
                                              • API String ID: 151266762-0
                                              • Opcode ID: 3b89ad314080acfcfa5e752e4380cd5b7e8fc3aa7940f56e0bfe36a9f1ccff9c
                                              • Instruction ID: 6bbb67ea70d6ee96dfa5f1d7b4d314b28acc786a60d934acbd3f762ecc45b662
                                              • Opcode Fuzzy Hash: 3b89ad314080acfcfa5e752e4380cd5b7e8fc3aa7940f56e0bfe36a9f1ccff9c
                                              • Instruction Fuzzy Hash: 2AE012E07502007FF5185F55DC5FF7B391DDB41751F410208FA0A981C4F9A15E18467A

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 481 6f144a-6f1474 LookupPrivilegeValueA NtAdjustPrivilegesToken
                                              APIs
                                              • LookupPrivilegeValueA.ADVAPI32(00000000,?,?,00000001,00000000,00000000,00000002), ref: 006F145A
                                              • NtAdjustPrivilegesToken.NTDLL(?,00000000,?,00000000,00000000,00000000,?,00000001,00000000,00000000,00000002), ref: 006F146A
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, Offset: 006F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6f0000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AdjustLookupPrivilegePrivilegesTokenValue
                                              • String ID:
                                              • API String ID: 3615134276-0
                                              • Opcode ID: f45ad7484d04f34a0af0f423c52b42987f710650b5115a9fa6d287fad7b05342
                                              • Instruction ID: ee32c209e3d0a2de55b6acbdbca8a3d00d8b73f2470e3acbbab87dcaf3c2c19a
                                              • Opcode Fuzzy Hash: f45ad7484d04f34a0af0f423c52b42987f710650b5115a9fa6d287fad7b05342
                                              • Instruction Fuzzy Hash: F2D06731643034BBD6312A568C0EEE77D1DEF577A0F015041F9089A1A1C5A28EA1C7F5
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dce32db99ff61221dc63db72a842662bb1762c0249ad71179134b7609ba8ba76
                                              • Instruction ID: 7f4b830b71087d045bcc2c3395c932e405091f925b7f89d01d938c821fa498e2
                                              • Opcode Fuzzy Hash: dce32db99ff61221dc63db72a842662bb1762c0249ad71179134b7609ba8ba76
                                              • Instruction Fuzzy Hash: B901E5716049449BD290FA25C981AD9B767BF84318F22C24FE60C2B14BC779A542DA9A
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2017052696.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_7fe30000_hrl97BF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 18debca8f2dd2d1ca2f8adb3937bfd968cff8255c5041bfcf825438cbb2dca55
                                              • Instruction ID: 3e2e8e4e75e5df89517f36b07e5cfbc1557ccc8b6e57ea1444096323934d4e27
                                              • Opcode Fuzzy Hash: 18debca8f2dd2d1ca2f8adb3937bfd968cff8255c5041bfcf825438cbb2dca55
                                              • Instruction Fuzzy Hash:

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 263 4029e0-402a19 #4710 SendMessageA * 2 264 402a1b-402a1d 263->264 265 402a1f 263->265 266 402a22-402a63 SetWindowLongA #6197 WinExec call 402ad0 264->266 265->266 268 402a68-402a6c 266->268 269 402a9d-402abb call 402b40 268->269 270 402a6e-402a87 268->270 272 402a94-402a9c 269->272 274 402abd-402ac4 call 402330 ExitProcess 269->274 270->272
                                              APIs
                                              • #4710.MFC42 ref: 004029EA
                                              • SendMessageA.USER32(?,00000080,00000001,?), ref: 00402A04
                                              • SendMessageA.USER32(?,00000080,00000000,?), ref: 00402A15
                                              • SetWindowLongA.USER32(?,000000EC,00000080), ref: 00402A2A
                                              • #6197.MFC42(00000000,0000009C,0000009C,00000000,00000000,00000001), ref: 00402A3E
                                              • WinExec.KERNEL32(taskkill /f /im ZhuDongFangYu.exe /t,00000000), ref: 00402A5D
                                                • Part of subcall function 00402B40: LoadLibraryA.KERNEL32(kernel32.dll,00000047), ref: 00402BF5
                                                • Part of subcall function 00402B40: GetProcAddress.KERNEL32(00000000), ref: 00402BFC
                                                • Part of subcall function 00402B40: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00402C1F
                                                • Part of subcall function 00402B40: strncmp.MSVCRT ref: 00402C44
                                              • ExitProcess.KERNEL32 ref: 00402AC4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: MessageSend$#4710#6197AddressDirectoryExecExitLibraryLoadLongProcProcessSystemWindowstrncmp
                                              • String ID: 100200$100200$100200$taskkill /f /im ZhuDongFangYu.exe /t$|7@
                                              • API String ID: 3614577793-2301931671
                                              • Opcode ID: e673e02340e5bd4efe8e554bec7010853af1fda679b9e67aa24c048e2f3451a8
                                              • Instruction ID: 36d68f4db7c25d412b264195875051be24fd626328578f2d4964cd317598fecc
                                              • Opcode Fuzzy Hash: e673e02340e5bd4efe8e554bec7010853af1fda679b9e67aa24c048e2f3451a8
                                              • Instruction Fuzzy Hash: 6E11B4307407107BD730AB659E0AF5B77A8BB44B04F10462EFA85B72C1CFF8A8048A5C

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 277 6f07ac-6f07bf call 6f144a FreeLibrary CloseHandle 280 6f07c5-6f07e4 CreateToolhelp32Snapshot Process32First 277->280 281 6f07eb-6f07f5 Process32Next 280->281 282 6f07f7-6f07fb 281->282 283 6f0865-6f0872 CloseHandle 281->283 282->281 284 6f07fd-6f080d OpenProcess 282->284 285 6f05a9-6f05d1 CloseHandle 283->285 284->281 286 6f080f 284->286 290 6f05d3-6f05fc SetProcessAffinityMask call 6f05f2 285->290 287 6f0810-6f0818 call 6f2574 286->287 293 6f085c-6f0863 CloseHandle 287->293 294 6f081a-6f0820 287->294 297 6f05fe-6f061c 290->297 298 6f0621-6f0623 290->298 293->281 294->293 296 6f0822-6f0832 294->296 296->293 301 6f0834-6f084b CreateRemoteThread 296->301 297->298 299 6f064c-6f0652 298->299 300 6f0625-6f0630 298->300 299->285 304 6f0658-6f0671 299->304 302 6f0639-6f0648 300->302 303 6f0632 300->303 301->293 305 6f084d-6f0857 call 6f05ba 301->305 302->299 303->302 304->285 306 6f0677-6f0690 304->306 305->293 306->285 308 6f0696-6f069c 306->308 309 6f069e-6f06b1 308->309 310 6f06d8-6f06de 308->310 309->285 311 6f06b7-6f06bd 309->311 312 6f06fc-6f0715 lstrcpyW call 6f24ae 310->312 313 6f06e0-6f06f3 310->313 311->310 314 6f06bf-6f06d2 311->314 318 6f074c-6f0775 NtMapViewOfSection 312->318 319 6f0717-6f0746 GetPEB lstrcpyW lstrcatW call 6f24ae 312->319 313->312 315 6f06f5 313->315 314->285 314->310 315->312 318->285 321 6f077b-6f078f call 6f0305 NtOpenProcessToken 318->321 319->285 319->318 321->280 325 6f0791-6f07a3 call 6f115d call 6f07ac 321->325 330 6f080e-6f080f 325->330 331 6f07a5 325->331 330->287 331->287 332 6f07a7-6f07e4 CreateToolhelp32Snapshot Process32First 331->332 332->281
                                              APIs
                                                • Part of subcall function 006F144A: LookupPrivilegeValueA.ADVAPI32(00000000,?,?,00000001,00000000,00000000,00000002), ref: 006F145A
                                                • Part of subcall function 006F144A: NtAdjustPrivilegesToken.NTDLL(?,00000000,?,00000000,00000000,00000000,?,00000001,00000000,00000000,00000002), ref: 006F146A
                                              • CloseHandle.KERNELBASE(?), ref: 006F05AD
                                              • FreeLibrary.KERNELBASE(76DA0000,?,006F079B,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 006F07B8
                                              • CloseHandle.KERNELBASE(?,?,006F079B,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 006F07BF
                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 006F07C9
                                              • Process32First.KERNEL32 ref: 006F07DC
                                              • Process32Next.KERNEL32 ref: 006F07ED
                                              • OpenProcess.KERNEL32(0000002A,00000000,?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 006F0805
                                              • CreateRemoteThread.KERNELBASE(?,00000000,00000000,-00003C38,00000002,00000000), ref: 006F0842
                                              • CloseHandle.KERNELBASE(?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 006F085D
                                              • CloseHandle.KERNEL32 ref: 006F086C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, Offset: 006F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6f0000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CloseHandle$CreateProcess32$AdjustFirstFreeLibraryLookupNextOpenPrivilegePrivilegesProcessRemoteSnapshotThreadTokenToolhelp32Value
                                              • String ID: csrs
                                              • API String ID: 3908997113-2321902090
                                              • Opcode ID: 214ed8d877d5af5bdcbfeb92dfaf8d9be1786541dc830f75d8708442990ea625
                                              • Instruction ID: 1058b10a0c64bb4be2cb67b5c3713657345469ac657fbaf3bf18296eefa2c298
                                              • Opcode Fuzzy Hash: 214ed8d877d5af5bdcbfeb92dfaf8d9be1786541dc830f75d8708442990ea625
                                              • Instruction Fuzzy Hash: F6113031501209FBFB256F25CD49BBF3A6EEF45751F10006CFE4A99142C6B49F019A6A

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 448 4010b0-4011bf #1134 call 4011f0 #2514 #641
                                              APIs
                                              • #1134.MFC42(00000000), ref: 004010D0
                                                • Part of subcall function 004011F0: #324.MFC42(00000066,00000000,?,?,00000000,00405C38,000000FF,004010ED,00000000), ref: 00401214
                                                • Part of subcall function 004011F0: #1168.MFC42(00000066,00000000,?,?,00000000), ref: 00401227
                                                • Part of subcall function 004011F0: #1146.MFC42(00000080,0000000E,00000080,00000066,00000000,?,?,00000000), ref: 00401238
                                                • Part of subcall function 004011F0: LoadIconA.USER32(00000000,00000080), ref: 0040123E
                                              • #2514.MFC42(00000000), ref: 004010FD
                                              • #641.MFC42(00000000), ref: 004011AA
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: #1134#1146#1168#2514#324#641IconLoad
                                              • String ID:
                                              • API String ID: 684539369-0
                                              • Opcode ID: d0dbdc0e91b82d1144f430ae13d057aa2d360b1f2b28aa11f9f2600f3695659b
                                              • Instruction ID: e887a676387cd3a6316cff733c1d11cddbc99e07af3dfecb023e529bfa9dd79e
                                              • Opcode Fuzzy Hash: d0dbdc0e91b82d1144f430ae13d057aa2d360b1f2b28aa11f9f2600f3695659b
                                              • Instruction Fuzzy Hash: 07F09671854618EBC724EFA4CC42B9DB778FB05724F10033EE815A36C1EB785605CB85

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 482 405b10-405b25 #1576
                                              APIs
                                              • #1576.MFC42(004035C3,004035C3,004035C3,004035C3,004035C3,00000000,?,0000000A), ref: 00405B20
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: #1576
                                              • String ID:
                                              • API String ID: 1976119259-0
                                              • Opcode ID: 47d5a98b55b57ba85a66e84109f2227387a3d22cae08d4c422bb556fe884a3cf
                                              • Instruction ID: d2ca0a3b883f0518e56937479b7600124a2c67ba881e6fa747779e696d41ac8e
                                              • Opcode Fuzzy Hash: 47d5a98b55b57ba85a66e84109f2227387a3d22cae08d4c422bb556fe884a3cf
                                              • Instruction Fuzzy Hash: 36B0087601C786ABDB02DE91880192BBAA2BB98704F485C1DB2A1140A187768478EB16
                                              APIs
                                              • CloseHandle.KERNELBASE(00000004,CA1AE9E0,?,?,?,?,?,?,?,?,?,?,?,?,?,07704390), ref: 00482C82
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CloseHandle
                                              • String ID:
                                              • API String ID: 2962429428-0
                                              • Opcode ID: 2941891f3795c6f05a293b06209a9f50f08dfe53ecc95c981ceb5e51ef49c74a
                                              • Instruction ID: a1d831deead5511c42865662fe48a5713adfdc2882c533367e09d43fbcf8ea79
                                              • Opcode Fuzzy Hash: 2941891f3795c6f05a293b06209a9f50f08dfe53ecc95c981ceb5e51ef49c74a
                                              • Instruction Fuzzy Hash: 2621797A5056219FCB15FA19DA822EDB3E1FF41724B501D1FFA818B201C6A89E47C7CA
                                              APIs
                                              • CloseHandle.KERNELBASE(00000004,CA1AE9E0,?,?,?,?,?,?,?,?,?,?,?,?,?,07704390), ref: 00482C82
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CloseHandle
                                              • String ID:
                                              • API String ID: 2962429428-0
                                              • Opcode ID: 2ef6b8e0adac193261cfa0d2a5bee3fdbc2c21d07b809aa780d6ca7f1990f43e
                                              • Instruction ID: 91acae21fac1e4a6c4b2e5db99c7eb7ecfa0cfdef3ce7ae895fde2adf8682098
                                              • Opcode Fuzzy Hash: 2ef6b8e0adac193261cfa0d2a5bee3fdbc2c21d07b809aa780d6ca7f1990f43e
                                              • Instruction Fuzzy Hash: C3E0D8365246189ECA10BA59EE524DD77E1FEC1724B504E1BE581460419B142E4797CA
                                              APIs
                                              • Sleep.KERNELBASE(0000000A,006F085C,?,00000000,00000000,-00003C38,00000002,00000000,?,00000000), ref: 006F05C1
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, Offset: 006F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6f0000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Sleep
                                              • String ID:
                                              • API String ID: 3472027048-0
                                              • Opcode ID: 3c1f989dfd13240381299ec7adf5382b251643946d8aa86ca05208ab7bb78418
                                              • Instruction ID: 8e38509498ebbc421bcd9654a0d47e5d1dae4e12dcac8f1ca07d3f21ad76a767
                                              • Opcode Fuzzy Hash: 3c1f989dfd13240381299ec7adf5382b251643946d8aa86ca05208ab7bb78418
                                              • Instruction Fuzzy Hash: D3B0126824030895FA140960460DB2416267F00B11FE00059E7064C0C107E407011C09
                                              APIs
                                              • GetLocaleInfoW.KERNEL32(00000800,00000002,?,00000040,?,76F8F550,76F90BD0,00000072), ref: 00402F8B
                                              • GetComputerNameA.KERNEL32 ref: 00402FA2
                                              • lstrcpyA.KERNEL32(?,SOFTWARE\Microsoft\Windows NT\CurrentVersion), ref: 00402FBB
                                              • strstr.MSVCRT ref: 00403024
                                              • strstr.MSVCRT ref: 00403052
                                              • strstr.MSVCRT ref: 00403075
                                              • lstrcpyA.KERNEL32(?,Windows NT), ref: 00403114
                                              • lstrcpyA.KERNEL32(?,HARDWARE\DESCRIPTION\System\CentralProcessor\0), ref: 0040313D
                                              • GlobalMemoryStatusEx.KERNEL32(?), ref: 004031C5
                                              • lstrcpyA.KERNEL32(?,20108L), ref: 00403201
                                              • GetTickCount.KERNEL32 ref: 0040320C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$strstr$ComputerCountGlobalInfoLocaleMemoryNameStatusTick
                                              • String ID: "7@$%u MB$%u MHz$2000$2003$2008$20108L$47@$<6@$@$@$F7@$HARDWARE\DESCRIPTION\System\CentralProcessor\0$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion$Vista$Windows 2000$Windows 2003$Windows 2008$Windows 7$Windows NT$Windows Vista$Windows XP$~MHz
                                              • API String ID: 13981014-3306235746
                                              • Opcode ID: a7db7102705653c934fd47b61ca4cdcb3c0d92441ed082312b1d186f1afde4d2
                                              • Instruction ID: 8024c398b29a2f099fa7e41a4c2d81eb78002d16970cbed0a3e220c746c77202
                                              • Opcode Fuzzy Hash: a7db7102705653c934fd47b61ca4cdcb3c0d92441ed082312b1d186f1afde4d2
                                              • Instruction Fuzzy Hash: A7614170144305BFD710DF60DD45FAB7BA8AB88745F10493EF585B22D0EA78AA09CF6A
                                              APIs
                                              • GetWindowsDirectoryA.KERNEL32(020a00 . . :#a260b0403 +*,00000104), ref: 006F3CA1
                                              • GetProcAddress.KERNEL32(00000000,00000002), ref: 006F3CD4
                                              • GetProcAddress.KERNEL32(00000000,006F3D41), ref: 006F3D4C
                                              • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 006F3D5F
                                              • GetTickCount.KERNEL32 ref: 006F3D93
                                              • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,006F6EF6,00000000,00000000,00000000,00000000), ref: 006F3E65
                                              • GetModuleFileNameA.KERNEL32(00000000,020a00 . . :#a260b0403 +*,000000C8), ref: 006F3EE2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, Offset: 006F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6f0000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressProc$CountDirectoryFileInformationLibraryLoadModuleNameTickVolumeWindows
                                              • String ID: 020a00 . . :#a260b0403 +*$ADVAPI32.DLL$C:\WINDOWS\SYSTEM32\UXTHEME.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 1749273276-768470111
                                              • Opcode ID: f516923bb6111dac5ea2ce27cbf4c730b644d8035d3db586d383e9b78a19a3eb
                                              • Instruction ID: a0ba6e6d3bc113b69b1f5e1fc6d7d5f2fa4d3b84310b91c8d60555ba87f00ca7
                                              • Opcode Fuzzy Hash: f516923bb6111dac5ea2ce27cbf4c730b644d8035d3db586d383e9b78a19a3eb
                                              • Instruction Fuzzy Hash: 2F02F37140825CBFEB21AF248C5ABFA7BADEF41300F00451DEA499E282D7F45F4587A6
                                              APIs
                                              • GetModuleHandleA.KERNEL32(006F3CBA), ref: 006F3CC2
                                              • GetProcAddress.KERNEL32(00000000,00000002), ref: 006F3CD4
                                              • GetProcAddress.KERNEL32(00000000,006F3D41), ref: 006F3D4C
                                              • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 006F3D5F
                                              • GetTickCount.KERNEL32 ref: 006F3D93
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, Offset: 006F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6f0000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressProc$CountHandleLibraryLoadModuleTick
                                              • String ID: 020a00 . . :#a260b0403 +*$ADVAPI32.DLL$C:\WINDOWS\SYSTEM32\UXTHEME.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 2837544101-768470111
                                              • Opcode ID: 5b48797bfded511fe3541d43c5fd4cc9561b065424dfc698fabc9acd851576a7
                                              • Instruction ID: 74323f49a4952a38d974d29f5c6d413713b17415e41bb0d94119f0fa3e076ab2
                                              • Opcode Fuzzy Hash: 5b48797bfded511fe3541d43c5fd4cc9561b065424dfc698fabc9acd851576a7
                                              • Instruction Fuzzy Hash: 40E1017140825DBFEB25AF248C1ABFA7BADEF41300F00055DEE499E182DAF45F458BA5
                                              APIs
                                              • GetModuleHandleA.KERNEL32(006F3CE5), ref: 006F3CF0
                                              • GetSystemDirectoryA.KERNEL32(020a00 . . :#a260b0403 +*,00000104), ref: 006F3D07
                                                • Part of subcall function 006F3D1F: lstrcat.KERNEL32(020a00 . . :#a260b0403 +*,006F3D12), ref: 006F3D20
                                                • Part of subcall function 006F3D1F: GetProcAddress.KERNEL32(00000000,006F3D41), ref: 006F3D4C
                                                • Part of subcall function 006F3D1F: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 006F3D5F
                                                • Part of subcall function 006F3D1F: GetTickCount.KERNEL32 ref: 006F3D93
                                                • Part of subcall function 006F3D1F: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,006F6EF6,00000000,00000000,00000000,00000000), ref: 006F3E65
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, Offset: 006F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6f0000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressCountDirectoryHandleInformationLibraryLoadModuleProcSystemTickVolumelstrcat
                                              • String ID: 020a00 . . :#a260b0403 +*$ADVAPI32.DLL$C:\WINDOWS\SYSTEM32\UXTHEME.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 215653160-768470111
                                              • Opcode ID: 260c0d83971146764b612a54da98fff840ddc31a6bb3a69eed28180f54add843
                                              • Instruction ID: afb84019b8b68c6d7b9571909d73c13b4f8f17c51e37a8dbfd162ac52b490ac8
                                              • Opcode Fuzzy Hash: 260c0d83971146764b612a54da98fff840ddc31a6bb3a69eed28180f54add843
                                              • Instruction Fuzzy Hash: BFE1F07140825CBFEB25AF248C1ABFA7BADEF41300F00455DEA499E182DAF45F458BA5
                                              APIs
                                              • lstrcat.KERNEL32(020a00 . . :#a260b0403 +*,006F3D12), ref: 006F3D20
                                                • Part of subcall function 006F3D36: LoadLibraryA.KERNEL32(006F3D2B), ref: 006F3D36
                                                • Part of subcall function 006F3D36: GetProcAddress.KERNEL32(00000000,006F3D41), ref: 006F3D4C
                                                • Part of subcall function 006F3D36: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 006F3D5F
                                                • Part of subcall function 006F3D36: GetTickCount.KERNEL32 ref: 006F3D93
                                                • Part of subcall function 006F3D36: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,006F6EF6,00000000,00000000,00000000,00000000), ref: 006F3E65
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, Offset: 006F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6f0000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: LibraryLoad$AddressCountInformationProcTickVolumelstrcat
                                              • String ID: 020a00 . . :#a260b0403 +*$ADVAPI32.DLL$C:\WINDOWS\SYSTEM32\UXTHEME.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 2038497427-768470111
                                              • Opcode ID: 9a3d42354aede4d92b231a7e1a08d8f1ff67a071c39a48690dfdf21ca6a4930c
                                              • Instruction ID: 897467fe55107d2af7e259db4634c94d5a1fb076760bd355d1ee5ec32d6fdbdb
                                              • Opcode Fuzzy Hash: 9a3d42354aede4d92b231a7e1a08d8f1ff67a071c39a48690dfdf21ca6a4930c
                                              • Instruction Fuzzy Hash: 71E1F17150825CBFEB25AF248C1ABFA7BADEF41300F00055DEE499E282DAF45F458B65
                                              APIs
                                              • LoadLibraryA.KERNEL32(006F3D2B), ref: 006F3D36
                                                • Part of subcall function 006F3D4B: GetProcAddress.KERNEL32(00000000,006F3D41), ref: 006F3D4C
                                                • Part of subcall function 006F3D4B: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 006F3D5F
                                                • Part of subcall function 006F3D4B: GetTickCount.KERNEL32 ref: 006F3D93
                                                • Part of subcall function 006F3D4B: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,006F6EF6,00000000,00000000,00000000,00000000), ref: 006F3E65
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, Offset: 006F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6f0000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: LibraryLoad$AddressCountInformationProcTickVolume
                                              • String ID: 020a00 . . :#a260b0403 +*$ADVAPI32.DLL$C:\WINDOWS\SYSTEM32\UXTHEME.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 3734769084-768470111
                                              • Opcode ID: fe378de023044d5e93c1fdb9f401057012e9a432939cf19daad1b95bd79d3ac1
                                              • Instruction ID: 5f572ada8208eda2f220439245cc3a9091fbb70ae7d8e7fdfd2c472bc6c06283
                                              • Opcode Fuzzy Hash: fe378de023044d5e93c1fdb9f401057012e9a432939cf19daad1b95bd79d3ac1
                                              • Instruction Fuzzy Hash: D4D1E17140425DBFEB25AF24CC1ABFA7BAEEF41300F000559EE499E282DAF45F458B65
                                              APIs
                                              • GetProcAddress.KERNEL32(00000000,006F3D41), ref: 006F3D4C
                                              • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 006F3D5F
                                              • GetTickCount.KERNEL32 ref: 006F3D93
                                              • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,006F6EF6,00000000,00000000,00000000,00000000), ref: 006F3E65
                                              • GetModuleFileNameA.KERNEL32(00000000,020a00 . . :#a260b0403 +*,000000C8), ref: 006F3EE2
                                              • wsprintfA.USER32 ref: 006F3EF7
                                              • CreateThread.KERNEL32(00000000,00000000,006F3691,00000000,00000000), ref: 006F3F40
                                              • CloseHandle.KERNEL32(?,1C567C50), ref: 006F3F49
                                              • CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 006F3FE9
                                              • CloseHandle.KERNEL32(?,00000000), ref: 006F3FF2
                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 006F3FFF
                                              • socket.WS2_32(00000002,00000001,00000000), ref: 006F4097
                                              • connect.WS2_32(6F6C6902,006F3B09,00000010), ref: 006F40B1
                                              • GetVersionExA.KERNEL32(?,?,00000000), ref: 006F40FB
                                              • wsprintfA.USER32 ref: 006F4179
                                              • SetEvent.KERNEL32(0000040C,?,00000000), ref: 006F42D6
                                              • Sleep.KERNEL32(00007530,?,00000000), ref: 006F42F7
                                              • ResetEvent.KERNEL32(0000040C,?,00000000), ref: 006F430A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, Offset: 006F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6f0000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CreateEvent$CloseHandleThreadwsprintf$AddressCountFileInformationLibraryLoadModuleNameProcResetSleepTickVersionVolumeconnectsocket
                                              • String ID: 020a00 . . :#a260b0403 +*$ADVAPI32.DLL$C:\WINDOWS\SYSTEM32\UXTHEME.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 1567941233-768470111
                                              • Opcode ID: d164329b401e47e84a28de3fe606969c9cc020fa4a70ab4836cae6f21abb50e9
                                              • Instruction ID: a2306eb45bd12b3cf1f31dae531ea834411e708a2c53df72f2c5be9407347413
                                              • Opcode Fuzzy Hash: d164329b401e47e84a28de3fe606969c9cc020fa4a70ab4836cae6f21abb50e9
                                              • Instruction Fuzzy Hash: 67E1DF7150825CBEEB25AF248C1ABFA7BAEEF41300F000559EE499E282D6F45F45CB65
                                              APIs
                                              • GetModuleHandleA.KERNEL32(00000000), ref: 7FE304CD
                                              • GetVersion.KERNEL32 ref: 7FE3050F
                                              • VirtualAlloc.KERNEL32(00000000,000065A4,08001000,00000040), ref: 7FE30537
                                              • CloseHandle.KERNEL32(?), ref: 7FE305BC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2017052696.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_7fe30000_hrl97BF.jbxd
                                              Similarity
                                              • API ID: Handle$AllocCloseModuleVersionVirtual
                                              • String ID: "'3$\BaseNamedObjects\rnxtVt$\BaseNamedObjects\rnxtVt$csrs
                                              • API String ID: 3017432202-1649617
                                              • Opcode ID: 7ac06902b526b320f932b07ff4c1ff8a544c7f655dd6fa859a553a943bad6a44
                                              • Instruction ID: bf6e148d40060bb9ff3a14a9286da860fd85a46fac5c7d6c15dd231958de371b
                                              • Opcode Fuzzy Hash: 7ac06902b526b320f932b07ff4c1ff8a544c7f655dd6fa859a553a943bad6a44
                                              • Instruction Fuzzy Hash: 95B16C31A05359FFEB619F20C809BED3BADEF4571AF900024EA0A9E181C7F1AB45CB55
                                              APIs
                                              • GetWindowsDirectoryA.KERNEL32(0047CA63,00000104), ref: 00479C62
                                              • GetProcAddress.KERNEL32(00000000,00000002), ref: 00479C95
                                              • GetProcAddress.KERNEL32(00000000,00479D02), ref: 00479D0D
                                              • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 00479D20
                                              • GetTickCount.KERNEL32 ref: 00479D54
                                              • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,0047CEB7,00000000,00000000,00000000,00000000), ref: 00479E26
                                              • GetModuleFileNameA.KERNEL32(00000000,0047CA63,000000C8), ref: 00479EA3
                                              Strings
                                              • ADVAPI32.DLL, xrefs: 00479D1F
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 00479ECD
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressProc$CountDirectoryFileInformationLibraryLoadModuleNameTickVolumeWindows
                                              • String ID: ADVAPI32.DLL$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 1749273276-2287716718
                                              • Opcode ID: f516923bb6111dac5ea2ce27cbf4c730b644d8035d3db586d383e9b78a19a3eb
                                              • Instruction ID: 0caf1512084f6909fe528e66500acd055b66b89cdc83cc9e9e8307c4290dc43c
                                              • Opcode Fuzzy Hash: f516923bb6111dac5ea2ce27cbf4c730b644d8035d3db586d383e9b78a19a3eb
                                              • Instruction Fuzzy Hash: 0302E471404248BFEB259F248C4ABEE3BACEF41314F04855EE94D9E182D6F85F45C7AA
                                              APIs
                                              • GetModuleHandleA.KERNEL32(00479C7B), ref: 00479C83
                                              • GetProcAddress.KERNEL32(00000000,00000002), ref: 00479C95
                                              • GetProcAddress.KERNEL32(00000000,00479D02), ref: 00479D0D
                                              • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 00479D20
                                              • GetTickCount.KERNEL32 ref: 00479D54
                                              Strings
                                              • ADVAPI32.DLL, xrefs: 00479D1F
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 00479ECD
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressProc$CountHandleLibraryLoadModuleTick
                                              • String ID: ADVAPI32.DLL$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 2837544101-2287716718
                                              • Opcode ID: 5b48797bfded511fe3541d43c5fd4cc9561b065424dfc698fabc9acd851576a7
                                              • Instruction ID: 2f53435e3539b5d7e81d95cbd58ad28af70cc7b35d97f5c79fd88c53db660623
                                              • Opcode Fuzzy Hash: 5b48797bfded511fe3541d43c5fd4cc9561b065424dfc698fabc9acd851576a7
                                              • Instruction Fuzzy Hash: 73E1E471408248BFEB259F248C4ABEE7B6CEF41304F04855EE94D9E182D6F85F45C7AA
                                              APIs
                                              • GetModuleHandleA.KERNEL32(00479CA6), ref: 00479CB1
                                              • GetSystemDirectoryA.KERNEL32(0047CA63,00000104), ref: 00479CC8
                                                • Part of subcall function 00479CE0: lstrcatA.KERNEL32(0047CA63,00479CD3), ref: 00479CE1
                                                • Part of subcall function 00479CE0: GetProcAddress.KERNEL32(00000000,00479D02), ref: 00479D0D
                                                • Part of subcall function 00479CE0: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 00479D20
                                                • Part of subcall function 00479CE0: GetTickCount.KERNEL32 ref: 00479D54
                                                • Part of subcall function 00479CE0: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,0047CEB7,00000000,00000000,00000000,00000000), ref: 00479E26
                                              Strings
                                              • ADVAPI32.DLL, xrefs: 00479D1F
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 00479ECD
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressCountDirectoryHandleInformationLibraryLoadModuleProcSystemTickVolumelstrcat
                                              • String ID: ADVAPI32.DLL$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 215653160-2287716718
                                              • Opcode ID: 260c0d83971146764b612a54da98fff840ddc31a6bb3a69eed28180f54add843
                                              • Instruction ID: 30c04978753a016f3c63a52301ede1388b25670dbe57c9ea942064ea3509f5f8
                                              • Opcode Fuzzy Hash: 260c0d83971146764b612a54da98fff840ddc31a6bb3a69eed28180f54add843
                                              • Instruction Fuzzy Hash: D7E1D071408248BFEB259F248C4ABEE3B6CEF41314F04855EE94D9E182D6F85F45C7AA
                                              APIs
                                              • lstrcatA.KERNEL32(0047CA63,00479CD3), ref: 00479CE1
                                                • Part of subcall function 00479CF7: LoadLibraryA.KERNEL32(00479CEC), ref: 00479CF7
                                                • Part of subcall function 00479CF7: GetProcAddress.KERNEL32(00000000,00479D02), ref: 00479D0D
                                                • Part of subcall function 00479CF7: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 00479D20
                                                • Part of subcall function 00479CF7: GetTickCount.KERNEL32 ref: 00479D54
                                                • Part of subcall function 00479CF7: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,0047CEB7,00000000,00000000,00000000,00000000), ref: 00479E26
                                              Strings
                                              • ADVAPI32.DLL, xrefs: 00479D1F
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 00479ECD
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: LibraryLoad$AddressCountInformationProcTickVolumelstrcat
                                              • String ID: ADVAPI32.DLL$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 2038497427-2287716718
                                              • Opcode ID: 9a3d42354aede4d92b231a7e1a08d8f1ff67a071c39a48690dfdf21ca6a4930c
                                              • Instruction ID: 6dc48965cf2990a963407d4f576ca4f73e3c7876e142d36eef1b9abd61760eb0
                                              • Opcode Fuzzy Hash: 9a3d42354aede4d92b231a7e1a08d8f1ff67a071c39a48690dfdf21ca6a4930c
                                              • Instruction Fuzzy Hash: C8E1C171404258BFEB259F248C4ABEE3B6CEF41304F04855AED4D9E182D6F85F45C7AA
                                              APIs
                                              • LoadLibraryA.KERNEL32(00479CEC), ref: 00479CF7
                                                • Part of subcall function 00479D0C: GetProcAddress.KERNEL32(00000000,00479D02), ref: 00479D0D
                                                • Part of subcall function 00479D0C: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 00479D20
                                                • Part of subcall function 00479D0C: GetTickCount.KERNEL32 ref: 00479D54
                                                • Part of subcall function 00479D0C: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,0047CEB7,00000000,00000000,00000000,00000000), ref: 00479E26
                                              Strings
                                              • ADVAPI32.DLL, xrefs: 00479D1F
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 00479ECD
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: LibraryLoad$AddressCountInformationProcTickVolume
                                              • String ID: ADVAPI32.DLL$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 3734769084-2287716718
                                              • Opcode ID: fe378de023044d5e93c1fdb9f401057012e9a432939cf19daad1b95bd79d3ac1
                                              • Instruction ID: 48ae7902ae7b0b59e0d321cd5551fc31945c41aab3136f9e629bcba434893ca6
                                              • Opcode Fuzzy Hash: fe378de023044d5e93c1fdb9f401057012e9a432939cf19daad1b95bd79d3ac1
                                              • Instruction Fuzzy Hash: FED1C071404248BFEB35AF248C4ABEE3BACEF41314F04855AE94D9E182D6F85F45C76A
                                              APIs
                                              • CloseHandle.KERNEL32(?), ref: 7FE305BC
                                              • GetModuleHandleA.KERNEL32(7FE305FB), ref: 7FE30601
                                              • lstrcpyW.KERNEL32(\BaseNamedObjects\rnxtVt,\BaseNamedObjects\rnxtVt,?,?,?,?), ref: 7FE30719
                                              • lstrcpyW.KERNEL32(\BaseNamedObjects\rnxtVt,?), ref: 7FE30736
                                              • lstrcatW.KERNEL32(\BaseNamedObjects\rnxtVt,\rnxtVt), ref: 7FE30744
                                              • NtMapViewOfSection.NTDLL(00000000,000000FF,?,00000000,000065A4,00000000,?,00000002,00000000,00000040), ref: 7FE30774
                                              • NtOpenProcessToken.NTDLL(000000FF,00000020), ref: 7FE3078F
                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,000065A4,00000000,?,00000002,00000000,00000040,00000000,000065A4), ref: 7FE307D2
                                              • Process32First.KERNEL32 ref: 7FE307E5
                                              • Process32Next.KERNEL32 ref: 7FE307F6
                                              • OpenProcess.KERNEL32(0000002A,00000000,?,?,?,?,?,?,00000002,00000000,00000040,00000000,000065A4), ref: 7FE3080E
                                              • CreateRemoteThread.KERNEL32(?,00000000,00000000,-00002FC3,00000002,00000000), ref: 7FE3084B
                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,00000002,00000000,00000040,00000000,000065A4), ref: 7FE30866
                                              • CloseHandle.KERNEL32 ref: 7FE30875
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2017052696.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_7fe30000_hrl97BF.jbxd
                                              Similarity
                                              • API ID: Handle$Close$CreateOpenProcessProcess32lstrcpy$FirstModuleNextRemoteSectionSnapshotThreadTokenToolhelp32Viewlstrcat
                                              • String ID: \BaseNamedObjects\rnxtVt$\BaseNamedObjects\rnxtVt$csrs
                                              • API String ID: 1545766225-676502312
                                              • Opcode ID: dcfbda88c1452e16d26fd376d2d59b1fd8c40ae983f26fda525faf50f22b961d
                                              • Instruction ID: 4034ee1ac34cf344d60b1b743f91cb73119df433e2ee071f6ee9a8f8d678e866
                                              • Opcode Fuzzy Hash: dcfbda88c1452e16d26fd376d2d59b1fd8c40ae983f26fda525faf50f22b961d
                                              • Instruction Fuzzy Hash: 0961BD31A05209FFDB619F10C84DBEE3B6EEF45719F904068EA0A9E590C7B1AF05CB95
                                              APIs
                                              • GetProcAddress.KERNEL32(00000000,00479D02), ref: 00479D0D
                                              • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 00479D20
                                              • GetTickCount.KERNEL32 ref: 00479D54
                                              • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,0047CEB7,00000000,00000000,00000000,00000000), ref: 00479E26
                                              • GetModuleFileNameA.KERNEL32(00000000,0047CA63,000000C8), ref: 00479EA3
                                              • CreateThread.KERNEL32(00000000,00000000,00479652,00000000,00000000), ref: 00479F01
                                              • CloseHandle.KERNEL32(?,1C567C50), ref: 00479F0A
                                              • CreateThread.KERNEL32(00000000,00000000,Function_00079849,00000000,00000000), ref: 00479FAA
                                              • CloseHandle.KERNEL32(?,00000000), ref: 00479FB3
                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 00479FC0
                                              • GetVersionExA.KERNEL32(?,?,00000000), ref: 0047A0BC
                                              • SetEvent.KERNEL32(D8533D84,?,00000000), ref: 0047A297
                                              • Sleep.KERNEL32(00007530,?,00000000), ref: 0047A2B8
                                              • ResetEvent.KERNEL32(D8533D84,?,00000000), ref: 0047A2CB
                                              Strings
                                              • ADVAPI32.DLL, xrefs: 00479D1F
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 00479ECD
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CreateEvent$CloseHandleThread$AddressCountFileInformationLibraryLoadModuleNameProcResetSleepTickVersionVolume
                                              • String ID: ADVAPI32.DLL$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 1484325168-2287716718
                                              • Opcode ID: d164329b401e47e84a28de3fe606969c9cc020fa4a70ab4836cae6f21abb50e9
                                              • Instruction ID: 0348aa8a99f5bb58e09168000f3f21ed7fdb8f68e561c110e3aa2a240045ceba
                                              • Opcode Fuzzy Hash: d164329b401e47e84a28de3fe606969c9cc020fa4a70ab4836cae6f21abb50e9
                                              • Instruction Fuzzy Hash: 0AE1D071404248BEEB259F248C4ABEE3BACEF41304F04855AED4D9E182D6F85F45C7AA
                                              APIs
                                              • lstrlen.KERNEL32(ilo.brenz.pl,?,00000000), ref: 006F4057
                                              • gethostbyname.WS2_32(ilo.brenz.pl), ref: 006F4066
                                              • socket.WS2_32(00000002,00000001,00000000), ref: 006F4097
                                              • connect.WS2_32(6F6C6902,006F3B09,00000010), ref: 006F40B1
                                              • GetVersionExA.KERNEL32(?,?,00000000), ref: 006F40FB
                                              • wsprintfA.USER32 ref: 006F4179
                                              • CreateThread.KERNEL32(00000000,00000000,Function_00003819,6F6C6902,00000000), ref: 006F41B4
                                              • CloseHandle.KERNEL32(?,00000000,6F6C6902,006F6AA2,00000000,00000000), ref: 006F41BD
                                              • GetTickCount.KERNEL32 ref: 006F41F6
                                              • Sleep.KERNEL32(00000064,?,00000000,6F6C6902,006F6AA2,00000000,00000000), ref: 006F428B
                                              • GetTickCount.KERNEL32 ref: 006F4294
                                              • closesocket.WS2_32(6F6C6902), ref: 006F42B8
                                              • SetEvent.KERNEL32(0000040C,?,00000000), ref: 006F42D6
                                              • Sleep.KERNEL32(00007530,?,00000000), ref: 006F42F7
                                              • ResetEvent.KERNEL32(0000040C,?,00000000), ref: 006F430A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, Offset: 006F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6f0000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CountEventSleepTick$CloseCreateHandleResetThreadVersionclosesocketconnectgethostbynamelstrlensocketwsprintf
                                              • String ID: 020a00 . . :#a260b0403 +*$C:\WINDOWS\SYSTEM32\UXTHEME.DLL
                                              • API String ID: 883794535-3907549323
                                              • Opcode ID: 6b0defe1960dce2cb68afb5d2726ae1425874940fd6c70606eed0c1c35355a33
                                              • Instruction ID: 86cc7e95a19332fe17394f2d4ad78c93938a12d4de23f7b66e6e8b95850826cc
                                              • Opcode Fuzzy Hash: 6b0defe1960dce2cb68afb5d2726ae1425874940fd6c70606eed0c1c35355a33
                                              • Instruction Fuzzy Hash: 0F71DC7150825DBAEB219F38881D7FE7BAEAF41310F040518EA5A9E681CBF45F41C765
                                              APIs
                                              • FindResourceA.KERNEL32(?,?,?), ref: 0040244F
                                              • LoadLibraryA.KERNEL32(kernel32.dll,SizeofResource), ref: 00402461
                                              • GetProcAddress.KERNEL32(00000000), ref: 00402468
                                              • LoadResource.KERNEL32(?,00000000), ref: 0040247A
                                              • LockResource.KERNEL32(00000000), ref: 00402489
                                              • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000), ref: 004024BD
                                              • WriteFile.KERNEL32 ref: 004024DC
                                              • CloseHandle.KERNEL32(00000000), ref: 004024E3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Resource$FileLoad$AddressCloseCreateFindHandleLibraryLockProcWrite
                                              • String ID: <6@$SizeofResource$hra%u.dll$kernel32.dll
                                              • API String ID: 2921964263-2374908272
                                              • Opcode ID: 8a57ef22dd47a814e705dbe9eb76e98e586b3eddb95431373c2ff637a7035f3e
                                              • Instruction ID: 298c1543b4fc4cf1b22406217ce591795a308af8d218835589389581325cd5cf
                                              • Opcode Fuzzy Hash: 8a57ef22dd47a814e705dbe9eb76e98e586b3eddb95431373c2ff637a7035f3e
                                              • Instruction Fuzzy Hash: 9211E9321803007BE2309B659E4DFAB7BACDF85B10F054439FA42F21D0DBB9981586B9
                                              APIs
                                              • lstrlenA.KERNEL32(ilo.brenz.pl,?,00000000), ref: 0047A018
                                              • GetVersionExA.KERNEL32(?,?,00000000), ref: 0047A0BC
                                              • CreateThread.KERNEL32(00000000,00000000,Function_000797DA,6F6C6902,00000000), ref: 0047A175
                                              • CloseHandle.KERNEL32(?,00000000,6F6C6902,0047CA63,00000000,00000000), ref: 0047A17E
                                              • GetTickCount.KERNEL32 ref: 0047A1B7
                                              • Sleep.KERNEL32(00000064,?,00000000,6F6C6902,0047CA63,00000000,00000000), ref: 0047A24C
                                              • GetTickCount.KERNEL32 ref: 0047A255
                                              • SetEvent.KERNEL32(D8533D84,?,00000000), ref: 0047A297
                                              • Sleep.KERNEL32(00007530,?,00000000), ref: 0047A2B8
                                              • ResetEvent.KERNEL32(D8533D84,?,00000000), ref: 0047A2CB
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CountEventSleepTick$CloseCreateHandleResetThreadVersionlstrlen
                                              • String ID:
                                              • API String ID: 1413472813-0
                                              • Opcode ID: 6b0defe1960dce2cb68afb5d2726ae1425874940fd6c70606eed0c1c35355a33
                                              • Instruction ID: 712269dbb71542e792dbdf9b15f3e06072d30830e5a6359557f50b1fe95982d4
                                              • Opcode Fuzzy Hash: 6b0defe1960dce2cb68afb5d2726ae1425874940fd6c70606eed0c1c35355a33
                                              • Instruction Fuzzy Hash: 5971EE31508248BAEB259F34881D7DE7BADEF81304F14864AE85E9E282C7F85F51C75A
                                              APIs
                                              • NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 7FE32A36
                                              • NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 7FE32A55
                                              • MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 7FE32A7F
                                              • CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 7FE32A8C
                                              • UnmapViewOfFile.KERNEL32(?), ref: 7FE32AA4
                                              Strings
                                              • C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1, xrefs: 7FE32A00
                                              • \Device\PhysicalMemory, xrefs: 7FE329CC
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2017052696.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_7fe30000_hrl97BF.jbxd
                                              Similarity
                                              • API ID: FileView$CloseHandleInformationOpenQuerySectionSystemUnmap
                                              • String ID: C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$\Device\PhysicalMemory
                                              • API String ID: 2985292042-3938670448
                                              • Opcode ID: f5b742b9587cdac67e2bb23952e5644605ce90bf8b7d29b5e49f46c6b19350d7
                                              • Instruction ID: f784499129cf61d4ff85df333bf3b76779e152c7d281c3d08bc0d42cf97a2f12
                                              • Opcode Fuzzy Hash: f5b742b9587cdac67e2bb23952e5644605ce90bf8b7d29b5e49f46c6b19350d7
                                              • Instruction Fuzzy Hash: 1C817A71A00219FFDB208F24CC89FAA77BDEF44705F614258ED499B295D3B0AF45CA91
                                              APIs
                                              • NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 006F344A
                                              • NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 006F3469
                                              • MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 006F3493
                                              • CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 006F34A0
                                              • UnmapViewOfFile.KERNEL32(?), ref: 006F34B8
                                              Strings
                                              • \Device\PhysicalMemory, xrefs: 006F33E0
                                              • C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1, xrefs: 006F3414
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, Offset: 006F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6f0000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: FileView$CloseHandleInformationOpenQuerySectionSystemUnmap
                                              • String ID: C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$\Device\PhysicalMemory
                                              • API String ID: 2985292042-3938670448
                                              • Opcode ID: e2b0c8f568571b3f59211b8063e335b2ad8ba4e779b6cb58c9455f457ca39783
                                              • Instruction ID: b81d83b63f850a011883c6bffa34a49200cb49da1c9492a3096ba929744748d7
                                              • Opcode Fuzzy Hash: e2b0c8f568571b3f59211b8063e335b2ad8ba4e779b6cb58c9455f457ca39783
                                              • Instruction Fuzzy Hash: 76817871500218BFEB248F14CC89ABA3BADEF45704F504658EE199B291D3F0AF458A68
                                              APIs
                                              • NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 7FE32A36
                                              • NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 7FE32A55
                                              • MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 7FE32A7F
                                              • CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 7FE32A8C
                                              • UnmapViewOfFile.KERNEL32(?), ref: 7FE32AA4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2017052696.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_7fe30000_hrl97BF.jbxd
                                              Similarity
                                              • API ID: FileView$CloseHandleInformationOpenQuerySectionSystemUnmap
                                              • String ID: C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$ysic
                                              • API String ID: 2985292042-2835701104
                                              • Opcode ID: e096a308c09e6b02b95fe1d014301fff9b14a95bfc109e57e88e1af0ff91d58a
                                              • Instruction ID: 318294e3e7f85719ab3bc7b1e15188bdad7b77c11d20dad426282bd8f2c8130f
                                              • Opcode Fuzzy Hash: e096a308c09e6b02b95fe1d014301fff9b14a95bfc109e57e88e1af0ff91d58a
                                              • Instruction Fuzzy Hash: 77116D70640705FBEB218F10CC49FAA3B7DEF88704F544218EE1A9A290D7B4AF14C655
                                              APIs
                                              • NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 006F344A
                                              • NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 006F3469
                                              • MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 006F3493
                                              • CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 006F34A0
                                              • UnmapViewOfFile.KERNEL32(?), ref: 006F34B8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, Offset: 006F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6f0000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: FileView$CloseHandleInformationOpenQuerySectionSystemUnmap
                                              • String ID: C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$ysic
                                              • API String ID: 2985292042-2835701104
                                              • Opcode ID: 75692eae59ef229a2f56f45455e385a3c03fd5a3a941212ab90a82f7e6085517
                                              • Instruction ID: cf230c399c29659175db3fd9995718bfc7bd329843d8a078712c8241af12214d
                                              • Opcode Fuzzy Hash: 75692eae59ef229a2f56f45455e385a3c03fd5a3a941212ab90a82f7e6085517
                                              • Instruction Fuzzy Hash: C9115B70140618BBEB24CF14CC59FAA366DEF88704F50451CEA199A3D0E7F46F188A68
                                              APIs
                                              • NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 0047940B
                                              • NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 0047942A
                                              • MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 00479454
                                              • CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 00479461
                                              • UnmapViewOfFile.KERNEL32(?), ref: 00479479
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: FileView$CloseHandleInformationOpenQuerySectionSystemUnmap
                                              • String ID: \Device\PhysicalMemory
                                              • API String ID: 2985292042-2007344781
                                              • Opcode ID: e2b0c8f568571b3f59211b8063e335b2ad8ba4e779b6cb58c9455f457ca39783
                                              • Instruction ID: c9ed1770a51eeceb4cbc9ac69c50ce46b3031ef87915e6fca9e8c17578926268
                                              • Opcode Fuzzy Hash: e2b0c8f568571b3f59211b8063e335b2ad8ba4e779b6cb58c9455f457ca39783
                                              • Instruction Fuzzy Hash: 92819B71500208FFEB24CF14CC89AAA37ADEF44714F604659ED199B291D3F4AF46CBA8
                                              APIs
                                              • NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 0047940B
                                              • NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 0047942A
                                              • MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 00479454
                                              • CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 00479461
                                              • UnmapViewOfFile.KERNEL32(?), ref: 00479479
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: FileView$CloseHandleInformationOpenQuerySectionSystemUnmap
                                              • String ID: ysic
                                              • API String ID: 2985292042-20973071
                                              • Opcode ID: 75692eae59ef229a2f56f45455e385a3c03fd5a3a941212ab90a82f7e6085517
                                              • Instruction ID: a4b267b066f08e2ef8df2b8ac50eb569a23c34ce5c16ab3af1c0546caa93a8a9
                                              • Opcode Fuzzy Hash: 75692eae59ef229a2f56f45455e385a3c03fd5a3a941212ab90a82f7e6085517
                                              • Instruction Fuzzy Hash: AF116D70140608BBEB20CF14CC59FEA367DEF84704F108619EA199A2A0E7F46F188A59
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2017052696.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_7fe30000_hrl97BF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: !$&$&$($@$f
                                              • API String ID: 0-836565088
                                              • Opcode ID: a548e724a74dc9f11ca3a86e122be3e75a7467703da748c30130107ed05d8512
                                              • Instruction ID: 163b70a94544a6a33ebd8871784e0f368fa93584f3282bf18d9836246f014e62
                                              • Opcode Fuzzy Hash: a548e724a74dc9f11ca3a86e122be3e75a7467703da748c30130107ed05d8512
                                              • Instruction Fuzzy Hash: 4E821431D08309EFDB26CF28C849B997BBAEF41318FA55219DC5A8F185D3B4AB51CB05
                                              APIs
                                              • lstrcpyW.KERNEL32(?,\BaseNamedObjects\rnxtVt), ref: 7FE32431
                                              • lstrlenW.KERNEL32(?), ref: 7FE32438
                                              • NtCreateSection.NTDLL(?,0000000E,?,?,00000040,08000000,00000000), ref: 7FE3248D
                                              Strings
                                              • \BaseNamedObjects\rnxtVt, xrefs: 7FE3242F
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2017052696.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_7fe30000_hrl97BF.jbxd
                                              Similarity
                                              • API ID: CreateSectionlstrcpylstrlen
                                              • String ID: \BaseNamedObjects\rnxtVt
                                              • API String ID: 2597515329-2100028039
                                              • Opcode ID: 20bdb40ffb474c402f65f73e914af13d443f92d4dff509730c57e181749428e4
                                              • Instruction ID: 36e2f0a27fad33023740782982cd1b2969f7fc0a37d941ebf6b0748064d4bf92
                                              • Opcode Fuzzy Hash: 20bdb40ffb474c402f65f73e914af13d443f92d4dff509730c57e181749428e4
                                              • Instruction Fuzzy Hash: 9F0181B0790344BAF7305B29CC8BF5A3929DF81B51F948154F604AE1C4D5B99A0487AA
                                              APIs
                                              • lstrcpyW.KERNEL32(?,\BaseNamedObjects\vdqtVt), ref: 006F24BA
                                              • lstrlenW.KERNEL32(?), ref: 006F24C1
                                              • NtCreateSection.NTDLL(?,0000000E,?,?,00000040,08000000,00000000), ref: 006F2516
                                              Strings
                                              • \BaseNamedObjects\vdqtVt, xrefs: 006F24B8
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, Offset: 006F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6f0000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CreateSectionlstrcpylstrlen
                                              • String ID: \BaseNamedObjects\vdqtVt
                                              • API String ID: 2597515329-3506632634
                                              • Opcode ID: a0e7931b6ec9b4ea826d6bb84c5d272d7e990a2cff268db9e9c3771cc379ab6c
                                              • Instruction ID: bb58588ea9e22815e80f7c30a5c0d3f2203103d15da1ba5a7a5498ab68acfdd2
                                              • Opcode Fuzzy Hash: a0e7931b6ec9b4ea826d6bb84c5d272d7e990a2cff268db9e9c3771cc379ab6c
                                              • Instruction Fuzzy Hash: 1A0181B0781344BAF7309B29CC4BF5B7929DFC1B50F508558F708AE1C5DAB89A0483A9
                                              APIs
                                              • LoadLibraryA.KERNEL32(00477123,00476757,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 00477130
                                                • Part of subcall function 00477157: GetProcAddress.KERNEL32(00000000,00477141), ref: 00477158
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: \vdqtVt
                                              • API String ID: 2574300362-4079102830
                                              • Opcode ID: d22ad19c5d20953731eb26dff950cba296a473678d0b8728d05c867e6114a31d
                                              • Instruction ID: 6b9c97f5df75992c63d6971bb8dd5519a058f3ab7a0e0083c6f2881134c52dfc
                                              • Opcode Fuzzy Hash: d22ad19c5d20953731eb26dff950cba296a473678d0b8728d05c867e6114a31d
                                              • Instruction Fuzzy Hash: 99A1732285C2819BC731AA708C894EF7F54EA127507C8C6DFECAC4B743D6998C06D79D
                                              APIs
                                              • GetSystemTime.KERNEL32(0047D545), ref: 00479860
                                              • Sleep.KERNEL32(0000EA60), ref: 004798D2
                                              • Sleep.KERNEL32(?,00000010,BB010002,00000000,8004667E,?,00000001), ref: 00479982
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Sleep$SystemTime
                                              • String ID:
                                              • API String ID: 3773743504-0
                                              • Opcode ID: b9cbcd502034ca6391bc477693aeae1c9470f5e239758c46d06d44a479c792e4
                                              • Instruction ID: 28d525e624ac25824b3bb18be67b2a8477d8f0781c310dde4727481d83f232a3
                                              • Opcode Fuzzy Hash: b9cbcd502034ca6391bc477693aeae1c9470f5e239758c46d06d44a479c792e4
                                              • Instruction Fuzzy Hash: D341D271644249BAEB305F258C4EBDA7B6EEF85310F04842AF90DDE2C1D7F89F418629
                                              APIs
                                              • NtOpenSection.NTDLL(?,0000000E), ref: 0047851F
                                              Strings
                                              • \BaseNamedObjects\vdqtVt, xrefs: 0047850C
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: OpenSection
                                              • String ID: \BaseNamedObjects\vdqtVt
                                              • API String ID: 1950954290-3506632634
                                              • Opcode ID: 070b698a65d812778bebda462e03455ac2d4d74c25fc029a23958a9dd811b266
                                              • Instruction ID: cc492c20b74137972e1aeb42a549193fdcd5baff80c1f90c3202c4eb3a6ea2fd
                                              • Opcode Fuzzy Hash: 070b698a65d812778bebda462e03455ac2d4d74c25fc029a23958a9dd811b266
                                              • Instruction Fuzzy Hash: A1E0DFF1342105BAFB288B19CC07FB7220DCBC0600F048604F918DA090E6F4AF104278
                                              APIs
                                              • NtOpenSection.NTDLL(?,0000000E), ref: 7FE324D5
                                              Strings
                                              • \BaseNamedObjects\rnxtVt, xrefs: 7FE324C2
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2017052696.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_7fe30000_hrl97BF.jbxd
                                              Similarity
                                              • API ID: OpenSection
                                              • String ID: \BaseNamedObjects\rnxtVt
                                              • API String ID: 1950954290-2100028039
                                              • Opcode ID: 01bc40aaccc0e12f94ebcffc641123895db33c2b7787041d8d9fd48dce060fde
                                              • Instruction ID: 3af93ba349bfc42ef742b5b28717abad19c90c039107910871d63db4ec892b88
                                              • Opcode Fuzzy Hash: 01bc40aaccc0e12f94ebcffc641123895db33c2b7787041d8d9fd48dce060fde
                                              • Instruction Fuzzy Hash: 88E0D8F13505053BFB585B1ACC07FB7211CDB80601F08C504F918D8180E5F6DF504674
                                              APIs
                                                • Part of subcall function 004784F0: NtOpenSection.NTDLL(?,0000000E), ref: 0047851F
                                              • NtMapViewOfSection.NTDLL(00000000,?,?,00000000,0000B7C4,00000000,?,00000002,00100000,00000040), ref: 00478565
                                              • CloseHandle.KERNEL32(00000000,0000B7C4,00000000,?,00000002,00100000,00000040,00000000,0000B7C4,00000000,?,004767D6), ref: 0047856D
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Section$CloseHandleOpenView
                                              • String ID:
                                              • API String ID: 2731707328-0
                                              • Opcode ID: 7e6d81ae67240a40e11905e7904a542b9946b97cc322a4af05470e0a41c17acf
                                              • Instruction ID: b393d387223e583d58dcf3be0b45be934a1b618d469cdfc02fdb4df324adb63e
                                              • Opcode Fuzzy Hash: 7e6d81ae67240a40e11905e7904a542b9946b97cc322a4af05470e0a41c17acf
                                              • Instruction Fuzzy Hash: 42213D30340506BAD724DE26C85AFEAB369AF80744F80811DF40DAE281EFB5AE15876C
                                              APIs
                                                • Part of subcall function 7FE324A6: NtOpenSection.NTDLL(?,0000000E), ref: 7FE324D5
                                              • NtMapViewOfSection.NTDLL(00000000,?,?,00000000,0000A5A4,00000000,?,00000002,00100000,00000040), ref: 7FE3251B
                                              • CloseHandle.KERNEL32(00000000,0000A5A4,00000000,?,00000002,00100000,00000040,00000000,0000A5A4,00000000,?,7FE3081E), ref: 7FE32523
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2017052696.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_7fe30000_hrl97BF.jbxd
                                              Similarity
                                              • API ID: Section$CloseHandleOpenView
                                              • String ID:
                                              • API String ID: 2731707328-0
                                              • Opcode ID: d57de25e2a9e0870f79673598bd885887cfcbdd2de40fd78df44cfc9adbced58
                                              • Instruction ID: bee1c855c16bc61800ea428020f6ca64b574a67132473be0581a367c0eaae25c
                                              • Opcode Fuzzy Hash: d57de25e2a9e0870f79673598bd885887cfcbdd2de40fd78df44cfc9adbced58
                                              • Instruction Fuzzy Hash: D3214D30B41706BBDB24DE25CC99FAA7369EF91615F800118F84A9E094DBB0BF05CB96
                                              APIs
                                              • LookupPrivilegeValueA.ADVAPI32(00000000,?), ref: 7FE313D1
                                              • NtAdjustPrivilegesToken.NTDLL(?,00000000,?,00000000,00000000,00000000), ref: 7FE313E1
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2017052696.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_7fe30000_hrl97BF.jbxd
                                              Similarity
                                              • API ID: AdjustLookupPrivilegePrivilegesTokenValue
                                              • String ID:
                                              • API String ID: 3615134276-0
                                              • Opcode ID: 06cb91745a521b86393166955c5c3afe83ac66ea4f770f9a12dd5b551f424793
                                              • Instruction ID: c1c1ab654349933eb8818b114bb595f6400d348302ddc4a0bc7520d30974f20a
                                              • Opcode Fuzzy Hash: 06cb91745a521b86393166955c5c3afe83ac66ea4f770f9a12dd5b551f424793
                                              • Instruction Fuzzy Hash: E4F02732542420BBD7201F42CC8EED77F28EF537A0F044456F4484E152C2A28BA5D3F4
                                              APIs
                                              • NtProtectVirtualMemory.NTDLL(?,?,?,00000040), ref: 0047845C
                                              • NtWriteVirtualMemory.NTDLL ref: 00478465
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: MemoryVirtual$ProtectWrite
                                              • String ID:
                                              • API String ID: 151266762-0
                                              • Opcode ID: 3b89ad314080acfcfa5e752e4380cd5b7e8fc3aa7940f56e0bfe36a9f1ccff9c
                                              • Instruction ID: 6bbb67ea70d6ee96dfa5f1d7b4d314b28acc786a60d934acbd3f762ecc45b662
                                              • Opcode Fuzzy Hash: 3b89ad314080acfcfa5e752e4380cd5b7e8fc3aa7940f56e0bfe36a9f1ccff9c
                                              • Instruction Fuzzy Hash: 2AE012E07502007FF5185F55DC5FF7B391DDB41751F410208FA0A981C4F9A15E18467A
                                              APIs
                                              • NtProtectVirtualMemory.NTDLL(?,?,?,00000040), ref: 7FE32412
                                              • NtWriteVirtualMemory.NTDLL ref: 7FE3241B
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2017052696.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_7fe30000_hrl97BF.jbxd
                                              Similarity
                                              • API ID: MemoryVirtual$ProtectWrite
                                              • String ID:
                                              • API String ID: 151266762-0
                                              • Opcode ID: 534548baa2052e911e8d62c03dc4c028d0ed02b2351596322006dfeadd0b54f5
                                              • Instruction ID: c38bda1e3a101e2fdd3f8b0b268324223328f149a1f706d2aad4996337be3d8a
                                              • Opcode Fuzzy Hash: 534548baa2052e911e8d62c03dc4c028d0ed02b2351596322006dfeadd0b54f5
                                              • Instruction Fuzzy Hash: 69E0E2A07502007FFA185A299C5BF7B391DDB80B41F810208FA0A98180FAE26F1486BA
                                              APIs
                                              • LookupPrivilegeValueA.ADVAPI32(00000000,?), ref: 7FE313D1
                                              • NtAdjustPrivilegesToken.NTDLL(?,00000000,?,00000000,00000000,00000000), ref: 7FE313E1
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2017052696.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_7fe30000_hrl97BF.jbxd
                                              Similarity
                                              • API ID: AdjustLookupPrivilegePrivilegesTokenValue
                                              • String ID:
                                              • API String ID: 3615134276-0
                                              • Opcode ID: 03410179fabc8902f2c006e492dd7336ccf3c81071a106955ee4cf51594df4cc
                                              • Instruction ID: 2757d4dcf4212f89d011a90f07cb8bff029887feb5f377fd6fe999df64044c2d
                                              • Opcode Fuzzy Hash: 03410179fabc8902f2c006e492dd7336ccf3c81071a106955ee4cf51594df4cc
                                              • Instruction Fuzzy Hash: 8AD09E316420347BD6711E168C0EEDB7E1DEF57BB1F014045F90C99192C5A28EA1C7F5
                                              APIs
                                              • NtAdjustPrivilegesToken.NTDLL(?,00000000,?,00000000,00000000,00000000,?,00000001,00000000,00000000,00000002), ref: 0047742B
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AdjustPrivilegesToken
                                              • String ID:
                                              • API String ID: 2874748243-0
                                              • Opcode ID: 4d961b29825b6918877cf0b8ca3bbdf1a1a783037955428b050f6265267c3a26
                                              • Instruction ID: ddbff97e699881e74d61e2820170bd54818263a6fff0c1519b9bac5ac29647fb
                                              • Opcode Fuzzy Hash: 4d961b29825b6918877cf0b8ca3bbdf1a1a783037955428b050f6265267c3a26
                                              • Instruction Fuzzy Hash: 5BF0AE36542510BBD7205F56CD8EED77F28EF533A0F144556F4484E151C2624BA5D3F4
                                              APIs
                                              • NtAdjustPrivilegesToken.NTDLL(?,00000000,?,00000000,00000000,00000000,?,00000001,00000000,00000000,00000002), ref: 0047742B
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AdjustPrivilegesToken
                                              • String ID:
                                              • API String ID: 2874748243-0
                                              • Opcode ID: f45ad7484d04f34a0af0f423c52b42987f710650b5115a9fa6d287fad7b05342
                                              • Instruction ID: ee32c209e3d0a2de55b6acbdbca8a3d00d8b73f2470e3acbbab87dcaf3c2c19a
                                              • Opcode Fuzzy Hash: f45ad7484d04f34a0af0f423c52b42987f710650b5115a9fa6d287fad7b05342
                                              • Instruction Fuzzy Hash: F2D06731643034BBD6312A568C0EEE77D1DEF577A0F015041F9089A1A1C5A28EA1C7F5
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0642b33d3ce8112a54256d33be083f0dc48b56f423af93a4a8a3c14605054926
                                              • Instruction ID: 2c1d06b0ef092043c03be5c4b92301d897a7a107ee02334de014fe54047685a1
                                              • Opcode Fuzzy Hash: 0642b33d3ce8112a54256d33be083f0dc48b56f423af93a4a8a3c14605054926
                                              • Instruction Fuzzy Hash: 4E311EB16006154BDB148E38C8447EAB3E1FB84704F10C53DE65AE7680EA79EA498BC5
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, Offset: 006F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6f0000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0642b33d3ce8112a54256d33be083f0dc48b56f423af93a4a8a3c14605054926
                                              • Instruction ID: 51613a3b3d3215fcd316f45095e4f2adff35fefad49d85e9a5315333e5fab7fa
                                              • Opcode Fuzzy Hash: 0642b33d3ce8112a54256d33be083f0dc48b56f423af93a4a8a3c14605054926
                                              • Instruction Fuzzy Hash: F3311C3161061A8FDB148E39C8517AAB3E2FB94304F10853CE656D7684D6B5FA998FC0
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8def141823eaeae6cde13e11ae20021037d3a6ae5ae00fe4e6870b9a90bf37d9
                                              • Instruction ID: d87477072c5758a900aba4f5c189c8769db751d19ec5dc3a13cb4d6bc656c2d6
                                              • Opcode Fuzzy Hash: 8def141823eaeae6cde13e11ae20021037d3a6ae5ae00fe4e6870b9a90bf37d9
                                              • Instruction Fuzzy Hash: 7321BE732061215FD711DE29CD95FEE7361AB81728F148356DC244F286DB368AD6C6C3
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bcd4db434fc62e517b86b69493e8fb0222cb7bd3f69c5fc92b6f384e28e32025
                                              • Instruction ID: f33a156f2a793f2b241488fcf13e9bc6ec48b5d09705d723da7567139f1fc87d
                                              • Opcode Fuzzy Hash: bcd4db434fc62e517b86b69493e8fb0222cb7bd3f69c5fc92b6f384e28e32025
                                              • Instruction Fuzzy Hash: 3A1187777051205FCB15AA38D844BAFB391EBC4338F54436EA9148B285EE3996458780
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dc4219628e2e45644285e776e2269212ba1003bd1e25755659efc044daeb246d
                                              • Instruction ID: 71cd4a28e4d2dae000c282f11a0f6bd61e1312517a305b6e8b44f642620b02f8
                                              • Opcode Fuzzy Hash: dc4219628e2e45644285e776e2269212ba1003bd1e25755659efc044daeb246d
                                              • Instruction Fuzzy Hash: FD019C336041226FC7166E39C91469E77D6AFCA318F12D37BD0156B508CF79A6078A81
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, Offset: 006F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6f0000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9218cfa05aaedef510c328bf7faf8a47d566a572764a29d5daf759a9c17380e6
                                              • Instruction ID: e37239cab1c7aa4818ea33ecb8d5b043c98d403fde929a56f4e89ecb3ac15748
                                              • Opcode Fuzzy Hash: 9218cfa05aaedef510c328bf7faf8a47d566a572764a29d5daf759a9c17380e6
                                              • Instruction Fuzzy Hash: 8F0124322441495BE720EF78CC89BADF7A2EBC8734F108328E6944A187D731A2958661
                                              APIs
                                              • LoadLibraryA.KERNEL32 ref: 00401A1E
                                              • GetProcAddress.KERNEL32(00000000), ref: 00401A27
                                              • LoadLibraryA.KERNEL32(kernel32.dll,GetTempPathA), ref: 00401A37
                                              • GetProcAddress.KERNEL32(00000000), ref: 00401A3A
                                                • Part of subcall function 00401660: strstr.MSVCRT ref: 004016A7
                                                • Part of subcall function 00401660: strcspn.MSVCRT ref: 004016C4
                                                • Part of subcall function 00401660: strncpy.MSVCRT ref: 004016D3
                                                • Part of subcall function 00401660: strcspn.MSVCRT ref: 004016E3
                                                • Part of subcall function 00402F70: GetLocaleInfoW.KERNEL32(00000800,00000002,?,00000040,?,76F8F550,76F90BD0,00000072), ref: 00402F8B
                                                • Part of subcall function 00402F70: GetComputerNameA.KERNEL32 ref: 00402FA2
                                                • Part of subcall function 00402F70: lstrcpyA.KERNEL32(?,SOFTWARE\Microsoft\Windows NT\CurrentVersion), ref: 00402FBB
                                                • Part of subcall function 00402F70: strstr.MSVCRT ref: 00403024
                                                • Part of subcall function 00402F70: lstrcpyA.KERNEL32(?,Windows NT), ref: 00403114
                                                • Part of subcall function 00402F70: lstrcpyA.KERNEL32(?,HARDWARE\DESCRIPTION\System\CentralProcessor\0), ref: 0040313D
                                                • Part of subcall function 00401980: LoadLibraryA.KERNEL32 ref: 004019A0
                                              • CloseHandle.KERNEL32(?), ref: 00401C02
                                              • CloseHandle.KERNEL32(?), ref: 00401C3F
                                              • LoadLibraryA.KERNEL32(PlusCtrl.dll), ref: 00401C52
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: LibraryLoad$lstrcpy$AddressCloseHandleProcstrcspnstrstr$ComputerInfoLocaleNamestrncpy
                                              • String ID: .$100200$<6@$A$A$D$ExitProcess$F$F$F$G$GetTempPathA$L$M$N$PlusCtrl.dll$R$SetFileAttributesA$T$U$W$a$a$d$d$d$e$e$e$e$e$e$i$i$i$i$kernel32.dll$l$l$l$l$l$l$l$l$m$m$o$o$o$o$o$t$t$u$u$w$w
                                              • API String ID: 3552227398-19183163
                                              • Opcode ID: 379116b2d88aa8af1ebcdaaeb2c968e704b39e4d9bc54b5ade393c686307fa29
                                              • Instruction ID: 6d36ee71d4a81d0c90f4322b46838c243b43bcae610d34eb8121a6d16edaaa69
                                              • Opcode Fuzzy Hash: 379116b2d88aa8af1ebcdaaeb2c968e704b39e4d9bc54b5ade393c686307fa29
                                              • Instruction Fuzzy Hash: 5A02C57050C380DAE310CB74DD48B5BBBE5AB95704F04492DF6D5A72E2D7BA9808CB6B
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32.dll,00000047), ref: 00402BF5
                                              • GetProcAddress.KERNEL32(00000000), ref: 00402BFC
                                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00402C1F
                                              • strncmp.MSVCRT ref: 00402C44
                                              • lstrcatA.KERNEL32(?,004084F4), ref: 00402CD0
                                              • lstrcatA.KERNEL32(?,?), ref: 00402CE0
                                              • CopyFileA.KERNEL32(?,?,00000000), ref: 00402CF1
                                              • lstrcpyA.KERNEL32(?,?), ref: 00402D14
                                              • GetLastError.KERNEL32 ref: 00402D8F
                                              • lstrcpyA.KERNEL32(?,SYSTEM\CurrentControlSet\Services\), ref: 00402DE1
                                              • lstrcatA.KERNEL32(?,?), ref: 00402DEF
                                              • lstrlenA.KERNEL32(00402AB1), ref: 00402E0E
                                                • Part of subcall function 00403B40: GetTickCount.KERNEL32 ref: 00403B41
                                                • Part of subcall function 00403B40: rand.MSVCRT ref: 00403B49
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$lstrcpy$AddressCopyCountDirectoryErrorFileLastLibraryLoadProcSystemTicklstrlenrandstrncmp
                                              • String ID: %c%c%c%c%c%c.exe$<6@$A$Description$F$G$M$N$SYSTEM\CurrentControlSet\Services\$a$d$i$kernel32.dll$m$o$t$u
                                              • API String ID: 2930506891-2104832695
                                              • Opcode ID: 79df84dcddb17782a356b93d0bf0c5b2b01855d991385c97858fe82d4394e814
                                              • Instruction ID: a50e26587b69554a2a762d444c19ea56879ec6abf88ed33a43cf8b764e003199
                                              • Opcode Fuzzy Hash: 79df84dcddb17782a356b93d0bf0c5b2b01855d991385c97858fe82d4394e814
                                              • Instruction Fuzzy Hash: 10812BB2900258ABD721DB60DD89FDEBB7CAF55B00F0401E9F609B61C2D6B45B84CF69
                                              APIs
                                              • lstrcpyA.KERNEL32(?,SYSTEM\CurrentControlSet\Services\), ref: 00402533
                                              • lstrcatA.KERNEL32(?,100200), ref: 00402543
                                              • RtlZeroMemory.KERNEL32 ref: 00402587
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: MemoryZerolstrcatlstrcpy
                                              • String ID: "7@$100200$47@$F7@$ImagePath$SYSTEM\CurrentControlSet\Services\
                                              • API String ID: 1768957353-3519508139
                                              • Opcode ID: 8a600dd736f3a178a13575e9a99342727ac9e09ed908883fd0121ec29af1dff4
                                              • Instruction ID: a495424809a9f9f54fedb59a1f20414eed3fe88150acac704cb64e1485c9eeb3
                                              • Opcode Fuzzy Hash: 8a600dd736f3a178a13575e9a99342727ac9e09ed908883fd0121ec29af1dff4
                                              • Instruction Fuzzy Hash: 8C51B435780305AFE320DB34ED49FEB37A8EB84721F504839FA46E11D0E6BD9519866D
                                              APIs
                                              • LoadLibraryA.KERNEL32(006F3F83), ref: 006F3F8F
                                              • WSAStartup.WS2_32(00000101), ref: 006F3FCE
                                              • CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 006F3FE9
                                              • CloseHandle.KERNEL32(?,00000000), ref: 006F3FF2
                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 006F3FFF
                                              • lstrlen.KERNEL32(ilo.brenz.pl,?,00000000), ref: 006F4057
                                              • gethostbyname.WS2_32(ilo.brenz.pl), ref: 006F4066
                                              • socket.WS2_32(00000002,00000001,00000000), ref: 006F4097
                                              • connect.WS2_32(6F6C6902,006F3B09,00000010), ref: 006F40B1
                                              • GetVersionExA.KERNEL32(?,?,00000000), ref: 006F40FB
                                              • wsprintfA.USER32 ref: 006F4179
                                              • CreateThread.KERNEL32(00000000,00000000,Function_00003819,6F6C6902,00000000), ref: 006F41B4
                                              • CloseHandle.KERNEL32(?,00000000,6F6C6902,006F6AA2,00000000,00000000), ref: 006F41BD
                                              • GetTickCount.KERNEL32 ref: 006F41F6
                                              • RtlExitUserThread.NTDLL(00000000), ref: 006F4322
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, Offset: 006F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6f0000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CreateThread$CloseHandle$CountEventExitLibraryLoadStartupTickUserVersionconnectgethostbynamelstrlensocketwsprintf
                                              • String ID: 020a00 . . :#a260b0403 +*$C:\WINDOWS\SYSTEM32\UXTHEME.DLL$ilo.brenz.pl
                                              • API String ID: 3316401344-4011269892
                                              • Opcode ID: ee4b1f535ca79d9535994823dd2765b1aa6c936bb005bd660b800cb5032af16f
                                              • Instruction ID: 05e8b580a982364d788afafe6aac2302bc95c98334f791d2a3b6b83624e4571d
                                              • Opcode Fuzzy Hash: ee4b1f535ca79d9535994823dd2765b1aa6c936bb005bd660b800cb5032af16f
                                              • Instruction Fuzzy Hash: 8291CA3150824DBAEB319F24881DBFE7BAEEF41300F040558EA5A9E681CBF45F45CB65
                                              APIs
                                              • GetModuleHandleA.KERNEL32(7FE33071), ref: 7FE3307C
                                              • GetSystemDirectoryA.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,00000104), ref: 7FE33093
                                              • CreateFileA.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,40000000,00000000,00000000,00000003,00000000,00000000), ref: 7FE330D4
                                              • WriteFile.KERNEL32(00000000,7FE33EDB,00000019,C:\Windows\sysWOW64\wbem\wmiprvse.exe,00000000,00000000), ref: 7FE330F6
                                              • CloseHandle.KERNEL32(?,00000003), ref: 7FE330FC
                                              • GetProcAddress.KERNEL32(00000000,7FE3311D), ref: 7FE33128
                                              • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE3313B
                                              • GetTickCount.KERNEL32 ref: 7FE3316F
                                              • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,7FE3637A,00000000,00000000,00000000,00000000), ref: 7FE33241
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2017052696.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_7fe30000_hrl97BF.jbxd
                                              Similarity
                                              • API ID: FileHandle$AddressCloseCountCreateDirectoryInformationLibraryLoadModuleProcSystemTickVolumeWrite
                                              • String ID: "'$"'$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$hell32.dll,-1
                                              • API String ID: 1729360627-4128452508
                                              • Opcode ID: 19b44635278fe99a4415179c49d6eb8c4f8a4d309380675498a1a4a2d9bdcc0e
                                              • Instruction ID: 6b64a43cb509898f68348655a96a0e184e2e065f58832200b8bd953c97f5cb1b
                                              • Opcode Fuzzy Hash: 19b44635278fe99a4415179c49d6eb8c4f8a4d309380675498a1a4a2d9bdcc0e
                                              • Instruction Fuzzy Hash: 2591F271954358BFEB269F20CC0EFEA3B6CDF41311F80011AED5A9A081DAF46F06D6A5
                                              APIs
                                              • lstrcat.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,7FE3309E), ref: 7FE330AC
                                                • Part of subcall function 7FE330BE: lstrcat.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,7FE330B7), ref: 7FE330BF
                                                • Part of subcall function 7FE330BE: CreateFileA.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,40000000,00000000,00000000,00000003,00000000,00000000), ref: 7FE330D4
                                                • Part of subcall function 7FE330BE: WriteFile.KERNEL32(00000000,7FE33EDB,00000019,C:\Windows\sysWOW64\wbem\wmiprvse.exe,00000000,00000000), ref: 7FE330F6
                                                • Part of subcall function 7FE330BE: CloseHandle.KERNEL32(?,00000003), ref: 7FE330FC
                                                • Part of subcall function 7FE330BE: GetProcAddress.KERNEL32(00000000,7FE3311D), ref: 7FE33128
                                                • Part of subcall function 7FE330BE: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE3313B
                                                • Part of subcall function 7FE330BE: GetTickCount.KERNEL32 ref: 7FE3316F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2017052696.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_7fe30000_hrl97BF.jbxd
                                              Similarity
                                              • API ID: Filelstrcat$AddressCloseCountCreateHandleLibraryLoadProcTickWrite
                                              • String ID: "'$"'$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$hell32.dll,-1
                                              • API String ID: 4135777234-4128452508
                                              • Opcode ID: 6958d413b6abf8e1b28038c6610194ed2bae6efbd87a574ee0b1bcde9ea0452d
                                              • Instruction ID: f56c8c8788c1527792fd5fee25e748029393f3a60fbf17811963ed314d73609c
                                              • Opcode Fuzzy Hash: 6958d413b6abf8e1b28038c6610194ed2bae6efbd87a574ee0b1bcde9ea0452d
                                              • Instruction Fuzzy Hash: 9091F171944718BFEB269F208C0EFEA3B6CDF41311F80011AED5A9E081DAF4AF05D6A5
                                              APIs
                                              • lstrcat.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,7FE330B7), ref: 7FE330BF
                                              • CreateFileA.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,40000000,00000000,00000000,00000003,00000000,00000000), ref: 7FE330D4
                                              • WriteFile.KERNEL32(00000000,7FE33EDB,00000019,C:\Windows\sysWOW64\wbem\wmiprvse.exe,00000000,00000000), ref: 7FE330F6
                                              • CloseHandle.KERNEL32(?,00000003), ref: 7FE330FC
                                              • GetProcAddress.KERNEL32(00000000,7FE3311D), ref: 7FE33128
                                              • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE3313B
                                              • GetTickCount.KERNEL32 ref: 7FE3316F
                                              • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,7FE3637A,00000000,00000000,00000000,00000000), ref: 7FE33241
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2017052696.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_7fe30000_hrl97BF.jbxd
                                              Similarity
                                              • API ID: File$AddressCloseCountCreateHandleInformationLibraryLoadProcTickVolumeWritelstrcat
                                              • String ID: "'$"'$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$hell32.dll,-1
                                              • API String ID: 3969241177-4128452508
                                              • Opcode ID: e99baabed080411f04b0d806c93d617434853b94cdc5a730a8b5d052636699dc
                                              • Instruction ID: 09541bb4dc3411c55ab005cb888b55fbb50cd13fbca17e3ae23e295a94b6b269
                                              • Opcode Fuzzy Hash: e99baabed080411f04b0d806c93d617434853b94cdc5a730a8b5d052636699dc
                                              • Instruction Fuzzy Hash: 7281BE71914718BFEB269F208C0EFEA3B6DDF41311F80011AED5A9E081EAF46F05D6A5
                                              APIs
                                              • LoadLibraryA.KERNEL32 ref: 0040239F
                                              • GetProcAddress.KERNEL32(00000000), ref: 004023A6
                                              • GetTempPathA.KERNEL32(00000104,?), ref: 004023DE
                                              • lstrcatA.KERNEL32(?,SOFTWARE.LOG), ref: 004023F1
                                              • MoveFileExA.KERNEL32(?,?,00000003(MOVEFILE_REPLACE_EXISTING|MOVEFILE_COPY_ALLOWED)), ref: 0040240C
                                              • MoveFileExA.KERNEL32(?,00000000,00000005(MOVEFILE_REPLACE_EXISTING|MOVEFILE_DELAY_UNTIL_REBOOT)), ref: 0040241E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: FileMove$AddressLibraryLoadPathProcTemplstrcat
                                              • String ID: A$F$G$M$N$SOFTWARE.LOG$a$d$i$kernel32.dll$m$o$t$u
                                              • API String ID: 20907805-1765106238
                                              • Opcode ID: 7fd43944f68fb6c432481ebaa13493a170158cfa409d862e8056095c2823890d
                                              • Instruction ID: 27376e1d226d6c03194d421c0e1a1af7b37e71632551d2efb61b8b65d87483f2
                                              • Opcode Fuzzy Hash: 7fd43944f68fb6c432481ebaa13493a170158cfa409d862e8056095c2823890d
                                              • Instruction Fuzzy Hash: EE216F7114C3C2DEE312CB68C908B9BBFD45BAA704F08495DB2C456282D6B9961CC7B7
                                              APIs
                                              • CreateFileA.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,40000000,00000000,00000000,00000003,00000000,00000000), ref: 7FE330D4
                                              • WriteFile.KERNEL32(00000000,7FE33EDB,00000019,C:\Windows\sysWOW64\wbem\wmiprvse.exe,00000000,00000000), ref: 7FE330F6
                                              • CloseHandle.KERNEL32(?,00000003), ref: 7FE330FC
                                              • GetProcAddress.KERNEL32(00000000,7FE3311D), ref: 7FE33128
                                              • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE3313B
                                              • GetTickCount.KERNEL32 ref: 7FE3316F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2017052696.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_7fe30000_hrl97BF.jbxd
                                              Similarity
                                              • API ID: File$AddressCloseCountCreateHandleLibraryLoadProcTickWrite
                                              • String ID: "'$"'$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$hell32.dll,-1
                                              • API String ID: 896256579-4128452508
                                              • Opcode ID: 725bb423a29dcd62c43598a103823de9de260c4f48a9b794d588fa8ccf6d82a8
                                              • Instruction ID: 9c4dac55b76228d7ff9437610bb880f50dd66be18c7f3b043a5811b11c928d4e
                                              • Opcode Fuzzy Hash: 725bb423a29dcd62c43598a103823de9de260c4f48a9b794d588fa8ccf6d82a8
                                              • Instruction Fuzzy Hash: E6A1F571954718BFEB269F208C0EFEA37ADDF41311F80011AED5A9E081DAF46F05D6A5
                                              APIs
                                              • LoadLibraryA.KERNEL32(006F3EA9), ref: 006F3EB5
                                                • Part of subcall function 006F3ECC: GetProcAddress.KERNEL32(00000000,006F3EC0), ref: 006F3ECD
                                                • Part of subcall function 006F3ECC: GetModuleFileNameA.KERNEL32(00000000,020a00 . . :#a260b0403 +*,000000C8), ref: 006F3EE2
                                                • Part of subcall function 006F3ECC: wsprintfA.USER32 ref: 006F3EF7
                                                • Part of subcall function 006F3ECC: CreateThread.KERNEL32(00000000,00000000,006F3691,00000000,00000000), ref: 006F3F40
                                                • Part of subcall function 006F3ECC: CloseHandle.KERNEL32(?,1C567C50), ref: 006F3F49
                                              • CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 006F3FE9
                                              • CloseHandle.KERNEL32(?,00000000), ref: 006F3FF2
                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 006F3FFF
                                              • socket.WS2_32(00000002,00000001,00000000), ref: 006F4097
                                              • connect.WS2_32(6F6C6902,006F3B09,00000010), ref: 006F40B1
                                              • GetVersionExA.KERNEL32(?,?,00000000), ref: 006F40FB
                                              • wsprintfA.USER32 ref: 006F4179
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, Offset: 006F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6f0000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Create$CloseHandleThreadwsprintf$AddressEventFileLibraryLoadModuleNameProcVersionconnectsocket
                                              • String ID: 020a00 . . :#a260b0403 +*$C:\WINDOWS\SYSTEM32\UXTHEME.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 4150863296-830918593
                                              • Opcode ID: 9f06b138147dde36dface2e64d8b648724a67120387ec8aabe41be75442747ba
                                              • Instruction ID: 25dce286589678664f3bbf318b25790e34a4572969ecf7ed410312cb35da1780
                                              • Opcode Fuzzy Hash: 9f06b138147dde36dface2e64d8b648724a67120387ec8aabe41be75442747ba
                                              • Instruction Fuzzy Hash: 73A10171408259BFEB219F248C1EBFB7BAEEF41300F040559EA498E282DAF45F45C7A5
                                              APIs
                                              • GetProcAddress.KERNEL32(00000000,006F3EC0), ref: 006F3ECD
                                              • GetModuleFileNameA.KERNEL32(00000000,020a00 . . :#a260b0403 +*,000000C8), ref: 006F3EE2
                                              • wsprintfA.USER32 ref: 006F3EF7
                                              • CreateThread.KERNEL32(00000000,00000000,006F3691,00000000,00000000), ref: 006F3F40
                                              • CloseHandle.KERNEL32(?,1C567C50), ref: 006F3F49
                                              • CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 006F3FE9
                                              • CloseHandle.KERNEL32(?,00000000), ref: 006F3FF2
                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 006F3FFF
                                                • Part of subcall function 006F3405: NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 006F344A
                                                • Part of subcall function 006F3405: NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 006F3469
                                                • Part of subcall function 006F3405: MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 006F3493
                                                • Part of subcall function 006F3405: CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 006F34A0
                                                • Part of subcall function 006F3405: UnmapViewOfFile.KERNEL32(?), ref: 006F34B8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, Offset: 006F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6f0000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CloseCreateFileHandle$ThreadView$AddressEventInformationModuleNameOpenProcQuerySectionSystemUnmapwsprintf
                                              • String ID: 020a00 . . :#a260b0403 +*$C:\WINDOWS\SYSTEM32\UXTHEME.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 541178049-830918593
                                              • Opcode ID: 3176691832235144c822bda6bdece0b9c65d83022bcced3ec1f9b4779e38ef98
                                              • Instruction ID: 6543e2cd33b1d503735f3c52c44325582dfa8ac981989ea5cce864c9ff276362
                                              • Opcode Fuzzy Hash: 3176691832235144c822bda6bdece0b9c65d83022bcced3ec1f9b4779e38ef98
                                              • Instruction Fuzzy Hash: 80A1F071408258BFEB219F248C1EBFB7BADEF41300F040658EA498E581DAF45F45CBA5
                                              APIs
                                              • LoadLibraryA.KERNEL32(7FE33107), ref: 7FE33112
                                                • Part of subcall function 7FE33127: GetProcAddress.KERNEL32(00000000,7FE3311D), ref: 7FE33128
                                                • Part of subcall function 7FE33127: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE3313B
                                                • Part of subcall function 7FE33127: GetTickCount.KERNEL32 ref: 7FE3316F
                                                • Part of subcall function 7FE33127: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,7FE3637A,00000000,00000000,00000000,00000000), ref: 7FE33241
                                                • Part of subcall function 7FE33127: Sleep.KERNEL32(00000064,0000001E), ref: 7FE33288
                                                • Part of subcall function 7FE33127: DeleteFileA.KERNEL32(hell32.dll,-1), ref: 7FE3328F
                                              Strings
                                              • "', xrefs: 7FE332BA
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 7FE3330F
                                              • ADVAPI32.DLL, xrefs: 7FE3313A
                                              • hell32.dll,-1, xrefs: 7FE3328E, 7FE3330E
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2017052696.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_7fe30000_hrl97BF.jbxd
                                              Similarity
                                              • API ID: LibraryLoad$AddressCountDeleteFileInformationProcSleepTickVolume
                                              • String ID: "'$ADVAPI32.DLL$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$hell32.dll,-1
                                              • API String ID: 3926103657-104948224
                                              • Opcode ID: b10989e1a19bd5d43d225fa2a3c42957d908225e734b95b6c14a3a6c700d835d
                                              • Instruction ID: d292d2856ce22b528264e3fb5c31764abc2e853f458007e39b67dc21da23dd02
                                              • Opcode Fuzzy Hash: b10989e1a19bd5d43d225fa2a3c42957d908225e734b95b6c14a3a6c700d835d
                                              • Instruction Fuzzy Hash: BD71D271915718BFEB269F20CC0EEEA37ADDF41311F80011AED5A9E081DAF4AF05D6A5
                                              APIs
                                              • GetProcAddress.KERNEL32(00000000,7FE3311D), ref: 7FE33128
                                              • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE3313B
                                              • GetTickCount.KERNEL32 ref: 7FE3316F
                                              • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,7FE3637A,00000000,00000000,00000000,00000000), ref: 7FE33241
                                              • Sleep.KERNEL32(00000064,0000001E), ref: 7FE33288
                                              • DeleteFileA.KERNEL32(hell32.dll,-1), ref: 7FE3328F
                                              • CreateThread.KERNEL32(00000000,00000000,7FE32C7D,00000000,00000000), ref: 7FE33343
                                              • CloseHandle.KERNEL32(?,0C1A4F68), ref: 7FE3334C
                                              • WSAStartup.WS2_32(00000101), ref: 7FE333D1
                                              • Sleep.KERNEL32(00001388,00000000,00000000), ref: 7FE333F3
                                              Strings
                                              • "', xrefs: 7FE332BA
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 7FE3330F
                                              • ADVAPI32.DLL, xrefs: 7FE3313A
                                              • hell32.dll,-1, xrefs: 7FE3328E, 7FE3330E
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2017052696.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_7fe30000_hrl97BF.jbxd
                                              Similarity
                                              • API ID: Sleep$AddressCloseCountCreateDeleteFileHandleInformationLibraryLoadProcStartupThreadTickVolume
                                              • String ID: "'$ADVAPI32.DLL$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$hell32.dll,-1
                                              • API String ID: 2219344514-104948224
                                              • Opcode ID: 5b9ba073255788373456750f45873bb949f55a25902f1e72925c0e661daa5f85
                                              • Instruction ID: 9bf7545e8cb9496520d09b0b1350cb01679fb2f5a0313100841ffea94c71ba5e
                                              • Opcode Fuzzy Hash: 5b9ba073255788373456750f45873bb949f55a25902f1e72925c0e661daa5f85
                                              • Instruction Fuzzy Hash: 2871A271915718BFEB269F20DC0EBEA37ACEF41311F80011AED5A9E081DAF46F05D6A5
                                              APIs
                                              • LoadLibraryA.KERNEL32(00479F44), ref: 00479F50
                                              • CreateThread.KERNEL32(00000000,00000000,Function_00079849,00000000,00000000), ref: 00479FAA
                                              • CloseHandle.KERNEL32(?,00000000), ref: 00479FB3
                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 00479FC0
                                              • lstrlenA.KERNEL32(ilo.brenz.pl,?,00000000), ref: 0047A018
                                              • GetVersionExA.KERNEL32(?,?,00000000), ref: 0047A0BC
                                              • CreateThread.KERNEL32(00000000,00000000,Function_000797DA,6F6C6902,00000000), ref: 0047A175
                                              • CloseHandle.KERNEL32(?,00000000,6F6C6902,0047CA63,00000000,00000000), ref: 0047A17E
                                              • GetTickCount.KERNEL32 ref: 0047A1B7
                                              • ExitThread.KERNEL32(00000000), ref: 0047A2E3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CreateThread$CloseHandle$CountEventExitLibraryLoadTickVersionlstrlen
                                              • String ID: ilo.brenz.pl
                                              • API String ID: 486330360-878173267
                                              • Opcode ID: ee4b1f535ca79d9535994823dd2765b1aa6c936bb005bd660b800cb5032af16f
                                              • Instruction ID: 3c8a0648eba9be70d918cda4be6de18bf3e7f2c038df428e2a9b8eb3ece30cf4
                                              • Opcode Fuzzy Hash: ee4b1f535ca79d9535994823dd2765b1aa6c936bb005bd660b800cb5032af16f
                                              • Instruction Fuzzy Hash: 7F91DE31508248BAEB319F24881DBEE7B6DEF81304F048549E85E9E282D7F85F55C76A
                                              APIs
                                              • LoadLibraryA.KERNEL32(006F3F54), ref: 006F3F60
                                                • Part of subcall function 006F3F8F: LoadLibraryA.KERNEL32(006F3F83), ref: 006F3F8F
                                                • Part of subcall function 006F3F8F: WSAStartup.WS2_32(00000101), ref: 006F3FCE
                                                • Part of subcall function 006F3F8F: CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 006F3FE9
                                                • Part of subcall function 006F3F8F: CloseHandle.KERNEL32(?,00000000), ref: 006F3FF2
                                                • Part of subcall function 006F3F8F: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 006F3FFF
                                                • Part of subcall function 006F3F8F: socket.WS2_32(00000002,00000001,00000000), ref: 006F4097
                                                • Part of subcall function 006F3F8F: connect.WS2_32(6F6C6902,006F3B09,00000010), ref: 006F40B1
                                                • Part of subcall function 006F3F8F: GetVersionExA.KERNEL32(?,?,00000000), ref: 006F40FB
                                              • lstrlen.KERNEL32(ilo.brenz.pl,?,00000000), ref: 006F4057
                                              • gethostbyname.WS2_32(ilo.brenz.pl), ref: 006F4066
                                              • wsprintfA.USER32 ref: 006F4179
                                              • CreateThread.KERNEL32(00000000,00000000,Function_00003819,6F6C6902,00000000), ref: 006F41B4
                                              • CloseHandle.KERNEL32(?,00000000,6F6C6902,006F6AA2,00000000,00000000), ref: 006F41BD
                                              • GetTickCount.KERNEL32 ref: 006F41F6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, Offset: 006F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6f0000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Create$CloseHandleLibraryLoadThread$CountEventStartupTickVersionconnectgethostbynamelstrlensocketwsprintf
                                              • String ID: 020a00 . . :#a260b0403 +*$C:\WINDOWS\SYSTEM32\UXTHEME.DLL
                                              • API String ID: 2996464229-3907549323
                                              • Opcode ID: 98c4dc3622c81e610166b3295d4bccfe550f8d2832964dac318e74891848542e
                                              • Instruction ID: f684eac0b46cbfd7949f952aaf2b00fa69753d5dfcf3bb58bdca5638ee546245
                                              • Opcode Fuzzy Hash: 98c4dc3622c81e610166b3295d4bccfe550f8d2832964dac318e74891848542e
                                              • Instruction Fuzzy Hash: 9D81F071508299BFEB219F348C5ABFA7BAEEF41300F040658EA498E5C2CAF45F45C765
                                              APIs
                                              • LoadLibraryA.KERNEL32(7FE33386), ref: 7FE33392
                                              • WSAStartup.WS2_32(00000101), ref: 7FE333D1
                                              • Sleep.KERNEL32(00001388,00000000,00000000), ref: 7FE333F3
                                              • gethostbyname.WS2_32(ilo.brenz.pl), ref: 7FE33412
                                              • lstrlen.KERNEL32(ilo.brenz.pl), ref: 7FE3341D
                                              • socket.WS2_32(00000002,00000001,00000000), ref: 7FE33453
                                              • connect.WS2_32(?,7FE32EB6,00000010), ref: 7FE3346D
                                              • GetVersionExA.KERNEL32(?,?,7FE32EB6,00000010), ref: 7FE334B7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2017052696.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_7fe30000_hrl97BF.jbxd
                                              Similarity
                                              • API ID: LibraryLoadSleepStartupVersionconnectgethostbynamelstrlensocket
                                              • String ID: C:\Windows\sysWOW64\wbem\wmiprvse.exe$ilo.brenz.pl
                                              • API String ID: 801863514-1010093679
                                              • Opcode ID: 174516e84d9c669cdc790a5bd5a266766651d9cd51a165662f06c8ce5e18c4ab
                                              • Instruction ID: ec9582b3104ee8db84d86a8e063e61350cf898793cca2a983ffbcde4064a8b90
                                              • Opcode Fuzzy Hash: 174516e84d9c669cdc790a5bd5a266766651d9cd51a165662f06c8ce5e18c4ab
                                              • Instruction Fuzzy Hash: 0361D132A04359BFEB22CF24C819FDE3BBDAF41715F440514E86A9E091D6F4AB04DBA5
                                              APIs
                                              • Sleep.KERNEL32(000001F4), ref: 004027A8
                                              • CreateMutexA.KERNEL32(00000000,00000000,100200), ref: 004027C8
                                              • GetLastError.KERNEL32 ref: 004027CE
                                              • ExitProcess.KERNEL32 ref: 004027DC
                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,Function_000019C0,00000000), ref: 00402864
                                              • CloseHandle.KERNEL32(?), ref: 0040286D
                                              • Sleep.KERNEL32(0000012C), ref: 00402887
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Sleep$CloseCreateErrorExitHandleLastMutexObjectProcessSingleWait
                                              • String ID: 100200$<6@$X7@$hra%u.dll$j7@$8@
                                              • API String ID: 482528292-700769639
                                              • Opcode ID: 1e47b03f81b28842055db56df177672559bc8670de47ada2c4e5fdc5ca35fded
                                              • Instruction ID: 4773f610d1753618e182b41886d2e1a4b90cb22de96b73be237ab8051f55e4f2
                                              • Opcode Fuzzy Hash: 1e47b03f81b28842055db56df177672559bc8670de47ada2c4e5fdc5ca35fded
                                              • Instruction Fuzzy Hash: B8315CB0554301AFD300AB71EF89F5A7AA9AB98704F11013EF585B21E2CFF958048F6C
                                              APIs
                                                • Part of subcall function 00403B40: GetTickCount.KERNEL32 ref: 00403B41
                                                • Part of subcall function 00403B40: rand.MSVCRT ref: 00403B49
                                              • Sleep.KERNEL32(0000000A), ref: 00404E97
                                              • ExitThread.KERNEL32 ref: 00404EA3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CountExitSleepThreadTickrand
                                              • String ID: %d.%d.%d.%d$192.168.1.244$<6@$@$E$L8@$P$p8@$8@$[@
                                              • API String ID: 896407411-3061671333
                                              • Opcode ID: 3410f6aa03986460e07f35c30161e885734b80fe57aac652988e95c7b84e40c9
                                              • Instruction ID: 87275159083c24ec72463f46727c3f40db5767b92ee09eca53101c8822c6a11e
                                              • Opcode Fuzzy Hash: 3410f6aa03986460e07f35c30161e885734b80fe57aac652988e95c7b84e40c9
                                              • Instruction Fuzzy Hash: F3B1BFB15083459AE710DF60C845B6FB7E5FFC4708F00092DFA89A7291DB74A609CB9B
                                              APIs
                                              • LoadLibraryA.KERNEL32(00479E6A), ref: 00479E76
                                                • Part of subcall function 00479E8D: GetProcAddress.KERNEL32(00000000,00479E81), ref: 00479E8E
                                                • Part of subcall function 00479E8D: GetModuleFileNameA.KERNEL32(00000000,0047CA63,000000C8), ref: 00479EA3
                                                • Part of subcall function 00479E8D: CreateThread.KERNEL32(00000000,00000000,00479652,00000000,00000000), ref: 00479F01
                                                • Part of subcall function 00479E8D: CloseHandle.KERNEL32(?,1C567C50), ref: 00479F0A
                                              • CreateThread.KERNEL32(00000000,00000000,Function_00079849,00000000,00000000), ref: 00479FAA
                                              • CloseHandle.KERNEL32(?,00000000), ref: 00479FB3
                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 00479FC0
                                              • GetVersionExA.KERNEL32(?,?,00000000), ref: 0047A0BC
                                              Strings
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 00479ECD
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Create$CloseHandleThread$AddressEventFileLibraryLoadModuleNameProcVersion
                                              • String ID: SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 4113580538-621207024
                                              • Opcode ID: 9f06b138147dde36dface2e64d8b648724a67120387ec8aabe41be75442747ba
                                              • Instruction ID: 73b50628087bfaf0acc653257c73fcadd5b3fec066be936890dcc58f64a7acd3
                                              • Opcode Fuzzy Hash: 9f06b138147dde36dface2e64d8b648724a67120387ec8aabe41be75442747ba
                                              • Instruction Fuzzy Hash: 47A1B071408248BFEB219F648C5ABEE7B6CEF41304F04854AE84D9E182D6F85F45C76A
                                              APIs
                                                • Part of subcall function 00403B40: GetTickCount.KERNEL32 ref: 00403B41
                                                • Part of subcall function 00403B40: rand.MSVCRT ref: 00403B49
                                              • Sleep.KERNEL32(0000000A), ref: 00405527
                                              • ExitThread.KERNEL32 ref: 00405533
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CountExitSleepThreadTickrand
                                              • String ID: %d.%d.%d.%d$192.168.1.244$<6@$@$E$L8@$P$p8@$8@$[@
                                              • API String ID: 896407411-3061671333
                                              • Opcode ID: a9ee2490293e25e91a77c21d2959831a20bb89c8af2e816b72d14c690114d407
                                              • Instruction ID: 2acc1ecf18658df22ca3a7ea1314f5fe6e182d61b19c12b6ce0228fb74aabab8
                                              • Opcode Fuzzy Hash: a9ee2490293e25e91a77c21d2959831a20bb89c8af2e816b72d14c690114d407
                                              • Instruction Fuzzy Hash: 14B19D715083459AE710DF60C845B6FB7E5FFC4708F00492DFA89A7291DBB4AA09CB9B
                                              APIs
                                              • GetProcAddress.KERNEL32(00000000,00479E81), ref: 00479E8E
                                              • GetModuleFileNameA.KERNEL32(00000000,0047CA63,000000C8), ref: 00479EA3
                                              • CreateThread.KERNEL32(00000000,00000000,00479652,00000000,00000000), ref: 00479F01
                                              • CloseHandle.KERNEL32(?,1C567C50), ref: 00479F0A
                                              • CreateThread.KERNEL32(00000000,00000000,Function_00079849,00000000,00000000), ref: 00479FAA
                                              • CloseHandle.KERNEL32(?,00000000), ref: 00479FB3
                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 00479FC0
                                                • Part of subcall function 004793C6: NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 0047940B
                                                • Part of subcall function 004793C6: NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 0047942A
                                                • Part of subcall function 004793C6: MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 00479454
                                                • Part of subcall function 004793C6: CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 00479461
                                                • Part of subcall function 004793C6: UnmapViewOfFile.KERNEL32(?), ref: 00479479
                                              Strings
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 00479ECD
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CloseCreateFileHandle$ThreadView$AddressEventInformationModuleNameOpenProcQuerySectionSystemUnmap
                                              • String ID: SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 3400179232-621207024
                                              • Opcode ID: 3176691832235144c822bda6bdece0b9c65d83022bcced3ec1f9b4779e38ef98
                                              • Instruction ID: fc5581227f9d1d93158e31406331e1dd6f9e64db049df1f60a84647a9d0915b1
                                              • Opcode Fuzzy Hash: 3176691832235144c822bda6bdece0b9c65d83022bcced3ec1f9b4779e38ef98
                                              • Instruction Fuzzy Hash: E0A1D271408248BFEB259F248C5EBEE7B6CEF81304F04855AE84D9E182D6F85F45C76A
                                              APIs
                                                • Part of subcall function 00403C10: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00403C20
                                                • Part of subcall function 00403C10: lstrcatA.KERNEL32(?,\Program Files\Internet Explorer\iexplore.exe,?,00000104), ref: 00403C35
                                                • Part of subcall function 00403C10: lstrcpyA.KERNEL32(?,?,?,\Program Files\Internet Explorer\iexplore.exe,?,00000104), ref: 00403C48
                                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0040482E
                                              • Sleep.KERNEL32(00001388), ref: 0040483D
                                              • Sleep.KERNEL32(0000000A,?,00000000), ref: 0040498D
                                              • ExitThread.KERNEL32 ref: 00404997
                                              Strings
                                              • GET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#, xrefs: 004047E0
                                              • GET %s HTTP/1.1Host: %s:%d, xrefs: 004048A2
                                              • GET %s HTTP/1.1Host: %s, xrefs: 0040487D
                                              • GET %s HTTP/1.1Content-Type: text/htmlHost: %s:%dAccept: text/html, */*User-Agent:Mozilla/4.0 (compatible; MSIE %d.00; Windows NT %d.0; MyIE 3.01), xrefs: 0040492A
                                              • %s %s%s, xrefs: 004047A1
                                              • D, xrefs: 004047B4
                                              • <6@, xrefs: 0040477F
                                              • GET %s HTTP/1.1Content-Type: text/htmlHost: %sAccept: text/html, */*User-Agent:Mozilla/4.0 (compatible; MSIE %d.00; Windows NT %d.0; MyIE 3.01), xrefs: 004048E7
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Sleep$CreateDirectoryExitProcessSystemThreadlstrcatlstrcpy
                                              • String ID: %s %s%s$<6@$D$GET %s HTTP/1.1Content-Type: text/htmlHost: %sAccept: text/html, */*User-Agent:Mozilla/4.0 (compatible; MSIE %d.00; Windows NT %d.0; MyIE 3.01)$GET %s HTTP/1.1Content-Type: text/htmlHost: %s:%dAccept: text/html, */*User-Agent:Mozilla/4.0 (compatible; MSIE %d.00; Windows NT %d.0; MyIE 3.01)$GET %s HTTP/1.1Host: %s$GET %s HTTP/1.1Host: %s:%d$GET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#
                                              • API String ID: 2825703556-4267235928
                                              • Opcode ID: e08e1effa276eb7547b25f3cb29d33cb09f5be14afca26cf21ab89a8ec85cfde
                                              • Instruction ID: 3e73d33b29753aa0a0a8c23456e8152a650bf458f26c86c47ab00128547e0a80
                                              • Opcode Fuzzy Hash: e08e1effa276eb7547b25f3cb29d33cb09f5be14afca26cf21ab89a8ec85cfde
                                              • Instruction Fuzzy Hash: 6D51DAB25443446BD324DB64CD41FFB77A8ABC5704F004D3EF64AA32C1EA75AA048B9B
                                              APIs
                                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00404627
                                              • Sleep.KERNEL32(000007D0), ref: 00404632
                                              • Sleep.KERNEL32(0000000A), ref: 00404643
                                              • ExitThread.KERNEL32 ref: 00404649
                                              • Sleep.KERNEL32(00000032,?,00000000), ref: 00404704
                                              • ExitThread.KERNEL32 ref: 0040470F
                                                • Part of subcall function 00403C10: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00403C20
                                                • Part of subcall function 00403C10: lstrcatA.KERNEL32(?,\Program Files\Internet Explorer\iexplore.exe,?,00000104), ref: 00403C35
                                                • Part of subcall function 00403C10: lstrcpyA.KERNEL32(?,?,?,\Program Files\Internet Explorer\iexplore.exe,?,00000104), ref: 00403C48
                                              Strings
                                              • GET %s HTTP/1.1Content-Type: text/htmlHost: %sAccept: text/html, */*User-Agent:Mozilla/5.0 (X11; U; Linux i686; en-US; re:1.4.0) Gecko/20080808 Firefox/%d.0, xrefs: 00404692
                                              • D, xrefs: 004045DB
                                              • %s %s%s, xrefs: 004045BE
                                              • <6@, xrefs: 004045C4, 0040469F
                                              • GET %s HTTP/1.1Referer: http://%s:80/http://%sHost: %sConnection: CloseCache-Control: no-cache, xrefs: 00404673
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Sleep$ExitThread$CreateDirectoryProcessSystemlstrcatlstrcpy
                                              • String ID: %s %s%s$<6@$D$GET %s HTTP/1.1Content-Type: text/htmlHost: %sAccept: text/html, */*User-Agent:Mozilla/5.0 (X11; U; Linux i686; en-US; re:1.4.0) Gecko/20080808 Firefox/%d.0$GET %s HTTP/1.1Referer: http://%s:80/http://%sHost: %sConnection: CloseCache-Control: no-cache
                                              • API String ID: 4106849892-1695404734
                                              • Opcode ID: 77bc9a4e8d2d1452da797db159c73d812a404676eedf890ee0f1537427deca61
                                              • Instruction ID: aea2a5038014d6908c877e8ed60871dbc4ffd7e4e280d37711b0d24c40857b9e
                                              • Opcode Fuzzy Hash: 77bc9a4e8d2d1452da797db159c73d812a404676eedf890ee0f1537427deca61
                                              • Instruction Fuzzy Hash: 66416671144345ABD320DB60CD45BEB77A9ABC4704F004D3EF786A32C1DA75A9058B9B
                                              APIs
                                              • LoadLibraryA.KERNEL32(?), ref: 004039C6
                                              • GetLastError.KERNEL32 ref: 004039D2
                                              • RaiseException.KERNEL32(C06D007E,00000000,00000001,?), ref: 00403A05
                                              • InterlockedExchange.KERNEL32(?,00000000), ref: 00403A17
                                              • LocalAlloc.KERNEL32(00000040,00000008), ref: 00403A2B
                                              • FreeLibrary.KERNEL32(00000000), ref: 00403A48
                                              • GetProcAddress.KERNEL32(?,?), ref: 00403AA9
                                              • GetLastError.KERNEL32 ref: 00403AB5
                                              • RaiseException.KERNEL32(C06D007F,00000000,00000001,?), ref: 00403AE7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ErrorExceptionLastLibraryRaise$AddressAllocExchangeFreeInterlockedLoadLocalProc
                                              • String ID: $
                                              • API String ID: 991255547-3993045852
                                              • Opcode ID: 256256f5bea5ef9629b74784c89f9cd366c968008bba8740bb1e0df359706086
                                              • Instruction ID: 003abd56770ea85181eee10679b32b4024c484e765cb6dd7374dfc17ffc6279b
                                              • Opcode Fuzzy Hash: 256256f5bea5ef9629b74784c89f9cd366c968008bba8740bb1e0df359706086
                                              • Instruction Fuzzy Hash: C3612DB5B006059FDB24CF99C984AAABBF9AB48301B10403EE956F7391D774EE04CF14
                                              APIs
                                              • ExitThread.KERNEL32 ref: 00405895
                                                • Part of subcall function 00403B40: GetTickCount.KERNEL32 ref: 00403B41
                                                • Part of subcall function 00403B40: rand.MSVCRT ref: 00403B49
                                              • Sleep.KERNEL32(00000028), ref: 00405887
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CountExitSleepThreadTickrand
                                              • String ID: %d.%d.%d.%d$<6@$AAAA$E$L8@$p8@$8@$[@
                                              • API String ID: 896407411-1437862014
                                              • Opcode ID: 2082310ec20457ce4bd3376e800f9b479eea37f891fde78d827ab7b4555d5ca3
                                              • Instruction ID: 7e6662bb6761759f066e7e86b2ee24da49ec5426ddd9b74326a3b1faf3b9be8f
                                              • Opcode Fuzzy Hash: 2082310ec20457ce4bd3376e800f9b479eea37f891fde78d827ab7b4555d5ca3
                                              • Instruction Fuzzy Hash: A0510470548380AAE320EF64CC45B5BB7E8EFD4308F00492DF695A72D1E7B595098B6B
                                              APIs
                                              • OpenMutexA.KERNEL32(001F0001,00000000,100200), ref: 004020DF
                                              • ReleaseMutex.KERNEL32(00000000), ref: 004020EC
                                              • CloseHandle.KERNEL32(00000000), ref: 004020F3
                                              • lstrcatA.KERNEL32(?,?), ref: 004021AC
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 004021BF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Mutex$AddressCloseHandleOpenProcReleaselstrcat
                                              • String ID: 100200$<6@$stf%c%c%c%c%c.exe
                                              • API String ID: 2376757572-3190100693
                                              • Opcode ID: d112f5c9d013e11b3731d5647da893e1883a61e01d2132f2d5a6d2d8178d5850
                                              • Instruction ID: 7c7aac5ec1300530b19c54ce4657de090f08845e18d217751b06ad59df05bcf8
                                              • Opcode Fuzzy Hash: d112f5c9d013e11b3731d5647da893e1883a61e01d2132f2d5a6d2d8178d5850
                                              • Instruction Fuzzy Hash: B731EBF26443007BE760AB60DD0AFAF7668BB44706F00453DF746B61C1EDB49604866B
                                              APIs
                                              • GetProcAddress.KERNEL32(00000000,7FE332C3), ref: 7FE332D0
                                              • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\sysWOW64\wbem\wmiprvse.exe,000000C8), ref: 7FE332E5
                                              • wsprintfA.USER32 ref: 7FE332FA
                                              • CreateThread.KERNEL32(00000000,00000000,7FE32C7D,00000000,00000000), ref: 7FE33343
                                              • CloseHandle.KERNEL32(?,0C1A4F68), ref: 7FE3334C
                                              • WSAStartup.WS2_32(00000101), ref: 7FE333D1
                                              • Sleep.KERNEL32(00001388,00000000,00000000), ref: 7FE333F3
                                                • Part of subcall function 7FE329F1: NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 7FE32A36
                                                • Part of subcall function 7FE329F1: NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 7FE32A55
                                                • Part of subcall function 7FE329F1: MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 7FE32A7F
                                                • Part of subcall function 7FE329F1: CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 7FE32A8C
                                                • Part of subcall function 7FE329F1: UnmapViewOfFile.KERNEL32(?), ref: 7FE32AA4
                                              Strings
                                              • C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1, xrefs: 7FE332F9
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 7FE3330F
                                              • C:\Windows\sysWOW64\wbem\wmiprvse.exe, xrefs: 7FE332E2, 7FE332F7
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2017052696.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_7fe30000_hrl97BF.jbxd
                                              Similarity
                                              • API ID: File$CloseHandleView$AddressCreateInformationModuleNameOpenProcQuerySectionSleepStartupSystemThreadUnmapwsprintf
                                              • String ID: C:\Windows\sysWOW64\wbem\wmiprvse.exe$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 3988882592-1392025104
                                              • Opcode ID: 5a2e8885b122901e0e527b3c98aa0eb90efe88ce56f4889f66029a75c3141c74
                                              • Instruction ID: 806d303376319e10b4faa7ba5eb60574f11820cef6a731847cf1d174f778dc29
                                              • Opcode Fuzzy Hash: 5a2e8885b122901e0e527b3c98aa0eb90efe88ce56f4889f66029a75c3141c74
                                              • Instruction Fuzzy Hash: 82319031904719FFDB619F61CC0EFEA362CDF41711F404219F96A6A080DAF06F05CAA6
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                              • String ID:
                                              • API String ID: 801014965-0
                                              • Opcode ID: e284ab8ee17c914b7e9ddb28410b1748839fce9069ce7daa9396d3e96ef4b395
                                              • Instruction ID: dc900e3830a3569765129a6993a161ee3a7e101abcc0f586eb7ca925653150ca
                                              • Opcode Fuzzy Hash: e284ab8ee17c914b7e9ddb28410b1748839fce9069ce7daa9396d3e96ef4b395
                                              • Instruction Fuzzy Hash: 9C414AB1840304AFDB209FA4DD45AAA7FACEB09711F20057EE842B72E1D7785A41CF68
                                              APIs
                                                • Part of subcall function 00403B40: GetTickCount.KERNEL32 ref: 00403B41
                                                • Part of subcall function 00403B40: rand.MSVCRT ref: 00403B49
                                              • Sleep.KERNEL32(0000000A,?,?,?,00000200), ref: 0040510F
                                              • ExitThread.KERNEL32 ref: 00405118
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CountExitSleepThreadTickrand
                                              • String ID: @$E$L8@$P$p8@$8@$[@
                                              • API String ID: 896407411-1894845992
                                              • Opcode ID: 6d76287d7377fc4d1ca150cdd5e1076a9e97807c64b402054d467cd7bc3b86a8
                                              • Instruction ID: d762af154df64fd3c6005db1ca3581d92c9b953f8629a195cdfd469d7596aa35
                                              • Opcode Fuzzy Hash: 6d76287d7377fc4d1ca150cdd5e1076a9e97807c64b402054d467cd7bc3b86a8
                                              • Instruction Fuzzy Hash: 30614C71548384AAD310DB64CC45B5FBBE9FF89308F40092DF688A72D1DAB49909CB9B
                                              APIs
                                              • malloc.MSVCRT ref: 0040424F
                                              • ExitThread.KERNEL32 ref: 004043BB
                                                • Part of subcall function 00403B40: GetTickCount.KERNEL32 ref: 00403B41
                                                • Part of subcall function 00403B40: rand.MSVCRT ref: 00403B49
                                              • sprintf.MSVCRT ref: 00404317
                                              • sprintf.MSVCRT ref: 00404348
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: sprintf$CountExitThreadTickmallocrand
                                              • String ID: #0%s!$%s/%s$(8@$:8@$L8@
                                              • API String ID: 3712263441-812610358
                                              • Opcode ID: 1fb8edccde2239dcf819b419ffd2f10b3402cd0bf8fe435dcda30660f774dccf
                                              • Instruction ID: 1928d251c466a658d3dfa1dbb8552598425e23835ae83e9358d9328c5b0794ed
                                              • Opcode Fuzzy Hash: 1fb8edccde2239dcf819b419ffd2f10b3402cd0bf8fe435dcda30660f774dccf
                                              • Instruction Fuzzy Hash: 1751A3B15043409FE310DB34C945B5BBAE4AFC4704F000A3EF69AA72D1E7B495058B5E
                                              APIs
                                              • GetSystemTime.KERNEL32(006F7584), ref: 006F389F
                                              • Sleep.KERNEL32(0000EA60), ref: 006F3911
                                              • gethostbyname.WS2_32(0D278125), ref: 006F396C
                                              • socket.WS2_32(00000002,00000001,00000000), ref: 006F3981
                                              • ioctlsocket.WS2_32(?,8004667E), ref: 006F399A
                                              • connect.WS2_32(?,?,00000010), ref: 006F39B3
                                              • Sleep.KERNEL32(?,00000010,BB010002,00000000,8004667E,?,00000001), ref: 006F39C1
                                              • closesocket.WS2_32 ref: 006F3A20
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, Offset: 006F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6f0000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Sleep$SystemTimeclosesocketconnectgethostbynameioctlsocketsocket
                                              • String ID: dahwgm.com
                                              • API String ID: 2474828227-4111878103
                                              • Opcode ID: b9cbcd502034ca6391bc477693aeae1c9470f5e239758c46d06d44a479c792e4
                                              • Instruction ID: 3f8560e37f41b1169ffa413409b900236450e9f1b64807606d27ab531247d85c
                                              • Opcode Fuzzy Hash: b9cbcd502034ca6391bc477693aeae1c9470f5e239758c46d06d44a479c792e4
                                              • Instruction Fuzzy Hash: 5F41B13160425DBAEB319E258C4EBE97B9FAF85710F044029FA49DE2C1D7F59F418B20
                                              APIs
                                                • Part of subcall function 0047740B: NtAdjustPrivilegesToken.NTDLL(?,00000000,?,00000000,00000000,00000000,?,00000001,00000000,00000000,00000002), ref: 0047742B
                                              • CloseHandle.KERNEL32(?), ref: 0047656E
                                              • FreeLibrary.KERNEL32(2DFEF72B,?,0047675C,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 00476779
                                              • CloseHandle.KERNEL32(?,?,0047675C,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 00476780
                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 0047678A
                                              • Process32First.KERNEL32 ref: 0047679D
                                              • Process32Next.KERNEL32 ref: 004767AE
                                              • OpenProcess.KERNEL32(0000002A,00000000,?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 004767C6
                                              • CreateRemoteThread.KERNEL32(?,00000000,00000000,-00003C38,00000002,00000000), ref: 00476803
                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 0047681E
                                              • CloseHandle.KERNEL32 ref: 0047682D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CloseHandle$CreateProcess32$AdjustFirstFreeLibraryNextOpenPrivilegesProcessRemoteSnapshotThreadTokenToolhelp32
                                              • String ID: csrs
                                              • API String ID: 931541398-2321902090
                                              • Opcode ID: 214ed8d877d5af5bdcbfeb92dfaf8d9be1786541dc830f75d8708442990ea625
                                              • Instruction ID: 4dbbaebd50a98f1d709f3ba35779d02a68b2b1df6c81aed282515aa3ed15899f
                                              • Opcode Fuzzy Hash: 214ed8d877d5af5bdcbfeb92dfaf8d9be1786541dc830f75d8708442990ea625
                                              • Instruction Fuzzy Hash: 7B118230505205BBEB296F21CD49BFF3A6EEF44745F01802EF84D99141CAB88F019E6E
                                              APIs
                                                • Part of subcall function 7FE313C1: LookupPrivilegeValueA.ADVAPI32(00000000,?), ref: 7FE313D1
                                                • Part of subcall function 7FE313C1: NtAdjustPrivilegesToken.NTDLL(?,00000000,?,00000000,00000000,00000000), ref: 7FE313E1
                                              • CloseHandle.KERNEL32(?), ref: 7FE305BC
                                              • FreeLibrary.KERNEL32(76DA0000,?,7FE307A4,00000000,000065A4,00000000,?,00000002,00000000,00000040,00000000,000065A4), ref: 7FE307C1
                                              • CloseHandle.KERNEL32(?,?,7FE307A4,00000000,000065A4,00000000,?,00000002,00000000,00000040,00000000,000065A4), ref: 7FE307C8
                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,000065A4,00000000,?,00000002,00000000,00000040,00000000,000065A4), ref: 7FE307D2
                                              • Process32First.KERNEL32 ref: 7FE307E5
                                              • Process32Next.KERNEL32 ref: 7FE307F6
                                              • OpenProcess.KERNEL32(0000002A,00000000,?,?,?,?,?,?,00000002,00000000,00000040,00000000,000065A4), ref: 7FE3080E
                                              • CreateRemoteThread.KERNEL32(?,00000000,00000000,-00002FC3,00000002,00000000), ref: 7FE3084B
                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,00000002,00000000,00000040,00000000,000065A4), ref: 7FE30866
                                              • CloseHandle.KERNEL32 ref: 7FE30875
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2017052696.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_7fe30000_hrl97BF.jbxd
                                              Similarity
                                              • API ID: CloseHandle$CreateProcess32$AdjustFirstFreeLibraryLookupNextOpenPrivilegePrivilegesProcessRemoteSnapshotThreadTokenToolhelp32Value
                                              • String ID: csrs
                                              • API String ID: 3908997113-2321902090
                                              • Opcode ID: 7a0311b27d1f69206ae28c9acee774715fd69c7f810f3bbf34c027bcac111cc0
                                              • Instruction ID: eba08b2346753bb0dc32dc5381f4741ba834f7a00a5bae23cd1368a28801996b
                                              • Opcode Fuzzy Hash: 7a0311b27d1f69206ae28c9acee774715fd69c7f810f3bbf34c027bcac111cc0
                                              • Instruction Fuzzy Hash: 6D119830A0A215FBEB255F21CC4DBBE3A7DDF44745F510028FA4799080DBB0DB41C6A6
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: strcspn$atoistrncpystrstr
                                              • String ID: (8@$:8@$L8@
                                              • API String ID: 896909712-67691562
                                              • Opcode ID: 74f2855ef3a0f674b5d1c88f69f431229b06cb2c14ad1b607f774191325958ff
                                              • Instruction ID: 423295b4073bef868c52a0da5d7697345aa104327ed5b96778bd2d0c64799647
                                              • Opcode Fuzzy Hash: 74f2855ef3a0f674b5d1c88f69f431229b06cb2c14ad1b607f774191325958ff
                                              • Instruction Fuzzy Hash: CA213931A002186BC710A778DD06BEA7765AF48714F0006BEFA5AF32C1DEB85A408B9D
                                              APIs
                                              • LoadLibraryA.KERNEL32(7FE332AC), ref: 7FE332B8
                                                • Part of subcall function 7FE332CF: GetProcAddress.KERNEL32(00000000,7FE332C3), ref: 7FE332D0
                                                • Part of subcall function 7FE332CF: GetModuleFileNameA.KERNEL32(00000000,C:\Windows\sysWOW64\wbem\wmiprvse.exe,000000C8), ref: 7FE332E5
                                                • Part of subcall function 7FE332CF: wsprintfA.USER32 ref: 7FE332FA
                                                • Part of subcall function 7FE332CF: CreateThread.KERNEL32(00000000,00000000,7FE32C7D,00000000,00000000), ref: 7FE33343
                                                • Part of subcall function 7FE332CF: CloseHandle.KERNEL32(?,0C1A4F68), ref: 7FE3334C
                                                • Part of subcall function 7FE332CF: WSAStartup.WS2_32(00000101), ref: 7FE333D1
                                                • Part of subcall function 7FE332CF: Sleep.KERNEL32(00001388,00000000,00000000), ref: 7FE333F3
                                              Strings
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 7FE3330F
                                              • hell32.dll,-1, xrefs: 7FE3330E
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2017052696.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_7fe30000_hrl97BF.jbxd
                                              Similarity
                                              • API ID: AddressCloseCreateFileHandleLibraryLoadModuleNameProcSleepStartupThreadwsprintf
                                              • String ID: SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$hell32.dll,-1
                                              • API String ID: 1694642180-1583563992
                                              • Opcode ID: 8f19a037a4958f9c4e4be2aea23628189e7a365a9e4db52631885ff5fdbb2ecd
                                              • Instruction ID: 12527aadef34871a68a9f0f3636c4070517339c0fc18d64a5fb64a9bfd057a23
                                              • Opcode Fuzzy Hash: 8f19a037a4958f9c4e4be2aea23628189e7a365a9e4db52631885ff5fdbb2ecd
                                              • Instruction Fuzzy Hash: F031E471918715BFD7229A208C4EFEA366CDF41711F804219F85A9E081DAF46F06D6A5
                                              APIs
                                              • Sleep.KERNEL32(00001388,00000000,00000000), ref: 7FE333F3
                                              • gethostbyname.WS2_32(ilo.brenz.pl), ref: 7FE33412
                                              • lstrlen.KERNEL32(ilo.brenz.pl), ref: 7FE3341D
                                              • socket.WS2_32(00000002,00000001,00000000), ref: 7FE33453
                                              • connect.WS2_32(?,7FE32EB6,00000010), ref: 7FE3346D
                                              • GetVersionExA.KERNEL32(?,?,7FE32EB6,00000010), ref: 7FE334B7
                                              • wsprintfA.USER32 ref: 7FE33566
                                              • Sleep.KERNEL32(00000064,?,?,C:\Windows\sysWOW64\wbem\wmiprvse.exe,7FE36125,00000000,?,C:\Windows\sysWOW64\wbem\wmiprvse.exe,00000000,?,?,00000000), ref: 7FE33612
                                              • GetTickCount.KERNEL32 ref: 7FE3361B
                                              • closesocket.WS2_32 ref: 7FE3363F
                                              • Sleep.KERNEL32(00007530), ref: 7FE33653
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2017052696.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_7fe30000_hrl97BF.jbxd
                                              Similarity
                                              • API ID: Sleep$CountTickVersionclosesocketconnectgethostbynamelstrlensocketwsprintf
                                              • String ID: C:\Windows\sysWOW64\wbem\wmiprvse.exe
                                              • API String ID: 2598339483-2345302899
                                              • Opcode ID: d8d5e14ce8bde0a1c939d63ec7781a2c4ff1cbe07d4ef513ca2b050a836d98cc
                                              • Instruction ID: d85bbd76be20f0a00c0cc1f3b58fd3048d72df3a51a8d270456399880643c19b
                                              • Opcode Fuzzy Hash: d8d5e14ce8bde0a1c939d63ec7781a2c4ff1cbe07d4ef513ca2b050a836d98cc
                                              • Instruction Fuzzy Hash: AC219171A04355BFEB259F24880DFAE3A7EEF41616F900504E80A9E194CBF0AB01DBA5
                                              APIs
                                              • LoadLibraryA.KERNEL32(00479F15), ref: 00479F21
                                                • Part of subcall function 00479F50: LoadLibraryA.KERNEL32(00479F44), ref: 00479F50
                                                • Part of subcall function 00479F50: CreateThread.KERNEL32(00000000,00000000,Function_00079849,00000000,00000000), ref: 00479FAA
                                                • Part of subcall function 00479F50: CloseHandle.KERNEL32(?,00000000), ref: 00479FB3
                                                • Part of subcall function 00479F50: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 00479FC0
                                                • Part of subcall function 00479F50: GetVersionExA.KERNEL32(?,?,00000000), ref: 0047A0BC
                                              • lstrlenA.KERNEL32(ilo.brenz.pl,?,00000000), ref: 0047A018
                                              • CreateThread.KERNEL32(00000000,00000000,Function_000797DA,6F6C6902,00000000), ref: 0047A175
                                              • CloseHandle.KERNEL32(?,00000000,6F6C6902,0047CA63,00000000,00000000), ref: 0047A17E
                                              • GetTickCount.KERNEL32 ref: 0047A1B7
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Create$CloseHandleLibraryLoadThread$CountEventTickVersionlstrlen
                                              • String ID:
                                              • API String ID: 2925003024-0
                                              • Opcode ID: 98c4dc3622c81e610166b3295d4bccfe550f8d2832964dac318e74891848542e
                                              • Instruction ID: 06a4968b1ad2d7077f08583ce9da1dd58def7fa499b792a6610bdfce13f11c6a
                                              • Opcode Fuzzy Hash: 98c4dc3622c81e610166b3295d4bccfe550f8d2832964dac318e74891848542e
                                              • Instruction Fuzzy Hash: D081D071408248BEEB219F348C59BEE7BACEF41304F04855AE8599E2C2D6F85F45C76A
                                              APIs
                                              • CloseHandle.KERNEL32(?), ref: 00401C02
                                              • CloseHandle.KERNEL32(?), ref: 00401C3F
                                              • LoadLibraryA.KERNEL32(PlusCtrl.dll), ref: 00401C52
                                              • CreateFileA.KERNEL32(PlusCtrl.dll,40000000,00000001,00000000,00000002,00000000,00000000), ref: 00401CF9
                                              • CloseHandle.KERNEL32(00000000,?,00000000,00000000), ref: 00401D37
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CloseHandle$CreateFileLibraryLoad
                                              • String ID: PlusCtrl.dll
                                              • API String ID: 4073770061-3813448905
                                              • Opcode ID: c6c2baf483a5c7817c0615bf604dfdbf5b4d22fa498cde7f9790926ec1ef48c2
                                              • Instruction ID: da15035d668b36466e8179076398aeffbcb361aec3f94f14ce4845e29cafbb59
                                              • Opcode Fuzzy Hash: c6c2baf483a5c7817c0615bf604dfdbf5b4d22fa498cde7f9790926ec1ef48c2
                                              • Instruction Fuzzy Hash: 214171715443019BE720CF34DD44B2BBBE4AB84764F140A2EF9A1B63F0E778D9458B9A
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ExitSleepThread
                                              • String ID: (8@$:8@$L8@$8@
                                              • API String ID: 2532117645-3614555925
                                              • Opcode ID: 03f13d39a4d50158b3b0a3e900b25450fd1bb83df8e0ac367b200edcad169de3
                                              • Instruction ID: 45af933c2d0913eb26ad9620014091e4a7ed23ef7f5d571b2848da93812ef47f
                                              • Opcode Fuzzy Hash: 03f13d39a4d50158b3b0a3e900b25450fd1bb83df8e0ac367b200edcad169de3
                                              • Instruction Fuzzy Hash: EE310231604300ABD310AF24ED45BAFB7A8EF95311F00443DF689A72C1CA7499098B9A
                                              APIs
                                                • Part of subcall function 00402500: EnumResourceNamesA.KERNEL32(00000000,0000000A,Function_00002430,00000000), ref: 0040250B
                                                • Part of subcall function 00402520: lstrcpyA.KERNEL32(?,SYSTEM\CurrentControlSet\Services\), ref: 00402533
                                                • Part of subcall function 00402520: lstrcatA.KERNEL32(?,100200), ref: 00402543
                                                • Part of subcall function 00401980: LoadLibraryA.KERNEL32 ref: 004019A0
                                                • Part of subcall function 004012B0: CreateThread.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 004012C2
                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,Function_000019C0,00000000), ref: 00402864
                                              • CloseHandle.KERNEL32(?), ref: 0040286D
                                              • Sleep.KERNEL32(0000012C), ref: 00402887
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CloseCreateEnumHandleLibraryLoadNamesObjectResourceSingleSleepThreadWaitlstrcatlstrcpy
                                              • String ID: <6@$hra%u.dll$8@
                                              • API String ID: 3019664125-4073101535
                                              • Opcode ID: b727a94cfc5c1870f1e87c0db4c5fd5ae21f5c357b8a6d8ebe3cffbda59e6732
                                              • Instruction ID: b4c6470f87cb35eaba9384fad452608e987ecd5d27c4b6046072c90e75b6b2b8
                                              • Opcode Fuzzy Hash: b727a94cfc5c1870f1e87c0db4c5fd5ae21f5c357b8a6d8ebe3cffbda59e6732
                                              • Instruction Fuzzy Hash: B701D275240300ABD200BB70EE8AFAAB364AB48710F10063EFA51721E2DEF994018B6D
                                              APIs
                                              • Sleep.KERNEL32(00000032,?,00000000), ref: 004044EC
                                              • ExitThread.KERNEL32 ref: 004044F6
                                                • Part of subcall function 00403B40: GetTickCount.KERNEL32 ref: 00403B41
                                                • Part of subcall function 00403B40: rand.MSVCRT ref: 00403B49
                                              Strings
                                              • GET %s HTTP/1.1Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */*Accept-Language: zh-cnAccept-Encoding: gzip, deflateUser-Agent:Mo, xrefs: 00404443
                                              • <6@, xrefs: 00404449, 0040448B
                                              • GET %s HTTP/1.1Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */*Accept-Language: zh-cnAccept-Encoding: gzip, deflateUser-Agent:Mo, xrefs: 00404485
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CountExitSleepThreadTickrand
                                              • String ID: <6@$GET %s HTTP/1.1Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */*Accept-Language: zh-cnAccept-Encoding: gzip, deflateUser-Agent:Mo$GET %s HTTP/1.1Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */*Accept-Language: zh-cnAccept-Encoding: gzip, deflateUser-Agent:Mo
                                              • API String ID: 896407411-1180673266
                                              • Opcode ID: 9c0648faaa7c580b1096e69dcd622242baed2352659d7df1ab5bc987a3810d2b
                                              • Instruction ID: fa830c5a6accc8db5a56bc8424976762d41b4de0ccec1c973aff273b9f1804e2
                                              • Opcode Fuzzy Hash: 9c0648faaa7c580b1096e69dcd622242baed2352659d7df1ab5bc987a3810d2b
                                              • Instruction Fuzzy Hash: 0831DBF15043406BE210EB24DC46FFBB3ACEB94305F04093DF645E21C2EA756A0886AB
                                              APIs
                                              • ExitThread.KERNEL32 ref: 00403E83
                                                • Part of subcall function 00403B40: GetTickCount.KERNEL32 ref: 00403B41
                                                • Part of subcall function 00403B40: rand.MSVCRT ref: 00403B49
                                              • Sleep.KERNEL32(00000005), ref: 00403E6D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CountExitSleepThreadTickrand
                                              • String ID: :8@$L8@$p8@
                                              • API String ID: 896407411-1348165829
                                              • Opcode ID: 3e75125e98315a6c303164bdcc62422dc0ac1f7090f3bf2c4196777fe1904896
                                              • Instruction ID: c0699dc0de98f8c7b82e62ff3ffffc6daf283feedac10fb4a2c39f1d9fb6e09f
                                              • Opcode Fuzzy Hash: 3e75125e98315a6c303164bdcc62422dc0ac1f7090f3bf2c4196777fe1904896
                                              • Instruction Fuzzy Hash: 1821F3316043006BE3109B15DD45BABB7EAAFC8705F00093DF689B72C1DAB45A088BDB
                                              APIs
                                              • CloseHandle.KERNEL32(?), ref: 00401C02
                                              • CloseHandle.KERNEL32(?), ref: 00401C3F
                                              • LoadLibraryA.KERNEL32(PlusCtrl.dll), ref: 00401C52
                                              • lstrlenA.KERNEL32(?), ref: 00401EB1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CloseHandle$LibraryLoadlstrlen
                                              • String ID: PlusCtrl.dll
                                              • API String ID: 1302537757-3813448905
                                              • Opcode ID: 9d6033b6bf4a2c9d292d010c3143f14cd85b7083ffd7105bc62b5e031c1c6f82
                                              • Instruction ID: fe13cccd782696a5966384611aa504fe5a24fcd4d90c73c14022dd0c19df5bb8
                                              • Opcode Fuzzy Hash: 9d6033b6bf4a2c9d292d010c3143f14cd85b7083ffd7105bc62b5e031c1c6f82
                                              • Instruction Fuzzy Hash: 303160715443019BE720CF24DD44E6BB7E8ABC4754F144A2EF9A1A32E0E738E845CB56
                                              APIs
                                                • Part of subcall function 00403B40: GetTickCount.KERNEL32 ref: 00403B41
                                                • Part of subcall function 00403B40: rand.MSVCRT ref: 00403B49
                                              • Sleep.KERNEL32(00000014), ref: 00403D53
                                              • ExitThread.KERNEL32 ref: 00403D65
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CountExitSleepThreadTickrand
                                              • String ID: :8@$L8@$p8@
                                              • API String ID: 896407411-1348165829
                                              • Opcode ID: 653889bf93ce3dc5ae69bcf3ca1f034d621d2bbf8dda7ff92a3885e57a6f8e2a
                                              • Instruction ID: 61c35c1a6ef796fb9a95b154365f1d274a12748536e75e316c168b2b6ba842ad
                                              • Opcode Fuzzy Hash: 653889bf93ce3dc5ae69bcf3ca1f034d621d2bbf8dda7ff92a3885e57a6f8e2a
                                              • Instruction Fuzzy Hash: 0321D131244304ABE3249B14DD16B6BB7A9EB84B04F00093DF689A72D1CBB59A08879A
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ExitSleepThread
                                              • String ID: :8@$L8@$p8@
                                              • API String ID: 2532117645-1348165829
                                              • Opcode ID: 4ec5ed0947da0d90acb00254561b95d3ed25ab39c8d3cff82c102e6db47b881b
                                              • Instruction ID: 5552c68df3c5ec419ed120abdad0def72af0b1e7849d46ccb2dcea0349e472ec
                                              • Opcode Fuzzy Hash: 4ec5ed0947da0d90acb00254561b95d3ed25ab39c8d3cff82c102e6db47b881b
                                              • Instruction Fuzzy Hash: 45119030244304ABE324DB50DE4AB6B77E9EF85704F00092DF689B61D1DBF49D088B9B
                                              APIs
                                              • lstrcpyA.KERNEL32(?,SYSTEM\CurrentControlSet\Services\), ref: 00402AF6
                                              • lstrcatA.KERNEL32(00000000,100200), ref: 00402B06
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcatlstrcpy
                                              • String ID: 100200$F7@$SYSTEM\CurrentControlSet\Services\
                                              • API String ID: 3905823039-3017750547
                                              • Opcode ID: 99f8f17f0a694f6518748ee4b6ac97a82841e6c45d2c058385b64cf9619508e7
                                              • Instruction ID: 81adf45cb320d8295d14ce0b174844155e5595c11b4d55a8e5ae176a8c1ac5a8
                                              • Opcode Fuzzy Hash: 99f8f17f0a694f6518748ee4b6ac97a82841e6c45d2c058385b64cf9619508e7
                                              • Instruction Fuzzy Hash: B5F08231248206BEE750D764DD05FAAB7A8ABD4700F108D3DB2C9A20E0D9B8915D8716
                                              APIs
                                              • GetTempPathA.KERNEL32(00000104), ref: 0047874D
                                                • Part of subcall function 00478768: GetTempFileNameA.KERNEL32(?,00478764,00000000,?), ref: 00478769
                                                • Part of subcall function 00478768: CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000,?,00478764,00000000,?), ref: 00478784
                                                • Part of subcall function 00478768: WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000104,?,00000000,?,00478764,00000000,?), ref: 004787B4
                                                • Part of subcall function 00478768: CloseHandle.KERNEL32(?,00000104,?,00000000,?,00478764,00000000,?), ref: 004787C0
                                                • Part of subcall function 00478768: CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000104,?,00000000,?,00478764), ref: 004787E4
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$CreateTemp$CloseHandleNamePathProcessWrite
                                              • String ID:
                                              • API String ID: 3982275768-0
                                              • Opcode ID: 2d38deb6aefaf5fafd3701ae89f7df2c8b85ad1d9cd8c4e8e23ab3e50bde978c
                                              • Instruction ID: 818476e441276dc42d84f657b397e929fa4b9a4741cf0798d1270138581a510b
                                              • Opcode Fuzzy Hash: 2d38deb6aefaf5fafd3701ae89f7df2c8b85ad1d9cd8c4e8e23ab3e50bde978c
                                              • Instruction Fuzzy Hash: D721D5B1180306BFE7255A21CC8EFFF7B2CEF95B00F104519FA0A89181DBB55E158669
                                              APIs
                                              • GetTempPathA.KERNEL32(00000104), ref: 7FE32703
                                                • Part of subcall function 7FE3271E: GetTempFileNameA.KERNEL32(?,7FE3271A,00000000,?), ref: 7FE3271F
                                                • Part of subcall function 7FE3271E: CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000,?,7FE3271A,00000000,?), ref: 7FE3273A
                                                • Part of subcall function 7FE3271E: WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000104,?,00000000,?,7FE3271A,00000000,?), ref: 7FE3276A
                                                • Part of subcall function 7FE3271E: CloseHandle.KERNEL32(?,00000104,?,00000000,?,7FE3271A,00000000,?), ref: 7FE32776
                                                • Part of subcall function 7FE3271E: CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000104,?,00000000,?,7FE3271A), ref: 7FE3279A
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2017052696.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_7fe30000_hrl97BF.jbxd
                                              Similarity
                                              • API ID: File$CreateTemp$CloseHandleNamePathProcessWrite
                                              • String ID:
                                              • API String ID: 3982275768-0
                                              • Opcode ID: bf7059baa2945a1e10e6b512662fb3aa47ecbf22e134ef99b631c6adeccb2904
                                              • Instruction ID: e8ff87219964215428be11df8a01d81b33858c950305ba854321610fda46bc39
                                              • Opcode Fuzzy Hash: bf7059baa2945a1e10e6b512662fb3aa47ecbf22e134ef99b631c6adeccb2904
                                              • Instruction Fuzzy Hash: 1621C3B1645306BFE7215B20CC4DFEB7B2CEF86711F404114F94689081E7B1AE15C6A6
                                              APIs
                                              • GetTempPathA.KERNEL32(00000104), ref: 006F278C
                                                • Part of subcall function 006F27A7: GetTempFileNameA.KERNEL32(?,006F27A3,00000000,?), ref: 006F27A8
                                                • Part of subcall function 006F27A7: CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000,?,006F27A3,00000000,?), ref: 006F27C3
                                                • Part of subcall function 006F27A7: WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000104,?,00000000,?,006F27A3,00000000,?), ref: 006F27F3
                                                • Part of subcall function 006F27A7: CloseHandle.KERNEL32(?,00000104,?,00000000,?,006F27A3,00000000,?), ref: 006F27FF
                                                • Part of subcall function 006F27A7: CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000104,?,00000000,?,006F27A3), ref: 006F2823
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, Offset: 006F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6f0000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$CreateTemp$CloseHandleNamePathProcessWrite
                                              • String ID:
                                              • API String ID: 3982275768-0
                                              • Opcode ID: 2d38deb6aefaf5fafd3701ae89f7df2c8b85ad1d9cd8c4e8e23ab3e50bde978c
                                              • Instruction ID: e5d6aa81c65bbb309d8522c2631df0a2cee08fc121a5904326f5cba85543753b
                                              • Opcode Fuzzy Hash: 2d38deb6aefaf5fafd3701ae89f7df2c8b85ad1d9cd8c4e8e23ab3e50bde978c
                                              • Instruction Fuzzy Hash: 8821D5B114420ABFE7215A20CC5EFFF3A2DEF95B10F000519FA4599181D7B19E158AB6
                                              APIs
                                              • GetTempFileNameA.KERNEL32(?,00478764,00000000,?), ref: 00478769
                                              • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000,?,00478764,00000000,?), ref: 00478784
                                              • WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000104,?,00000000,?,00478764,00000000,?), ref: 004787B4
                                              • CloseHandle.KERNEL32(?,00000104,?,00000000,?,00478764,00000000,?), ref: 004787C0
                                              • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000104,?,00000000,?,00478764), ref: 004787E4
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$Create$CloseHandleNameProcessTempWrite
                                              • String ID:
                                              • API String ID: 463619559-0
                                              • Opcode ID: bbf5c5561a5178fb7ef464295b4b729c13e68fcf671b41c3dcb44b7c67eff673
                                              • Instruction ID: f9384e7524f948391849e77edfd83035576d2aa7e9ef77b067fd291cb22e7d4d
                                              • Opcode Fuzzy Hash: bbf5c5561a5178fb7ef464295b4b729c13e68fcf671b41c3dcb44b7c67eff673
                                              • Instruction Fuzzy Hash: EC1180B1140606BBEB250B21CC4EFFF7A2DEF94B11F10451DFA0A89080DBF59F5186A8
                                              APIs
                                              • GetTempFileNameA.KERNEL32(?,7FE3271A,00000000,?), ref: 7FE3271F
                                              • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000,?,7FE3271A,00000000,?), ref: 7FE3273A
                                              • WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000104,?,00000000,?,7FE3271A,00000000,?), ref: 7FE3276A
                                              • CloseHandle.KERNEL32(?,00000104,?,00000000,?,7FE3271A,00000000,?), ref: 7FE32776
                                              • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000104,?,00000000,?,7FE3271A), ref: 7FE3279A
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2017052696.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_7fe30000_hrl97BF.jbxd
                                              Similarity
                                              • API ID: File$Create$CloseHandleNameProcessTempWrite
                                              • String ID:
                                              • API String ID: 463619559-0
                                              • Opcode ID: 46a42b1a7938ce57373cf3b37306313736b16861edf51c12b33c8459ee93000f
                                              • Instruction ID: 53811a8245002154d32b689494dec5e7fa63c0c5570ca99e0030f64d1e6d62be
                                              • Opcode Fuzzy Hash: 46a42b1a7938ce57373cf3b37306313736b16861edf51c12b33c8459ee93000f
                                              • Instruction Fuzzy Hash: C91161B1600605BFE7251B20CC4DFEB7A2CEF89B11F404518FA4698480EBF1AE1186A5
                                              APIs
                                              • GetTempFileNameA.KERNEL32(?,006F27A3,00000000,?), ref: 006F27A8
                                              • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000,?,006F27A3,00000000,?), ref: 006F27C3
                                              • WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000104,?,00000000,?,006F27A3,00000000,?), ref: 006F27F3
                                              • CloseHandle.KERNEL32(?,00000104,?,00000000,?,006F27A3,00000000,?), ref: 006F27FF
                                              • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000104,?,00000000,?,006F27A3), ref: 006F2823
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, Offset: 006F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6f0000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$Create$CloseHandleNameProcessTempWrite
                                              • String ID:
                                              • API String ID: 463619559-0
                                              • Opcode ID: bbf5c5561a5178fb7ef464295b4b729c13e68fcf671b41c3dcb44b7c67eff673
                                              • Instruction ID: ced304d001c2525b7cac575f73587a46ed6eb601c29202d9e8bda7fb17f98e7e
                                              • Opcode Fuzzy Hash: bbf5c5561a5178fb7ef464295b4b729c13e68fcf671b41c3dcb44b7c67eff673
                                              • Instruction Fuzzy Hash: 94116DB110060ABBEB251B20CC5AFFB7A2DEF84B10F004519FA0699080DBF59E519AA8
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CountExitThreadTick
                                              • String ID: 8@$[@
                                              • API String ID: 2794094058-2583875052
                                              • Opcode ID: ff3c58b0bdba37a238cd5a4d168293157beaed9c7ed117d7eea0098dd14a9af2
                                              • Instruction ID: 469505ee80aad82e613372910616f7cc737cc72fb2d144b40eece11ab5930af1
                                              • Opcode Fuzzy Hash: ff3c58b0bdba37a238cd5a4d168293157beaed9c7ed117d7eea0098dd14a9af2
                                              • Instruction Fuzzy Hash: BF31C2715043409BE320EB14DC09B9BB7A5AB84715F04493EF789BB2D1D675A5088B9B
                                              APIs
                                              • Sleep.KERNEL32(00000005,?,00000000), ref: 00404A80
                                              • ExitThread.KERNEL32 ref: 00404A8D
                                              Strings
                                              • GET %s HTTP/1.1Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */*Accept-Language: zh-cnAccept-Encoding: gzip, deflateUser-Agent:Mo, xrefs: 00404A2E
                                              • <6@, xrefs: 004049E2
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ExitSleepThread
                                              • String ID: <6@$GET %s HTTP/1.1Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */*Accept-Language: zh-cnAccept-Encoding: gzip, deflateUser-Agent:Mo
                                              • API String ID: 2532117645-2365876256
                                              • Opcode ID: c3d47d769dcbd41a8f4167cd28f1adef2b6d86539016551bb7ef57a848531342
                                              • Instruction ID: e6dcf0b5b1e536148edb8c7bcee7a6828d1d94e54290116fa950f8d1a6053691
                                              • Opcode Fuzzy Hash: c3d47d769dcbd41a8f4167cd28f1adef2b6d86539016551bb7ef57a848531342
                                              • Instruction Fuzzy Hash: 0E21A572144344AFD324DB24DD45FEB73A8EF85315F00493DF685A2281EF7565098BAB
                                              APIs
                                              • GetProcAddress.KERNEL32(?,ProcessTrans), ref: 0040182F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressProc
                                              • String ID: %u.%u.%u.%u$<6@$ProcessTrans
                                              • API String ID: 190572456-2997530932
                                              • Opcode ID: 923ab22f828fa07c49138cca62a50a6aac9a6e92c9ae45124c644abfdc677477
                                              • Instruction ID: 3a4176f581b1380518edbe1a1b49e1bd09d6b00a217a4bcfab538be4d270b979
                                              • Opcode Fuzzy Hash: 923ab22f828fa07c49138cca62a50a6aac9a6e92c9ae45124c644abfdc677477
                                              • Instruction Fuzzy Hash: E901A172414302AFD314DB24CD85E7B77A8EFC4704F048A3CF895A62D0DB78D9088B9A
                                              APIs
                                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00403C20
                                              • lstrcatA.KERNEL32(?,\Program Files\Internet Explorer\iexplore.exe,?,00000104), ref: 00403C35
                                              • lstrcpyA.KERNEL32(?,?,?,\Program Files\Internet Explorer\iexplore.exe,?,00000104), ref: 00403C48
                                              Strings
                                              • \Program Files\Internet Explorer\iexplore.exe, xrefs: 00403C2A
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: DirectorySystemlstrcatlstrcpy
                                              • String ID: \Program Files\Internet Explorer\iexplore.exe
                                              • API String ID: 2630975639-1907246925
                                              • Opcode ID: 9d610355a3853537af27de88a3b84bfec3623b09a142c4852019a6b4888a0da7
                                              • Instruction ID: 58d9aff6231955fab03da148272387ac6a18f6e7ddf61f3ccb84cd9a8b5690bb
                                              • Opcode Fuzzy Hash: 9d610355a3853537af27de88a3b84bfec3623b09a142c4852019a6b4888a0da7
                                              • Instruction Fuzzy Hash: 4FE086F4548340ABD710D754D948FAA77A4BB94305F45882CB5CDD2190D6B8809CC71A
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32.dll,TerminateProcess), ref: 0040451A
                                              • GetProcAddress.KERNEL32(00000000), ref: 00404521
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: TerminateProcess$kernel32.dll
                                              • API String ID: 2574300362-189552057
                                              • Opcode ID: 6f636aeb74e389af04e2a293c086324e8f42b9283dc5f0b57c6f061e2f8a9beb
                                              • Instruction ID: 033c7f9598048c8c3c56f6b884b3fb58df83f6f11900fedc1394fc5852d01883
                                              • Opcode Fuzzy Hash: 6f636aeb74e389af04e2a293c086324e8f42b9283dc5f0b57c6f061e2f8a9beb
                                              • Instruction Fuzzy Hash: 78C012B2681300AAC2806BA0BE08A643710A285A2A320103BF602B00E0CA3A00208B2D
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32.dll,SizeofResource), ref: 004012EA
                                              • GetProcAddress.KERNEL32(00000000), ref: 004012F1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: SizeofResource$kernel32.dll
                                              • API String ID: 2574300362-1445693867
                                              • Opcode ID: 971289207801f0adfb33d8d7a52fdaf637566f62aa59e6dc078033588d0b97f7
                                              • Instruction ID: 1f67b7e38132fca7fb6d3c7304225dc3284bb93b5259144f6b05d2bd588ba888
                                              • Opcode Fuzzy Hash: 971289207801f0adfb33d8d7a52fdaf637566f62aa59e6dc078033588d0b97f7
                                              • Instruction Fuzzy Hash: B4C09B705C1300DBC7406BF07F0DA0537556645F41311007EB843F11F0CEB910115B1D
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: #2379#470#755MessageSend
                                              • String ID:
                                              • API String ID: 516545250-0
                                              • Opcode ID: 19307cc0112b641f42c05127e240e9b621d2d73733c872dcc2d07d297b7f00d4
                                              • Instruction ID: ae483ed0e89d9e4723fdc79b7f6c9c7c3acea37d86427cf1e14bb756db3c141b
                                              • Opcode Fuzzy Hash: 19307cc0112b641f42c05127e240e9b621d2d73733c872dcc2d07d297b7f00d4
                                              • Instruction Fuzzy Hash: 3D117C712143029BC214DF39DE89D6BBBEAFFD8205F084A2DF58AD32D0DA34E9058B55
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Sleep
                                              • String ID: X7@
                                              • API String ID: 3472027048-2067089342
                                              • Opcode ID: 92fada5cfdbc6a922edbaf3abd6bdbc867ed69b1f2908b021d67a98f8e651ac5
                                              • Instruction ID: 56058c761996469b055373d7f4e5675fd511cabc212af0c966289d5b43759b51
                                              • Opcode Fuzzy Hash: 92fada5cfdbc6a922edbaf3abd6bdbc867ed69b1f2908b021d67a98f8e651ac5
                                              • Instruction Fuzzy Hash: EE21F9B12982129BDB00DF71EF08B5A3B66A7D8745F10843EE184762E4CFB95445CFAC
                                              APIs
                                              • #324.MFC42(00000066,00000000,?,?,00000000,00405C38,000000FF,004010ED,00000000), ref: 00401214
                                              • #1168.MFC42(00000066,00000000,?,?,00000000), ref: 00401227
                                              • #1146.MFC42(00000080,0000000E,00000080,00000066,00000000,?,?,00000000), ref: 00401238
                                              • LoadIconA.USER32(00000000,00000080), ref: 0040123E
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: #1146#1168#324IconLoad
                                              • String ID:
                                              • API String ID: 193567849-0
                                              • Opcode ID: b0d8ebbce458bee7b7671c312a9a251e003c61d6e3bc7029ecfa220d6c6ff1fb
                                              • Instruction ID: 5f364d0ca6f0da87c9e4d08cbfa7f53ff09ba6a78162f9d23447e03a582c3780
                                              • Opcode Fuzzy Hash: b0d8ebbce458bee7b7671c312a9a251e003c61d6e3bc7029ecfa220d6c6ff1fb
                                              • Instruction Fuzzy Hash: 0CF082B1644B50ABE310DF59CD42B0ABAD8FB04B11F008A2EF591A77C0CBBD95008B59
                                              APIs
                                              • GetModuleHandleA.KERNEL32(0019FF0C), ref: 004770FE
                                              • GetProcAddress.KERNEL32(00000000,00477197), ref: 00477109
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressHandleModuleProc
                                              • String ID: .DLL
                                              • API String ID: 1646373207-899428287
                                              • Opcode ID: 9b51216898ffcb4fe806c96a28a5bcfa5a3a5ee25ac287b27db5695e7a1a30a7
                                              • Instruction ID: 7b29dc7dbdc5564260aebfda9c3e9341b44fd7a4bf5765f7172cf8c8c37ad89c
                                              • Opcode Fuzzy Hash: 9b51216898ffcb4fe806c96a28a5bcfa5a3a5ee25ac287b27db5695e7a1a30a7
                                              • Instruction Fuzzy Hash: A601C03060F104EA8F649E3CC949AFA3BADFF44341FC08556E90D8B696C7788E41979E
                                              APIs
                                              • GetModuleHandleA.KERNEL32(0380FF20), ref: 7FE310E8
                                              • GetProcAddress.KERNEL32(00000000,7FE31181), ref: 7FE310F3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2017052696.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_7fe30000_hrl97BF.jbxd
                                              Similarity
                                              • API ID: AddressHandleModuleProc
                                              • String ID: .DLL
                                              • API String ID: 1646373207-899428287
                                              • Opcode ID: 5fdbe1fdb9a291c56d0de1b0085fc354e7c21eb32f0bc32c042edfe8f07510ff
                                              • Instruction ID: 5900f217701f080c4111b40af2f692126b674fcdb3668acd741284d8170f4144
                                              • Opcode Fuzzy Hash: 5fdbe1fdb9a291c56d0de1b0085fc354e7c21eb32f0bc32c042edfe8f07510ff
                                              • Instruction Fuzzy Hash: B301C835D00584EBC7659F38C54DADF3B7BEF08266F800118E5268A455C6F8DA90CFA1
                                              APIs
                                              • GetModuleHandleA.KERNEL32(0365FCF0), ref: 006F113D
                                              • GetProcAddress.KERNEL32(00000000,006F11D6), ref: 006F1148
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2016226259.00000000006F0000.00000040.10000000.00040000.00000000.sdmp, Offset: 006F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6f0000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressHandleModuleProc
                                              • String ID: .DLL
                                              • API String ID: 1646373207-899428287
                                              • Opcode ID: 82aecbdba2b6c313781f1a35b90d956a9f8d4ce40e6713e346beece58f6b0b34
                                              • Instruction ID: ad701b94ddcba6a2c9a070a3db55a21709ca0bea512e2976f6d1407f2ad5bdff
                                              • Opcode Fuzzy Hash: 82aecbdba2b6c313781f1a35b90d956a9f8d4ce40e6713e346beece58f6b0b34
                                              • Instruction Fuzzy Hash: BC018030607009EADF65DE6CC849AFA3B6EEF063D1F104114EB1A8F256CB708E9186A5
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2014756449.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000006.00000002.2014725154.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014788210.0000000000406000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014819168.0000000000408000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014850226.000000000040A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014883689.0000000000411000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014914420.0000000000414000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014948163.000000000041A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2014980693.000000000041B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015012838.0000000000420000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015046451.0000000000422000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015078963.0000000000428000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015111287.0000000000429000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015145266.000000000042E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015180018.0000000000430000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015213526.0000000000436000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015246635.0000000000437000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015280644.000000000043C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015317535.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015349617.000000000043F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015382690.0000000000444000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015416441.0000000000445000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015458095.000000000044A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015494843.000000000044C000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015528471.0000000000452000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015562799.0000000000453000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015596431.0000000000458000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015635043.000000000045A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015668372.000000000045B000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015702055.0000000000460000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015736897.0000000000461000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015772590.0000000000466000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015806142.0000000000468000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015842352.0000000000469000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015875687.000000000046E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015907050.000000000046F000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015944598.0000000000474000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2015978096.0000000000476000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016014832.000000000047D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000006.00000002.2016049473.0000000000482000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_400000_hrl97BF.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID: <6@$hra%u.dll
                                              • API String ID: 1029625771-964591844
                                              • Opcode ID: 2390837fc517bc62a5bb002552fb09d752def2f0a1c79550ccc7e106046599eb
                                              • Instruction ID: e7fbf41a89d2fe79915ad9526865f0c88ed692e155a9173a154c572c31764057
                                              • Opcode Fuzzy Hash: 2390837fc517bc62a5bb002552fb09d752def2f0a1c79550ccc7e106046599eb
                                              • Instruction Fuzzy Hash: C1D0A77059030167D710A770ED4AAA633646B54700F444A3D7686D11D0EABD815CC689

                                              Execution Graph

                                              Execution Coverage:2.5%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:0%
                                              Total number of Nodes:1867
                                              Total number of Limit Nodes:4
                                              execution_graph 13176 401040 13177 401048 13176->13177 13178 401058 13177->13178 13179 40104f #825 13177->13179 13179->13178 14810 9b1399 LookupPrivilegeValueA NtAdjustPrivilegesToken 13184 40384d 13186 403814 13184->13186 13186->13184 13187 403920 13186->13187 13188 40397e 13187->13188 13189 4039c3 LoadLibraryA 13188->13189 13191 403a13 InterlockedExchange 13188->13191 13192 403a35 13188->13192 13202 403a91 13188->13202 13190 4039d2 GetLastError 13189->13190 13189->13191 13194 4039f2 RaiseException 13190->13194 13195 4039e4 13190->13195 13196 403a21 13191->13196 13197 403a47 FreeLibrary 13191->13197 13193 403aa5 GetProcAddress 13192->13193 13192->13202 13199 403ab5 GetLastError 13193->13199 13193->13202 13194->13202 13195->13191 13195->13194 13196->13192 13198 403a27 LocalAlloc 13196->13198 13197->13192 13198->13192 13200 403ac7 13199->13200 13201 403ad5 RaiseException 13200->13201 13200->13202 13201->13202 13202->13186 13203 40364f 13204 403628 13203->13204 13204->13203 13205 403920 9 API calls 13204->13205 13205->13204 14818 405b51 14819 405b56 14818->14819 14822 405b28 #1168 14819->14822 14823 405b42 _setmbcp 14822->14823 14824 405b4b 14822->14824 14823->14824 13209 403c60 13217 403b40 GetTickCount rand 13209->13217 13211 403c85 13218 403b40 GetTickCount rand 13211->13218 13213 403d63 ExitThread 13214 403c94 13214->13213 13215 403d51 Sleep 13214->13215 13215->13214 13216 403d62 13215->13216 13216->13213 13217->13211 13218->13214 13121 7fe35ac1 13124 7fe35ace 13121->13124 13125 7fe35acb 13124->13125 13126 7fe35ad9 13124->13126 13128 7fe35adf 13126->13128 13131 7fe324eb 13128->13131 13150 7fe324a6 NtOpenSection 13131->13150 13133 7fe324f3 13134 7fe324f9 NtMapViewOfSection CloseHandle 13133->13134 13135 7fe325d8 13133->13135 13134->13135 13137 7fe32531 13134->13137 13135->13125 13136 7fe32566 13152 7fe323ee NtProtectVirtualMemory NtWriteVirtualMemory 13136->13152 13137->13136 13151 7fe323ee NtProtectVirtualMemory NtWriteVirtualMemory 13137->13151 13140 7fe32577 13153 7fe323ee NtProtectVirtualMemory NtWriteVirtualMemory 13140->13153 13142 7fe32588 13154 7fe323ee NtProtectVirtualMemory NtWriteVirtualMemory 13142->13154 13144 7fe32599 13145 7fe325ae 13144->13145 13155 7fe323ee NtProtectVirtualMemory NtWriteVirtualMemory 13144->13155 13146 7fe325c3 13145->13146 13156 7fe323ee NtProtectVirtualMemory NtWriteVirtualMemory 13145->13156 13146->13135 13157 7fe323ee NtProtectVirtualMemory NtWriteVirtualMemory 13146->13157 13150->13133 13151->13136 13152->13140 13153->13142 13154->13144 13155->13145 13156->13146 13157->13135 13226 7fe32fcb 13227 7fe32ff0 13226->13227 13274 7fe330be lstrcat CreateFileA 13227->13274 13230 7fe33102 13319 7fe33112 LoadLibraryA 13230->13319 13231 7fe330df WriteFile CloseHandle 13231->13230 13236 7fe33159 13237 7fe3316e GetTickCount 13236->13237 13238 7fe33186 13237->13238 13239 7fe33223 GetVolumeInformationA 13238->13239 13240 7fe33256 13239->13240 13241 7fe3329a 13240->13241 13242 7fe33285 Sleep DeleteFileA 13240->13242 13243 7fe33328 13241->13243 13366 7fe332b8 LoadLibraryA 13241->13366 13242->13241 13242->13242 13245 7fe33352 13243->13245 13246 7fe33334 CreateThread CloseHandle 13243->13246 13406 7fe33363 LoadLibraryA 13245->13406 13246->13245 13249 7fe31079 2 API calls 13251 7fe33381 13249->13251 13430 7fe33392 LoadLibraryA 13251->13430 13255 7fe31079 2 API calls 13256 7fe333b8 13255->13256 13257 7fe333c5 WSAStartup 13256->13257 13258 7fe3365e 13256->13258 13262 7fe333dd 13257->13262 13259 7fe333ee Sleep 13259->13262 13260 7fe33411 gethostbyname 13261 7fe3341c lstrlen 13260->13261 13260->13262 13261->13260 13261->13262 13262->13258 13262->13259 13262->13260 13263 7fe3344d socket 13262->13263 13265 7fe3364e Sleep 13262->13265 13266 7fe3363e closesocket 13262->13266 13272 7fe3360f Sleep 13262->13272 13263->13262 13264 7fe33462 connect 13263->13264 13264->13266 13269 7fe3347b 13264->13269 13265->13262 13266->13262 13267 7fe334ab GetVersionExA 13267->13269 13269->13267 13451 7fe33537 wsprintfA 13269->13451 13468 7fe33565 wsprintfA 13269->13468 13272->13262 13273 7fe3361b GetTickCount 13272->13273 13273->13262 13275 7fe33102 13274->13275 13276 7fe330df WriteFile CloseHandle 13274->13276 13277 7fe33112 129 API calls 13275->13277 13276->13275 13278 7fe33107 GetProcAddress LoadLibraryA 13277->13278 13280 7fe31079 2 API calls 13278->13280 13281 7fe33159 13280->13281 13282 7fe3316e GetTickCount 13281->13282 13283 7fe33186 13282->13283 13284 7fe33223 GetVolumeInformationA 13283->13284 13285 7fe33256 13284->13285 13286 7fe3329a 13285->13286 13287 7fe33285 Sleep DeleteFileA 13285->13287 13288 7fe33328 13286->13288 13289 7fe332b8 88 API calls 13286->13289 13287->13286 13287->13287 13290 7fe33352 13288->13290 13291 7fe33334 CreateThread CloseHandle 13288->13291 13295 7fe332ac 13289->13295 13292 7fe33363 51 API calls 13290->13292 13291->13290 13293 7fe33357 13292->13293 13294 7fe31079 2 API calls 13293->13294 13296 7fe33381 13294->13296 13295->13288 13298 7fe329f1 5 API calls 13295->13298 13297 7fe33392 38 API calls 13296->13297 13299 7fe33386 13297->13299 13298->13288 13300 7fe31079 2 API calls 13299->13300 13301 7fe333b8 13300->13301 13302 7fe333c5 WSAStartup 13301->13302 13303 7fe330b7 CreateFileA 13301->13303 13316 7fe333dd 13302->13316 13303->13230 13303->13231 13304 7fe333ee Sleep 13304->13316 13305 7fe33411 gethostbyname 13306 7fe3341c lstrlen 13305->13306 13305->13316 13306->13305 13306->13316 13307 7fe3344d socket 13308 7fe33462 connect 13307->13308 13307->13316 13310 7fe3363e closesocket 13308->13310 13313 7fe3347b 13308->13313 13309 7fe3364e Sleep 13309->13316 13310->13316 13311 7fe334ab GetVersionExA 13311->13313 13312 7fe33537 23 API calls 13312->13313 13313->13311 13313->13312 13314 7fe33565 23 API calls 13313->13314 13315 7fe3355d wsprintfA 13314->13315 13315->13316 13316->13303 13316->13304 13316->13305 13316->13307 13316->13309 13316->13310 13317 7fe3360f Sleep 13316->13317 13317->13316 13318 7fe3361b GetTickCount 13317->13318 13318->13316 13485 7fe33127 GetProcAddress LoadLibraryA 13319->13485 13323 7fe31079 2 API calls 13324 7fe33159 13323->13324 13325 7fe3316e GetTickCount 13324->13325 13326 7fe33186 13325->13326 13327 7fe33223 GetVolumeInformationA 13326->13327 13328 7fe33256 13327->13328 13329 7fe3329a 13328->13329 13330 7fe33285 Sleep DeleteFileA 13328->13330 13331 7fe33328 13329->13331 13332 7fe332b8 88 API calls 13329->13332 13330->13329 13330->13330 13333 7fe33352 13331->13333 13334 7fe33334 CreateThread CloseHandle 13331->13334 13338 7fe332ac 13332->13338 13335 7fe33363 51 API calls 13333->13335 13334->13333 13336 7fe33357 13335->13336 13337 7fe31079 2 API calls 13336->13337 13339 7fe33381 13337->13339 13338->13331 13341 7fe329f1 5 API calls 13338->13341 13340 7fe33392 38 API calls 13339->13340 13342 7fe33386 13340->13342 13341->13331 13343 7fe31079 2 API calls 13342->13343 13344 7fe333b8 13343->13344 13345 7fe333c5 WSAStartup 13344->13345 13346 7fe33107 GetProcAddress LoadLibraryA 13344->13346 13359 7fe333dd 13345->13359 13362 7fe31079 13346->13362 13347 7fe333ee Sleep 13347->13359 13348 7fe33411 gethostbyname 13349 7fe3341c lstrlen 13348->13349 13348->13359 13349->13348 13349->13359 13350 7fe3344d socket 13351 7fe33462 connect 13350->13351 13350->13359 13353 7fe3363e closesocket 13351->13353 13356 7fe3347b 13351->13356 13352 7fe3364e Sleep 13352->13359 13353->13359 13354 7fe334ab GetVersionExA 13354->13356 13355 7fe33537 23 API calls 13355->13356 13356->13354 13356->13355 13357 7fe33565 23 API calls 13356->13357 13358 7fe3355d wsprintfA 13357->13358 13358->13359 13359->13346 13359->13347 13359->13348 13359->13350 13359->13352 13359->13353 13360 7fe3360f Sleep 13359->13360 13360->13359 13361 7fe3361b GetTickCount 13360->13361 13361->13359 13363 7fe31086 13362->13363 13363->13362 13364 7fe31107 13363->13364 13365 7fe310de GetModuleHandleA GetProcAddress 13363->13365 13364->13236 13365->13363 13525 7fe332cf GetProcAddress GetModuleFileNameA wsprintfA 13366->13525 13368 7fe33328 13369 7fe33352 13368->13369 13370 7fe33334 CreateThread CloseHandle 13368->13370 13372 7fe33363 51 API calls 13369->13372 13370->13369 13373 7fe33357 13372->13373 13375 7fe31079 2 API calls 13373->13375 13374 7fe329f1 5 API calls 13374->13368 13376 7fe33381 13375->13376 13377 7fe33392 38 API calls 13376->13377 13378 7fe33386 13377->13378 13379 7fe31079 2 API calls 13378->13379 13380 7fe333b8 13379->13380 13381 7fe333c5 WSAStartup 13380->13381 13382 7fe332ac 13380->13382 13386 7fe333dd 13381->13386 13382->13243 13398 7fe329f1 13382->13398 13383 7fe333ee Sleep 13383->13386 13384 7fe33411 gethostbyname 13385 7fe3341c lstrlen 13384->13385 13384->13386 13385->13384 13385->13386 13386->13382 13386->13383 13386->13384 13387 7fe3344d socket 13386->13387 13389 7fe3364e Sleep 13386->13389 13390 7fe3363e closesocket 13386->13390 13396 7fe3360f Sleep 13386->13396 13387->13386 13388 7fe33462 connect 13387->13388 13388->13390 13393 7fe3347b 13388->13393 13389->13386 13390->13386 13391 7fe334ab GetVersionExA 13391->13393 13392 7fe33537 23 API calls 13392->13393 13393->13391 13393->13392 13394 7fe33565 23 API calls 13393->13394 13395 7fe3355d wsprintfA 13394->13395 13395->13386 13396->13386 13397 7fe3361b GetTickCount 13396->13397 13397->13386 13399 7fe32a27 13398->13399 13399->13399 13400 7fe32a2c NtOpenSection 13399->13400 13401 7fe32a4b NtQuerySystemInformation 13400->13401 13405 7fe32bdf 13400->13405 13402 7fe32a5b MapViewOfFile CloseHandle 13401->13402 13404 7fe32a9c 13402->13404 13402->13405 13403 7fe32aa3 UnmapViewOfFile 13403->13405 13404->13403 13404->13405 13405->13243 13407 7fe33381 13406->13407 13408 7fe31079 2 API calls 13406->13408 13409 7fe33392 38 API calls 13407->13409 13408->13407 13410 7fe33386 13409->13410 13411 7fe31079 2 API calls 13410->13411 13412 7fe333b8 13411->13412 13413 7fe333c5 WSAStartup 13412->13413 13414 7fe33357 13412->13414 13427 7fe333dd 13413->13427 13414->13249 13415 7fe333ee Sleep 13415->13427 13416 7fe33411 gethostbyname 13417 7fe3341c lstrlen 13416->13417 13416->13427 13417->13416 13417->13427 13418 7fe3344d socket 13419 7fe33462 connect 13418->13419 13418->13427 13421 7fe3363e closesocket 13419->13421 13424 7fe3347b 13419->13424 13420 7fe3364e Sleep 13420->13427 13421->13427 13422 7fe334ab GetVersionExA 13422->13424 13423 7fe33537 23 API calls 13423->13424 13424->13422 13424->13423 13425 7fe33565 23 API calls 13424->13425 13426 7fe3355d wsprintfA 13425->13426 13426->13427 13427->13414 13427->13415 13427->13416 13427->13418 13427->13420 13427->13421 13428 7fe3360f Sleep 13427->13428 13428->13427 13429 7fe3361b GetTickCount 13428->13429 13429->13427 13431 7fe333a0 13430->13431 13432 7fe33386 13430->13432 13433 7fe333b8 13431->13433 13434 7fe31079 2 API calls 13431->13434 13432->13255 13433->13432 13435 7fe333c5 WSAStartup 13433->13435 13434->13433 13438 7fe333dd 13435->13438 13436 7fe333ee Sleep 13436->13438 13437 7fe33411 gethostbyname 13437->13438 13439 7fe3341c lstrlen 13437->13439 13438->13432 13438->13436 13438->13437 13440 7fe3344d socket 13438->13440 13442 7fe3364e Sleep 13438->13442 13443 7fe3363e closesocket 13438->13443 13449 7fe3360f Sleep 13438->13449 13439->13437 13439->13438 13440->13438 13441 7fe33462 connect 13440->13441 13441->13443 13446 7fe3347b 13441->13446 13442->13438 13443->13438 13444 7fe334ab GetVersionExA 13444->13446 13445 7fe33537 23 API calls 13445->13446 13446->13444 13446->13445 13447 7fe33565 23 API calls 13446->13447 13448 7fe3355d wsprintfA 13447->13448 13448->13438 13449->13438 13450 7fe3361b GetTickCount 13449->13450 13450->13438 13452 7fe3347b 13451->13452 13453 7fe33565 11 API calls 13452->13453 13464 7fe334ab GetVersionExA 13452->13464 13467 7fe33537 11 API calls 13452->13467 13454 7fe3355d wsprintfA 13453->13454 13458 7fe333dd 13454->13458 13455 7fe3363e closesocket 13455->13458 13456 7fe3365e 13456->13269 13457 7fe3364e Sleep 13457->13458 13458->13455 13458->13456 13458->13457 13459 7fe333ee Sleep 13458->13459 13460 7fe33411 gethostbyname 13458->13460 13462 7fe3344d socket 13458->13462 13465 7fe3360f Sleep 13458->13465 13459->13458 13460->13458 13461 7fe3341c lstrlen 13460->13461 13461->13458 13461->13460 13462->13458 13463 7fe33462 connect 13462->13463 13463->13452 13463->13455 13464->13452 13465->13458 13466 7fe3361b GetTickCount 13465->13466 13466->13458 13467->13452 13475 7fe333dd 13468->13475 13469 7fe3363e closesocket 13469->13475 13470 7fe3355d wsprintfA 13470->13262 13471 7fe3364e Sleep 13471->13475 13472 7fe333ee Sleep 13472->13475 13473 7fe33411 gethostbyname 13474 7fe3341c lstrlen 13473->13474 13473->13475 13474->13473 13474->13475 13475->13469 13475->13470 13475->13471 13475->13472 13475->13473 13476 7fe3344d socket 13475->13476 13479 7fe3360f Sleep 13475->13479 13476->13475 13477 7fe33462 connect 13476->13477 13477->13469 13480 7fe3347b 13477->13480 13478 7fe334ab GetVersionExA 13478->13480 13479->13475 13481 7fe3361b GetTickCount 13479->13481 13480->13478 13482 7fe33537 12 API calls 13480->13482 13483 7fe33565 12 API calls 13480->13483 13481->13475 13482->13480 13484 7fe3355d wsprintfA 13483->13484 13484->13475 13486 7fe33159 13485->13486 13487 7fe31079 2 API calls 13485->13487 13488 7fe3316e GetTickCount 13486->13488 13487->13486 13489 7fe33186 13488->13489 13490 7fe33223 GetVolumeInformationA 13489->13490 13491 7fe33256 13490->13491 13492 7fe3329a 13491->13492 13493 7fe33285 Sleep DeleteFileA 13491->13493 13494 7fe33328 13492->13494 13495 7fe332b8 88 API calls 13492->13495 13493->13492 13493->13493 13496 7fe33352 13494->13496 13497 7fe33334 CreateThread CloseHandle 13494->13497 13501 7fe332ac 13495->13501 13498 7fe33363 51 API calls 13496->13498 13497->13496 13499 7fe33357 13498->13499 13500 7fe31079 2 API calls 13499->13500 13502 7fe33381 13500->13502 13501->13494 13504 7fe329f1 5 API calls 13501->13504 13503 7fe33392 38 API calls 13502->13503 13505 7fe33386 13503->13505 13504->13494 13506 7fe31079 2 API calls 13505->13506 13507 7fe333b8 13506->13507 13508 7fe333c5 WSAStartup 13507->13508 13509 7fe3311d GetProcAddress LoadLibraryA 13507->13509 13512 7fe333dd 13508->13512 13509->13323 13510 7fe333ee Sleep 13510->13512 13511 7fe33411 gethostbyname 13511->13512 13513 7fe3341c lstrlen 13511->13513 13512->13509 13512->13510 13512->13511 13514 7fe3344d socket 13512->13514 13516 7fe3364e Sleep 13512->13516 13517 7fe3363e closesocket 13512->13517 13523 7fe3360f Sleep 13512->13523 13513->13511 13513->13512 13514->13512 13515 7fe33462 connect 13514->13515 13515->13517 13520 7fe3347b 13515->13520 13516->13512 13517->13512 13518 7fe334ab GetVersionExA 13518->13520 13519 7fe33537 23 API calls 13519->13520 13520->13518 13520->13519 13521 7fe33565 23 API calls 13520->13521 13522 7fe3355d wsprintfA 13521->13522 13522->13512 13523->13512 13524 7fe3361b GetTickCount 13523->13524 13524->13512 13526 7fe33317 13525->13526 13527 7fe33328 13526->13527 13528 7fe329f1 5 API calls 13526->13528 13529 7fe33352 13527->13529 13530 7fe33334 CreateThread CloseHandle 13527->13530 13528->13527 13531 7fe33363 51 API calls 13529->13531 13530->13529 13532 7fe33357 13531->13532 13533 7fe31079 2 API calls 13532->13533 13534 7fe33381 13533->13534 13535 7fe33392 38 API calls 13534->13535 13536 7fe33386 13535->13536 13537 7fe31079 2 API calls 13536->13537 13538 7fe333b8 13537->13538 13539 7fe333c5 WSAStartup 13538->13539 13540 7fe332c3 13538->13540 13543 7fe333dd 13539->13543 13540->13368 13540->13374 13541 7fe333ee Sleep 13541->13543 13542 7fe33411 gethostbyname 13542->13543 13544 7fe3341c lstrlen 13542->13544 13543->13540 13543->13541 13543->13542 13545 7fe3344d socket 13543->13545 13547 7fe3364e Sleep 13543->13547 13548 7fe3363e closesocket 13543->13548 13554 7fe3360f Sleep 13543->13554 13544->13542 13544->13543 13545->13543 13546 7fe33462 connect 13545->13546 13546->13548 13551 7fe3347b 13546->13551 13547->13543 13548->13543 13549 7fe334ab GetVersionExA 13549->13551 13550 7fe33537 23 API calls 13550->13551 13551->13549 13551->13550 13552 7fe33565 23 API calls 13551->13552 13553 7fe3355d wsprintfA 13552->13553 13553->13543 13554->13543 13555 7fe3361b GetTickCount 13554->13555 13555->13543 14832 403d6b 14833 403db8 14832->14833 14834 403e81 ExitThread 14833->14834 14835 403b40 GetTickCount rand 14833->14835 14836 403e6b Sleep 14833->14836 14835->14833 14836->14833 13556 482c65 13557 482c67 13556->13557 13558 482c74 13557->13558 13560 482dd6 13557->13560 13561 482de0 13560->13561 13562 482e70 SetThreadAffinityMask 13561->13562 13563 482e75 13562->13563 13564 7fe329cc 13565 7fe329d1 13564->13565 13566 7fe32a5b MapViewOfFile CloseHandle 13565->13566 13567 7fe32a2c NtOpenSection 13565->13567 13570 7fe32a9c 13566->13570 13571 7fe32bdf 13566->13571 13569 7fe32a4b NtQuerySystemInformation 13567->13569 13567->13571 13568 7fe32aa3 UnmapViewOfFile 13568->13571 13569->13566 13570->13568 13570->13571 13572 9b5ab4 13575 9b5ace 13572->13575 13576 9b5ad9 13575->13576 13577 9b5abe 13575->13577 13576->13577 13579 9b5adf 13576->13579 13582 9b24eb 13579->13582 13601 9b24a6 NtOpenSection 13582->13601 13584 9b24f3 13585 9b24f9 NtMapViewOfSection CloseHandle 13584->13585 13586 9b25d8 13584->13586 13585->13586 13588 9b2531 13585->13588 13586->13577 13587 9b2566 13603 9b23ee NtProtectVirtualMemory NtWriteVirtualMemory 13587->13603 13588->13587 13602 9b23ee NtProtectVirtualMemory NtWriteVirtualMemory 13588->13602 13591 9b2577 13604 9b23ee NtProtectVirtualMemory NtWriteVirtualMemory 13591->13604 13593 9b2588 13605 9b23ee NtProtectVirtualMemory NtWriteVirtualMemory 13593->13605 13595 9b25ae 13598 9b25c3 13595->13598 13607 9b23ee NtProtectVirtualMemory NtWriteVirtualMemory 13595->13607 13596 9b2599 13596->13595 13606 9b23ee NtProtectVirtualMemory NtWriteVirtualMemory 13596->13606 13598->13586 13608 9b23ee NtProtectVirtualMemory NtWriteVirtualMemory 13598->13608 13601->13584 13602->13587 13603->13591 13604->13593 13605->13596 13606->13595 13607->13598 13608->13586 13609 401070 13610 401075 13609->13610 13613 40343c 13610->13613 13616 403410 13613->13616 13615 40109a 13617 403425 __dllonexit 13616->13617 13618 403419 _onexit 13616->13618 13617->13615 13618->13615 13619 9b30ab lstrcat 13620 9b30b2 13619->13620 13667 9b30be lstrcat CreateFileA 13620->13667 13623 9b30df WriteFile CloseHandle 13624 9b3102 13623->13624 13712 9b3112 LoadLibraryA 13624->13712 13629 9b3159 13630 9b316e GetTickCount 13629->13630 13631 9b3186 13630->13631 13632 9b3223 GetVolumeInformationA 13631->13632 13633 9b3256 13632->13633 13634 9b329a 13633->13634 13635 9b3285 Sleep DeleteFileA 13633->13635 13636 9b3328 13634->13636 13759 9b32b8 LoadLibraryA 13634->13759 13635->13634 13635->13635 13638 9b3352 13636->13638 13639 9b3334 CreateThread CloseHandle 13636->13639 13800 9b3363 LoadLibraryA 13638->13800 13639->13638 13642 9b1079 2 API calls 13644 9b3381 13642->13644 13824 9b3392 LoadLibraryA 13644->13824 13648 9b1079 2 API calls 13649 9b33b8 13648->13649 13650 9b365e 13649->13650 13651 9b33c5 WSAStartup 13649->13651 13656 9b33dd 13651->13656 13652 9b33ee Sleep 13652->13656 13653 9b3411 gethostbyname 13654 9b341c lstrlen 13653->13654 13653->13656 13654->13653 13654->13656 13655 9b344d socket 13655->13656 13657 9b3462 connect 13655->13657 13656->13650 13656->13652 13656->13653 13656->13655 13658 9b363e closesocket 13656->13658 13659 9b364e Sleep 13656->13659 13665 9b360f Sleep 13656->13665 13657->13658 13661 9b347b 13657->13661 13658->13656 13659->13656 13660 9b34ab GetVersionExA 13660->13661 13661->13660 13845 9b3537 wsprintfA 13661->13845 13862 9b3565 wsprintfA 13661->13862 13665->13656 13666 9b361b GetTickCount 13665->13666 13666->13656 13668 9b30df WriteFile CloseHandle 13667->13668 13669 9b3102 13667->13669 13668->13669 13670 9b3112 129 API calls 13669->13670 13671 9b3107 GetProcAddress LoadLibraryA 13670->13671 13673 9b1079 2 API calls 13671->13673 13674 9b3159 13673->13674 13675 9b316e GetTickCount 13674->13675 13676 9b3186 13675->13676 13677 9b3223 GetVolumeInformationA 13676->13677 13678 9b3256 13677->13678 13679 9b3285 Sleep DeleteFileA 13678->13679 13681 9b329a 13678->13681 13679->13679 13679->13681 13680 9b3328 13683 9b3352 13680->13683 13684 9b3334 CreateThread CloseHandle 13680->13684 13681->13680 13682 9b32b8 88 API calls 13681->13682 13688 9b32ac 13682->13688 13685 9b3363 51 API calls 13683->13685 13684->13683 13686 9b3357 13685->13686 13687 9b1079 2 API calls 13686->13687 13689 9b3381 13687->13689 13688->13680 13691 9b29f1 5 API calls 13688->13691 13690 9b3392 38 API calls 13689->13690 13692 9b3386 13690->13692 13691->13680 13693 9b1079 2 API calls 13692->13693 13694 9b33b8 13693->13694 13695 9b30b7 CreateFileA 13694->13695 13696 9b33c5 WSAStartup 13694->13696 13695->13623 13695->13624 13701 9b33dd 13696->13701 13697 9b33ee Sleep 13697->13701 13698 9b3411 gethostbyname 13699 9b341c lstrlen 13698->13699 13698->13701 13699->13698 13699->13701 13700 9b344d socket 13700->13701 13702 9b3462 connect 13700->13702 13701->13695 13701->13697 13701->13698 13701->13700 13703 9b363e closesocket 13701->13703 13704 9b364e Sleep 13701->13704 13710 9b360f Sleep 13701->13710 13702->13703 13707 9b347b 13702->13707 13703->13701 13704->13701 13705 9b34ab GetVersionExA 13705->13707 13706 9b3537 23 API calls 13706->13707 13707->13705 13707->13706 13708 9b3565 23 API calls 13707->13708 13709 9b355f wsprintfA 13708->13709 13709->13701 13710->13701 13711 9b361b GetTickCount 13710->13711 13711->13701 13713 9b311d GetProcAddress LoadLibraryA 13712->13713 13879 9b3127 GetProcAddress LoadLibraryA 13712->13879 13716 9b1079 2 API calls 13713->13716 13717 9b3159 13716->13717 13718 9b316e GetTickCount 13717->13718 13719 9b3186 13718->13719 13720 9b3223 GetVolumeInformationA 13719->13720 13721 9b3256 13720->13721 13722 9b329a 13721->13722 13723 9b3285 Sleep DeleteFileA 13721->13723 13724 9b3328 13722->13724 13725 9b32b8 88 API calls 13722->13725 13723->13722 13723->13723 13726 9b3352 13724->13726 13727 9b3334 CreateThread CloseHandle 13724->13727 13731 9b32ac 13725->13731 13728 9b3363 51 API calls 13726->13728 13727->13726 13729 9b3357 13728->13729 13730 9b1079 2 API calls 13729->13730 13732 9b3381 13730->13732 13731->13724 13734 9b29f1 5 API calls 13731->13734 13733 9b3392 38 API calls 13732->13733 13735 9b3386 13733->13735 13734->13724 13736 9b1079 2 API calls 13735->13736 13737 9b33b8 13736->13737 13738 9b3107 GetProcAddress LoadLibraryA 13737->13738 13739 9b33c5 WSAStartup 13737->13739 13755 9b1079 13738->13755 13743 9b33dd 13739->13743 13740 9b33ee Sleep 13740->13743 13741 9b3411 gethostbyname 13742 9b341c lstrlen 13741->13742 13741->13743 13742->13741 13742->13743 13743->13738 13743->13740 13743->13741 13744 9b344d socket 13743->13744 13746 9b363e closesocket 13743->13746 13747 9b364e Sleep 13743->13747 13753 9b360f Sleep 13743->13753 13744->13743 13745 9b3462 connect 13744->13745 13745->13746 13750 9b347b 13745->13750 13746->13743 13747->13743 13748 9b34ab GetVersionExA 13748->13750 13749 9b3537 23 API calls 13749->13750 13750->13748 13750->13749 13751 9b3565 23 API calls 13750->13751 13752 9b355f wsprintfA 13751->13752 13752->13743 13753->13743 13754 9b361b GetTickCount 13753->13754 13754->13743 13757 9b1086 13755->13757 13756 9b1107 13756->13629 13757->13755 13757->13756 13758 9b10de GetModuleHandleA GetProcAddress 13757->13758 13758->13757 13919 9b32cf GetProcAddress GetModuleFileNameA wsprintfA 13759->13919 13761 9b3328 13762 9b3352 13761->13762 13763 9b3334 CreateThread CloseHandle 13761->13763 13765 9b3363 51 API calls 13762->13765 13763->13762 13766 9b3357 13765->13766 13768 9b1079 2 API calls 13766->13768 13767 9b29f1 5 API calls 13767->13761 13769 9b3381 13768->13769 13770 9b3392 38 API calls 13769->13770 13771 9b3386 13770->13771 13772 9b1079 2 API calls 13771->13772 13773 9b33b8 13772->13773 13774 9b32ac 13773->13774 13775 9b33c5 WSAStartup 13773->13775 13774->13636 13791 9b29f1 13774->13791 13779 9b33dd 13775->13779 13776 9b33ee Sleep 13776->13779 13777 9b3411 gethostbyname 13778 9b341c lstrlen 13777->13778 13777->13779 13778->13777 13778->13779 13779->13774 13779->13776 13779->13777 13780 9b344d socket 13779->13780 13782 9b363e closesocket 13779->13782 13783 9b364e Sleep 13779->13783 13789 9b360f Sleep 13779->13789 13780->13779 13781 9b3462 connect 13780->13781 13781->13782 13786 9b347b 13781->13786 13782->13779 13783->13779 13784 9b34ab GetVersionExA 13784->13786 13785 9b3537 23 API calls 13785->13786 13786->13784 13786->13785 13787 9b3565 23 API calls 13786->13787 13788 9b355f wsprintfA 13787->13788 13788->13779 13789->13779 13790 9b361b GetTickCount 13789->13790 13790->13779 13792 9b2a27 13791->13792 13792->13792 13793 9b2a2c NtOpenSection 13792->13793 13794 9b2a3a 13793->13794 13795 9b2a4b NtQuerySystemInformation 13794->13795 13796 9b2bdf 13794->13796 13797 9b2a5b MapViewOfFile CloseHandle 13795->13797 13796->13636 13797->13796 13799 9b2a9c 13797->13799 13798 9b2aa3 UnmapViewOfFile 13798->13796 13799->13796 13799->13798 13801 9b3381 13800->13801 13802 9b1079 2 API calls 13800->13802 13803 9b3392 38 API calls 13801->13803 13802->13801 13804 9b3386 13803->13804 13805 9b1079 2 API calls 13804->13805 13806 9b33b8 13805->13806 13807 9b3357 13806->13807 13808 9b33c5 WSAStartup 13806->13808 13807->13642 13812 9b33dd 13808->13812 13809 9b33ee Sleep 13809->13812 13810 9b3411 gethostbyname 13811 9b341c lstrlen 13810->13811 13810->13812 13811->13810 13811->13812 13812->13807 13812->13809 13812->13810 13813 9b344d socket 13812->13813 13815 9b363e closesocket 13812->13815 13816 9b364e Sleep 13812->13816 13822 9b360f Sleep 13812->13822 13813->13812 13814 9b3462 connect 13813->13814 13814->13815 13819 9b347b 13814->13819 13815->13812 13816->13812 13817 9b34ab GetVersionExA 13817->13819 13818 9b3537 23 API calls 13818->13819 13819->13817 13819->13818 13820 9b3565 23 API calls 13819->13820 13821 9b355f wsprintfA 13820->13821 13821->13812 13822->13812 13823 9b361b GetTickCount 13822->13823 13823->13812 13825 9b3386 13824->13825 13826 9b33a0 13824->13826 13825->13648 13827 9b33b8 13826->13827 13828 9b1079 2 API calls 13826->13828 13827->13825 13829 9b33c5 WSAStartup 13827->13829 13828->13827 13833 9b33dd 13829->13833 13830 9b33ee Sleep 13830->13833 13831 9b3411 gethostbyname 13832 9b341c lstrlen 13831->13832 13831->13833 13832->13831 13832->13833 13833->13825 13833->13830 13833->13831 13834 9b344d socket 13833->13834 13836 9b363e closesocket 13833->13836 13837 9b364e Sleep 13833->13837 13843 9b360f Sleep 13833->13843 13834->13833 13835 9b3462 connect 13834->13835 13835->13836 13840 9b347b 13835->13840 13836->13833 13837->13833 13838 9b34ab GetVersionExA 13838->13840 13839 9b3537 23 API calls 13839->13840 13840->13838 13840->13839 13841 9b3565 23 API calls 13840->13841 13842 9b355f wsprintfA 13841->13842 13842->13833 13843->13833 13844 9b361b GetTickCount 13843->13844 13844->13833 13861 9b347b 13845->13861 13846 9b3565 11 API calls 13847 9b355f wsprintfA 13846->13847 13853 9b33dd 13847->13853 13848 9b363e closesocket 13848->13853 13849 9b365e 13849->13661 13850 9b364e Sleep 13850->13853 13851 9b33ee Sleep 13851->13853 13852 9b3411 gethostbyname 13852->13853 13854 9b341c lstrlen 13852->13854 13853->13848 13853->13849 13853->13850 13853->13851 13853->13852 13855 9b344d socket 13853->13855 13858 9b360f Sleep 13853->13858 13854->13852 13854->13853 13855->13853 13856 9b3462 connect 13855->13856 13856->13848 13856->13861 13857 9b34ab GetVersionExA 13857->13861 13858->13853 13859 9b361b GetTickCount 13858->13859 13859->13853 13860 9b3537 11 API calls 13860->13861 13861->13846 13861->13857 13861->13860 13878 9b33dd 13862->13878 13863 9b363e closesocket 13863->13878 13864 9b355f wsprintfA 13864->13656 13865 9b364e Sleep 13865->13878 13866 9b33ee Sleep 13866->13878 13867 9b3411 gethostbyname 13868 9b341c lstrlen 13867->13868 13867->13878 13868->13867 13868->13878 13869 9b344d socket 13870 9b3462 connect 13869->13870 13869->13878 13870->13863 13875 9b347b 13870->13875 13871 9b34ab GetVersionExA 13871->13875 13872 9b360f Sleep 13873 9b361b GetTickCount 13872->13873 13872->13878 13873->13878 13874 9b3537 12 API calls 13874->13875 13875->13871 13875->13874 13876 9b3565 12 API calls 13875->13876 13877 9b355f wsprintfA 13876->13877 13877->13878 13878->13863 13878->13864 13878->13865 13878->13866 13878->13867 13878->13869 13878->13872 13880 9b3159 13879->13880 13881 9b1079 2 API calls 13879->13881 13882 9b316e GetTickCount 13880->13882 13881->13880 13883 9b3186 13882->13883 13884 9b3223 GetVolumeInformationA 13883->13884 13885 9b3256 13884->13885 13886 9b329a 13885->13886 13887 9b3285 Sleep DeleteFileA 13885->13887 13888 9b3328 13886->13888 13889 9b32b8 88 API calls 13886->13889 13887->13886 13887->13887 13890 9b3352 13888->13890 13891 9b3334 CreateThread CloseHandle 13888->13891 13895 9b32ac 13889->13895 13892 9b3363 51 API calls 13890->13892 13891->13890 13893 9b3357 13892->13893 13894 9b1079 2 API calls 13893->13894 13896 9b3381 13894->13896 13895->13888 13898 9b29f1 5 API calls 13895->13898 13897 9b3392 38 API calls 13896->13897 13899 9b3386 13897->13899 13898->13888 13900 9b1079 2 API calls 13899->13900 13901 9b33b8 13900->13901 13902 9b365e 13901->13902 13903 9b33c5 WSAStartup 13901->13903 13902->13713 13907 9b33dd 13903->13907 13904 9b33ee Sleep 13904->13907 13905 9b3411 gethostbyname 13906 9b341c lstrlen 13905->13906 13905->13907 13906->13905 13906->13907 13907->13902 13907->13904 13907->13905 13908 9b344d socket 13907->13908 13910 9b363e closesocket 13907->13910 13911 9b364e Sleep 13907->13911 13917 9b360f Sleep 13907->13917 13908->13907 13909 9b3462 connect 13908->13909 13909->13910 13914 9b347b 13909->13914 13910->13907 13911->13907 13912 9b34ab GetVersionExA 13912->13914 13913 9b3537 23 API calls 13913->13914 13914->13912 13914->13913 13915 9b3565 23 API calls 13914->13915 13916 9b355f wsprintfA 13915->13916 13916->13907 13917->13907 13918 9b361b GetTickCount 13917->13918 13918->13907 13920 9b3317 13919->13920 13921 9b3328 13920->13921 13922 9b29f1 5 API calls 13920->13922 13923 9b3352 13921->13923 13924 9b3334 CreateThread CloseHandle 13921->13924 13922->13921 13925 9b3363 51 API calls 13923->13925 13924->13923 13926 9b3357 13925->13926 13927 9b1079 2 API calls 13926->13927 13928 9b3381 13927->13928 13929 9b3392 38 API calls 13928->13929 13930 9b3386 13929->13930 13931 9b1079 2 API calls 13930->13931 13932 9b33b8 13931->13932 13933 9b32c3 13932->13933 13934 9b33c5 WSAStartup 13932->13934 13933->13761 13933->13767 13939 9b33dd 13934->13939 13935 9b33ee Sleep 13935->13939 13936 9b3411 gethostbyname 13937 9b341c lstrlen 13936->13937 13936->13939 13937->13936 13937->13939 13938 9b344d socket 13938->13939 13940 9b3462 connect 13938->13940 13939->13933 13939->13935 13939->13936 13939->13938 13941 9b363e closesocket 13939->13941 13942 9b364e Sleep 13939->13942 13948 9b360f Sleep 13939->13948 13940->13941 13945 9b347b 13940->13945 13941->13939 13942->13939 13943 9b34ab GetVersionExA 13943->13945 13944 9b3537 23 API calls 13944->13945 13945->13943 13945->13944 13946 9b3565 23 API calls 13945->13946 13947 9b355f wsprintfA 13946->13947 13947->13939 13948->13939 13949 9b361b GetTickCount 13948->13949 13949->13939 14858 401300 Sleep 13979 47d000 13980 47d132 13979->13980 13982 47d14a 13980->13982 14012 47dd81 13982->14012 13984 47d1ac 13985 47d1f4 13984->13985 13986 47d1cd GetModuleHandleA 13984->13986 13987 47d20f GetVersion 13985->13987 13986->13985 13988 47d226 VirtualAlloc 13987->13988 13992 47d2e1 13987->13992 13989 47d2c0 CloseHandle 13988->13989 13994 47d249 13988->13994 13989->13992 13990 47d2ea SetThreadAffinityMask 14019 47d309 GetModuleHandleA 13990->14019 13992->13989 13992->13990 13993 47dd81 2 API calls 13992->13993 13995 47d413 lstrcpyW 13992->13995 13998 47d42e GetPEB lstrcpyW lstrcatW 13992->13998 13999 47d45d NtMapViewOfSection 13992->13999 14001 47d491 NtOpenProcessToken 13992->14001 14003 47d4fc Process32Next 13992->14003 14005 47d50e OpenProcess 13992->14005 14008 47d4b8 CreateToolhelp32Snapshot Process32First 13992->14008 14009 47d56d CloseHandle 13992->14009 14010 47d545 CreateRemoteThread 13992->14010 14011 47d2d1 Sleep 13992->14011 14047 47d4bd 13992->14047 14073 47f1f3 13992->14073 13993->13992 13994->13989 14016 47d2d1 13994->14016 14044 47f12d lstrcpyW lstrlenW 13995->14044 14000 47f12d 3 API calls 13998->14000 13999->13989 13999->13992 14000->13992 14001->13992 14002 47d4d6 CreateToolhelp32Snapshot Process32First 14001->14002 14002->14003 14003->13992 14004 47d576 CloseHandle 14003->14004 14004->13989 14005->13992 14005->14003 14008->14003 14009->14003 14010->13992 14010->14009 14011->14009 14015 47dd8e __common_dcos_data 14012->14015 14013 47de0f 14013->13984 14014 47dde6 GetModuleHandleA GetProcAddress 14014->14015 14015->14012 14015->14013 14015->14014 14017 47d2d6 Sleep 14016->14017 14018 47d2e0 14016->14018 14017->14016 14018->13989 14020 47dd81 2 API calls 14019->14020 14037 47d2e1 14019->14037 14020->14037 14021 47d2c0 CloseHandle 14021->14037 14022 47d2ea SetThreadAffinityMask 14023 47d309 29 API calls 14022->14023 14023->14037 14024 47dd81 2 API calls 14024->14037 14025 47d413 lstrcpyW 14026 47f12d 3 API calls 14025->14026 14026->14037 14027 47d42e GetPEB lstrcpyW lstrcatW 14029 47f12d 3 API calls 14027->14029 14028 47d45d NtMapViewOfSection 14028->14021 14028->14037 14029->14037 14030 47d491 NtOpenProcessToken 14031 47d4d6 CreateToolhelp32Snapshot Process32First 14030->14031 14030->14037 14032 47d4fc Process32Next 14031->14032 14033 47d576 CloseHandle 14032->14033 14034 47d508 14032->14034 14033->14021 14034->14032 14035 47d50e OpenProcess 14034->14035 14035->14032 14042 47d4b6 14035->14042 14036 47d4bd 29 API calls 14036->14037 14037->14021 14037->14022 14037->14024 14037->14025 14037->14027 14037->14028 14037->14030 14037->14036 14037->14042 14038 47f1f3 5 API calls 14038->14042 14039 47d4b8 CreateToolhelp32Snapshot Process32First 14039->14032 14040 47d56d CloseHandle 14040->14032 14041 47d545 CreateRemoteThread 14041->14040 14041->14042 14042->14038 14042->14039 14042->14040 14042->14041 14043 47d2d1 Sleep 14042->14043 14043->14040 14092 482daf 14044->14092 14094 47e0c9 14047->14094 14049 47d4c3 FreeLibrary CloseHandle 14050 47d4d6 CreateToolhelp32Snapshot Process32First 14049->14050 14051 47d4fc Process32Next 14050->14051 14052 47d576 CloseHandle 14051->14052 14053 47d508 14051->14053 14055 47d2c0 CloseHandle 14052->14055 14053->14051 14054 47d50e OpenProcess 14053->14054 14054->14051 14062 47d4b6 14054->14062 14064 47d2e1 14055->14064 14056 47f1f3 5 API calls 14056->14062 14057 47d2ea SetThreadAffinityMask 14058 47d309 28 API calls 14057->14058 14058->14064 14059 47d56d CloseHandle 14059->14051 14060 47dd81 2 API calls 14060->14064 14061 47d545 CreateRemoteThread 14061->14059 14061->14062 14062->14056 14062->14059 14062->14061 14063 47d2d1 Sleep 14062->14063 14072 47d4b8 CreateToolhelp32Snapshot Process32First 14062->14072 14063->14059 14064->14055 14064->14057 14064->14060 14064->14062 14065 47d413 lstrcpyW 14064->14065 14067 47d42e GetPEB lstrcpyW lstrcatW 14064->14067 14068 47d45d NtMapViewOfSection 14064->14068 14070 47d491 NtOpenProcessToken 14064->14070 14071 47d4bd 28 API calls 14064->14071 14066 47f12d 3 API calls 14065->14066 14066->14064 14069 47f12d 3 API calls 14067->14069 14068->14055 14068->14064 14069->14064 14070->14050 14070->14064 14071->14064 14072->14051 14096 47f1ae NtOpenSection 14073->14096 14075 47f1fb 14076 47f201 NtMapViewOfSection CloseHandle 14075->14076 14077 47f2e0 14075->14077 14076->14077 14079 47f239 14076->14079 14077->13992 14078 47f26e 14098 47f0f6 NtProtectVirtualMemory NtWriteVirtualMemory 14078->14098 14079->14078 14097 47f0f6 NtProtectVirtualMemory NtWriteVirtualMemory 14079->14097 14082 47f27f 14099 47f0f6 NtProtectVirtualMemory NtWriteVirtualMemory 14082->14099 14084 47f290 14100 47f0f6 NtProtectVirtualMemory NtWriteVirtualMemory 14084->14100 14086 47f2a1 14087 47f2b6 14086->14087 14101 47f0f6 NtProtectVirtualMemory NtWriteVirtualMemory 14086->14101 14089 47f2cb 14087->14089 14102 47f0f6 NtProtectVirtualMemory NtWriteVirtualMemory 14087->14102 14089->14077 14103 47f0f6 NtProtectVirtualMemory NtWriteVirtualMemory 14089->14103 14093 47f169 NtCreateSection 14092->14093 14093->13992 14095 47e0df NtAdjustPrivilegesToken 14094->14095 14095->14049 14096->14075 14097->14078 14098->14082 14099->14084 14100->14086 14101->14087 14102->14089 14103->14077 14871 7fe330ab lstrcat 14872 7fe330b2 14871->14872 14873 7fe330be 153 API calls 14872->14873 14874 7fe330b7 CreateFileA 14873->14874 14875 7fe33102 14874->14875 14876 7fe330df WriteFile CloseHandle 14874->14876 14877 7fe33112 129 API calls 14875->14877 14876->14875 14878 7fe33107 GetProcAddress LoadLibraryA 14877->14878 14880 7fe31079 2 API calls 14878->14880 14881 7fe33159 14880->14881 14882 7fe3316e GetTickCount 14881->14882 14883 7fe33186 14882->14883 14884 7fe33223 GetVolumeInformationA 14883->14884 14885 7fe33256 14884->14885 14886 7fe3329a 14885->14886 14887 7fe33285 Sleep DeleteFileA 14885->14887 14888 7fe33328 14886->14888 14889 7fe332b8 88 API calls 14886->14889 14887->14886 14887->14887 14890 7fe33352 14888->14890 14891 7fe33334 CreateThread CloseHandle 14888->14891 14895 7fe332ac 14889->14895 14892 7fe33363 51 API calls 14890->14892 14891->14890 14893 7fe33357 14892->14893 14894 7fe31079 2 API calls 14893->14894 14896 7fe33381 14894->14896 14895->14888 14898 7fe329f1 5 API calls 14895->14898 14897 7fe33392 38 API calls 14896->14897 14899 7fe33386 14897->14899 14898->14888 14900 7fe31079 2 API calls 14899->14900 14901 7fe333b8 14900->14901 14902 7fe333c5 WSAStartup 14901->14902 14903 7fe3365e 14901->14903 14907 7fe333dd 14902->14907 14904 7fe333ee Sleep 14904->14907 14905 7fe33411 gethostbyname 14906 7fe3341c lstrlen 14905->14906 14905->14907 14906->14905 14906->14907 14907->14903 14907->14904 14907->14905 14908 7fe3344d socket 14907->14908 14910 7fe3364e Sleep 14907->14910 14911 7fe3363e closesocket 14907->14911 14917 7fe3360f Sleep 14907->14917 14908->14907 14909 7fe33462 connect 14908->14909 14909->14911 14914 7fe3347b 14909->14914 14910->14907 14911->14907 14912 7fe334ab GetVersionExA 14912->14914 14913 7fe33537 23 API calls 14913->14914 14914->14912 14914->14913 14915 7fe33565 23 API calls 14914->14915 14916 7fe3355d wsprintfA 14915->14916 14916->14907 14917->14907 14918 7fe3361b GetTickCount 14917->14918 14918->14907 14919 9b2fcb 14920 9b2ff0 14919->14920 14921 9b30be 153 API calls 14920->14921 14922 9b30b7 CreateFileA 14921->14922 14923 9b30df WriteFile CloseHandle 14922->14923 14924 9b3102 14922->14924 14923->14924 14925 9b3112 129 API calls 14924->14925 14926 9b3107 GetProcAddress LoadLibraryA 14925->14926 14928 9b1079 2 API calls 14926->14928 14929 9b3159 14928->14929 14930 9b316e GetTickCount 14929->14930 14931 9b3186 14930->14931 14932 9b3223 GetVolumeInformationA 14931->14932 14933 9b3256 14932->14933 14934 9b329a 14933->14934 14935 9b3285 Sleep DeleteFileA 14933->14935 14936 9b3328 14934->14936 14937 9b32b8 88 API calls 14934->14937 14935->14934 14935->14935 14938 9b3352 14936->14938 14939 9b3334 CreateThread CloseHandle 14936->14939 14943 9b32ac 14937->14943 14940 9b3363 51 API calls 14938->14940 14939->14938 14941 9b3357 14940->14941 14942 9b1079 2 API calls 14941->14942 14944 9b3381 14942->14944 14943->14936 14946 9b29f1 5 API calls 14943->14946 14945 9b3392 38 API calls 14944->14945 14947 9b3386 14945->14947 14946->14936 14948 9b1079 2 API calls 14947->14948 14949 9b33b8 14948->14949 14950 9b365e 14949->14950 14951 9b33c5 WSAStartup 14949->14951 14964 9b33dd 14951->14964 14952 9b33ee Sleep 14952->14964 14953 9b3411 gethostbyname 14954 9b341c lstrlen 14953->14954 14953->14964 14954->14953 14954->14964 14955 9b344d socket 14956 9b3462 connect 14955->14956 14955->14964 14957 9b363e closesocket 14956->14957 14961 9b347b 14956->14961 14957->14964 14958 9b364e Sleep 14958->14964 14959 9b34ab GetVersionExA 14959->14961 14960 9b3537 23 API calls 14960->14961 14961->14959 14961->14960 14962 9b3565 23 API calls 14961->14962 14963 9b355f wsprintfA 14962->14963 14963->14964 14964->14950 14964->14952 14964->14953 14964->14955 14964->14957 14964->14958 14965 9b360f Sleep 14964->14965 14965->14964 14966 9b361b GetTickCount 14965->14966 14966->14964 14970 404715 14989 403c10 GetSystemDirectoryA lstrcatA lstrcpyA 14970->14989 14972 40477f 14973 40480e CreateProcessA 14972->14973 14985 4047e0 14972->14985 14974 404850 14973->14974 14975 404838 Sleep 14973->14975 14990 403b40 GetTickCount rand 14974->14990 14975->14974 14977 404995 ExitThread 14978 404856 14979 4048f4 14978->14979 14980 4048b9 14978->14980 14978->14985 14993 403b40 GetTickCount rand 14979->14993 14991 403b40 GetTickCount rand 14980->14991 14983 4048f9 14994 403b40 GetTickCount rand 14983->14994 14984 4048be 14992 403b40 GetTickCount rand 14984->14992 14985->14977 14988 40498b Sleep 14985->14988 14988->14985 14989->14972 14990->14978 14991->14984 14992->14985 14993->14983 14994->14985 15007 436719 15008 43671e 15007->15008 15009 43675d 15007->15009 15008->15009 15011 4369d9 15008->15011 15015 4366ea 15011->15015 15014 4368ec 15014->15009 15016 436700 GetPEB 15015->15016 15016->15014 14110 40361c 14111 403628 14110->14111 14112 403920 9 API calls 14111->14112 14112->14111 14113 41a81c 14114 41a820 14113->14114 14116 41a8f0 14114->14116 14117 41a736 14114->14117 14121 41a9ee 14117->14121 14120 41a755 14120->14116 14122 41a740 GetPEB 14121->14122 14122->14120 14123 401020 #561 14124 405620 14128 405685 14124->14128 14125 40589b 14126 405894 ExitThread 14127 403b40 GetTickCount rand 14127->14128 14128->14125 14128->14126 14128->14127 14129 405885 Sleep 14128->14129 14129->14128 14130 47de22 LoadLibraryA 14133 47de49 GetProcAddress 14130->14133 14132 47de33 14133->14132 14141 402430 FindResourceA LoadLibraryA GetProcAddress 14142 402472 LoadResource 14141->14142 14143 4024e9 14141->14143 14142->14143 14145 402484 14142->14145 14145->14143 14146 402488 LockResource 14145->14146 14146->14143 14147 402495 CreateFileA 14146->14147 14147->14143 14149 4024ca WriteFile CloseHandle 14147->14149 14149->14143 15020 404530 15021 404595 15020->15021 15022 40464f 15020->15022 15035 403c10 GetSystemDirectoryA lstrcatA lstrcpyA 15021->15035 15036 403b40 GetTickCount rand 15022->15036 15025 4045a2 15029 404647 ExitThread 15025->15029 15030 404607 CreateProcessA 15025->15030 15026 404655 15027 40465c 15026->15027 15037 403b40 GetTickCount rand 15026->15037 15033 40470d ExitThread 15027->15033 15034 404702 Sleep 15027->15034 15031 404641 Sleep 15030->15031 15032 40462d Sleep 15030->15032 15031->15025 15032->15031 15034->15027 15035->15025 15036->15026 15037->15027 15053 402730 15054 40274a Sleep 15053->15054 15056 4027c1 CreateMutexA GetLastError 15054->15056 15057 4027e6 15056->15057 15058 4027db ExitProcess 15056->15058 15068 402500 EnumResourceNamesA 15057->15068 15060 4027eb 15069 402520 lstrcpyA lstrcatA 15060->15069 15062 402807 15092 401980 15062->15092 15064 40280c 15094 4012b0 CreateThread 15064->15094 15066 40285c WaitForSingleObject CloseHandle 15067 402878 Sleep 15066->15067 15067->15064 15068->15060 15070 402565 15069->15070 15071 402575 RtlZeroMemory 15070->15071 15072 402569 15070->15072 15073 4025ab 15071->15073 15072->15062 15074 4025af 15073->15074 15075 4025d1 GetFileAttributesA 15073->15075 15074->15062 15076 4025e1 15075->15076 15077 4025ed CreateFileA 15075->15077 15076->15062 15078 40261a GetFileSize 15077->15078 15079 40260e 15077->15079 15080 40262b CloseHandle 15078->15080 15081 40263e GlobalAlloc 15078->15081 15079->15062 15080->15062 15082 402660 ReadFile 15081->15082 15083 40264d CloseHandle 15081->15083 15084 402692 CloseHandle BeginUpdateResourceA 15082->15084 15085 402678 GlobalFree CloseHandle 15082->15085 15083->15062 15086 4026c2 UpdateResourceA 15084->15086 15087 4026af GlobalFree 15084->15087 15085->15062 15088 4026fb EndUpdateResourceA 15086->15088 15089 4026de lstrlenA UpdateResourceA 15086->15089 15087->15062 15090 40270a GlobalFree 15088->15090 15091 40271c GlobalFree 15088->15091 15089->15088 15090->15062 15091->15062 15093 401998 LoadLibraryA 15092->15093 15093->15064 15094->15066 14150 48043d 14151 47e0c9 NtAdjustPrivilegesToken 14150->14151 14152 480443 14151->14152 14155 48045a 14152->14155 14156 47e0c9 NtAdjustPrivilegesToken 14155->14156 14157 480460 14156->14157 14160 48047d 14157->14160 14161 47e0c9 NtAdjustPrivilegesToken 14160->14161 14162 480448 14161->14162 15098 428735 15099 428739 15098->15099 15100 4287db 15099->15100 15102 42887f 15099->15102 15106 4288de 15102->15106 15105 428899 15105->15100 15107 428889 GetPEB 15106->15107 15107->15105 15108 43673b 15109 43673e 15108->15109 15110 4369d9 GetPEB 15109->15110 15111 43675d 15109->15111 15110->15111 15112 4019c0 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 15137 401660 strstr 15112->15137 15114 402254 15115 401a45 15115->15114 15141 402f70 GetLocaleInfoW GetComputerNameA lstrcpyA 15115->15141 15118 401980 LoadLibraryA 15120 401a80 15118->15120 15119 401acc 15120->15119 15121 40222c 15120->15121 15122 401c3e CloseHandle LoadLibraryA 15120->15122 15123 401820 GetProcAddress 15120->15123 15125 401c01 CloseHandle 15120->15125 15126 401e2a lstrcpynA lstrlenA lstrcpynA 15120->15126 15127 401d4e lstrcpynA 15120->15127 15128 401d9f lstrcpynA lstrlenA lstrcpynA 15120->15128 15129 401eff 6 API calls 15120->15129 15134 40206e lstrcatA LoadLibraryA GetProcAddress 15120->15134 15135 401f77 LoadLibraryA GetProcAddress 15120->15135 15121->15114 15124 40224d CloseHandle 15121->15124 15122->15120 15123->15120 15124->15114 15125->15120 15130 4015d0 CreateThread 15126->15130 15132 401330 CreateThread 15127->15132 15133 4014f0 CreateThread 15128->15133 15129->15120 15131 401f45 ReleaseMutex CloseHandle 15129->15131 15130->15120 15131->15120 15132->15120 15133->15120 15136 4020af WinExec 15134->15136 15135->15120 15136->15120 15138 401712 atoi 15137->15138 15139 4016b4 strcspn strncpy strcspn 15137->15139 15140 40176f 15138->15140 15139->15138 15140->15115 15142 402fdd strstr 15141->15142 15144 403048 strstr 15142->15144 15150 40302d lstrcpyA lstrcpyA 15142->15150 15146 40306b strstr 15144->15146 15144->15150 15147 403096 strstr 15146->15147 15146->15150 15148 4030bd strstr 15147->15148 15147->15150 15148->15150 15151 4030e1 strstr 15148->15151 15149 40315d GlobalMemoryStatusEx 15153 4031dd 15149->15153 15150->15149 15151->15150 15154 4031f2 lstrcpyA 15153->15154 15155 401a78 15154->15155 15156 40320c GetTickCount 15154->15156 15155->15118 15156->15155 13117 9b111a LoadLibraryA 13120 9b1141 GetProcAddress 13117->13120 13119 9b112b 13120->13119 14181 41a8c0 14182 41a8c8 14181->14182 14183 41a736 GetPEB 14182->14183 14184 41a8f0 14182->14184 14183->14184 15157 4043c1 15158 404413 15157->15158 15159 404454 15157->15159 15169 403b40 GetTickCount rand 15158->15169 15171 403b40 GetTickCount rand 15159->15171 15162 404461 15172 403b40 GetTickCount rand 15162->15172 15163 40441f 15170 403b40 GetTickCount rand 15163->15170 15166 4044f4 ExitThread 15167 40442d 15167->15166 15168 4044ea Sleep 15167->15168 15168->15167 15169->15163 15170->15167 15171->15162 15172->15167 15173 4827c9 15176 4827d6 15173->15176 15177 4827d3 15176->15177 15178 4827e1 15176->15178 15180 4827e7 15178->15180 15181 47f1f3 5 API calls 15180->15181 15182 4827f9 15181->15182 15182->15177 15186 4041cf 15187 40420b 15186->15187 15188 404246 malloc 15187->15188 15191 4042ab 15188->15191 15189 4043b9 ExitThread 15190 403b40 GetTickCount rand 15190->15191 15191->15189 15191->15190 15192 404304 sprintf 15191->15192 15193 404336 sprintf 15191->15193 15192->15191 15193->15191 14191 4012d0 14192 4012e0 LoadLibraryA GetProcAddress 14191->14192 14193 4020d3 OpenMutexA 14194 4020f9 14193->14194 14195 4020eb ReleaseMutex CloseHandle 14193->14195 14210 403b40 GetTickCount rand 14194->14210 14195->14194 14197 402147 14211 403b40 GetTickCount rand 14197->14211 14199 402155 14212 403b40 GetTickCount rand 14199->14212 14201 402163 14213 403b40 GetTickCount rand 14201->14213 14203 402171 14214 403b40 GetTickCount rand 14203->14214 14205 40217f lstrcatA 14207 4021b9 GetProcAddress 14205->14207 14208 4021da WinExec ExitProcess 14207->14208 14210->14197 14211->14199 14212->14201 14213->14203 14214->14205 14215 47f6d4 14216 47f742 14215->14216 14217 47f6d9 14215->14217 14219 47f753 NtQuerySystemInformation 14216->14219 14223 47f8e7 14216->14223 14218 47f763 MapViewOfFile CloseHandle 14217->14218 14220 47f734 NtOpenSection 14217->14220 14222 47f7a4 14218->14222 14218->14223 14219->14218 14220->14216 14221 47f7ab UnmapViewOfFile 14221->14223 14222->14221 14222->14223 14224 47fcd3 14225 47fcf8 14224->14225 14265 47fdc6 lstrcatA CreateFileA 14225->14265 14228 47fde7 WriteFile CloseHandle 14229 47fe0a 14228->14229 14303 47fe1a LoadLibraryA 14229->14303 14233 47dd81 2 API calls 14234 47fe61 14233->14234 14339 47cede 14234->14339 14266 47fde7 WriteFile CloseHandle 14265->14266 14267 47fe0a 14265->14267 14266->14267 14268 47fe1a 142 API calls 14267->14268 14269 47fe0f GetProcAddress LoadLibraryA 14268->14269 14271 47dd81 2 API calls 14269->14271 14272 47fe61 14271->14272 14273 47cede 63 API calls 14272->14273 14274 47fe76 GetTickCount 14273->14274 14275 47fe8e 14274->14275 14276 47ff2b GetVolumeInformationA 14275->14276 14277 47ff5e 14276->14277 14278 47ffa2 14277->14278 14279 47ff8d Sleep DeleteFileA 14277->14279 14280 480030 14278->14280 14342 47ffc0 LoadLibraryA 14278->14342 14279->14278 14279->14279 14282 48005a 14280->14282 14283 48003c CreateThread CloseHandle 14280->14283 14375 48006b LoadLibraryA 14282->14375 14283->14282 14286 480089 14391 48009a LoadLibraryA 14286->14391 14287 47dd81 2 API calls 14287->14286 14292 47dd81 2 API calls 14300 4800c0 14292->14300 14293 47fdbf CreateFileA 14293->14228 14293->14229 14294 4800f6 Sleep 14294->14300 14295 480124 lstrlenA 14295->14300 14296 480356 Sleep 14296->14300 14297 4801b3 GetVersionExA 14297->14300 14300->14293 14300->14294 14300->14295 14300->14296 14300->14297 14301 480317 Sleep 14300->14301 14404 48023f 14300->14404 14415 48026d 14300->14415 14301->14300 14302 480323 GetTickCount 14301->14302 14302->14300 14304 47fe25 GetProcAddress LoadLibraryA 14303->14304 14449 47fe2f GetProcAddress LoadLibraryA 14303->14449 14307 47dd81 2 API calls 14304->14307 14308 47fe61 14307->14308 14309 47cede 63 API calls 14308->14309 14310 47fe76 GetTickCount 14309->14310 14311 47fe8e 14310->14311 14312 47ff2b GetVolumeInformationA 14311->14312 14313 47ff5e 14312->14313 14314 47ffa2 14313->14314 14315 47ff8d Sleep DeleteFileA 14313->14315 14316 480030 14314->14316 14317 47ffc0 52 API calls 14314->14317 14315->14314 14315->14315 14318 48005a 14316->14318 14319 48003c CreateThread CloseHandle 14316->14319 14324 47ffb4 14317->14324 14320 48006b 28 API calls 14318->14320 14319->14318 14321 48005f 14320->14321 14322 480089 14321->14322 14323 47dd81 2 API calls 14321->14323 14325 48009a 21 API calls 14322->14325 14323->14322 14324->14316 14327 47f6f9 5 API calls 14324->14327 14326 48008e 14325->14326 14328 47dd81 2 API calls 14326->14328 14327->14316 14336 4800c0 14328->14336 14329 47fe0f GetProcAddress LoadLibraryA 14329->14233 14330 4800f6 Sleep 14330->14336 14331 480124 lstrlenA 14331->14336 14332 480356 Sleep 14332->14336 14333 4801b3 GetVersionExA 14333->14336 14334 48023f 12 API calls 14334->14336 14335 48026d 12 API calls 14335->14336 14336->14329 14336->14330 14336->14331 14336->14332 14336->14333 14336->14334 14336->14335 14337 480317 Sleep 14336->14337 14337->14336 14338 480323 GetTickCount 14337->14338 14338->14336 14340 47d000 14339->14340 14341 47d14a 63 API calls 14340->14341 14426 47ffd7 GetProcAddress GetModuleFileNameA 14342->14426 14344 480030 14345 48005a 14344->14345 14346 48003c CreateThread CloseHandle 14344->14346 14348 48006b 28 API calls 14345->14348 14346->14345 14349 48005f 14348->14349 14350 480089 14349->14350 14351 47dd81 2 API calls 14349->14351 14353 48009a 21 API calls 14350->14353 14351->14350 14352 47f6f9 5 API calls 14352->14344 14354 48008e 14353->14354 14355 47dd81 2 API calls 14354->14355 14363 4800c0 14355->14363 14356 47ffb4 14356->14280 14366 47f6f9 14356->14366 14357 4800f6 Sleep 14357->14363 14358 480124 lstrlenA 14358->14363 14359 480356 Sleep 14359->14363 14360 4801b3 GetVersionExA 14360->14363 14361 48023f 12 API calls 14361->14363 14362 48026d 12 API calls 14362->14363 14363->14356 14363->14357 14363->14358 14363->14359 14363->14360 14363->14361 14363->14362 14364 480317 Sleep 14363->14364 14364->14363 14365 480323 GetTickCount 14364->14365 14365->14363 14367 47f72f 14366->14367 14367->14367 14368 47f734 NtOpenSection 14367->14368 14369 47f742 14368->14369 14370 47f753 NtQuerySystemInformation 14369->14370 14374 47f8e7 14369->14374 14371 47f763 MapViewOfFile CloseHandle 14370->14371 14373 47f7a4 14371->14373 14371->14374 14372 47f7ab UnmapViewOfFile 14372->14374 14373->14372 14373->14374 14374->14280 14376 47dd81 2 API calls 14375->14376 14377 480089 14376->14377 14378 48009a 21 API calls 14377->14378 14379 48008e 14378->14379 14380 47dd81 2 API calls 14379->14380 14388 4800c0 14380->14388 14381 48005f 14381->14286 14381->14287 14382 4800f6 Sleep 14382->14388 14383 480124 lstrlenA 14383->14388 14384 480356 Sleep 14384->14388 14385 4801b3 GetVersionExA 14385->14388 14386 48023f 12 API calls 14386->14388 14387 48026d 12 API calls 14387->14388 14388->14381 14388->14382 14388->14383 14388->14384 14388->14385 14388->14386 14388->14387 14389 480317 Sleep 14388->14389 14389->14388 14390 480323 GetTickCount 14389->14390 14390->14388 14392 4800a8 14391->14392 14393 48008e 14391->14393 14394 47dd81 2 API calls 14392->14394 14401 4800c0 14392->14401 14393->14292 14394->14401 14395 4800f6 Sleep 14395->14401 14396 480124 lstrlenA 14396->14401 14397 480356 Sleep 14397->14401 14398 4801b3 GetVersionExA 14398->14401 14399 48023f 12 API calls 14399->14401 14400 48026d 12 API calls 14400->14401 14401->14393 14401->14395 14401->14396 14401->14397 14401->14398 14401->14399 14401->14400 14402 480317 Sleep 14401->14402 14402->14401 14403 480323 GetTickCount 14402->14403 14403->14401 14413 4800e5 14404->14413 14405 48026d 6 API calls 14405->14413 14406 480366 14406->14300 14407 480356 Sleep 14407->14413 14408 4800f6 Sleep 14408->14413 14409 480124 lstrlenA 14409->14413 14410 480317 Sleep 14411 480323 GetTickCount 14410->14411 14410->14413 14411->14413 14412 4801b3 GetVersionExA 14412->14413 14413->14405 14413->14406 14413->14407 14413->14408 14413->14409 14413->14410 14413->14412 14414 48023f 6 API calls 14413->14414 14414->14413 14424 4800e5 14415->14424 14416 480366 14416->14300 14417 480356 Sleep 14417->14424 14418 4800f6 Sleep 14418->14424 14419 480124 lstrlenA 14419->14424 14420 480317 Sleep 14421 480323 GetTickCount 14420->14421 14420->14424 14421->14424 14422 4801b3 GetVersionExA 14422->14424 14423 48023f 6 API calls 14423->14424 14424->14416 14424->14417 14424->14418 14424->14419 14424->14420 14424->14422 14424->14423 14425 48026d 6 API calls 14424->14425 14425->14424 14427 480008 14426->14427 14428 480030 14427->14428 14429 47f6f9 5 API calls 14427->14429 14430 48005a 14428->14430 14431 48003c CreateThread CloseHandle 14428->14431 14429->14428 14432 48006b 28 API calls 14430->14432 14431->14430 14433 48005f 14432->14433 14434 480089 14433->14434 14435 47dd81 2 API calls 14433->14435 14436 48009a 21 API calls 14434->14436 14435->14434 14437 48008e 14436->14437 14438 47dd81 2 API calls 14437->14438 14441 4800c0 14438->14441 14439 47ffcb 14439->14344 14439->14352 14440 4800f6 Sleep 14440->14441 14441->14439 14441->14440 14442 480124 lstrlenA 14441->14442 14443 480356 Sleep 14441->14443 14444 4801b3 GetVersionExA 14441->14444 14445 48023f 12 API calls 14441->14445 14446 48026d 12 API calls 14441->14446 14447 480317 Sleep 14441->14447 14442->14441 14443->14441 14444->14441 14445->14441 14446->14441 14447->14441 14448 480323 GetTickCount 14447->14448 14448->14441 14450 47fe61 14449->14450 14451 47dd81 2 API calls 14449->14451 14452 47cede 63 API calls 14450->14452 14451->14450 14453 47fe76 GetTickCount 14452->14453 14454 47fe8e 14453->14454 14455 47ff2b GetVolumeInformationA 14454->14455 14456 47ff5e 14455->14456 14457 47ffa2 14456->14457 14458 47ff8d Sleep DeleteFileA 14456->14458 14459 480030 14457->14459 14460 47ffc0 52 API calls 14457->14460 14458->14457 14458->14458 14461 48005a 14459->14461 14462 48003c CreateThread CloseHandle 14459->14462 14467 47ffb4 14460->14467 14463 48006b 28 API calls 14461->14463 14462->14461 14464 48005f 14463->14464 14465 480089 14464->14465 14466 47dd81 2 API calls 14464->14466 14468 48009a 21 API calls 14465->14468 14466->14465 14467->14459 14470 47f6f9 5 API calls 14467->14470 14469 48008e 14468->14469 14471 47dd81 2 API calls 14469->14471 14470->14459 14478 4800c0 14471->14478 14472 480366 14472->14304 14473 4800f6 Sleep 14473->14478 14474 480124 lstrlenA 14474->14478 14475 480356 Sleep 14475->14478 14476 4801b3 GetVersionExA 14476->14478 14477 48023f 12 API calls 14477->14478 14478->14472 14478->14473 14478->14474 14478->14475 14478->14476 14478->14477 14479 48026d 12 API calls 14478->14479 14480 480317 Sleep 14478->14480 14479->14478 14480->14478 14481 480323 GetTickCount 14480->14481 14481->14478 13158 482dd6 13159 482de0 13158->13159 13160 482e70 SetThreadAffinityMask 13159->13160 13161 482e75 13160->13161 13072 4029e0 #4710 SendMessageA SendMessageA 13073 402a1b SetWindowLongA #6197 WinExec 13072->13073 13083 402ad0 lstrcpyA lstrcatA 13073->13083 13077 402a9d 13085 402b40 LoadLibraryA GetProcAddress 13077->13085 13078 402a6e 13080 402ab1 13080->13078 13107 402330 LoadLibraryA GetProcAddress 13080->13107 13084 402a68 13083->13084 13084->13077 13084->13078 13086 402c13 GetSystemDirectoryA strncmp 13085->13086 13087 402c55 13086->13087 13092 402d26 13086->13092 13111 403b40 GetTickCount rand 13087->13111 13089 402c5c 13112 403b40 GetTickCount rand 13089->13112 13091 402e2c 13091->13080 13092->13091 13096 402d9c 13092->13096 13097 402d8f GetLastError 13092->13097 13093 402c6a 13113 403b40 GetTickCount rand 13093->13113 13095 402c78 13114 403b40 GetTickCount rand 13095->13114 13096->13091 13102 402dd5 lstrcpyA lstrcatA 13096->13102 13097->13096 13099 402c86 13115 403b40 GetTickCount rand 13099->13115 13101 402c94 13116 403b40 GetTickCount rand 13101->13116 13105 402e0a lstrlenA 13102->13105 13104 402ca2 lstrcatA lstrcatA CopyFileA lstrcpyA 13104->13092 13105->13091 13108 4023d1 GetTempPathA lstrcatA MoveFileExA 13107->13108 13109 402420 ExitProcess 13108->13109 13110 402412 MoveFileExA 13108->13110 13110->13109 13111->13089 13112->13093 13113->13095 13114->13099 13115->13101 13116->13104 15247 4035e1 _exit 14492 7fe31141 GetProcAddress 15248 4027e2 15249 4027e6 15248->15249 15259 402500 EnumResourceNamesA 15249->15259 15251 4027eb 15252 402520 21 API calls 15251->15252 15253 402807 15252->15253 15254 401980 LoadLibraryA 15253->15254 15255 40280c 15254->15255 15260 4012b0 CreateThread 15255->15260 15257 40285c WaitForSingleObject CloseHandle 15258 402878 Sleep 15257->15258 15258->15255 15259->15251 15260->15257 14493 47f2e4 14495 47f2ea CreateThread CloseHandle 14493->14495 14496 47fccb 14495->14496 14497 47fcd1 14496->14497 15261 47f3e1 15263 47f3e7 15261->15263 15264 47f3ff GetTempPathA 15263->15264 15267 47f4a8 15263->15267 15271 47f426 GetTempFileNameA CreateFileA 15264->15271 15268 47f44d 15269 47f47d CloseHandle CreateProcessA 15268->15269 15270 47f469 WriteFile 15268->15270 15269->15267 15270->15268 15270->15269 15272 47f44d 15271->15272 15273 47f422 CreateFileA 15271->15273 15274 47f47d CloseHandle CreateProcessA 15272->15274 15275 47f469 WriteFile 15272->15275 15273->15267 15273->15268 15274->15273 15275->15272 15275->15274 15276 4037e9 15277 4037f4 15276->15277 15278 403920 9 API calls 15277->15278 15279 4037fe 15278->15279 15280 9b3735 15285 9b13c1 LookupPrivilegeValueA NtAdjustPrivilegesToken 15280->15285 15282 9b373b 15286 9b3752 15282->15286 15285->15282 15291 9b13c1 LookupPrivilegeValueA NtAdjustPrivilegesToken 15286->15291 15288 9b3758 15292 9b3775 15288->15292 15291->15288 15295 9b13c1 LookupPrivilegeValueA NtAdjustPrivilegesToken 15292->15295 15294 9b3740 15295->15294 14501 4040f0 14503 404115 14501->14503 14502 404144 ExitThread 14503->14502 14504 404138 Sleep 14503->14504 14504->14503 14505 9b042a 14506 9b0436 14505->14506 14508 9b0442 14506->14508 14509 9b1079 2 API calls 14508->14509 14510 9b04a4 14509->14510 14511 9b04ec 14510->14511 14512 9b04c5 GetModuleHandleA 14510->14512 14513 9b0507 GetVersion 14511->14513 14512->14511 14514 9b051e VirtualAlloc 14513->14514 14530 9b05d9 14513->14530 14515 9b05b8 CloseHandle 14514->14515 14519 9b0541 14514->14519 14515->14530 14516 9b05e2 SetThreadAffinityMask 14541 9b0601 GetModuleHandleA 14516->14541 14518 9b1079 2 API calls 14518->14530 14519->14515 14538 9b05c9 14519->14538 14520 9b070b lstrcpyW 14564 9b2425 lstrcpyW lstrlenW 14520->14564 14523 9b0726 GetPEB lstrcpyW lstrcatW 14525 9b2425 3 API calls 14523->14525 14524 9b0755 NtMapViewOfSection 14524->14515 14524->14530 14525->14530 14526 9b0789 NtOpenProcessToken 14527 9b07ce CreateToolhelp32Snapshot Process32First 14526->14527 14526->14530 14528 9b07f4 Process32Next 14527->14528 14529 9b086e CloseHandle 14528->14529 14528->14530 14529->14515 14530->14515 14530->14516 14530->14518 14530->14520 14530->14523 14530->14524 14530->14526 14530->14528 14531 9b0806 OpenProcess 14530->14531 14533 9b07b0 CreateToolhelp32Snapshot Process32First 14530->14533 14534 9b24eb 5 API calls 14530->14534 14535 9b0865 CloseHandle 14530->14535 14536 9b083d CreateRemoteThread 14530->14536 14537 9b05c9 Sleep 14530->14537 14567 9b07b5 14530->14567 14531->14528 14531->14530 14533->14528 14534->14530 14535->14528 14536->14530 14536->14535 14537->14535 14539 9b05d8 14538->14539 14540 9b05ce Sleep 14538->14540 14539->14515 14540->14538 14542 9b1079 2 API calls 14541->14542 14556 9b05d9 14541->14556 14542->14556 14543 9b05b8 CloseHandle 14543->14556 14544 9b05e2 SetThreadAffinityMask 14545 9b0601 30 API calls 14544->14545 14545->14556 14546 9b1079 2 API calls 14546->14556 14547 9b070b lstrcpyW 14548 9b2425 3 API calls 14547->14548 14548->14556 14549 9b0726 GetPEB lstrcpyW lstrcatW 14551 9b2425 3 API calls 14549->14551 14550 9b0755 NtMapViewOfSection 14550->14543 14550->14556 14551->14556 14552 9b0789 NtOpenProcessToken 14553 9b07ce CreateToolhelp32Snapshot Process32First 14552->14553 14552->14556 14554 9b07f4 Process32Next 14553->14554 14555 9b086e CloseHandle 14554->14555 14554->14556 14555->14543 14556->14543 14556->14544 14556->14546 14556->14547 14556->14549 14556->14550 14556->14552 14556->14554 14557 9b0806 OpenProcess 14556->14557 14558 9b07b5 30 API calls 14556->14558 14559 9b07b0 CreateToolhelp32Snapshot Process32First 14556->14559 14560 9b24eb 5 API calls 14556->14560 14561 9b0865 CloseHandle 14556->14561 14562 9b083d CreateRemoteThread 14556->14562 14563 9b05c9 Sleep 14556->14563 14557->14554 14557->14556 14558->14556 14559->14554 14560->14556 14561->14554 14562->14556 14562->14561 14563->14561 14591 9b60a7 14564->14591 14593 9b13c1 LookupPrivilegeValueA NtAdjustPrivilegesToken 14567->14593 14569 9b07bb FreeLibrary CloseHandle 14570 9b07ce CreateToolhelp32Snapshot Process32First 14569->14570 14571 9b07f4 Process32Next 14570->14571 14572 9b086e CloseHandle 14571->14572 14581 9b05d9 14571->14581 14573 9b05b8 CloseHandle 14572->14573 14573->14581 14574 9b0806 OpenProcess 14574->14571 14574->14581 14575 9b05e2 SetThreadAffinityMask 14577 9b0601 29 API calls 14575->14577 14576 9b24eb 5 API calls 14576->14581 14577->14581 14578 9b0865 CloseHandle 14578->14571 14579 9b1079 2 API calls 14579->14581 14580 9b083d CreateRemoteThread 14580->14578 14580->14581 14581->14571 14581->14573 14581->14574 14581->14575 14581->14576 14581->14578 14581->14579 14581->14580 14582 9b05c9 Sleep 14581->14582 14583 9b070b lstrcpyW 14581->14583 14585 9b0726 GetPEB lstrcpyW lstrcatW 14581->14585 14586 9b0755 NtMapViewOfSection 14581->14586 14588 9b0789 NtOpenProcessToken 14581->14588 14589 9b07b5 29 API calls 14581->14589 14590 9b07b0 CreateToolhelp32Snapshot Process32First 14581->14590 14582->14578 14584 9b2425 3 API calls 14583->14584 14584->14581 14587 9b2425 3 API calls 14585->14587 14586->14573 14586->14581 14587->14581 14588->14570 14588->14581 14589->14581 14590->14571 14592 9b615b 14591->14592 14593->14569 14599 402e80 14600 402e90 14599->14600 14601 402f27 #2379 14600->14601 14602 402e98 #470 SendMessageA 14600->14602 14603 402ecb #755 14602->14603 15304 47fd84 GetModuleHandleA 15345 47f353 15304->15345 15307 47fda6 CreateFileA 15308 47fde7 WriteFile CloseHandle 15307->15308 15309 47fe0a 15307->15309 15308->15309 15310 47fe1a 142 API calls 15309->15310 15311 47fe0f GetProcAddress LoadLibraryA 15310->15311 15313 47dd81 2 API calls 15311->15313 15314 47fe61 15313->15314 15315 47cede 63 API calls 15314->15315 15316 47fe76 GetTickCount 15315->15316 15317 47fe8e 15316->15317 15318 47ff2b GetVolumeInformationA 15317->15318 15319 47ff5e 15318->15319 15320 47ffa2 15319->15320 15321 47ff8d Sleep DeleteFileA 15319->15321 15322 480030 15320->15322 15323 47ffc0 52 API calls 15320->15323 15321->15320 15321->15321 15324 48005a 15322->15324 15325 48003c CreateThread CloseHandle 15322->15325 15330 47ffb4 15323->15330 15326 48006b 28 API calls 15324->15326 15325->15324 15327 48005f 15326->15327 15328 480089 15327->15328 15329 47dd81 2 API calls 15327->15329 15331 48009a 21 API calls 15328->15331 15329->15328 15330->15322 15333 47f6f9 5 API calls 15330->15333 15332 48008e 15331->15332 15334 47dd81 2 API calls 15332->15334 15333->15322 15342 4800c0 15334->15342 15335 480366 15336 4800f6 Sleep 15336->15342 15337 480124 lstrlenA 15337->15342 15338 480356 Sleep 15338->15342 15339 4801b3 GetVersionExA 15339->15342 15340 48023f 12 API calls 15340->15342 15341 48026d 12 API calls 15341->15342 15342->15335 15342->15336 15342->15337 15342->15338 15342->15339 15342->15340 15342->15341 15343 480317 Sleep 15342->15343 15343->15342 15344 480323 GetTickCount 15343->15344 15344->15342 15346 47f347 GetSystemDirectoryA 15345->15346 15346->15307 14611 403e89 14612 403ebd 14611->14612 14613 403f1b 14612->14613 14621 403b40 GetTickCount rand 14612->14621 14615 403f3d 14622 403b40 GetTickCount rand 14615->14622 14617 403f4c 14618 403fa2 ExitThread 14617->14618 14619 403f9c Sleep 14617->14619 14619->14617 14621->14615 14622->14617 15347 7fe3042a 15348 7fe30436 15347->15348 15350 7fe30442 15348->15350 15351 7fe31079 2 API calls 15350->15351 15352 7fe304a4 15351->15352 15353 7fe304ec 15352->15353 15354 7fe304c5 GetModuleHandleA 15352->15354 15355 7fe30507 GetVersion 15353->15355 15354->15353 15356 7fe305d9 15355->15356 15357 7fe3051e VirtualAlloc 15355->15357 15358 7fe305b8 CloseHandle 15356->15358 15359 7fe305e2 SetThreadAffinityMask 15356->15359 15357->15358 15365 7fe30541 15357->15365 15362 7fe30601 GetModuleHandleA 15358->15362 15386 7fe30601 GetModuleHandleA 15359->15386 15364 7fe31079 2 API calls 15362->15364 15381 7fe3061d 15364->15381 15365->15358 15383 7fe305c9 15365->15383 15366 7fe3070b lstrcpyW 15405 7fe32425 lstrcpyW lstrlenW 15366->15405 15369 7fe30726 GetPEB lstrcpyW lstrcatW 15371 7fe32425 3 API calls 15369->15371 15370 7fe30755 NtMapViewOfSection 15370->15358 15370->15381 15371->15381 15372 7fe30789 NtOpenProcessToken 15373 7fe307ce CreateToolhelp32Snapshot Process32First 15372->15373 15372->15381 15374 7fe307f4 Process32Next 15373->15374 15375 7fe3086e CloseHandle 15374->15375 15374->15381 15375->15358 15377 7fe30806 OpenProcess 15377->15374 15377->15381 15378 7fe324eb 5 API calls 15378->15381 15379 7fe30865 CloseHandle 15379->15374 15380 7fe3083d CreateRemoteThread 15380->15379 15380->15381 15381->15358 15381->15366 15381->15369 15381->15370 15381->15372 15381->15373 15381->15374 15381->15377 15381->15378 15381->15379 15381->15380 15382 7fe305c9 Sleep 15381->15382 15408 7fe307b5 15381->15408 15382->15379 15384 7fe305d8 15383->15384 15385 7fe305ce Sleep 15383->15385 15384->15358 15385->15383 15387 7fe31079 2 API calls 15386->15387 15397 7fe3061d 15387->15397 15388 7fe305b8 CloseHandle 15388->15386 15389 7fe3070b lstrcpyW 15390 7fe32425 3 API calls 15389->15390 15390->15397 15391 7fe30726 GetPEB lstrcpyW lstrcatW 15393 7fe32425 3 API calls 15391->15393 15392 7fe30755 NtMapViewOfSection 15392->15388 15392->15397 15393->15397 15394 7fe30789 NtOpenProcessToken 15395 7fe307ce CreateToolhelp32Snapshot Process32First 15394->15395 15394->15397 15396 7fe307f4 Process32Next 15395->15396 15396->15397 15398 7fe3086e CloseHandle 15396->15398 15397->15388 15397->15389 15397->15391 15397->15392 15397->15394 15397->15395 15397->15396 15399 7fe307b5 30 API calls 15397->15399 15400 7fe30806 OpenProcess 15397->15400 15401 7fe324eb 5 API calls 15397->15401 15402 7fe30865 CloseHandle 15397->15402 15403 7fe3083d CreateRemoteThread 15397->15403 15404 7fe305c9 Sleep 15397->15404 15398->15388 15399->15397 15400->15396 15400->15397 15401->15397 15402->15396 15403->15397 15403->15402 15404->15402 15406 7fe360a7 15405->15406 15407 7fe32461 NtCreateSection 15406->15407 15407->15381 15430 7fe313c1 LookupPrivilegeValueA NtAdjustPrivilegesToken 15408->15430 15410 7fe307bb FreeLibrary CloseHandle 15411 7fe307ce CreateToolhelp32Snapshot Process32First 15410->15411 15412 7fe307f4 Process32Next 15411->15412 15413 7fe3086e CloseHandle 15412->15413 15422 7fe3061d 15412->15422 15414 7fe305b8 CloseHandle 15413->15414 15416 7fe30601 GetModuleHandleA 15414->15416 15415 7fe30806 OpenProcess 15415->15412 15415->15422 15417 7fe31079 2 API calls 15416->15417 15417->15422 15418 7fe324eb 5 API calls 15418->15422 15419 7fe30865 CloseHandle 15419->15412 15420 7fe3083d CreateRemoteThread 15420->15419 15420->15422 15421 7fe305c9 Sleep 15421->15419 15422->15411 15422->15412 15422->15414 15422->15415 15422->15418 15422->15419 15422->15420 15422->15421 15423 7fe3070b lstrcpyW 15422->15423 15425 7fe30726 GetPEB lstrcpyW lstrcatW 15422->15425 15426 7fe30755 NtMapViewOfSection 15422->15426 15428 7fe30789 NtOpenProcessToken 15422->15428 15429 7fe307b5 13 API calls 15422->15429 15424 7fe32425 3 API calls 15423->15424 15424->15422 15427 7fe32425 3 API calls 15425->15427 15426->15414 15426->15422 15427->15422 15428->15411 15428->15422 15429->15422 15430->15410 14623 47f68d 14625 47f696 14623->14625 14626 47f69d Sleep 14625->14626 14626->14626 13162 40348f __set_app_type __p__fmode __p__commode 13163 4034fe 13162->13163 13164 403512 13163->13164 13165 403506 __setusermatherr 13163->13165 13174 403600 _controlfp 13164->13174 13165->13164 13167 403517 _initterm __getmainargs _initterm 13168 40356b GetStartupInfoA 13167->13168 13170 40359f GetModuleHandleA 13168->13170 13175 405b10 #1576 13170->13175 13173 4035c3 exit _XcptFilter 13174->13167 13175->13173 14627 402890 14628 4029b4 14627->14628 14629 4028a5 14627->14629 14629->14628 14630 402921 Sleep 14629->14630 14631 402973 Sleep 14629->14631 14632 4028ac Sleep 14629->14632 14636 40296f 14630->14636 14631->14628 14637 40291d 14632->14637 14638 404a93 14640 404ad2 14638->14640 14639 404ea9 14640->14639 14650 403b40 GetTickCount rand 14640->14650 14642 404bcb 14651 403b40 GetTickCount rand 14642->14651 14644 404c0a 14652 403b40 GetTickCount rand 14644->14652 14646 404ea2 ExitThread 14647 403b40 GetTickCount rand 14648 404c2f 14647->14648 14648->14646 14648->14647 14649 404e95 Sleep 14648->14649 14649->14648 14650->14642 14651->14644 14652->14648 14656 7fe33735 14661 7fe313c1 LookupPrivilegeValueA NtAdjustPrivilegesToken 14656->14661 14658 7fe3373b 14662 7fe33752 14658->14662 14661->14658 14667 7fe313c1 LookupPrivilegeValueA NtAdjustPrivilegesToken 14662->14667 14664 7fe33758 14668 7fe33775 14664->14668 14667->14664 14671 7fe313c1 LookupPrivilegeValueA NtAdjustPrivilegesToken 14668->14671 14670 7fe33740 14671->14670 14675 401e9c 14676 401ea9 lstrlenA 14675->14676 14694 401b79 14675->14694 14676->14694 14677 40222c 14680 402254 14677->14680 14681 40224d CloseHandle 14677->14681 14678 401c3e CloseHandle LoadLibraryA 14678->14694 14681->14680 14682 401c01 CloseHandle 14682->14694 14683 401e2a lstrcpynA lstrlenA lstrcpynA 14709 4015d0 14683->14709 14684 401d4e lstrcpynA 14697 401330 14684->14697 14685 401d9f lstrcpynA lstrlenA lstrcpynA 14703 4014f0 14685->14703 14686 401eff 6 API calls 14688 401f45 ReleaseMutex CloseHandle 14686->14688 14686->14694 14688->14694 14691 40206e lstrcatA LoadLibraryA GetProcAddress 14693 4020af WinExec 14691->14693 14692 401f77 LoadLibraryA GetProcAddress 14692->14694 14693->14694 14694->14677 14694->14678 14694->14682 14694->14683 14694->14684 14694->14685 14694->14686 14694->14691 14694->14692 14695 401820 GetProcAddress 14694->14695 14696 40183f 14695->14696 14696->14694 14698 401482 14697->14698 14700 40134c 14697->14700 14698->14694 14699 401471 14716 4012b0 CreateThread 14699->14716 14700->14699 14715 4012b0 CreateThread 14700->14715 14704 401510 14703->14704 14705 4015ac 14703->14705 14706 40159b 14704->14706 14708 4012b0 CreateThread 14704->14708 14705->14694 14717 4012b0 CreateThread 14706->14717 14708->14704 14710 401651 14709->14710 14714 401612 14709->14714 14710->14694 14711 401640 14719 4012b0 CreateThread 14711->14719 14714->14711 14718 4012b0 CreateThread 14714->14718 14715->14700 14716->14698 14717->14705 14718->14714 14719->14710 14720 482cae 14722 482c67 14720->14722 14721 482c74 14722->14721 14723 482dd6 SetThreadAffinityMask 14722->14723 14723->14721 14724 47e0a1 14725 47e0df NtAdjustPrivilegesToken 14724->14725 14729 9b307c GetModuleHandleA 14777 9b264b 14729->14777 14732 9b309e CreateFileA 14733 9b30df WriteFile CloseHandle 14732->14733 14734 9b3102 14732->14734 14733->14734 14735 9b3112 129 API calls 14734->14735 14736 9b3107 GetProcAddress LoadLibraryA 14735->14736 14738 9b1079 2 API calls 14736->14738 14739 9b3159 14738->14739 14740 9b316e GetTickCount 14739->14740 14741 9b3186 14740->14741 14742 9b3223 GetVolumeInformationA 14741->14742 14743 9b3256 14742->14743 14744 9b329a 14743->14744 14745 9b3285 Sleep DeleteFileA 14743->14745 14746 9b3328 14744->14746 14747 9b32b8 88 API calls 14744->14747 14745->14744 14745->14745 14748 9b3352 14746->14748 14749 9b3334 CreateThread CloseHandle 14746->14749 14753 9b32ac 14747->14753 14750 9b3363 51 API calls 14748->14750 14749->14748 14751 9b3357 14750->14751 14752 9b1079 2 API calls 14751->14752 14754 9b3381 14752->14754 14753->14746 14756 9b29f1 5 API calls 14753->14756 14755 9b3392 38 API calls 14754->14755 14757 9b3386 14755->14757 14756->14746 14758 9b1079 2 API calls 14757->14758 14759 9b33b8 14758->14759 14760 9b365e 14759->14760 14761 9b33c5 WSAStartup 14759->14761 14766 9b33dd 14761->14766 14762 9b33ee Sleep 14762->14766 14763 9b3411 gethostbyname 14764 9b341c lstrlen 14763->14764 14763->14766 14764->14763 14764->14766 14765 9b344d socket 14765->14766 14767 9b3462 connect 14765->14767 14766->14760 14766->14762 14766->14763 14766->14765 14768 9b363e closesocket 14766->14768 14769 9b364e Sleep 14766->14769 14775 9b360f Sleep 14766->14775 14767->14768 14772 9b347b 14767->14772 14768->14766 14769->14766 14770 9b34ab GetVersionExA 14770->14772 14771 9b3537 23 API calls 14771->14772 14772->14770 14772->14771 14773 9b3565 23 API calls 14772->14773 14774 9b355f wsprintfA 14773->14774 14774->14766 14775->14766 14776 9b361b GetTickCount 14775->14776 14776->14766 14778 9b263f GetSystemDirectoryA 14777->14778 14778->14732 15441 4827af 15442 4827d6 5 API calls 15441->15442 15443 4827b9 15442->15443 13068 4010b0 #1134 13071 4011f0 #324 #1168 #1146 LoadIconA 13068->13071 13070 4010ed #2514 #641 13071->13070 15444 403fb1 15445 403fca 15444->15445 15446 40400f 15445->15446 15447 40402c GetTickCount 15445->15447 15453 403b40 GetTickCount rand 15447->15453 15449 40407d 15454 403b40 GetTickCount rand 15449->15454 15452 40408c ExitThread 15453->15449 15454->15452 15458 47fdb3 lstrcatA 15459 47fdba 15458->15459 15460 47fdc6 160 API calls 15459->15460 15461 47fdbf CreateFileA 15460->15461 15462 47fde7 WriteFile CloseHandle 15461->15462 15463 47fe0a 15461->15463 15462->15463 15464 47fe1a 142 API calls 15463->15464 15465 47fe0f GetProcAddress LoadLibraryA 15464->15465 15467 47dd81 2 API calls 15465->15467 15468 47fe61 15467->15468 15469 47cede 63 API calls 15468->15469 15470 47fe76 GetTickCount 15469->15470 15471 47fe8e 15470->15471 15472 47ff2b GetVolumeInformationA 15471->15472 15473 47ff5e 15472->15473 15474 47ffa2 15473->15474 15475 47ff8d Sleep DeleteFileA 15473->15475 15476 480030 15474->15476 15477 47ffc0 52 API calls 15474->15477 15475->15474 15475->15475 15478 48005a 15476->15478 15479 48003c CreateThread CloseHandle 15476->15479 15484 47ffb4 15477->15484 15480 48006b 28 API calls 15478->15480 15479->15478 15481 48005f 15480->15481 15482 480089 15481->15482 15483 47dd81 2 API calls 15481->15483 15485 48009a 21 API calls 15482->15485 15483->15482 15484->15476 15487 47f6f9 5 API calls 15484->15487 15486 48008e 15485->15486 15488 47dd81 2 API calls 15486->15488 15487->15476 15496 4800c0 15488->15496 15489 480366 15490 4800f6 Sleep 15490->15496 15491 480124 lstrlenA 15491->15496 15492 480356 Sleep 15492->15496 15493 4801b3 GetVersionExA 15493->15496 15494 48023f 12 API calls 15494->15496 15495 48026d 12 API calls 15495->15496 15496->15489 15496->15490 15496->15491 15496->15492 15496->15493 15496->15494 15496->15495 15497 480317 Sleep 15496->15497 15497->15496 15498 480323 GetTickCount 15497->15498 15498->15496 14782 401cb5 14783 401ce5 CreateFileA 14782->14783 14803 401b79 14782->14803 14784 401d0b 14783->14784 14783->14803 14785 401d36 CloseHandle 14784->14785 14784->14803 14785->14803 14786 40222c 14789 402254 14786->14789 14790 40224d CloseHandle 14786->14790 14787 401c3e CloseHandle LoadLibraryA 14787->14803 14788 401820 GetProcAddress 14788->14803 14790->14789 14791 401c01 CloseHandle 14791->14803 14792 401e2a lstrcpynA lstrlenA lstrcpynA 14796 4015d0 CreateThread 14792->14796 14793 401d4e lstrcpynA 14798 401330 CreateThread 14793->14798 14794 401d9f lstrcpynA lstrlenA lstrcpynA 14799 4014f0 CreateThread 14794->14799 14795 401eff 6 API calls 14797 401f45 ReleaseMutex CloseHandle 14795->14797 14795->14803 14796->14803 14797->14803 14798->14803 14799->14803 14800 40206e lstrcatA LoadLibraryA GetProcAddress 14802 4020af WinExec 14800->14802 14801 401f77 LoadLibraryA GetProcAddress 14801->14803 14802->14803 14803->14786 14803->14787 14803->14788 14803->14791 14803->14792 14803->14793 14803->14794 14803->14795 14803->14800 14803->14801

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 47d14a-47d1c1 call 47dd81 3 47d1f4 0->3 4 47d1c3-47d1f2 call 47f3bb GetModuleHandleA 0->4 6 47d1fb-47d220 call 47f3cf GetVersion 3->6 4->6 10 47d226-47d247 VirtualAlloc 6->10 11 47d2e1-47d2e8 6->11 12 47d2c0-47d2ca CloseHandle 10->12 13 47d249-47d279 call 47d005 10->13 11->12 14 47d2ea-47d32c SetThreadAffinityMask call 47d309 call 47dd81 11->14 12->11 13->12 22 47d27b-47d292 13->22 14->12 23 47d32e-47d347 14->23 22->12 28 47d294-47d2bb call 47d2d1 22->28 24 47d350-47d369 23->24 25 47d349 23->25 24->12 27 47d36f-47d388 24->27 25->24 27->12 29 47d38e-47d3a7 27->29 28->12 29->12 30 47d3ad-47d3b3 29->30 32 47d3b5-47d3c8 30->32 33 47d3ef-47d3f5 30->33 32->12 34 47d3ce-47d3d4 32->34 35 47d3f7-47d40a 33->35 36 47d413-47d42c lstrcpyW call 47f12d 33->36 34->33 38 47d3d6-47d3e9 34->38 35->36 39 47d40c 35->39 43 47d42e-47d457 GetPEB lstrcpyW lstrcatW call 47f12d 36->43 44 47d45d-47d486 NtMapViewOfSection 36->44 38->12 38->33 39->36 43->12 43->44 44->12 46 47d48c-47d4a0 call 47d005 NtOpenProcessToken 44->46 50 47d4d6-47d4f5 CreateToolhelp32Snapshot Process32First 46->50 51 47d4a2-47d4b4 call 47de10 call 47d4bd 46->51 52 47d4fc-47d506 Process32Next 50->52 62 47d4b6 51->62 63 47d51f-47d520 51->63 54 47d576-47d583 CloseHandle 52->54 55 47d508-47d50c 52->55 54->12 55->52 57 47d50e-47d51e OpenProcess 55->57 57->52 59 47d520 57->59 61 47d521-47d529 call 47f1f3 59->61 67 47d56d-47d574 CloseHandle 61->67 68 47d52b-47d531 61->68 62->61 65 47d4b8-47d4f5 CreateToolhelp32Snapshot Process32First 62->65 63->61 65->52 67->52 68->67 69 47d533-47d543 68->69 69->67 70 47d545-47d55c CreateRemoteThread 69->70 70->67 71 47d55e-47d568 call 47d2d1 70->71 71->67
                                              APIs
                                              • GetModuleHandleA.KERNEL32(00000000), ref: 0047D1D5
                                              • GetVersion.KERNEL32 ref: 0047D217
                                              • VirtualAlloc.KERNEL32(00000000,000065A4,08001000,00000040), ref: 0047D23F
                                              • CloseHandle.KERNEL32(?), ref: 0047D2C4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: Handle$AllocCloseModuleVersionVirtual
                                              • String ID: "'3$\BaseNamedObjects\rnxtVt$\BaseNamedObjects\rnxtVt$csrs
                                              • API String ID: 3017432202-1649617
                                              • Opcode ID: 7ac06902b526b320f932b07ff4c1ff8a544c7f655dd6fa859a553a943bad6a44
                                              • Instruction ID: d3e89109dc24bbf886ea0b6f2b303f9048f19f5640d296cbfa9f7c9e66786fe5
                                              • Opcode Fuzzy Hash: 7ac06902b526b320f932b07ff4c1ff8a544c7f655dd6fa859a553a943bad6a44
                                              • Instruction Fuzzy Hash: 21B1AF31A14209FBEB219F20CC09BEA3BBDEF04706F14806AE90D9E182C7F59F458759

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 73 9b0442-9b04b9 call 9b1079 76 9b04bb-9b04ea call 9b26b3 GetModuleHandleA 73->76 77 9b04ec 73->77 79 9b04f3-9b0518 call 9b26c7 GetVersion 76->79 77->79 83 9b05d9-9b05e0 79->83 84 9b051e-9b053f VirtualAlloc 79->84 85 9b05b8-9b05c2 CloseHandle 83->85 86 9b05e2-9b0624 SetThreadAffinityMask call 9b0601 call 9b1079 83->86 84->85 87 9b0541-9b0571 call 9b02fd 84->87 85->83 86->85 96 9b0626-9b063f 86->96 87->85 95 9b0573-9b058a 87->95 95->85 101 9b058c-9b05b3 call 9b05c9 95->101 97 9b0648-9b0661 96->97 98 9b0641 96->98 97->85 100 9b0667-9b0680 97->100 98->97 100->85 102 9b0686-9b069f 100->102 101->85 102->85 103 9b06a5-9b06ab 102->103 105 9b06ad-9b06c0 103->105 106 9b06e7-9b06ed 103->106 105->85 107 9b06c6-9b06cc 105->107 108 9b070b-9b0724 lstrcpyW call 9b2425 106->108 109 9b06ef-9b0702 106->109 107->106 113 9b06ce-9b06e1 107->113 116 9b0726-9b074f GetPEB lstrcpyW lstrcatW call 9b2425 108->116 117 9b0755-9b077e NtMapViewOfSection 108->117 109->108 110 9b0704 109->110 110->108 113->85 113->106 116->85 116->117 117->85 119 9b0784-9b0798 call 9b02fd NtOpenProcessToken 117->119 123 9b079a-9b07ac call 9b1108 call 9b07b5 119->123 124 9b07ce-9b07ed CreateToolhelp32Snapshot Process32First 119->124 134 9b07ae 123->134 135 9b0817-9b0818 123->135 125 9b07f4-9b07fe Process32Next 124->125 127 9b086e-9b087b CloseHandle 125->127 128 9b0800-9b0804 125->128 127->85 128->125 130 9b0806-9b0816 OpenProcess 128->130 130->125 132 9b0818 130->132 136 9b0819-9b0821 call 9b24eb 132->136 134->136 137 9b07b0-9b07ed CreateToolhelp32Snapshot Process32First 134->137 135->136 140 9b0823-9b0829 136->140 141 9b0865-9b086c CloseHandle 136->141 137->125 140->141 142 9b082b-9b083b 140->142 141->125 142->141 143 9b083d-9b0854 CreateRemoteThread 142->143 143->141 144 9b0856-9b0860 call 9b05c9 143->144 144->141
                                              APIs
                                              • GetModuleHandleA.KERNEL32(00000000), ref: 009B04CD
                                              • GetVersion.KERNEL32 ref: 009B050F
                                              • VirtualAlloc.KERNEL32(00000000,000065A4,08001000,00000040), ref: 009B0537
                                              • CloseHandle.KERNELBASE(?), ref: 009B05BC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043369977.00000000009B0000.00000040.10000000.00040000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_9b0000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: Handle$AllocCloseModuleVersionVirtual
                                              • String ID: "'3$\BaseNamedObjects\rnxtVt$\BaseNamedObjects\rnxtVt$csrs
                                              • API String ID: 3017432202-1649617
                                              • Opcode ID: 7ac06902b526b320f932b07ff4c1ff8a544c7f655dd6fa859a553a943bad6a44
                                              • Instruction ID: 4e229efc3d520e97deb4388f8938704670b8addbc78b96a4f55b785fb9f86adf
                                              • Opcode Fuzzy Hash: 7ac06902b526b320f932b07ff4c1ff8a544c7f655dd6fa859a553a943bad6a44
                                              • Instruction Fuzzy Hash: D4B17631604249FBEB619F21C94ABEE3BADAF84722F100028F9089E591CBF19F55CB55

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 146 47d309-47d31f GetModuleHandleA 147 47d325-47d32c 146->147 148 47d320 call 47dd81 146->148 149 47d2c0-47d2e8 CloseHandle 147->149 150 47d32e-47d347 147->150 148->147 156 47d2ea-47d2fe SetThreadAffinityMask call 47d309 149->156 151 47d350-47d369 150->151 152 47d349 150->152 151->149 153 47d36f-47d388 151->153 152->151 153->149 155 47d38e-47d3a7 153->155 155->149 157 47d3ad-47d3b3 155->157 161 47d303-47d320 call 47dd81 156->161 159 47d3b5-47d3c8 157->159 160 47d3ef-47d3f5 157->160 159->149 163 47d3ce-47d3d4 159->163 164 47d3f7-47d40a 160->164 165 47d413-47d42c lstrcpyW call 47f12d 160->165 161->147 163->160 166 47d3d6-47d3e9 163->166 164->165 167 47d40c 164->167 170 47d42e-47d457 GetPEB lstrcpyW lstrcatW call 47f12d 165->170 171 47d45d-47d486 NtMapViewOfSection 165->171 166->149 166->160 167->165 170->149 170->171 171->149 173 47d48c-47d4a0 call 47d005 NtOpenProcessToken 171->173 177 47d4d6-47d4f5 CreateToolhelp32Snapshot Process32First 173->177 178 47d4a2-47d4b4 call 47de10 call 47d4bd 173->178 179 47d4fc-47d506 Process32Next 177->179 189 47d4b6 178->189 190 47d51f-47d520 178->190 181 47d576-47d583 CloseHandle 179->181 182 47d508-47d50c 179->182 181->149 182->179 184 47d50e-47d51e OpenProcess 182->184 184->179 186 47d520 184->186 188 47d521-47d529 call 47f1f3 186->188 194 47d56d-47d574 CloseHandle 188->194 195 47d52b-47d531 188->195 189->188 192 47d4b8-47d4f5 CreateToolhelp32Snapshot Process32First 189->192 190->188 192->179 194->179 195->194 196 47d533-47d543 195->196 196->194 197 47d545-47d55c CreateRemoteThread 196->197 197->194 198 47d55e-47d568 call 47d2d1 197->198 198->194
                                              APIs
                                              • CloseHandle.KERNEL32(?), ref: 0047D2C4
                                              • GetModuleHandleA.KERNEL32(0047D303), ref: 0047D309
                                              • lstrcpyW.KERNEL32(\BaseNamedObjects\rnxtVt,\BaseNamedObjects\rnxtVt,?,?,?,?), ref: 0047D421
                                              • lstrcpyW.KERNEL32(\BaseNamedObjects\rnxtVt,?), ref: 0047D43E
                                              • lstrcatW.KERNEL32(\BaseNamedObjects\rnxtVt,\rnxtVt), ref: 0047D44C
                                              • NtMapViewOfSection.NTDLL(00000000,000000FF,?,00000000,000065A4,00000000,?,00000002,00000000,00000040), ref: 0047D47C
                                              • NtOpenProcessToken.NTDLL(000000FF,00000020), ref: 0047D497
                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,000065A4,00000000,?,00000002,00000000,00000040,00000000,000065A4), ref: 0047D4DA
                                              • Process32First.KERNEL32 ref: 0047D4ED
                                              • Process32Next.KERNEL32 ref: 0047D4FE
                                              • OpenProcess.KERNEL32(0000002A,00000000,?,?,?,?,?,?,00000002,00000000,00000040,00000000,000065A4), ref: 0047D516
                                              • CreateRemoteThread.KERNEL32(?,00000000,00000000,-00002FC3,00000002,00000000), ref: 0047D553
                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,00000002,00000000,00000040,00000000,000065A4), ref: 0047D56E
                                              • CloseHandle.KERNEL32 ref: 0047D57D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: Handle$Close$CreateOpenProcessProcess32lstrcpy$FirstModuleNextRemoteSectionSnapshotThreadTokenToolhelp32Viewlstrcat
                                              • String ID: \BaseNamedObjects\rnxtVt$\BaseNamedObjects\rnxtVt$csrs
                                              • API String ID: 1545766225-676502312
                                              • Opcode ID: dcfbda88c1452e16d26fd376d2d59b1fd8c40ae983f26fda525faf50f22b961d
                                              • Instruction ID: fcdb6bbfc0312b4f8506c2a26003359644726e6987a875f92ecc1c07d60a53b0
                                              • Opcode Fuzzy Hash: dcfbda88c1452e16d26fd376d2d59b1fd8c40ae983f26fda525faf50f22b961d
                                              • Instruction Fuzzy Hash: 7D61BA31A14109FFDB219F50C849BEE3B7DEF45316F14806AE80D9E192C7B99F0A8B59

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 200 9b0601-9b0617 GetModuleHandleA 201 9b061d-9b0624 200->201 202 9b0618 call 9b1079 200->202 203 9b05b8-9b05c2 CloseHandle 201->203 204 9b0626-9b063f 201->204 202->201 208 9b05d9-9b05e0 203->208 205 9b0648-9b0661 204->205 206 9b0641 204->206 205->203 207 9b0667-9b0680 205->207 206->205 207->203 210 9b0686-9b069f 207->210 208->203 209 9b05e2-9b0618 SetThreadAffinityMask call 9b0601 call 9b1079 208->209 209->201 210->203 212 9b06a5-9b06ab 210->212 214 9b06ad-9b06c0 212->214 215 9b06e7-9b06ed 212->215 214->203 217 9b06c6-9b06cc 214->217 218 9b070b-9b0724 lstrcpyW call 9b2425 215->218 219 9b06ef-9b0702 215->219 217->215 222 9b06ce-9b06e1 217->222 224 9b0726-9b074f GetPEB lstrcpyW lstrcatW call 9b2425 218->224 225 9b0755-9b077e NtMapViewOfSection 218->225 219->218 220 9b0704 219->220 220->218 222->203 222->215 224->203 224->225 225->203 227 9b0784-9b0798 call 9b02fd NtOpenProcessToken 225->227 231 9b079a-9b07ac call 9b1108 call 9b07b5 227->231 232 9b07ce-9b07ed CreateToolhelp32Snapshot Process32First 227->232 242 9b07ae 231->242 243 9b0817-9b0818 231->243 233 9b07f4-9b07fe Process32Next 232->233 235 9b086e-9b087b CloseHandle 233->235 236 9b0800-9b0804 233->236 235->203 236->233 238 9b0806-9b0816 OpenProcess 236->238 238->233 240 9b0818 238->240 244 9b0819-9b0821 call 9b24eb 240->244 242->244 245 9b07b0-9b07ed CreateToolhelp32Snapshot Process32First 242->245 243->244 248 9b0823-9b0829 244->248 249 9b0865-9b086c CloseHandle 244->249 245->233 248->249 250 9b082b-9b083b 248->250 249->233 250->249 251 9b083d-9b0854 CreateRemoteThread 250->251 251->249 252 9b0856-9b0860 call 9b05c9 251->252 252->249
                                              APIs
                                              • CloseHandle.KERNELBASE(?), ref: 009B05BC
                                              • GetModuleHandleA.KERNEL32(009B05FB), ref: 009B0601
                                              • lstrcpyW.KERNEL32(\BaseNamedObjects\rnxtVt,\BaseNamedObjects\rnxtVt,?,?,?,?), ref: 009B0719
                                              • lstrcpyW.KERNEL32(\BaseNamedObjects\rnxtVt,?), ref: 009B0736
                                              • lstrcatW.KERNEL32(\BaseNamedObjects\rnxtVt,\rnxtVt), ref: 009B0744
                                              • NtMapViewOfSection.NTDLL(00000000,000000FF,?,00000000,000065A4,00000000,?,00000002,00000000,00000040), ref: 009B0774
                                              • NtOpenProcessToken.NTDLL(000000FF,00000020), ref: 009B078F
                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,000065A4,00000000,?,00000002,00000000,00000040,00000000,000065A4), ref: 009B07D2
                                              • Process32First.KERNEL32 ref: 009B07E5
                                              • Process32Next.KERNEL32 ref: 009B07F6
                                              • OpenProcess.KERNEL32(0000002A,00000000,?,?,?,?,?,?,00000002,00000000,00000040,00000000,000065A4), ref: 009B080E
                                              • CreateRemoteThread.KERNELBASE(?,00000000,00000000,-00002FC3,00000002,00000000), ref: 009B084B
                                              • CloseHandle.KERNELBASE(?,?,?,?,?,?,00000002,00000000,00000040,00000000,000065A4), ref: 009B0866
                                              • CloseHandle.KERNEL32 ref: 009B0875
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043369977.00000000009B0000.00000040.10000000.00040000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_9b0000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: Handle$Close$CreateOpenProcessProcess32lstrcpy$FirstModuleNextRemoteSectionSnapshotThreadTokenToolhelp32Viewlstrcat
                                              • String ID: \BaseNamedObjects\rnxtVt$\BaseNamedObjects\rnxtVt$csrs
                                              • API String ID: 1545766225-676502312
                                              • Opcode ID: dcfbda88c1452e16d26fd376d2d59b1fd8c40ae983f26fda525faf50f22b961d
                                              • Instruction ID: 45f8643d4050a3f40740ce4add8d88ec45bb4b1fa2d238a3ddddab4416af18a2
                                              • Opcode Fuzzy Hash: dcfbda88c1452e16d26fd376d2d59b1fd8c40ae983f26fda525faf50f22b961d
                                              • Instruction Fuzzy Hash: 96619731604209FBDB659F11C949BFE3B6EEF89322F504028F8099E591CBB1AF058B95

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 323 47f12d-47f1ad lstrcpyW lstrlenW call 482daf NtCreateSection
                                              APIs
                                              • lstrcpyW.KERNEL32(?,\BaseNamedObjects\rnxtVt), ref: 0047F139
                                              • lstrlenW.KERNEL32(?), ref: 0047F140
                                              • NtCreateSection.NTDLL(?,0000000E,?,?,00000040,08000000,00000000), ref: 0047F195
                                              Strings
                                              • \BaseNamedObjects\rnxtVt, xrefs: 0047F137
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: CreateSectionlstrcpylstrlen
                                              • String ID: \BaseNamedObjects\rnxtVt
                                              • API String ID: 2597515329-2100028039
                                              • Opcode ID: 20bdb40ffb474c402f65f73e914af13d443f92d4dff509730c57e181749428e4
                                              • Instruction ID: 236b27dbcf50c3b36ce75338e0eff8c7e58860e6019f247f95c002ae3b581bdf
                                              • Opcode Fuzzy Hash: 20bdb40ffb474c402f65f73e914af13d443f92d4dff509730c57e181749428e4
                                              • Instruction Fuzzy Hash: B00181B0790304BAF7305B2ACC8BF5E3D68DF81B51F548558F605AE1C4D5F99A0487AA

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 344 9b24a6-9b24ea NtOpenSection
                                              APIs
                                              • NtOpenSection.NTDLL(?,0000000E), ref: 009B24D5
                                              Strings
                                              • \BaseNamedObjects\rnxtVt, xrefs: 009B24C2
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043369977.00000000009B0000.00000040.10000000.00040000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_9b0000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: OpenSection
                                              • String ID: \BaseNamedObjects\rnxtVt
                                              • API String ID: 1950954290-2100028039
                                              • Opcode ID: 01bc40aaccc0e12f94ebcffc641123895db33c2b7787041d8d9fd48dce060fde
                                              • Instruction ID: 3af93ba349bfc42ef742b5b28717abad19c90c039107910871d63db4ec892b88
                                              • Opcode Fuzzy Hash: 01bc40aaccc0e12f94ebcffc641123895db33c2b7787041d8d9fd48dce060fde
                                              • Instruction Fuzzy Hash: 88E0D8F13505053BFB585B1ACC07FB7211CDB80601F08C504F918D8180E5F6DF504674

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 345 9b24eb-9b24f3 call 9b24a6 348 9b24f9-9b252b NtMapViewOfSection CloseHandle 345->348 349 9b25d8-9b25db 345->349 348->349 350 9b2531-9b2537 348->350 351 9b2539-9b2542 350->351 352 9b2545-9b254f 350->352 351->352 353 9b2551-9b2559 352->353 354 9b2566-9b25a1 call 9b23ee * 3 352->354 353->354 355 9b255b-9b2561 call 9b23ee 353->355 363 9b25ae-9b25b6 354->363 364 9b25a3-9b25a9 call 9b23ee 354->364 355->354 366 9b25b8-9b25be call 9b23ee 363->366 367 9b25c3-9b25cb 363->367 364->363 366->367 367->349 369 9b25cd-9b25d3 call 9b23ee 367->369 369->349
                                              APIs
                                                • Part of subcall function 009B24A6: NtOpenSection.NTDLL(?,0000000E), ref: 009B24D5
                                              • NtMapViewOfSection.NTDLL(00000000,?,?,00000000,0000A5A4,00000000,?,00000002,00100000,00000040), ref: 009B251B
                                              • CloseHandle.KERNELBASE(00000000,0000A5A4,00000000,?,00000002,00100000,00000040,00000000,0000A5A4,00000000,?,009B081E), ref: 009B2523
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043369977.00000000009B0000.00000040.10000000.00040000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_9b0000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: Section$CloseHandleOpenView
                                              • String ID:
                                              • API String ID: 2731707328-0
                                              • Opcode ID: d57de25e2a9e0870f79673598bd885887cfcbdd2de40fd78df44cfc9adbced58
                                              • Instruction ID: 0ef0e5a9f0ea872d1116677e812433304fb4d952543c798f3825385127d7bbe6
                                              • Opcode Fuzzy Hash: d57de25e2a9e0870f79673598bd885887cfcbdd2de40fd78df44cfc9adbced58
                                              • Instruction Fuzzy Hash: F1211A3034060AABDB34EB25CD96FEA736DEF81B21F040118F8089E495DBB4AF06CA55

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 371 9b1399-9b13eb LookupPrivilegeValueA NtAdjustPrivilegesToken
                                              APIs
                                              • LookupPrivilegeValueA.ADVAPI32(00000000,?), ref: 009B13D1
                                              • NtAdjustPrivilegesToken.NTDLL(?,00000000,?,00000000,00000000,00000000), ref: 009B13E1
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043369977.00000000009B0000.00000040.10000000.00040000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_9b0000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: AdjustLookupPrivilegePrivilegesTokenValue
                                              • String ID:
                                              • API String ID: 3615134276-0
                                              • Opcode ID: 06cb91745a521b86393166955c5c3afe83ac66ea4f770f9a12dd5b551f424793
                                              • Instruction ID: c1c1ab654349933eb8818b114bb595f6400d348302ddc4a0bc7520d30974f20a
                                              • Opcode Fuzzy Hash: 06cb91745a521b86393166955c5c3afe83ac66ea4f770f9a12dd5b551f424793
                                              • Instruction Fuzzy Hash: E4F02732542420BBD7201F42CC8EED77F28EF537A0F044456F4484E152C2A28BA5D3F4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 372 9b23ee-9b2424 NtProtectVirtualMemory NtWriteVirtualMemory
                                              APIs
                                              • NtProtectVirtualMemory.NTDLL(?,?,?,00000040), ref: 009B2412
                                              • NtWriteVirtualMemory.NTDLL ref: 009B241B
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043369977.00000000009B0000.00000040.10000000.00040000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_9b0000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: MemoryVirtual$ProtectWrite
                                              • String ID:
                                              • API String ID: 151266762-0
                                              • Opcode ID: 534548baa2052e911e8d62c03dc4c028d0ed02b2351596322006dfeadd0b54f5
                                              • Instruction ID: c38bda1e3a101e2fdd3f8b0b268324223328f149a1f706d2aad4996337be3d8a
                                              • Opcode Fuzzy Hash: 534548baa2052e911e8d62c03dc4c028d0ed02b2351596322006dfeadd0b54f5
                                              • Instruction Fuzzy Hash: 69E0E2A07502007FFA185A299C5BF7B391DDB80B41F810208FA0A98180FAE26F1486BA

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 373 9b13c1-9b13eb LookupPrivilegeValueA NtAdjustPrivilegesToken
                                              APIs
                                              • LookupPrivilegeValueA.ADVAPI32(00000000,?), ref: 009B13D1
                                              • NtAdjustPrivilegesToken.NTDLL(?,00000000,?,00000000,00000000,00000000), ref: 009B13E1
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043369977.00000000009B0000.00000040.10000000.00040000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_9b0000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: AdjustLookupPrivilegePrivilegesTokenValue
                                              • String ID:
                                              • API String ID: 3615134276-0
                                              • Opcode ID: 03410179fabc8902f2c006e492dd7336ccf3c81071a106955ee4cf51594df4cc
                                              • Instruction ID: 2757d4dcf4212f89d011a90f07cb8bff029887feb5f377fd6fe999df64044c2d
                                              • Opcode Fuzzy Hash: 03410179fabc8902f2c006e492dd7336ccf3c81071a106955ee4cf51594df4cc
                                              • Instruction Fuzzy Hash: 8AD09E316420347BD6711E168C0EEDB7E1DEF57BB1F014045F90C99192C5A28EA1C7F5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 254 4029e0-402a19 #4710 SendMessageA * 2 255 402a1b-402a1d 254->255 256 402a1f 254->256 257 402a22-402a63 SetWindowLongA #6197 WinExec call 402ad0 255->257 256->257 259 402a68-402a6c 257->259 260 402a9d-402abb call 402b40 259->260 261 402a6e-402a87 259->261 263 402a94-402a9c 260->263 265 402abd-402ac4 call 402330 ExitProcess 260->265 261->263
                                              APIs
                                              • #4710.MFC42 ref: 004029EA
                                              • SendMessageA.USER32(?,00000080,00000001,?), ref: 00402A04
                                              • SendMessageA.USER32(?,00000080,00000000,?), ref: 00402A15
                                              • SetWindowLongA.USER32(?,000000EC,00000080), ref: 00402A2A
                                              • #6197.MFC42(00000000,0000009C,0000009C,00000000,00000000,00000001), ref: 00402A3E
                                              • WinExec.KERNEL32(taskkill /f /im ZhuDongFangYu.exe /t,00000000), ref: 00402A5D
                                                • Part of subcall function 00402B40: LoadLibraryA.KERNEL32(kernel32.dll,00000047), ref: 00402BF5
                                                • Part of subcall function 00402B40: GetProcAddress.KERNEL32(00000000), ref: 00402BFC
                                                • Part of subcall function 00402B40: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00402C1F
                                                • Part of subcall function 00402B40: strncmp.MSVCRT ref: 00402C44
                                              • ExitProcess.KERNEL32 ref: 00402AC4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: MessageSend$#4710#6197AddressDirectoryExecExitLibraryLoadLongProcProcessSystemWindowstrncmp
                                              • String ID: 100200$100200$100200$taskkill /f /im ZhuDongFangYu.exe /t$|7@
                                              • API String ID: 3614577793-2301931671
                                              • Opcode ID: e673e02340e5bd4efe8e554bec7010853af1fda679b9e67aa24c048e2f3451a8
                                              • Instruction ID: 36d68f4db7c25d412b264195875051be24fd626328578f2d4964cd317598fecc
                                              • Opcode Fuzzy Hash: e673e02340e5bd4efe8e554bec7010853af1fda679b9e67aa24c048e2f3451a8
                                              • Instruction Fuzzy Hash: 6E11B4307407107BD730AB659E0AF5B77A8BB44B04F10462EFA85B72C1CFF8A8048A5C

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 268 9b07b5-9b07c8 call 9b13c1 FreeLibrary CloseHandle 271 9b07ce-9b07ed CreateToolhelp32Snapshot Process32First 268->271 272 9b07f4-9b07fe Process32Next 271->272 273 9b086e-9b087b CloseHandle 272->273 274 9b0800-9b0804 272->274 275 9b05b8-9b05e0 CloseHandle 273->275 274->272 276 9b0806-9b0816 OpenProcess 274->276 280 9b05e2-9b0624 SetThreadAffinityMask call 9b0601 call 9b1079 275->280 276->272 277 9b0818 276->277 278 9b0819-9b0821 call 9b24eb 277->278 285 9b0823-9b0829 278->285 286 9b0865-9b086c CloseHandle 278->286 280->275 291 9b0626-9b063f 280->291 285->286 288 9b082b-9b083b 285->288 286->272 288->286 290 9b083d-9b0854 CreateRemoteThread 288->290 290->286 292 9b0856-9b0860 call 9b05c9 290->292 293 9b0648-9b0661 291->293 294 9b0641 291->294 292->286 293->275 296 9b0667-9b0680 293->296 294->293 296->275 297 9b0686-9b069f 296->297 297->275 298 9b06a5-9b06ab 297->298 299 9b06ad-9b06c0 298->299 300 9b06e7-9b06ed 298->300 299->275 301 9b06c6-9b06cc 299->301 302 9b070b-9b0724 lstrcpyW call 9b2425 300->302 303 9b06ef-9b0702 300->303 301->300 306 9b06ce-9b06e1 301->306 308 9b0726-9b074f GetPEB lstrcpyW lstrcatW call 9b2425 302->308 309 9b0755-9b077e NtMapViewOfSection 302->309 303->302 304 9b0704 303->304 304->302 306->275 306->300 308->275 308->309 309->275 311 9b0784-9b0798 call 9b02fd NtOpenProcessToken 309->311 311->271 315 9b079a-9b07ac call 9b1108 call 9b07b5 311->315 320 9b07ae 315->320 321 9b0817-9b0818 315->321 320->278 322 9b07b0-9b07ed CreateToolhelp32Snapshot Process32First 320->322 321->278 322->272
                                              APIs
                                                • Part of subcall function 009B13C1: LookupPrivilegeValueA.ADVAPI32(00000000,?), ref: 009B13D1
                                                • Part of subcall function 009B13C1: NtAdjustPrivilegesToken.NTDLL(?,00000000,?,00000000,00000000,00000000), ref: 009B13E1
                                              • CloseHandle.KERNELBASE(?), ref: 009B05BC
                                              • FreeLibrary.KERNELBASE(76DA0000,?,009B07A4,00000000,000065A4,00000000,?,00000002,00000000,00000040,00000000,000065A4), ref: 009B07C1
                                              • CloseHandle.KERNELBASE(?,?,009B07A4,00000000,000065A4,00000000,?,00000002,00000000,00000040,00000000,000065A4), ref: 009B07C8
                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,000065A4,00000000,?,00000002,00000000,00000040,00000000,000065A4), ref: 009B07D2
                                              • Process32First.KERNEL32 ref: 009B07E5
                                              • Process32Next.KERNEL32 ref: 009B07F6
                                              • OpenProcess.KERNEL32(0000002A,00000000,?,?,?,?,?,?,00000002,00000000,00000040,00000000,000065A4), ref: 009B080E
                                              • CreateRemoteThread.KERNELBASE(?,00000000,00000000,-00002FC3,00000002,00000000), ref: 009B084B
                                              • CloseHandle.KERNELBASE(?,?,?,?,?,?,00000002,00000000,00000040,00000000,000065A4), ref: 009B0866
                                              • CloseHandle.KERNEL32 ref: 009B0875
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043369977.00000000009B0000.00000040.10000000.00040000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_9b0000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: CloseHandle$CreateProcess32$AdjustFirstFreeLibraryLookupNextOpenPrivilegePrivilegesProcessRemoteSnapshotThreadTokenToolhelp32Value
                                              • String ID: csrs
                                              • API String ID: 3908997113-2321902090
                                              • Opcode ID: 7a0311b27d1f69206ae28c9acee774715fd69c7f810f3bbf34c027bcac111cc0
                                              • Instruction ID: 0dbbd65e151dee08bd4ce7a0b5921048cae0814ab8677a7717b497bfa926959d
                                              • Opcode Fuzzy Hash: 7a0311b27d1f69206ae28c9acee774715fd69c7f810f3bbf34c027bcac111cc0
                                              • Instruction Fuzzy Hash: 29114231244215FBEB255F21CD8DBFF7A6DEF84762F101028F94699081DBB1CF428AA6

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 326 4010b0-4011bf #1134 call 4011f0 #2514 #641
                                              APIs
                                              • #1134.MFC42(00000000), ref: 004010D0
                                                • Part of subcall function 004011F0: #324.MFC42(00000066,00000000,?,?,00000000,00405C38,000000FF,004010ED,00000000), ref: 00401214
                                                • Part of subcall function 004011F0: #1168.MFC42(00000066,00000000,?,?,00000000), ref: 00401227
                                                • Part of subcall function 004011F0: #1146.MFC42(00000080,0000000E,00000080,00000066,00000000,?,?,00000000), ref: 00401238
                                                • Part of subcall function 004011F0: LoadIconA.USER32(00000000,00000080), ref: 0040123E
                                              • #2514.MFC42(00000000), ref: 004010FD
                                              • #641.MFC42(00000000), ref: 004011AA
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: #1134#1146#1168#2514#324#641IconLoad
                                              • String ID:
                                              • API String ID: 684539369-0
                                              • Opcode ID: d0dbdc0e91b82d1144f430ae13d057aa2d360b1f2b28aa11f9f2600f3695659b
                                              • Instruction ID: e887a676387cd3a6316cff733c1d11cddbc99e07af3dfecb023e529bfa9dd79e
                                              • Opcode Fuzzy Hash: d0dbdc0e91b82d1144f430ae13d057aa2d360b1f2b28aa11f9f2600f3695659b
                                              • Instruction Fuzzy Hash: 07F09671854618EBC724EFA4CC42B9DB778FB05724F10033EE815A36C1EB785605CB85

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 329 9b111a-9b1126 LoadLibraryA call 9b1141 331 9b112b-9b1132 329->331 332 9b119d 331->332 333 9b1134 331->333 334 9b119f-9b11a3 332->334 333->334 335 9b1136-9b113d 333->335 336 9b11a4-9b11ae 334->336 335->336 337 9b113f-9b1164 335->337 339 9b1166-9b1183 337->339 343 9b1185-9b1197 339->343 343->332
                                              APIs
                                              • LoadLibraryA.KERNELBASE(009B110D,009B079F,00000000,000065A4,00000000,?,00000002,00000000,00000040,00000000,000065A4), ref: 009B111A
                                                • Part of subcall function 009B1141: GetProcAddress.KERNEL32(00000000,009B112B), ref: 009B1142
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043369977.00000000009B0000.00000040.10000000.00040000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_9b0000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: \rnxtVt
                                              • API String ID: 2574300362-1594572371
                                              • Opcode ID: 26fcc5e8879559b3b83a82e0dda8a5f548424430b07c6330c5c9e08bd0f2914d
                                              • Instruction ID: 3067b662685fc21095eb646c4592805f8dbffd5f059cbf0deb5e2a181e68ac2c
                                              • Opcode Fuzzy Hash: 26fcc5e8879559b3b83a82e0dda8a5f548424430b07c6330c5c9e08bd0f2914d
                                              • Instruction Fuzzy Hash: C211EC9586C3C25FCB16CB744ABE5D4BF407E0322078CC6CFC5860F2A3E79581028742

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 374 482dd6-482e70 call 482f60 * 2 SetThreadAffinityMask 380 482e75-482e88 call 482c52 374->380 383 482e8a-482e92 380->383 384 482edb-482eec call 482b79 380->384 383->384 385 482e94-482eda 383->385 385->384
                                              APIs
                                              • SetThreadAffinityMask.KERNEL32(?,F2222C20,000000FE,C5DF86ED,A22ABE94,00482C74), ref: 00482E70
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: AffinityMaskThread
                                              • String ID:
                                              • API String ID: 3640065098-0
                                              • Opcode ID: c3cf256ebe4f1c2ecfd723cee460dd2a3f2d6b55d1eced337396679191a8835d
                                              • Instruction ID: 4312523c05c8ac190cfc8e271565302d471b299cd7a62bb55059f68913cba86f
                                              • Opcode Fuzzy Hash: c3cf256ebe4f1c2ecfd723cee460dd2a3f2d6b55d1eced337396679191a8835d
                                              • Instruction Fuzzy Hash: 7701AB3A508110DFCB107E3CCE485BD77E2AFD5314F115B1EE1945B284CF385A0A8786
                                              APIs
                                              • #1576.MFC42(004035C3,004035C3,004035C3,004035C3,004035C3,00000000,?,0000000A), ref: 00405B20
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: #1576
                                              • String ID:
                                              • API String ID: 1976119259-0
                                              • Opcode ID: 47d5a98b55b57ba85a66e84109f2227387a3d22cae08d4c422bb556fe884a3cf
                                              • Instruction ID: d2ca0a3b883f0518e56937479b7600124a2c67ba881e6fa747779e696d41ac8e
                                              • Opcode Fuzzy Hash: 47d5a98b55b57ba85a66e84109f2227387a3d22cae08d4c422bb556fe884a3cf
                                              • Instruction Fuzzy Hash: 36B0087601C786ABDB02DE91880192BBAA2BB98704F485C1DB2A1140A187768478EB16
                                              APIs
                                              • Sleep.KERNELBASE(0000000A,009B0865,?,00000000,00000000,-00002FC3,00000002,00000000,?,00000000), ref: 009B05D0
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043369977.00000000009B0000.00000040.10000000.00040000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_9b0000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: Sleep
                                              • String ID:
                                              • API String ID: 3472027048-0
                                              • Opcode ID: 9edc5c94d801cdde56f49ff5336f37be4f198dfa9831bd9a4b8610ef498a08ec
                                              • Instruction ID: 98924bfd55e486d10f53bb03bc4250a4ac19d964606a7a1db1e7ad3cbc5130b7
                                              • Opcode Fuzzy Hash: 9edc5c94d801cdde56f49ff5336f37be4f198dfa9831bd9a4b8610ef498a08ec
                                              • Instruction Fuzzy Hash: 2BB0122578020096D6340911490DFD615105F80B22FF00066F2071CCC00DE40702290D
                                              APIs
                                              • GetLocaleInfoW.KERNEL32(00000800,00000002,?,00000040,?,76F8F550,76F90BD0,00000072), ref: 00402F8B
                                              • GetComputerNameA.KERNEL32 ref: 00402FA2
                                              • lstrcpyA.KERNEL32(?,SOFTWARE\Microsoft\Windows NT\CurrentVersion), ref: 00402FBB
                                              • strstr.MSVCRT ref: 00403024
                                              • strstr.MSVCRT ref: 00403052
                                              • strstr.MSVCRT ref: 00403075
                                              • lstrcpyA.KERNEL32(?,Windows NT), ref: 00403114
                                              • lstrcpyA.KERNEL32(?,HARDWARE\DESCRIPTION\System\CentralProcessor\0), ref: 0040313D
                                              • GlobalMemoryStatusEx.KERNEL32(?), ref: 004031C5
                                              • lstrcpyA.KERNEL32(?,20108L), ref: 00403201
                                              • GetTickCount.KERNEL32 ref: 0040320C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: lstrcpy$strstr$ComputerCountGlobalInfoLocaleMemoryNameStatusTick
                                              • String ID: "7@$%u MB$%u MHz$2000$2003$2008$20108L$47@$<6@$@$@$F7@$HARDWARE\DESCRIPTION\System\CentralProcessor\0$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion$Vista$Windows 2000$Windows 2003$Windows 2008$Windows 7$Windows NT$Windows Vista$Windows XP$~MHz
                                              • API String ID: 13981014-3306235746
                                              • Opcode ID: a7db7102705653c934fd47b61ca4cdcb3c0d92441ed082312b1d186f1afde4d2
                                              • Instruction ID: 8024c398b29a2f099fa7e41a4c2d81eb78002d16970cbed0a3e220c746c77202
                                              • Opcode Fuzzy Hash: a7db7102705653c934fd47b61ca4cdcb3c0d92441ed082312b1d186f1afde4d2
                                              • Instruction Fuzzy Hash: A7614170144305BFD710DF60DD45FAB7BA8AB88745F10493EF585B22D0EA78AA09CF6A
                                              APIs
                                              • GetModuleHandleA.KERNEL32(00000000), ref: 7FE304CD
                                              • GetVersion.KERNEL32 ref: 7FE3050F
                                              • VirtualAlloc.KERNEL32(00000000,000065A4,08001000,00000040), ref: 7FE30537
                                              • CloseHandle.KERNEL32(?), ref: 7FE305BC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043960210.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7fe30000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: Handle$AllocCloseModuleVersionVirtual
                                              • String ID: "'3$\BaseNamedObjects\rnxtVt$\BaseNamedObjects\rnxtVt$csrs
                                              • API String ID: 3017432202-1649617
                                              • Opcode ID: 7ac06902b526b320f932b07ff4c1ff8a544c7f655dd6fa859a553a943bad6a44
                                              • Instruction ID: bf6e148d40060bb9ff3a14a9286da860fd85a46fac5c7d6c15dd231958de371b
                                              • Opcode Fuzzy Hash: 7ac06902b526b320f932b07ff4c1ff8a544c7f655dd6fa859a553a943bad6a44
                                              • Instruction Fuzzy Hash: 95B16C31A05359FFEB619F20C809BED3BADEF4571AF900024EA0A9E181C7F1AB45CB55
                                              APIs
                                              • CloseHandle.KERNEL32(?), ref: 7FE305BC
                                              • GetModuleHandleA.KERNEL32(7FE305FB), ref: 7FE30601
                                              • lstrcpyW.KERNEL32(\BaseNamedObjects\rnxtVt,\BaseNamedObjects\rnxtVt,?,?,?,?), ref: 7FE30719
                                              • lstrcpyW.KERNEL32(\BaseNamedObjects\rnxtVt,?), ref: 7FE30736
                                              • lstrcatW.KERNEL32(\BaseNamedObjects\rnxtVt,\rnxtVt), ref: 7FE30744
                                              • NtMapViewOfSection.NTDLL(00000000,000000FF,?,00000000,000065A4,00000000,?,00000002,00000000,00000040), ref: 7FE30774
                                              • NtOpenProcessToken.NTDLL(000000FF,00000020), ref: 7FE3078F
                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,000065A4,00000000,?,00000002,00000000,00000040,00000000,000065A4), ref: 7FE307D2
                                              • Process32First.KERNEL32 ref: 7FE307E5
                                              • Process32Next.KERNEL32 ref: 7FE307F6
                                              • OpenProcess.KERNEL32(0000002A,00000000,?,?,?,?,?,?,00000002,00000000,00000040,00000000,000065A4), ref: 7FE3080E
                                              • CreateRemoteThread.KERNEL32(?,00000000,00000000,-00002FC3,00000002,00000000), ref: 7FE3084B
                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,00000002,00000000,00000040,00000000,000065A4), ref: 7FE30866
                                              • CloseHandle.KERNEL32 ref: 7FE30875
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043960210.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7fe30000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: Handle$Close$CreateOpenProcessProcess32lstrcpy$FirstModuleNextRemoteSectionSnapshotThreadTokenToolhelp32Viewlstrcat
                                              • String ID: \BaseNamedObjects\rnxtVt$\BaseNamedObjects\rnxtVt$csrs
                                              • API String ID: 1545766225-676502312
                                              • Opcode ID: dcfbda88c1452e16d26fd376d2d59b1fd8c40ae983f26fda525faf50f22b961d
                                              • Instruction ID: 4034ee1ac34cf344d60b1b743f91cb73119df433e2ee071f6ee9a8f8d678e866
                                              • Opcode Fuzzy Hash: dcfbda88c1452e16d26fd376d2d59b1fd8c40ae983f26fda525faf50f22b961d
                                              • Instruction Fuzzy Hash: 0961BD31A05209FFDB619F10C84DBEE3B6EEF45719F904068EA0A9E590C7B1AF05CB95
                                              APIs
                                              • NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 7FE32A36
                                              • NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 7FE32A55
                                              • MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 7FE32A7F
                                              • CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 7FE32A8C
                                              • UnmapViewOfFile.KERNEL32(?), ref: 7FE32AA4
                                              Strings
                                              • C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1, xrefs: 7FE32A00
                                              • \Device\PhysicalMemory, xrefs: 7FE329CC
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043960210.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7fe30000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: FileView$CloseHandleInformationOpenQuerySectionSystemUnmap
                                              • String ID: C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$\Device\PhysicalMemory
                                              • API String ID: 2985292042-3938670448
                                              • Opcode ID: f5b742b9587cdac67e2bb23952e5644605ce90bf8b7d29b5e49f46c6b19350d7
                                              • Instruction ID: f784499129cf61d4ff85df333bf3b76779e152c7d281c3d08bc0d42cf97a2f12
                                              • Opcode Fuzzy Hash: f5b742b9587cdac67e2bb23952e5644605ce90bf8b7d29b5e49f46c6b19350d7
                                              • Instruction Fuzzy Hash: 1C817A71A00219FFDB208F24CC89FAA77BDEF44705F614258ED499B295D3B0AF45CA91
                                              APIs
                                              • NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 009B2A36
                                              • NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 009B2A55
                                              • MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 009B2A7F
                                              • CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 009B2A8C
                                              • UnmapViewOfFile.KERNEL32(?), ref: 009B2AA4
                                              Strings
                                              • \Device\PhysicalMemory, xrefs: 009B29CC
                                              • C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1, xrefs: 009B2A00
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043369977.00000000009B0000.00000040.10000000.00040000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_9b0000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: FileView$CloseHandleInformationOpenQuerySectionSystemUnmap
                                              • String ID: C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$\Device\PhysicalMemory
                                              • API String ID: 2985292042-3938670448
                                              • Opcode ID: d4bbd99800a5ed16e67fd9b1e1255b72b407661223bcf3a707d0e03b541c6dfc
                                              • Instruction ID: 5d17eabab3570cef6317bbe20f380952279cf61ac3628bf94ffa36e688820904
                                              • Opcode Fuzzy Hash: d4bbd99800a5ed16e67fd9b1e1255b72b407661223bcf3a707d0e03b541c6dfc
                                              • Instruction Fuzzy Hash: 1E81AA71600219FFEB208F24CC89FAA7BADFF45711F244658ED099B291C7B0AF45CA90
                                              APIs
                                              • NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 7FE32A36
                                              • NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 7FE32A55
                                              • MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 7FE32A7F
                                              • CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 7FE32A8C
                                              • UnmapViewOfFile.KERNEL32(?), ref: 7FE32AA4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043960210.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7fe30000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: FileView$CloseHandleInformationOpenQuerySectionSystemUnmap
                                              • String ID: C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$ysic
                                              • API String ID: 2985292042-2835701104
                                              • Opcode ID: e096a308c09e6b02b95fe1d014301fff9b14a95bfc109e57e88e1af0ff91d58a
                                              • Instruction ID: 318294e3e7f85719ab3bc7b1e15188bdad7b77c11d20dad426282bd8f2c8130f
                                              • Opcode Fuzzy Hash: e096a308c09e6b02b95fe1d014301fff9b14a95bfc109e57e88e1af0ff91d58a
                                              • Instruction Fuzzy Hash: 77116D70640705FBEB218F10CC49FAA3B7DEF88704F544218EE1A9A290D7B4AF14C655
                                              APIs
                                              • NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 009B2A36
                                              • NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 009B2A55
                                              • MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 009B2A7F
                                              • CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 009B2A8C
                                              • UnmapViewOfFile.KERNEL32(?), ref: 009B2AA4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043369977.00000000009B0000.00000040.10000000.00040000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_9b0000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: FileView$CloseHandleInformationOpenQuerySectionSystemUnmap
                                              • String ID: C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$ysic
                                              • API String ID: 2985292042-2835701104
                                              • Opcode ID: e096a308c09e6b02b95fe1d014301fff9b14a95bfc109e57e88e1af0ff91d58a
                                              • Instruction ID: 11370ddadd2c3fa92d20600b4c3851dbef3e2eff2192d446905542364170b9e9
                                              • Opcode Fuzzy Hash: e096a308c09e6b02b95fe1d014301fff9b14a95bfc109e57e88e1af0ff91d58a
                                              • Instruction Fuzzy Hash: A6115B70240609FBEB258F10CC49FAA3B6CEF88710F244628EE199B290D7B4AF148A55
                                              APIs
                                              • NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 0047F73E
                                              • NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 0047F75D
                                              • MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 0047F787
                                              • CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 0047F794
                                              • UnmapViewOfFile.KERNEL32(?), ref: 0047F7AC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: FileView$CloseHandleInformationOpenQuerySectionSystemUnmap
                                              • String ID: \Device\PhysicalMemory
                                              • API String ID: 2985292042-2007344781
                                              • Opcode ID: f5b742b9587cdac67e2bb23952e5644605ce90bf8b7d29b5e49f46c6b19350d7
                                              • Instruction ID: dbffc54f3f4b93b50b3eeccc6da7c51b8081ae6782131aca0f62d72c14de9156
                                              • Opcode Fuzzy Hash: f5b742b9587cdac67e2bb23952e5644605ce90bf8b7d29b5e49f46c6b19350d7
                                              • Instruction Fuzzy Hash: EC81AC71600114FFEB208F28CC89FAA77BDEF44710F258269ED099B291D3B4AF05CA95
                                              APIs
                                              • NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 0047F73E
                                              • NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 0047F75D
                                              • MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 0047F787
                                              • CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 0047F794
                                              • UnmapViewOfFile.KERNEL32(?), ref: 0047F7AC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: FileView$CloseHandleInformationOpenQuerySectionSystemUnmap
                                              • String ID: ysic
                                              • API String ID: 2985292042-20973071
                                              • Opcode ID: e096a308c09e6b02b95fe1d014301fff9b14a95bfc109e57e88e1af0ff91d58a
                                              • Instruction ID: 91616b339b69817b0c307470fa0380e6dce288ebc01f30f06508eb5204f8cd11
                                              • Opcode Fuzzy Hash: e096a308c09e6b02b95fe1d014301fff9b14a95bfc109e57e88e1af0ff91d58a
                                              • Instruction Fuzzy Hash: D1118270640605FBEB248F14CC49FEB377CEF84704F248229EE199B290D7B4AF158669
                                              APIs
                                              • lstrcpyW.KERNEL32(?,\BaseNamedObjects\rnxtVt), ref: 7FE32431
                                              • lstrlenW.KERNEL32(?), ref: 7FE32438
                                              • NtCreateSection.NTDLL(?,0000000E,?,?,00000040,08000000,00000000), ref: 7FE3248D
                                              Strings
                                              • \BaseNamedObjects\rnxtVt, xrefs: 7FE3242F
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043960210.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7fe30000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: CreateSectionlstrcpylstrlen
                                              • String ID: \BaseNamedObjects\rnxtVt
                                              • API String ID: 2597515329-2100028039
                                              • Opcode ID: 20bdb40ffb474c402f65f73e914af13d443f92d4dff509730c57e181749428e4
                                              • Instruction ID: 36e2f0a27fad33023740782982cd1b2969f7fc0a37d941ebf6b0748064d4bf92
                                              • Opcode Fuzzy Hash: 20bdb40ffb474c402f65f73e914af13d443f92d4dff509730c57e181749428e4
                                              • Instruction Fuzzy Hash: 9F0181B0790344BAF7305B29CC8BF5A3929DF81B51F948154F604AE1C4D5B99A0487AA
                                              APIs
                                              • lstrcpyW.KERNEL32(?,\BaseNamedObjects\rnxtVt), ref: 009B2431
                                              • lstrlenW.KERNEL32(?), ref: 009B2438
                                              • NtCreateSection.NTDLL(?,0000000E,?,?,00000040,08000000,00000000), ref: 009B248D
                                              Strings
                                              • \BaseNamedObjects\rnxtVt, xrefs: 009B242F
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043369977.00000000009B0000.00000040.10000000.00040000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_9b0000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: CreateSectionlstrcpylstrlen
                                              • String ID: \BaseNamedObjects\rnxtVt
                                              • API String ID: 2597515329-2100028039
                                              • Opcode ID: 20bdb40ffb474c402f65f73e914af13d443f92d4dff509730c57e181749428e4
                                              • Instruction ID: 109d1591245053ee06c7fb24c14cb1ce65892ca2d81946e2c2894ae0968f9de7
                                              • Opcode Fuzzy Hash: 20bdb40ffb474c402f65f73e914af13d443f92d4dff509730c57e181749428e4
                                              • Instruction Fuzzy Hash: C20181B0790344BAF7305B2ACC8BF5A3928DF81B51F548154F604AE1C4D5B99A0487AA
                                              APIs
                                              • LoadLibraryA.KERNEL32 ref: 00401A1E
                                              • GetProcAddress.KERNEL32(00000000), ref: 00401A27
                                              • LoadLibraryA.KERNEL32(kernel32.dll,GetTempPathA), ref: 00401A37
                                              • GetProcAddress.KERNEL32(00000000), ref: 00401A3A
                                                • Part of subcall function 00401660: strstr.MSVCRT ref: 004016A7
                                                • Part of subcall function 00401660: strcspn.MSVCRT ref: 004016C4
                                                • Part of subcall function 00401660: strncpy.MSVCRT ref: 004016D3
                                                • Part of subcall function 00401660: strcspn.MSVCRT ref: 004016E3
                                                • Part of subcall function 00402F70: GetLocaleInfoW.KERNEL32(00000800,00000002,?,00000040,?,76F8F550,76F90BD0,00000072), ref: 00402F8B
                                                • Part of subcall function 00402F70: GetComputerNameA.KERNEL32 ref: 00402FA2
                                                • Part of subcall function 00402F70: lstrcpyA.KERNEL32(?,SOFTWARE\Microsoft\Windows NT\CurrentVersion), ref: 00402FBB
                                                • Part of subcall function 00402F70: strstr.MSVCRT ref: 00403024
                                                • Part of subcall function 00402F70: lstrcpyA.KERNEL32(?,Windows NT), ref: 00403114
                                                • Part of subcall function 00402F70: lstrcpyA.KERNEL32(?,HARDWARE\DESCRIPTION\System\CentralProcessor\0), ref: 0040313D
                                                • Part of subcall function 00401980: LoadLibraryA.KERNEL32 ref: 004019A0
                                              • CloseHandle.KERNEL32(?), ref: 00401C02
                                              • CloseHandle.KERNEL32(?), ref: 00401C3F
                                              • LoadLibraryA.KERNEL32(PlusCtrl.dll), ref: 00401C52
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: LibraryLoad$lstrcpy$AddressCloseHandleProcstrcspnstrstr$ComputerInfoLocaleNamestrncpy
                                              • String ID: .$100200$<6@$A$A$D$ExitProcess$F$F$F$G$GetTempPathA$L$M$N$PlusCtrl.dll$R$SetFileAttributesA$T$U$W$a$a$d$d$d$e$e$e$e$e$e$i$i$i$i$kernel32.dll$l$l$l$l$l$l$l$l$m$m$o$o$o$o$o$t$t$u$u$w$w
                                              • API String ID: 3552227398-19183163
                                              • Opcode ID: 379116b2d88aa8af1ebcdaaeb2c968e704b39e4d9bc54b5ade393c686307fa29
                                              • Instruction ID: 6d36ee71d4a81d0c90f4322b46838c243b43bcae610d34eb8121a6d16edaaa69
                                              • Opcode Fuzzy Hash: 379116b2d88aa8af1ebcdaaeb2c968e704b39e4d9bc54b5ade393c686307fa29
                                              • Instruction Fuzzy Hash: 5A02C57050C380DAE310CB74DD48B5BBBE5AB95704F04492DF6D5A72E2D7BA9808CB6B
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32.dll,00000047), ref: 00402BF5
                                              • GetProcAddress.KERNEL32(00000000), ref: 00402BFC
                                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00402C1F
                                              • strncmp.MSVCRT ref: 00402C44
                                              • lstrcatA.KERNEL32(?,004084F4), ref: 00402CD0
                                              • lstrcatA.KERNEL32(?,?), ref: 00402CE0
                                              • CopyFileA.KERNEL32(?,?,00000000), ref: 00402CF1
                                              • lstrcpyA.KERNEL32(?,?), ref: 00402D14
                                              • GetLastError.KERNEL32 ref: 00402D8F
                                              • lstrcpyA.KERNEL32(?,SYSTEM\CurrentControlSet\Services\), ref: 00402DE1
                                              • lstrcatA.KERNEL32(?,?), ref: 00402DEF
                                              • lstrlenA.KERNEL32(00402AB1), ref: 00402E0E
                                                • Part of subcall function 00403B40: GetTickCount.KERNEL32 ref: 00403B41
                                                • Part of subcall function 00403B40: rand.MSVCRT ref: 00403B49
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: lstrcat$lstrcpy$AddressCopyCountDirectoryErrorFileLastLibraryLoadProcSystemTicklstrlenrandstrncmp
                                              • String ID: %c%c%c%c%c%c.exe$<6@$A$Description$F$G$M$N$SYSTEM\CurrentControlSet\Services\$a$d$i$kernel32.dll$m$o$t$u
                                              • API String ID: 2930506891-2104832695
                                              • Opcode ID: 79df84dcddb17782a356b93d0bf0c5b2b01855d991385c97858fe82d4394e814
                                              • Instruction ID: a50e26587b69554a2a762d444c19ea56879ec6abf88ed33a43cf8b764e003199
                                              • Opcode Fuzzy Hash: 79df84dcddb17782a356b93d0bf0c5b2b01855d991385c97858fe82d4394e814
                                              • Instruction Fuzzy Hash: 10812BB2900258ABD721DB60DD89FDEBB7CAF55B00F0401E9F609B61C2D6B45B84CF69
                                              APIs
                                              • lstrcpyA.KERNEL32(?,SYSTEM\CurrentControlSet\Services\), ref: 00402533
                                              • lstrcatA.KERNEL32(?,100200), ref: 00402543
                                              • RtlZeroMemory.KERNEL32 ref: 00402587
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: MemoryZerolstrcatlstrcpy
                                              • String ID: "7@$100200$47@$F7@$ImagePath$SYSTEM\CurrentControlSet\Services\
                                              • API String ID: 1768957353-3519508139
                                              • Opcode ID: 8a600dd736f3a178a13575e9a99342727ac9e09ed908883fd0121ec29af1dff4
                                              • Instruction ID: a495424809a9f9f54fedb59a1f20414eed3fe88150acac704cb64e1485c9eeb3
                                              • Opcode Fuzzy Hash: 8a600dd736f3a178a13575e9a99342727ac9e09ed908883fd0121ec29af1dff4
                                              • Instruction Fuzzy Hash: 8C51B435780305AFE320DB34ED49FEB37A8EB84721F504839FA46E11D0E6BD9519866D
                                              APIs
                                              • GetModuleHandleA.KERNEL32(7FE33071), ref: 7FE3307C
                                              • GetSystemDirectoryA.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,00000104), ref: 7FE33093
                                              • CreateFileA.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,40000000,00000000,00000000,00000003,00000000,00000000), ref: 7FE330D4
                                              • WriteFile.KERNEL32(00000000,7FE33EDB,00000019,C:\Windows\sysWOW64\wbem\wmiprvse.exe,00000000,00000000), ref: 7FE330F6
                                              • CloseHandle.KERNEL32(?,00000003), ref: 7FE330FC
                                              • GetProcAddress.KERNEL32(00000000,7FE3311D), ref: 7FE33128
                                              • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE3313B
                                              • GetTickCount.KERNEL32 ref: 7FE3316F
                                              • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,7FE3637A,00000000,00000000,00000000,00000000), ref: 7FE33241
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043960210.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7fe30000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: FileHandle$AddressCloseCountCreateDirectoryInformationLibraryLoadModuleProcSystemTickVolumeWrite
                                              • String ID: "'$"'$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$hell32.dll,-1
                                              • API String ID: 1729360627-4128452508
                                              • Opcode ID: 19b44635278fe99a4415179c49d6eb8c4f8a4d309380675498a1a4a2d9bdcc0e
                                              • Instruction ID: 6b64a43cb509898f68348655a96a0e184e2e065f58832200b8bd953c97f5cb1b
                                              • Opcode Fuzzy Hash: 19b44635278fe99a4415179c49d6eb8c4f8a4d309380675498a1a4a2d9bdcc0e
                                              • Instruction Fuzzy Hash: 2591F271954358BFEB269F20CC0EFEA3B6CDF41311F80011AED5A9A081DAF46F06D6A5
                                              APIs
                                              • GetModuleHandleA.KERNEL32(009B3071), ref: 009B307C
                                              • GetSystemDirectoryA.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,00000104), ref: 009B3093
                                              • CreateFileA.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,40000000,00000000,00000000,00000003,00000000,00000000), ref: 009B30D4
                                              • WriteFile.KERNEL32(00000000,009B3EDB,00000019,C:\Windows\sysWOW64\wbem\wmiprvse.exe,00000000,00000000), ref: 009B30F6
                                              • CloseHandle.KERNEL32(?,00000003), ref: 009B30FC
                                              • GetProcAddress.KERNEL32(00000000,009B311D), ref: 009B3128
                                              • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 009B313B
                                              • GetTickCount.KERNEL32 ref: 009B316F
                                              • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,009B637A,00000000,00000000,00000000,00000000), ref: 009B3241
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043369977.00000000009B0000.00000040.10000000.00040000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_9b0000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: FileHandle$AddressCloseCountCreateDirectoryInformationLibraryLoadModuleProcSystemTickVolumeWrite
                                              • String ID: "'$"'$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$hell32.dll,-1
                                              • API String ID: 1729360627-4128452508
                                              • Opcode ID: 19b44635278fe99a4415179c49d6eb8c4f8a4d309380675498a1a4a2d9bdcc0e
                                              • Instruction ID: 6caefc344f5001224ce507a28f4b08f2ee6ad13940b5968d14fb8ba2a122b955
                                              • Opcode Fuzzy Hash: 19b44635278fe99a4415179c49d6eb8c4f8a4d309380675498a1a4a2d9bdcc0e
                                              • Instruction Fuzzy Hash: 88912671544748BFEB26AF24CD0ABEA3B6CDF41320F40411AFD559E082DBF45F0686A5
                                              APIs
                                              • lstrcat.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,7FE3309E), ref: 7FE330AC
                                                • Part of subcall function 7FE330BE: lstrcat.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,7FE330B7), ref: 7FE330BF
                                                • Part of subcall function 7FE330BE: CreateFileA.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,40000000,00000000,00000000,00000003,00000000,00000000), ref: 7FE330D4
                                                • Part of subcall function 7FE330BE: WriteFile.KERNEL32(00000000,7FE33EDB,00000019,C:\Windows\sysWOW64\wbem\wmiprvse.exe,00000000,00000000), ref: 7FE330F6
                                                • Part of subcall function 7FE330BE: CloseHandle.KERNEL32(?,00000003), ref: 7FE330FC
                                                • Part of subcall function 7FE330BE: GetProcAddress.KERNEL32(00000000,7FE3311D), ref: 7FE33128
                                                • Part of subcall function 7FE330BE: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE3313B
                                                • Part of subcall function 7FE330BE: GetTickCount.KERNEL32 ref: 7FE3316F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043960210.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7fe30000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: Filelstrcat$AddressCloseCountCreateHandleLibraryLoadProcTickWrite
                                              • String ID: "'$"'$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$hell32.dll,-1
                                              • API String ID: 4135777234-4128452508
                                              • Opcode ID: 6958d413b6abf8e1b28038c6610194ed2bae6efbd87a574ee0b1bcde9ea0452d
                                              • Instruction ID: f56c8c8788c1527792fd5fee25e748029393f3a60fbf17811963ed314d73609c
                                              • Opcode Fuzzy Hash: 6958d413b6abf8e1b28038c6610194ed2bae6efbd87a574ee0b1bcde9ea0452d
                                              • Instruction Fuzzy Hash: 9091F171944718BFEB269F208C0EFEA3B6CDF41311F80011AED5A9E081DAF4AF05D6A5
                                              APIs
                                              • lstrcat.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,009B309E), ref: 009B30AC
                                                • Part of subcall function 009B30BE: lstrcat.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,009B30B7), ref: 009B30BF
                                                • Part of subcall function 009B30BE: CreateFileA.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,40000000,00000000,00000000,00000003,00000000,00000000), ref: 009B30D4
                                                • Part of subcall function 009B30BE: WriteFile.KERNEL32(00000000,009B3EDB,00000019,C:\Windows\sysWOW64\wbem\wmiprvse.exe,00000000,00000000), ref: 009B30F6
                                                • Part of subcall function 009B30BE: CloseHandle.KERNEL32(?,00000003), ref: 009B30FC
                                                • Part of subcall function 009B30BE: GetProcAddress.KERNEL32(00000000,009B311D), ref: 009B3128
                                                • Part of subcall function 009B30BE: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 009B313B
                                                • Part of subcall function 009B30BE: GetTickCount.KERNEL32 ref: 009B316F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043369977.00000000009B0000.00000040.10000000.00040000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_9b0000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: Filelstrcat$AddressCloseCountCreateHandleLibraryLoadProcTickWrite
                                              • String ID: "'$"'$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$hell32.dll,-1
                                              • API String ID: 4135777234-4128452508
                                              • Opcode ID: 6958d413b6abf8e1b28038c6610194ed2bae6efbd87a574ee0b1bcde9ea0452d
                                              • Instruction ID: 043d4b618333234daff30f76f4c46a29e867717007945118204f0c53a83e1371
                                              • Opcode Fuzzy Hash: 6958d413b6abf8e1b28038c6610194ed2bae6efbd87a574ee0b1bcde9ea0452d
                                              • Instruction Fuzzy Hash: 0091F471554748BFEB26AF24CD0EBEA3BACDF41321F40411AFD199E081DAF45F0686A5
                                              APIs
                                              • lstrcat.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,7FE330B7), ref: 7FE330BF
                                              • CreateFileA.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,40000000,00000000,00000000,00000003,00000000,00000000), ref: 7FE330D4
                                              • WriteFile.KERNEL32(00000000,7FE33EDB,00000019,C:\Windows\sysWOW64\wbem\wmiprvse.exe,00000000,00000000), ref: 7FE330F6
                                              • CloseHandle.KERNEL32(?,00000003), ref: 7FE330FC
                                              • GetProcAddress.KERNEL32(00000000,7FE3311D), ref: 7FE33128
                                              • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE3313B
                                              • GetTickCount.KERNEL32 ref: 7FE3316F
                                              • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,7FE3637A,00000000,00000000,00000000,00000000), ref: 7FE33241
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043960210.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7fe30000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: File$AddressCloseCountCreateHandleInformationLibraryLoadProcTickVolumeWritelstrcat
                                              • String ID: "'$"'$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$hell32.dll,-1
                                              • API String ID: 3969241177-4128452508
                                              • Opcode ID: e99baabed080411f04b0d806c93d617434853b94cdc5a730a8b5d052636699dc
                                              • Instruction ID: 09541bb4dc3411c55ab005cb888b55fbb50cd13fbca17e3ae23e295a94b6b269
                                              • Opcode Fuzzy Hash: e99baabed080411f04b0d806c93d617434853b94cdc5a730a8b5d052636699dc
                                              • Instruction Fuzzy Hash: 7281BE71914718BFEB269F208C0EFEA3B6DDF41311F80011AED5A9E081EAF46F05D6A5
                                              APIs
                                              • lstrcat.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,009B30B7), ref: 009B30BF
                                              • CreateFileA.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,40000000,00000000,00000000,00000003,00000000,00000000), ref: 009B30D4
                                              • WriteFile.KERNEL32(00000000,009B3EDB,00000019,C:\Windows\sysWOW64\wbem\wmiprvse.exe,00000000,00000000), ref: 009B30F6
                                              • CloseHandle.KERNEL32(?,00000003), ref: 009B30FC
                                              • GetProcAddress.KERNEL32(00000000,009B311D), ref: 009B3128
                                              • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 009B313B
                                              • GetTickCount.KERNEL32 ref: 009B316F
                                              • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,009B637A,00000000,00000000,00000000,00000000), ref: 009B3241
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043369977.00000000009B0000.00000040.10000000.00040000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_9b0000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: File$AddressCloseCountCreateHandleInformationLibraryLoadProcTickVolumeWritelstrcat
                                              • String ID: "'$"'$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$hell32.dll,-1
                                              • API String ID: 3969241177-4128452508
                                              • Opcode ID: e99baabed080411f04b0d806c93d617434853b94cdc5a730a8b5d052636699dc
                                              • Instruction ID: 877e650b612f49487860015164acf66199780f3d8cb19279b678bb0b8beeb4d8
                                              • Opcode Fuzzy Hash: e99baabed080411f04b0d806c93d617434853b94cdc5a730a8b5d052636699dc
                                              • Instruction Fuzzy Hash: 2A81E371554708BFEB26AF24CD0EBEA37ACEF41321F40411AFD199E081EAF46F0586A5
                                              APIs
                                              • LoadLibraryA.KERNEL32 ref: 0040239F
                                              • GetProcAddress.KERNEL32(00000000), ref: 004023A6
                                              • GetTempPathA.KERNEL32(00000104,?), ref: 004023DE
                                              • lstrcatA.KERNEL32(?,SOFTWARE.LOG), ref: 004023F1
                                              • MoveFileExA.KERNEL32(?,?,00000003(MOVEFILE_REPLACE_EXISTING|MOVEFILE_COPY_ALLOWED)), ref: 0040240C
                                              • MoveFileExA.KERNEL32(?,00000000,00000005(MOVEFILE_REPLACE_EXISTING|MOVEFILE_DELAY_UNTIL_REBOOT)), ref: 0040241E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: FileMove$AddressLibraryLoadPathProcTemplstrcat
                                              • String ID: A$F$G$M$N$SOFTWARE.LOG$a$d$i$kernel32.dll$m$o$t$u
                                              • API String ID: 20907805-1765106238
                                              • Opcode ID: 7fd43944f68fb6c432481ebaa13493a170158cfa409d862e8056095c2823890d
                                              • Instruction ID: 27376e1d226d6c03194d421c0e1a1af7b37e71632551d2efb61b8b65d87483f2
                                              • Opcode Fuzzy Hash: 7fd43944f68fb6c432481ebaa13493a170158cfa409d862e8056095c2823890d
                                              • Instruction Fuzzy Hash: EE216F7114C3C2DEE312CB68C908B9BBFD45BAA704F08495DB2C456282D6B9961CC7B7
                                              APIs
                                              • CreateFileA.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,40000000,00000000,00000000,00000003,00000000,00000000), ref: 7FE330D4
                                              • WriteFile.KERNEL32(00000000,7FE33EDB,00000019,C:\Windows\sysWOW64\wbem\wmiprvse.exe,00000000,00000000), ref: 7FE330F6
                                              • CloseHandle.KERNEL32(?,00000003), ref: 7FE330FC
                                              • GetProcAddress.KERNEL32(00000000,7FE3311D), ref: 7FE33128
                                              • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE3313B
                                              • GetTickCount.KERNEL32 ref: 7FE3316F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043960210.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7fe30000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: File$AddressCloseCountCreateHandleLibraryLoadProcTickWrite
                                              • String ID: "'$"'$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$hell32.dll,-1
                                              • API String ID: 896256579-4128452508
                                              • Opcode ID: 725bb423a29dcd62c43598a103823de9de260c4f48a9b794d588fa8ccf6d82a8
                                              • Instruction ID: 9c4dac55b76228d7ff9437610bb880f50dd66be18c7f3b043a5811b11c928d4e
                                              • Opcode Fuzzy Hash: 725bb423a29dcd62c43598a103823de9de260c4f48a9b794d588fa8ccf6d82a8
                                              • Instruction Fuzzy Hash: E6A1F571954718BFEB269F208C0EFEA37ADDF41311F80011AED5A9E081DAF46F05D6A5
                                              APIs
                                              • CreateFileA.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,40000000,00000000,00000000,00000003,00000000,00000000), ref: 009B30D4
                                              • WriteFile.KERNEL32(00000000,009B3EDB,00000019,C:\Windows\sysWOW64\wbem\wmiprvse.exe,00000000,00000000), ref: 009B30F6
                                              • CloseHandle.KERNEL32(?,00000003), ref: 009B30FC
                                              • GetProcAddress.KERNEL32(00000000,009B311D), ref: 009B3128
                                              • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 009B313B
                                              • GetTickCount.KERNEL32 ref: 009B316F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043369977.00000000009B0000.00000040.10000000.00040000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_9b0000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: File$AddressCloseCountCreateHandleLibraryLoadProcTickWrite
                                              • String ID: "'$"'$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$hell32.dll,-1
                                              • API String ID: 896256579-4128452508
                                              • Opcode ID: 725bb423a29dcd62c43598a103823de9de260c4f48a9b794d588fa8ccf6d82a8
                                              • Instruction ID: 690cf75c5f46dbfad55174143bc5f1269540c7285914231332d006009ae9d403
                                              • Opcode Fuzzy Hash: 725bb423a29dcd62c43598a103823de9de260c4f48a9b794d588fa8ccf6d82a8
                                              • Instruction Fuzzy Hash: C6A10671554608BFEB26EF24CD0ABEA3BACEF41321F40451AFD199E081DBF45F0686A5
                                              APIs
                                              • GetModuleHandleA.KERNEL32(0047FD79), ref: 0047FD84
                                              • GetSystemDirectoryA.KERNEL32(00482C2E,00000104), ref: 0047FD9B
                                              • CreateFileA.KERNEL32(00482C2E,40000000,00000000,00000000,00000003,00000000,00000000), ref: 0047FDDC
                                              • WriteFile.KERNEL32(00000000,00480BE3,00000019,00482C2E,00000000,00000000), ref: 0047FDFE
                                              • CloseHandle.KERNEL32(?,00000003), ref: 0047FE04
                                              • GetProcAddress.KERNEL32(00000000,0047FE25), ref: 0047FE30
                                              • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 0047FE43
                                              • GetTickCount.KERNEL32 ref: 0047FE77
                                              • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00483082,00000000,00000000,00000000,00000000), ref: 0047FF49
                                              Strings
                                              • "', xrefs: 0047FE1C
                                              • "', xrefs: 0047FFC2
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 00480017
                                              • ADVAPI32.DLL, xrefs: 0047FE42
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: FileHandle$AddressCloseCountCreateDirectoryInformationLibraryLoadModuleProcSystemTickVolumeWrite
                                              • String ID: "'$"'$ADVAPI32.DLL$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 1729360627-3465829191
                                              • Opcode ID: 19b44635278fe99a4415179c49d6eb8c4f8a4d309380675498a1a4a2d9bdcc0e
                                              • Instruction ID: 7bd5bf45457efd2896b910d0e7970ae087a12d2d42fd200cd0f69a5a9196fda1
                                              • Opcode Fuzzy Hash: 19b44635278fe99a4415179c49d6eb8c4f8a4d309380675498a1a4a2d9bdcc0e
                                              • Instruction Fuzzy Hash: 4491FB71554248BFEB35AF21CC0ABEE375CDF01715F00412BFD599A092D6F85F0A86A9
                                              APIs
                                              • lstrcatA.KERNEL32(00482C2E,0047FDA6), ref: 0047FDB4
                                                • Part of subcall function 0047FDC6: lstrcatA.KERNEL32(00482C2E,0047FDBF), ref: 0047FDC7
                                                • Part of subcall function 0047FDC6: CreateFileA.KERNEL32(00482C2E,40000000,00000000,00000000,00000003,00000000,00000000), ref: 0047FDDC
                                                • Part of subcall function 0047FDC6: WriteFile.KERNEL32(00000000,00480BE3,00000019,00482C2E,00000000,00000000), ref: 0047FDFE
                                                • Part of subcall function 0047FDC6: CloseHandle.KERNEL32(?,00000003), ref: 0047FE04
                                                • Part of subcall function 0047FDC6: GetProcAddress.KERNEL32(00000000,0047FE25), ref: 0047FE30
                                                • Part of subcall function 0047FDC6: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 0047FE43
                                                • Part of subcall function 0047FDC6: GetTickCount.KERNEL32 ref: 0047FE77
                                              Strings
                                              • "', xrefs: 0047FE1C
                                              • "', xrefs: 0047FFC2
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 00480017
                                              • ADVAPI32.DLL, xrefs: 0047FE42
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: Filelstrcat$AddressCloseCountCreateHandleLibraryLoadProcTickWrite
                                              • String ID: "'$"'$ADVAPI32.DLL$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 4135777234-3465829191
                                              • Opcode ID: 6958d413b6abf8e1b28038c6610194ed2bae6efbd87a574ee0b1bcde9ea0452d
                                              • Instruction ID: 0c758667335218c90f85d575aa06eed63a3ca8922f38a5acd67208de2acf439b
                                              • Opcode Fuzzy Hash: 6958d413b6abf8e1b28038c6610194ed2bae6efbd87a574ee0b1bcde9ea0452d
                                              • Instruction Fuzzy Hash: CB91E671514708BFEB36AF219C0ABEE376CDF01701F00452BFD199A092DAF85F4986A9
                                              APIs
                                              • lstrcatA.KERNEL32(00482C2E,0047FDBF), ref: 0047FDC7
                                              • CreateFileA.KERNEL32(00482C2E,40000000,00000000,00000000,00000003,00000000,00000000), ref: 0047FDDC
                                              • WriteFile.KERNEL32(00000000,00480BE3,00000019,00482C2E,00000000,00000000), ref: 0047FDFE
                                              • CloseHandle.KERNEL32(?,00000003), ref: 0047FE04
                                              • GetProcAddress.KERNEL32(00000000,0047FE25), ref: 0047FE30
                                              • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 0047FE43
                                              • GetTickCount.KERNEL32 ref: 0047FE77
                                              • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00483082,00000000,00000000,00000000,00000000), ref: 0047FF49
                                              Strings
                                              • "', xrefs: 0047FE1C
                                              • "', xrefs: 0047FFC2
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 00480017
                                              • ADVAPI32.DLL, xrefs: 0047FE42
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: File$AddressCloseCountCreateHandleInformationLibraryLoadProcTickVolumeWritelstrcat
                                              • String ID: "'$"'$ADVAPI32.DLL$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 3969241177-3465829191
                                              • Opcode ID: e99baabed080411f04b0d806c93d617434853b94cdc5a730a8b5d052636699dc
                                              • Instruction ID: c8aaa11ad6ec9eae92136448849b97a30557e4e2a489ef321387a0b65ff8bddc
                                              • Opcode Fuzzy Hash: e99baabed080411f04b0d806c93d617434853b94cdc5a730a8b5d052636699dc
                                              • Instruction Fuzzy Hash: 8581C571514608BFEB26AF65DC0ABEE376CDF01701F00452BFD199A091EAF85F0986A9
                                              APIs
                                              • CreateFileA.KERNEL32(00482C2E,40000000,00000000,00000000,00000003,00000000,00000000), ref: 0047FDDC
                                              • WriteFile.KERNEL32(00000000,00480BE3,00000019,00482C2E,00000000,00000000), ref: 0047FDFE
                                              • CloseHandle.KERNEL32(?,00000003), ref: 0047FE04
                                              • GetProcAddress.KERNEL32(00000000,0047FE25), ref: 0047FE30
                                              • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 0047FE43
                                              • GetTickCount.KERNEL32 ref: 0047FE77
                                              Strings
                                              • "', xrefs: 0047FE1C
                                              • "', xrefs: 0047FFC2
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 00480017
                                              • ADVAPI32.DLL, xrefs: 0047FE42
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: File$AddressCloseCountCreateHandleLibraryLoadProcTickWrite
                                              • String ID: "'$"'$ADVAPI32.DLL$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 896256579-3465829191
                                              • Opcode ID: 725bb423a29dcd62c43598a103823de9de260c4f48a9b794d588fa8ccf6d82a8
                                              • Instruction ID: bbe40e1655c8ba2c17ea702bc694d41ea2ba27fb20882f208f31d8fd6de8f96b
                                              • Opcode Fuzzy Hash: 725bb423a29dcd62c43598a103823de9de260c4f48a9b794d588fa8ccf6d82a8
                                              • Instruction Fuzzy Hash: 7BA1F571514608BFEB36AF208C0ABEE37ACDF01701F00442BED199E191D6F85F0A86A9
                                              APIs
                                              • LoadLibraryA.KERNEL32(7FE33107), ref: 7FE33112
                                                • Part of subcall function 7FE33127: GetProcAddress.KERNEL32(00000000,7FE3311D), ref: 7FE33128
                                                • Part of subcall function 7FE33127: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE3313B
                                                • Part of subcall function 7FE33127: GetTickCount.KERNEL32 ref: 7FE3316F
                                                • Part of subcall function 7FE33127: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,7FE3637A,00000000,00000000,00000000,00000000), ref: 7FE33241
                                                • Part of subcall function 7FE33127: Sleep.KERNEL32(00000064,0000001E), ref: 7FE33288
                                                • Part of subcall function 7FE33127: DeleteFileA.KERNEL32(hell32.dll,-1), ref: 7FE3328F
                                              Strings
                                              • "', xrefs: 7FE332BA
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 7FE3330F
                                              • hell32.dll,-1, xrefs: 7FE3328E, 7FE3330E
                                              • ADVAPI32.DLL, xrefs: 7FE3313A
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043960210.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7fe30000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: LibraryLoad$AddressCountDeleteFileInformationProcSleepTickVolume
                                              • String ID: "'$ADVAPI32.DLL$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$hell32.dll,-1
                                              • API String ID: 3926103657-104948224
                                              • Opcode ID: b10989e1a19bd5d43d225fa2a3c42957d908225e734b95b6c14a3a6c700d835d
                                              • Instruction ID: d292d2856ce22b528264e3fb5c31764abc2e853f458007e39b67dc21da23dd02
                                              • Opcode Fuzzy Hash: b10989e1a19bd5d43d225fa2a3c42957d908225e734b95b6c14a3a6c700d835d
                                              • Instruction Fuzzy Hash: BD71D271915718BFEB269F20CC0EEEA37ADDF41311F80011AED5A9E081DAF4AF05D6A5
                                              APIs
                                              • LoadLibraryA.KERNEL32(009B3107), ref: 009B3112
                                                • Part of subcall function 009B3127: GetProcAddress.KERNEL32(00000000,009B311D), ref: 009B3128
                                                • Part of subcall function 009B3127: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 009B313B
                                                • Part of subcall function 009B3127: GetTickCount.KERNEL32 ref: 009B316F
                                                • Part of subcall function 009B3127: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,009B637A,00000000,00000000,00000000,00000000), ref: 009B3241
                                                • Part of subcall function 009B3127: Sleep.KERNEL32(00000064,0000001E), ref: 009B3288
                                                • Part of subcall function 009B3127: DeleteFileA.KERNEL32(hell32.dll,-1), ref: 009B328F
                                              Strings
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 009B330F
                                              • hell32.dll,-1, xrefs: 009B328E, 009B330E
                                              • ADVAPI32.DLL, xrefs: 009B313A
                                              • "', xrefs: 009B32BA
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043369977.00000000009B0000.00000040.10000000.00040000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_9b0000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: LibraryLoad$AddressCountDeleteFileInformationProcSleepTickVolume
                                              • String ID: "'$ADVAPI32.DLL$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$hell32.dll,-1
                                              • API String ID: 3926103657-104948224
                                              • Opcode ID: b10989e1a19bd5d43d225fa2a3c42957d908225e734b95b6c14a3a6c700d835d
                                              • Instruction ID: 6367d5856d909d9778ff54df9e664ab6fcc1b1d6bb08b8c127aff0334a61cc33
                                              • Opcode Fuzzy Hash: b10989e1a19bd5d43d225fa2a3c42957d908225e734b95b6c14a3a6c700d835d
                                              • Instruction Fuzzy Hash: DC71F071514708BFEB26AF24CD0EBEA37ACEF41321F40411AFD199E081EAF49F0586A5
                                              APIs
                                              • GetProcAddress.KERNEL32(00000000,7FE3311D), ref: 7FE33128
                                              • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE3313B
                                              • GetTickCount.KERNEL32 ref: 7FE3316F
                                              • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,7FE3637A,00000000,00000000,00000000,00000000), ref: 7FE33241
                                              • Sleep.KERNEL32(00000064,0000001E), ref: 7FE33288
                                              • DeleteFileA.KERNEL32(hell32.dll,-1), ref: 7FE3328F
                                              • CreateThread.KERNEL32(00000000,00000000,7FE32C7D,00000000,00000000), ref: 7FE33343
                                              • CloseHandle.KERNEL32(?,0C1A4F68), ref: 7FE3334C
                                              • WSAStartup.WS2_32(00000101), ref: 7FE333D1
                                              • Sleep.KERNEL32(00001388,00000000,00000000), ref: 7FE333F3
                                              Strings
                                              • "', xrefs: 7FE332BA
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 7FE3330F
                                              • hell32.dll,-1, xrefs: 7FE3328E, 7FE3330E
                                              • ADVAPI32.DLL, xrefs: 7FE3313A
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043960210.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7fe30000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: Sleep$AddressCloseCountCreateDeleteFileHandleInformationLibraryLoadProcStartupThreadTickVolume
                                              • String ID: "'$ADVAPI32.DLL$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$hell32.dll,-1
                                              • API String ID: 2219344514-104948224
                                              • Opcode ID: 5b9ba073255788373456750f45873bb949f55a25902f1e72925c0e661daa5f85
                                              • Instruction ID: 9bf7545e8cb9496520d09b0b1350cb01679fb2f5a0313100841ffea94c71ba5e
                                              • Opcode Fuzzy Hash: 5b9ba073255788373456750f45873bb949f55a25902f1e72925c0e661daa5f85
                                              • Instruction Fuzzy Hash: 2871A271915718BFEB269F20DC0EBEA37ACEF41311F80011AED5A9E081DAF46F05D6A5
                                              APIs
                                              • GetProcAddress.KERNEL32(00000000,009B311D), ref: 009B3128
                                              • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 009B313B
                                              • GetTickCount.KERNEL32 ref: 009B316F
                                              • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,009B637A,00000000,00000000,00000000,00000000), ref: 009B3241
                                              • Sleep.KERNEL32(00000064,0000001E), ref: 009B3288
                                              • DeleteFileA.KERNEL32(hell32.dll,-1), ref: 009B328F
                                              • CreateThread.KERNEL32(00000000,00000000,009B2C7D,00000000,00000000), ref: 009B3343
                                              • CloseHandle.KERNEL32(?,0C1A4F68), ref: 009B334C
                                              • WSAStartup.WS2_32(00000101), ref: 009B33D1
                                              • Sleep.KERNEL32(00001388,00000000,00000000), ref: 009B33F3
                                              Strings
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 009B330F
                                              • hell32.dll,-1, xrefs: 009B328E, 009B330E
                                              • ADVAPI32.DLL, xrefs: 009B313A
                                              • "', xrefs: 009B32BA
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043369977.00000000009B0000.00000040.10000000.00040000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_9b0000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: Sleep$AddressCloseCountCreateDeleteFileHandleInformationLibraryLoadProcStartupThreadTickVolume
                                              • String ID: "'$ADVAPI32.DLL$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$hell32.dll,-1
                                              • API String ID: 2219344514-104948224
                                              • Opcode ID: 5b9ba073255788373456750f45873bb949f55a25902f1e72925c0e661daa5f85
                                              • Instruction ID: aaec6478a658d8c6968798f41a0a562a51e3c7f5033bc3cd5b347ad434cb9fe6
                                              • Opcode Fuzzy Hash: 5b9ba073255788373456750f45873bb949f55a25902f1e72925c0e661daa5f85
                                              • Instruction Fuzzy Hash: 4971D171514718BFEB25EF64CD0ABEA3BACEF41321F40411AFD199E081DAF46F0586A5
                                              APIs
                                              • LoadLibraryA.KERNEL32(0047FE0F), ref: 0047FE1A
                                                • Part of subcall function 0047FE2F: GetProcAddress.KERNEL32(00000000,0047FE25), ref: 0047FE30
                                                • Part of subcall function 0047FE2F: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 0047FE43
                                                • Part of subcall function 0047FE2F: GetTickCount.KERNEL32 ref: 0047FE77
                                                • Part of subcall function 0047FE2F: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00483082,00000000,00000000,00000000,00000000), ref: 0047FF49
                                                • Part of subcall function 0047FE2F: Sleep.KERNEL32(00000064,0000001E), ref: 0047FF90
                                                • Part of subcall function 0047FE2F: DeleteFileA.KERNEL32(00482D28), ref: 0047FF97
                                              Strings
                                              • "', xrefs: 0047FFC2
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 00480017
                                              • ADVAPI32.DLL, xrefs: 0047FE42
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: LibraryLoad$AddressCountDeleteFileInformationProcSleepTickVolume
                                              • String ID: "'$ADVAPI32.DLL$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 3926103657-2346592412
                                              • Opcode ID: b10989e1a19bd5d43d225fa2a3c42957d908225e734b95b6c14a3a6c700d835d
                                              • Instruction ID: ca6f37dde20a556150d8b9aff03c10a4c9d3f2d00a63a1d16cbda09a3d529e5a
                                              • Opcode Fuzzy Hash: b10989e1a19bd5d43d225fa2a3c42957d908225e734b95b6c14a3a6c700d835d
                                              • Instruction Fuzzy Hash: 1471C571514718BFEB76AF619C0ABEE366CDF01301F00452BED199A082DAF85F4986A9
                                              APIs
                                              • LoadLibraryA.KERNEL32(7FE33386), ref: 7FE33392
                                              • WSAStartup.WS2_32(00000101), ref: 7FE333D1
                                              • Sleep.KERNEL32(00001388,00000000,00000000), ref: 7FE333F3
                                              • gethostbyname.WS2_32(ilo.brenz.pl), ref: 7FE33412
                                              • lstrlen.KERNEL32(ilo.brenz.pl), ref: 7FE3341D
                                              • socket.WS2_32(00000002,00000001,00000000), ref: 7FE33453
                                              • connect.WS2_32(?,7FE32EB6,00000010), ref: 7FE3346D
                                              • GetVersionExA.KERNEL32(?,?,7FE32EB6,00000010), ref: 7FE334B7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043960210.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7fe30000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: LibraryLoadSleepStartupVersionconnectgethostbynamelstrlensocket
                                              • String ID: C:\Windows\sysWOW64\wbem\wmiprvse.exe$ilo.brenz.pl
                                              • API String ID: 801863514-1010093679
                                              • Opcode ID: 174516e84d9c669cdc790a5bd5a266766651d9cd51a165662f06c8ce5e18c4ab
                                              • Instruction ID: ec9582b3104ee8db84d86a8e063e61350cf898793cca2a983ffbcde4064a8b90
                                              • Opcode Fuzzy Hash: 174516e84d9c669cdc790a5bd5a266766651d9cd51a165662f06c8ce5e18c4ab
                                              • Instruction Fuzzy Hash: 0361D132A04359BFEB22CF24C819FDE3BBDAF41715F440514E86A9E091D6F4AB04DBA5
                                              APIs
                                              • LoadLibraryA.KERNEL32(009B3386), ref: 009B3392
                                              • WSAStartup.WS2_32(00000101), ref: 009B33D1
                                              • Sleep.KERNEL32(00001388,00000000,00000000), ref: 009B33F3
                                              • gethostbyname.WS2_32(ilo.brenz.pl), ref: 009B3412
                                              • lstrlen.KERNEL32(ilo.brenz.pl), ref: 009B341D
                                              • socket.WS2_32(00000002,00000001,00000000), ref: 009B3453
                                              • connect.WS2_32(?,009B2EB6,00000010), ref: 009B346D
                                              • GetVersionExA.KERNEL32(?,?,009B2EB6,00000010), ref: 009B34B7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043369977.00000000009B0000.00000040.10000000.00040000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_9b0000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: LibraryLoadSleepStartupVersionconnectgethostbynamelstrlensocket
                                              • String ID: C:\Windows\sysWOW64\wbem\wmiprvse.exe$ilo.brenz.pl
                                              • API String ID: 801863514-1010093679
                                              • Opcode ID: 174516e84d9c669cdc790a5bd5a266766651d9cd51a165662f06c8ce5e18c4ab
                                              • Instruction ID: 861c87ccc95fe5057daf7307b359051e2e8503501d48962768b0e125d457cb83
                                              • Opcode Fuzzy Hash: 174516e84d9c669cdc790a5bd5a266766651d9cd51a165662f06c8ce5e18c4ab
                                              • Instruction Fuzzy Hash: D261F332604249BFDB31DF28C91ABDE3BADAF41721F044518F8699E082D7F49F058BA1
                                              APIs
                                              • Sleep.KERNEL32(000001F4), ref: 004027A8
                                              • CreateMutexA.KERNEL32(00000000,00000000,100200), ref: 004027C8
                                              • GetLastError.KERNEL32 ref: 004027CE
                                              • ExitProcess.KERNEL32 ref: 004027DC
                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,Function_000019C0,00000000), ref: 00402864
                                              • CloseHandle.KERNEL32(?), ref: 0040286D
                                              • Sleep.KERNEL32(0000012C), ref: 00402887
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: Sleep$CloseCreateErrorExitHandleLastMutexObjectProcessSingleWait
                                              • String ID: 100200$<6@$X7@$hra%u.dll$j7@$8@
                                              • API String ID: 482528292-700769639
                                              • Opcode ID: 1e47b03f81b28842055db56df177672559bc8670de47ada2c4e5fdc5ca35fded
                                              • Instruction ID: 4773f610d1753618e182b41886d2e1a4b90cb22de96b73be237ab8051f55e4f2
                                              • Opcode Fuzzy Hash: 1e47b03f81b28842055db56df177672559bc8670de47ada2c4e5fdc5ca35fded
                                              • Instruction Fuzzy Hash: B8315CB0554301AFD300AB71EF89F5A7AA9AB98704F11013EF585B21E2CFF958048F6C
                                              APIs
                                                • Part of subcall function 00403B40: GetTickCount.KERNEL32 ref: 00403B41
                                                • Part of subcall function 00403B40: rand.MSVCRT ref: 00403B49
                                              • Sleep.KERNEL32(0000000A), ref: 00404E97
                                              • ExitThread.KERNEL32 ref: 00404EA3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: CountExitSleepThreadTickrand
                                              • String ID: %d.%d.%d.%d$192.168.1.244$<6@$@$E$L8@$P$p8@$8@$[@
                                              • API String ID: 896407411-3061671333
                                              • Opcode ID: 3410f6aa03986460e07f35c30161e885734b80fe57aac652988e95c7b84e40c9
                                              • Instruction ID: 87275159083c24ec72463f46727c3f40db5767b92ee09eca53101c8822c6a11e
                                              • Opcode Fuzzy Hash: 3410f6aa03986460e07f35c30161e885734b80fe57aac652988e95c7b84e40c9
                                              • Instruction Fuzzy Hash: F3B1BFB15083459AE710DF60C845B6FB7E5FFC4708F00092DFA89A7291DB74A609CB9B
                                              APIs
                                                • Part of subcall function 00403B40: GetTickCount.KERNEL32 ref: 00403B41
                                                • Part of subcall function 00403B40: rand.MSVCRT ref: 00403B49
                                              • Sleep.KERNEL32(0000000A), ref: 00405527
                                              • ExitThread.KERNEL32 ref: 00405533
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: CountExitSleepThreadTickrand
                                              • String ID: %d.%d.%d.%d$192.168.1.244$<6@$@$E$L8@$P$p8@$8@$[@
                                              • API String ID: 896407411-3061671333
                                              • Opcode ID: a9ee2490293e25e91a77c21d2959831a20bb89c8af2e816b72d14c690114d407
                                              • Instruction ID: 2acc1ecf18658df22ca3a7ea1314f5fe6e182d61b19c12b6ce0228fb74aabab8
                                              • Opcode Fuzzy Hash: a9ee2490293e25e91a77c21d2959831a20bb89c8af2e816b72d14c690114d407
                                              • Instruction Fuzzy Hash: 14B19D715083459AE710DF60C845B6FB7E5FFC4708F00492DFA89A7291DBB4AA09CB9B
                                              APIs
                                              • GetProcAddress.KERNEL32(00000000,0047FE25), ref: 0047FE30
                                              • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 0047FE43
                                              • GetTickCount.KERNEL32 ref: 0047FE77
                                              • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00483082,00000000,00000000,00000000,00000000), ref: 0047FF49
                                              • Sleep.KERNEL32(00000064,0000001E), ref: 0047FF90
                                              • DeleteFileA.KERNEL32(00482D28), ref: 0047FF97
                                              • CreateThread.KERNEL32(00000000,00000000,0047F985,00000000,00000000), ref: 0048004B
                                              • CloseHandle.KERNEL32(?,0C1A4F68), ref: 00480054
                                              • Sleep.KERNEL32(00001388,00000000,00000000), ref: 004800FB
                                              Strings
                                              • "', xrefs: 0047FFC2
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 00480017
                                              • ADVAPI32.DLL, xrefs: 0047FE42
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: Sleep$AddressCloseCountCreateDeleteFileHandleInformationLibraryLoadProcThreadTickVolume
                                              • String ID: "'$ADVAPI32.DLL$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 3376152981-2346592412
                                              • Opcode ID: 5b9ba073255788373456750f45873bb949f55a25902f1e72925c0e661daa5f85
                                              • Instruction ID: 09c322043ac8d84edb9ce6a58673b1a16576989b4127bcfadf353c9930ff3144
                                              • Opcode Fuzzy Hash: 5b9ba073255788373456750f45873bb949f55a25902f1e72925c0e661daa5f85
                                              • Instruction Fuzzy Hash: 0671D471514718BFEB66AF659C0ABEE376CDF01301F00452BFD199A082DAF85F0986A9
                                              APIs
                                                • Part of subcall function 00403C10: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00403C20
                                                • Part of subcall function 00403C10: lstrcatA.KERNEL32(?,\Program Files\Internet Explorer\iexplore.exe,?,00000104), ref: 00403C35
                                                • Part of subcall function 00403C10: lstrcpyA.KERNEL32(?,?,?,\Program Files\Internet Explorer\iexplore.exe,?,00000104), ref: 00403C48
                                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0040482E
                                              • Sleep.KERNEL32(00001388), ref: 0040483D
                                              • Sleep.KERNEL32(0000000A,?,00000000), ref: 0040498D
                                              • ExitThread.KERNEL32 ref: 00404997
                                              Strings
                                              • <6@, xrefs: 0040477F
                                              • %s %s%s, xrefs: 004047A1
                                              • GET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#, xrefs: 004047E0
                                              • GET %s HTTP/1.1Host: %s, xrefs: 0040487D
                                              • GET %s HTTP/1.1Host: %s:%d, xrefs: 004048A2
                                              • D, xrefs: 004047B4
                                              • GET %s HTTP/1.1Content-Type: text/htmlHost: %s:%dAccept: text/html, */*User-Agent:Mozilla/4.0 (compatible; MSIE %d.00; Windows NT %d.0; MyIE 3.01), xrefs: 0040492A
                                              • GET %s HTTP/1.1Content-Type: text/htmlHost: %sAccept: text/html, */*User-Agent:Mozilla/4.0 (compatible; MSIE %d.00; Windows NT %d.0; MyIE 3.01), xrefs: 004048E7
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: Sleep$CreateDirectoryExitProcessSystemThreadlstrcatlstrcpy
                                              • String ID: %s %s%s$<6@$D$GET %s HTTP/1.1Content-Type: text/htmlHost: %sAccept: text/html, */*User-Agent:Mozilla/4.0 (compatible; MSIE %d.00; Windows NT %d.0; MyIE 3.01)$GET %s HTTP/1.1Content-Type: text/htmlHost: %s:%dAccept: text/html, */*User-Agent:Mozilla/4.0 (compatible; MSIE %d.00; Windows NT %d.0; MyIE 3.01)$GET %s HTTP/1.1Host: %s$GET %s HTTP/1.1Host: %s:%d$GET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#
                                              • API String ID: 2825703556-4267235928
                                              • Opcode ID: e08e1effa276eb7547b25f3cb29d33cb09f5be14afca26cf21ab89a8ec85cfde
                                              • Instruction ID: 3e73d33b29753aa0a0a8c23456e8152a650bf458f26c86c47ab00128547e0a80
                                              • Opcode Fuzzy Hash: e08e1effa276eb7547b25f3cb29d33cb09f5be14afca26cf21ab89a8ec85cfde
                                              • Instruction Fuzzy Hash: 6D51DAB25443446BD324DB64CD41FFB77A8ABC5704F004D3EF64AA32C1EA75AA048B9B
                                              APIs
                                              • FindResourceA.KERNEL32(?,?,?), ref: 0040244F
                                              • LoadLibraryA.KERNEL32(kernel32.dll,SizeofResource), ref: 00402461
                                              • GetProcAddress.KERNEL32(00000000), ref: 00402468
                                              • LoadResource.KERNEL32(?,00000000), ref: 0040247A
                                              • LockResource.KERNEL32(00000000), ref: 00402489
                                              • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000), ref: 004024BD
                                              • WriteFile.KERNEL32 ref: 004024DC
                                              • CloseHandle.KERNEL32(00000000), ref: 004024E3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: Resource$FileLoad$AddressCloseCreateFindHandleLibraryLockProcWrite
                                              • String ID: <6@$SizeofResource$hra%u.dll$kernel32.dll
                                              • API String ID: 2921964263-2374908272
                                              • Opcode ID: 8a57ef22dd47a814e705dbe9eb76e98e586b3eddb95431373c2ff637a7035f3e
                                              • Instruction ID: 298c1543b4fc4cf1b22406217ce591795a308af8d218835589389581325cd5cf
                                              • Opcode Fuzzy Hash: 8a57ef22dd47a814e705dbe9eb76e98e586b3eddb95431373c2ff637a7035f3e
                                              • Instruction Fuzzy Hash: 9211E9321803007BE2309B659E4DFAB7BACDF85B10F054439FA42F21D0DBB9981586B9
                                              APIs
                                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00404627
                                              • Sleep.KERNEL32(000007D0), ref: 00404632
                                              • Sleep.KERNEL32(0000000A), ref: 00404643
                                              • ExitThread.KERNEL32 ref: 00404649
                                              • Sleep.KERNEL32(00000032,?,00000000), ref: 00404704
                                              • ExitThread.KERNEL32 ref: 0040470F
                                                • Part of subcall function 00403C10: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00403C20
                                                • Part of subcall function 00403C10: lstrcatA.KERNEL32(?,\Program Files\Internet Explorer\iexplore.exe,?,00000104), ref: 00403C35
                                                • Part of subcall function 00403C10: lstrcpyA.KERNEL32(?,?,?,\Program Files\Internet Explorer\iexplore.exe,?,00000104), ref: 00403C48
                                              Strings
                                              • D, xrefs: 004045DB
                                              • <6@, xrefs: 004045C4, 0040469F
                                              • %s %s%s, xrefs: 004045BE
                                              • GET %s HTTP/1.1Content-Type: text/htmlHost: %sAccept: text/html, */*User-Agent:Mozilla/5.0 (X11; U; Linux i686; en-US; re:1.4.0) Gecko/20080808 Firefox/%d.0, xrefs: 00404692
                                              • GET %s HTTP/1.1Referer: http://%s:80/http://%sHost: %sConnection: CloseCache-Control: no-cache, xrefs: 00404673
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: Sleep$ExitThread$CreateDirectoryProcessSystemlstrcatlstrcpy
                                              • String ID: %s %s%s$<6@$D$GET %s HTTP/1.1Content-Type: text/htmlHost: %sAccept: text/html, */*User-Agent:Mozilla/5.0 (X11; U; Linux i686; en-US; re:1.4.0) Gecko/20080808 Firefox/%d.0$GET %s HTTP/1.1Referer: http://%s:80/http://%sHost: %sConnection: CloseCache-Control: no-cache
                                              • API String ID: 4106849892-1695404734
                                              • Opcode ID: 77bc9a4e8d2d1452da797db159c73d812a404676eedf890ee0f1537427deca61
                                              • Instruction ID: aea2a5038014d6908c877e8ed60871dbc4ffd7e4e280d37711b0d24c40857b9e
                                              • Opcode Fuzzy Hash: 77bc9a4e8d2d1452da797db159c73d812a404676eedf890ee0f1537427deca61
                                              • Instruction Fuzzy Hash: 66416671144345ABD320DB60CD45BEB77A9ABC4704F004D3EF786A32C1DA75A9058B9B
                                              APIs
                                              • LoadLibraryA.KERNEL32(?), ref: 004039C6
                                              • GetLastError.KERNEL32 ref: 004039D2
                                              • RaiseException.KERNEL32(C06D007E,00000000,00000001,?), ref: 00403A05
                                              • InterlockedExchange.KERNEL32(?,00000000), ref: 00403A17
                                              • LocalAlloc.KERNEL32(00000040,00000008), ref: 00403A2B
                                              • FreeLibrary.KERNEL32(00000000), ref: 00403A48
                                              • GetProcAddress.KERNEL32(?,?), ref: 00403AA9
                                              • GetLastError.KERNEL32 ref: 00403AB5
                                              • RaiseException.KERNEL32(C06D007F,00000000,00000001,?), ref: 00403AE7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: ErrorExceptionLastLibraryRaise$AddressAllocExchangeFreeInterlockedLoadLocalProc
                                              • String ID: $
                                              • API String ID: 991255547-3993045852
                                              • Opcode ID: 256256f5bea5ef9629b74784c89f9cd366c968008bba8740bb1e0df359706086
                                              • Instruction ID: 003abd56770ea85181eee10679b32b4024c484e765cb6dd7374dfc17ffc6279b
                                              • Opcode Fuzzy Hash: 256256f5bea5ef9629b74784c89f9cd366c968008bba8740bb1e0df359706086
                                              • Instruction Fuzzy Hash: C3612DB5B006059FDB24CF99C984AAABBF9AB48301B10403EE956F7391D774EE04CF14
                                              APIs
                                              • ExitThread.KERNEL32 ref: 00405895
                                                • Part of subcall function 00403B40: GetTickCount.KERNEL32 ref: 00403B41
                                                • Part of subcall function 00403B40: rand.MSVCRT ref: 00403B49
                                              • Sleep.KERNEL32(00000028), ref: 00405887
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: CountExitSleepThreadTickrand
                                              • String ID: %d.%d.%d.%d$<6@$AAAA$E$L8@$p8@$8@$[@
                                              • API String ID: 896407411-1437862014
                                              • Opcode ID: 2082310ec20457ce4bd3376e800f9b479eea37f891fde78d827ab7b4555d5ca3
                                              • Instruction ID: 7e6662bb6761759f066e7e86b2ee24da49ec5426ddd9b74326a3b1faf3b9be8f
                                              • Opcode Fuzzy Hash: 2082310ec20457ce4bd3376e800f9b479eea37f891fde78d827ab7b4555d5ca3
                                              • Instruction Fuzzy Hash: A0510470548380AAE320EF64CC45B5BB7E8EFD4308F00492DF695A72D1E7B595098B6B
                                              APIs
                                              • OpenMutexA.KERNEL32(001F0001,00000000,100200), ref: 004020DF
                                              • ReleaseMutex.KERNEL32(00000000), ref: 004020EC
                                              • CloseHandle.KERNEL32(00000000), ref: 004020F3
                                              • lstrcatA.KERNEL32(?,?), ref: 004021AC
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 004021BF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: Mutex$AddressCloseHandleOpenProcReleaselstrcat
                                              • String ID: 100200$<6@$stf%c%c%c%c%c.exe
                                              • API String ID: 2376757572-3190100693
                                              • Opcode ID: d112f5c9d013e11b3731d5647da893e1883a61e01d2132f2d5a6d2d8178d5850
                                              • Instruction ID: 7c7aac5ec1300530b19c54ce4657de090f08845e18d217751b06ad59df05bcf8
                                              • Opcode Fuzzy Hash: d112f5c9d013e11b3731d5647da893e1883a61e01d2132f2d5a6d2d8178d5850
                                              • Instruction Fuzzy Hash: B731EBF26443007BE760AB60DD0AFAF7668BB44706F00453DF746B61C1EDB49604866B
                                              APIs
                                              • GetProcAddress.KERNEL32(00000000,7FE332C3), ref: 7FE332D0
                                              • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\sysWOW64\wbem\wmiprvse.exe,000000C8), ref: 7FE332E5
                                              • wsprintfA.USER32 ref: 7FE332FA
                                              • CreateThread.KERNEL32(00000000,00000000,7FE32C7D,00000000,00000000), ref: 7FE33343
                                              • CloseHandle.KERNEL32(?,0C1A4F68), ref: 7FE3334C
                                              • WSAStartup.WS2_32(00000101), ref: 7FE333D1
                                              • Sleep.KERNEL32(00001388,00000000,00000000), ref: 7FE333F3
                                                • Part of subcall function 7FE329F1: NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 7FE32A36
                                                • Part of subcall function 7FE329F1: NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 7FE32A55
                                                • Part of subcall function 7FE329F1: MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 7FE32A7F
                                                • Part of subcall function 7FE329F1: CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 7FE32A8C
                                                • Part of subcall function 7FE329F1: UnmapViewOfFile.KERNEL32(?), ref: 7FE32AA4
                                              Strings
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 7FE3330F
                                              • C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1, xrefs: 7FE332F9
                                              • C:\Windows\sysWOW64\wbem\wmiprvse.exe, xrefs: 7FE332E2, 7FE332F7
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043960210.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7fe30000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: File$CloseHandleView$AddressCreateInformationModuleNameOpenProcQuerySectionSleepStartupSystemThreadUnmapwsprintf
                                              • String ID: C:\Windows\sysWOW64\wbem\wmiprvse.exe$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 3988882592-1392025104
                                              • Opcode ID: 5a2e8885b122901e0e527b3c98aa0eb90efe88ce56f4889f66029a75c3141c74
                                              • Instruction ID: 806d303376319e10b4faa7ba5eb60574f11820cef6a731847cf1d174f778dc29
                                              • Opcode Fuzzy Hash: 5a2e8885b122901e0e527b3c98aa0eb90efe88ce56f4889f66029a75c3141c74
                                              • Instruction Fuzzy Hash: 82319031904719FFDB619F61CC0EFEA362CDF41711F404219F96A6A080DAF06F05CAA6
                                              APIs
                                              • GetProcAddress.KERNEL32(00000000,009B32C3), ref: 009B32D0
                                              • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\sysWOW64\wbem\wmiprvse.exe,000000C8), ref: 009B32E5
                                              • wsprintfA.USER32 ref: 009B32FA
                                              • CreateThread.KERNEL32(00000000,00000000,009B2C7D,00000000,00000000), ref: 009B3343
                                              • CloseHandle.KERNEL32(?,0C1A4F68), ref: 009B334C
                                              • WSAStartup.WS2_32(00000101), ref: 009B33D1
                                              • Sleep.KERNEL32(00001388,00000000,00000000), ref: 009B33F3
                                                • Part of subcall function 009B29F1: NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 009B2A36
                                                • Part of subcall function 009B29F1: NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 009B2A55
                                                • Part of subcall function 009B29F1: MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 009B2A7F
                                                • Part of subcall function 009B29F1: CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 009B2A8C
                                                • Part of subcall function 009B29F1: UnmapViewOfFile.KERNEL32(?), ref: 009B2AA4
                                              Strings
                                              • C:\Windows\sysWOW64\wbem\wmiprvse.exe, xrefs: 009B32E2, 009B32F7
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 009B330F
                                              • C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1, xrefs: 009B32F9
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043369977.00000000009B0000.00000040.10000000.00040000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_9b0000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: File$CloseHandleView$AddressCreateInformationModuleNameOpenProcQuerySectionSleepStartupSystemThreadUnmapwsprintf
                                              • String ID: C:\Windows\sysWOW64\wbem\wmiprvse.exe$C:\Windows\sysWOW64\wbem\wmiprvse.exe:*:enabled:@shell32.dll,-1$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 3988882592-1392025104
                                              • Opcode ID: 5a2e8885b122901e0e527b3c98aa0eb90efe88ce56f4889f66029a75c3141c74
                                              • Instruction ID: 85caea9f831230e214a23bae2b931ce151e7de05c9948ea5f9cfed6659e6b80a
                                              • Opcode Fuzzy Hash: 5a2e8885b122901e0e527b3c98aa0eb90efe88ce56f4889f66029a75c3141c74
                                              • Instruction Fuzzy Hash: FD31AF32504609FBDB61AF65CC4EFEB3B6CEF81721F404219F9196A080DAF06F0586E6
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                              • String ID:
                                              • API String ID: 801014965-0
                                              • Opcode ID: e284ab8ee17c914b7e9ddb28410b1748839fce9069ce7daa9396d3e96ef4b395
                                              • Instruction ID: dc900e3830a3569765129a6993a161ee3a7e101abcc0f586eb7ca925653150ca
                                              • Opcode Fuzzy Hash: e284ab8ee17c914b7e9ddb28410b1748839fce9069ce7daa9396d3e96ef4b395
                                              • Instruction Fuzzy Hash: 9C414AB1840304AFDB209FA4DD45AAA7FACEB09711F20057EE842B72E1D7785A41CF68
                                              APIs
                                                • Part of subcall function 00403B40: GetTickCount.KERNEL32 ref: 00403B41
                                                • Part of subcall function 00403B40: rand.MSVCRT ref: 00403B49
                                              • Sleep.KERNEL32(0000000A,?,?,?,00000200), ref: 0040510F
                                              • ExitThread.KERNEL32 ref: 00405118
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: CountExitSleepThreadTickrand
                                              • String ID: @$E$L8@$P$p8@$8@$[@
                                              • API String ID: 896407411-1894845992
                                              • Opcode ID: 6d76287d7377fc4d1ca150cdd5e1076a9e97807c64b402054d467cd7bc3b86a8
                                              • Instruction ID: d762af154df64fd3c6005db1ca3581d92c9b953f8629a195cdfd469d7596aa35
                                              • Opcode Fuzzy Hash: 6d76287d7377fc4d1ca150cdd5e1076a9e97807c64b402054d467cd7bc3b86a8
                                              • Instruction Fuzzy Hash: 30614C71548384AAD310DB64CC45B5FBBE9FF89308F40092DF688A72D1DAB49909CB9B
                                              APIs
                                              • malloc.MSVCRT ref: 0040424F
                                              • ExitThread.KERNEL32 ref: 004043BB
                                                • Part of subcall function 00403B40: GetTickCount.KERNEL32 ref: 00403B41
                                                • Part of subcall function 00403B40: rand.MSVCRT ref: 00403B49
                                              • sprintf.MSVCRT ref: 00404317
                                              • sprintf.MSVCRT ref: 00404348
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: sprintf$CountExitThreadTickmallocrand
                                              • String ID: #0%s!$%s/%s$(8@$:8@$L8@
                                              • API String ID: 3712263441-812610358
                                              • Opcode ID: 1fb8edccde2239dcf819b419ffd2f10b3402cd0bf8fe435dcda30660f774dccf
                                              • Instruction ID: 1928d251c466a658d3dfa1dbb8552598425e23835ae83e9358d9328c5b0794ed
                                              • Opcode Fuzzy Hash: 1fb8edccde2239dcf819b419ffd2f10b3402cd0bf8fe435dcda30660f774dccf
                                              • Instruction Fuzzy Hash: 1751A3B15043409FE310DB34C945B5BBAE4AFC4704F000A3EF69AA72D1E7B495058B5E
                                              APIs
                                                • Part of subcall function 0047E0C9: NtAdjustPrivilegesToken.NTDLL(?,00000000,?,00000000,00000000,00000000), ref: 0047E0E9
                                              • CloseHandle.KERNEL32(?), ref: 0047D2C4
                                              • FreeLibrary.KERNEL32(A58583C3,?,0047D4AC,00000000,000065A4,00000000,?,00000002,00000000,00000040,00000000,000065A4), ref: 0047D4C9
                                              • CloseHandle.KERNEL32(?,?,0047D4AC,00000000,000065A4,00000000,?,00000002,00000000,00000040,00000000,000065A4), ref: 0047D4D0
                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,000065A4,00000000,?,00000002,00000000,00000040,00000000,000065A4), ref: 0047D4DA
                                              • Process32First.KERNEL32 ref: 0047D4ED
                                              • Process32Next.KERNEL32 ref: 0047D4FE
                                              • OpenProcess.KERNEL32(0000002A,00000000,?,?,?,?,?,?,00000002,00000000,00000040,00000000,000065A4), ref: 0047D516
                                              • CreateRemoteThread.KERNEL32(?,00000000,00000000,-00002FC3,00000002,00000000), ref: 0047D553
                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,00000002,00000000,00000040,00000000,000065A4), ref: 0047D56E
                                              • CloseHandle.KERNEL32 ref: 0047D57D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: CloseHandle$CreateProcess32$AdjustFirstFreeLibraryNextOpenPrivilegesProcessRemoteSnapshotThreadTokenToolhelp32
                                              • String ID: csrs
                                              • API String ID: 931541398-2321902090
                                              • Opcode ID: 7a0311b27d1f69206ae28c9acee774715fd69c7f810f3bbf34c027bcac111cc0
                                              • Instruction ID: 3cfd69b60c374d0d3d65ca31b379ca15b6d48a512b285e6bab972a84e5075eef
                                              • Opcode Fuzzy Hash: 7a0311b27d1f69206ae28c9acee774715fd69c7f810f3bbf34c027bcac111cc0
                                              • Instruction Fuzzy Hash: 7A119330614215FBDB255E21CC49BFF3A7DDF44741F54842EF80A99181C7B4DF4186AA
                                              APIs
                                                • Part of subcall function 7FE313C1: LookupPrivilegeValueA.ADVAPI32(00000000,?), ref: 7FE313D1
                                                • Part of subcall function 7FE313C1: NtAdjustPrivilegesToken.NTDLL(?,00000000,?,00000000,00000000,00000000), ref: 7FE313E1
                                              • CloseHandle.KERNEL32(?), ref: 7FE305BC
                                              • FreeLibrary.KERNEL32(76DA0000,?,7FE307A4,00000000,000065A4,00000000,?,00000002,00000000,00000040,00000000,000065A4), ref: 7FE307C1
                                              • CloseHandle.KERNEL32(?,?,7FE307A4,00000000,000065A4,00000000,?,00000002,00000000,00000040,00000000,000065A4), ref: 7FE307C8
                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,000065A4,00000000,?,00000002,00000000,00000040,00000000,000065A4), ref: 7FE307D2
                                              • Process32First.KERNEL32 ref: 7FE307E5
                                              • Process32Next.KERNEL32 ref: 7FE307F6
                                              • OpenProcess.KERNEL32(0000002A,00000000,?,?,?,?,?,?,00000002,00000000,00000040,00000000,000065A4), ref: 7FE3080E
                                              • CreateRemoteThread.KERNEL32(?,00000000,00000000,-00002FC3,00000002,00000000), ref: 7FE3084B
                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,00000002,00000000,00000040,00000000,000065A4), ref: 7FE30866
                                              • CloseHandle.KERNEL32 ref: 7FE30875
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043960210.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7fe30000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: CloseHandle$CreateProcess32$AdjustFirstFreeLibraryLookupNextOpenPrivilegePrivilegesProcessRemoteSnapshotThreadTokenToolhelp32Value
                                              • String ID: csrs
                                              • API String ID: 3908997113-2321902090
                                              • Opcode ID: 7a0311b27d1f69206ae28c9acee774715fd69c7f810f3bbf34c027bcac111cc0
                                              • Instruction ID: eba08b2346753bb0dc32dc5381f4741ba834f7a00a5bae23cd1368a28801996b
                                              • Opcode Fuzzy Hash: 7a0311b27d1f69206ae28c9acee774715fd69c7f810f3bbf34c027bcac111cc0
                                              • Instruction Fuzzy Hash: 6D119830A0A215FBEB255F21CC4DBBE3A7DDF44745F510028FA4799080DBB0DB41C6A6
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: strcspn$atoistrncpystrstr
                                              • String ID: (8@$:8@$L8@
                                              • API String ID: 896909712-67691562
                                              • Opcode ID: 74f2855ef3a0f674b5d1c88f69f431229b06cb2c14ad1b607f774191325958ff
                                              • Instruction ID: 423295b4073bef868c52a0da5d7697345aa104327ed5b96778bd2d0c64799647
                                              • Opcode Fuzzy Hash: 74f2855ef3a0f674b5d1c88f69f431229b06cb2c14ad1b607f774191325958ff
                                              • Instruction Fuzzy Hash: CA213931A002186BC710A778DD06BEA7765AF48714F0006BEFA5AF32C1DEB85A408B9D
                                              APIs
                                              • LoadLibraryA.KERNEL32(7FE332AC), ref: 7FE332B8
                                                • Part of subcall function 7FE332CF: GetProcAddress.KERNEL32(00000000,7FE332C3), ref: 7FE332D0
                                                • Part of subcall function 7FE332CF: GetModuleFileNameA.KERNEL32(00000000,C:\Windows\sysWOW64\wbem\wmiprvse.exe,000000C8), ref: 7FE332E5
                                                • Part of subcall function 7FE332CF: wsprintfA.USER32 ref: 7FE332FA
                                                • Part of subcall function 7FE332CF: CreateThread.KERNEL32(00000000,00000000,7FE32C7D,00000000,00000000), ref: 7FE33343
                                                • Part of subcall function 7FE332CF: CloseHandle.KERNEL32(?,0C1A4F68), ref: 7FE3334C
                                                • Part of subcall function 7FE332CF: WSAStartup.WS2_32(00000101), ref: 7FE333D1
                                                • Part of subcall function 7FE332CF: Sleep.KERNEL32(00001388,00000000,00000000), ref: 7FE333F3
                                              Strings
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 7FE3330F
                                              • hell32.dll,-1, xrefs: 7FE3330E
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043960210.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7fe30000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: AddressCloseCreateFileHandleLibraryLoadModuleNameProcSleepStartupThreadwsprintf
                                              • String ID: SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$hell32.dll,-1
                                              • API String ID: 1694642180-1583563992
                                              • Opcode ID: 8f19a037a4958f9c4e4be2aea23628189e7a365a9e4db52631885ff5fdbb2ecd
                                              • Instruction ID: 12527aadef34871a68a9f0f3636c4070517339c0fc18d64a5fb64a9bfd057a23
                                              • Opcode Fuzzy Hash: 8f19a037a4958f9c4e4be2aea23628189e7a365a9e4db52631885ff5fdbb2ecd
                                              • Instruction Fuzzy Hash: F031E471918715BFD7229A208C4EFEA366CDF41711F804219F85A9E081DAF46F06D6A5
                                              APIs
                                              • LoadLibraryA.KERNEL32(009B32AC), ref: 009B32B8
                                                • Part of subcall function 009B32CF: GetProcAddress.KERNEL32(00000000,009B32C3), ref: 009B32D0
                                                • Part of subcall function 009B32CF: GetModuleFileNameA.KERNEL32(00000000,C:\Windows\sysWOW64\wbem\wmiprvse.exe,000000C8), ref: 009B32E5
                                                • Part of subcall function 009B32CF: wsprintfA.USER32 ref: 009B32FA
                                                • Part of subcall function 009B32CF: CreateThread.KERNEL32(00000000,00000000,009B2C7D,00000000,00000000), ref: 009B3343
                                                • Part of subcall function 009B32CF: CloseHandle.KERNEL32(?,0C1A4F68), ref: 009B334C
                                                • Part of subcall function 009B32CF: WSAStartup.WS2_32(00000101), ref: 009B33D1
                                                • Part of subcall function 009B32CF: Sleep.KERNEL32(00001388,00000000,00000000), ref: 009B33F3
                                              Strings
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 009B330F
                                              • hell32.dll,-1, xrefs: 009B330E
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043369977.00000000009B0000.00000040.10000000.00040000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_9b0000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: AddressCloseCreateFileHandleLibraryLoadModuleNameProcSleepStartupThreadwsprintf
                                              • String ID: SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List$hell32.dll,-1
                                              • API String ID: 1694642180-1583563992
                                              • Opcode ID: 8f19a037a4958f9c4e4be2aea23628189e7a365a9e4db52631885ff5fdbb2ecd
                                              • Instruction ID: 3f2befe13118c3ce72ce2bf6b0b7bd5de0cd341f01bccea031db3987cbea8421
                                              • Opcode Fuzzy Hash: 8f19a037a4958f9c4e4be2aea23628189e7a365a9e4db52631885ff5fdbb2ecd
                                              • Instruction Fuzzy Hash: C831F471518615FFDB25AF24CD4EBEB36ACDF41320F40811AF8559E0C1DAF45F0A86A5
                                              APIs
                                              • Sleep.KERNEL32(00001388,00000000,00000000), ref: 7FE333F3
                                              • gethostbyname.WS2_32(ilo.brenz.pl), ref: 7FE33412
                                              • lstrlen.KERNEL32(ilo.brenz.pl), ref: 7FE3341D
                                              • socket.WS2_32(00000002,00000001,00000000), ref: 7FE33453
                                              • connect.WS2_32(?,7FE32EB6,00000010), ref: 7FE3346D
                                              • GetVersionExA.KERNEL32(?,?,7FE32EB6,00000010), ref: 7FE334B7
                                              • wsprintfA.USER32 ref: 7FE33566
                                              • Sleep.KERNEL32(00000064,?,?,C:\Windows\sysWOW64\wbem\wmiprvse.exe,7FE36125,00000000,?,C:\Windows\sysWOW64\wbem\wmiprvse.exe,00000000,?,?,00000000), ref: 7FE33612
                                              • GetTickCount.KERNEL32 ref: 7FE3361B
                                              • closesocket.WS2_32 ref: 7FE3363F
                                              • Sleep.KERNEL32(00007530), ref: 7FE33653
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043960210.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7fe30000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: Sleep$CountTickVersionclosesocketconnectgethostbynamelstrlensocketwsprintf
                                              • String ID: C:\Windows\sysWOW64\wbem\wmiprvse.exe
                                              • API String ID: 2598339483-2345302899
                                              • Opcode ID: d8d5e14ce8bde0a1c939d63ec7781a2c4ff1cbe07d4ef513ca2b050a836d98cc
                                              • Instruction ID: d85bbd76be20f0a00c0cc1f3b58fd3048d72df3a51a8d270456399880643c19b
                                              • Opcode Fuzzy Hash: d8d5e14ce8bde0a1c939d63ec7781a2c4ff1cbe07d4ef513ca2b050a836d98cc
                                              • Instruction Fuzzy Hash: AC219171A04355BFEB259F24880DFAE3A7EEF41616F900504E80A9E194CBF0AB01DBA5
                                              APIs
                                              • Sleep.KERNEL32(00001388,00000000,00000000), ref: 009B33F3
                                              • gethostbyname.WS2_32(ilo.brenz.pl), ref: 009B3412
                                              • lstrlen.KERNEL32(ilo.brenz.pl), ref: 009B341D
                                              • socket.WS2_32(00000002,00000001,00000000), ref: 009B3453
                                              • connect.WS2_32(?,009B2EB6,00000010), ref: 009B346D
                                              • GetVersionExA.KERNEL32(?,?,009B2EB6,00000010), ref: 009B34B7
                                              • wsprintfA.USER32 ref: 009B3566
                                              • Sleep.KERNEL32(00000064,?,?,C:\Windows\sysWOW64\wbem\wmiprvse.exe,009B6125,00000000,?,C:\Windows\sysWOW64\wbem\wmiprvse.exe,00000000,?,?,00000000), ref: 009B3612
                                              • GetTickCount.KERNEL32 ref: 009B361B
                                              • closesocket.WS2_32 ref: 009B363F
                                              • Sleep.KERNEL32(00007530), ref: 009B3653
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043369977.00000000009B0000.00000040.10000000.00040000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_9b0000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: Sleep$CountTickVersionclosesocketconnectgethostbynamelstrlensocketwsprintf
                                              • String ID: C:\Windows\sysWOW64\wbem\wmiprvse.exe
                                              • API String ID: 2598339483-2345302899
                                              • Opcode ID: d8d5e14ce8bde0a1c939d63ec7781a2c4ff1cbe07d4ef513ca2b050a836d98cc
                                              • Instruction ID: d7ba4ce2a12f6a2f5258369a9ddec2ed887766dd1167a7ccc69867db07586697
                                              • Opcode Fuzzy Hash: d8d5e14ce8bde0a1c939d63ec7781a2c4ff1cbe07d4ef513ca2b050a836d98cc
                                              • Instruction Fuzzy Hash: 7921B671604219BBDF34DF288A1EBEE3B6DDF41721F504404F80A9A081DBF49F018A55
                                              APIs
                                              • LoadLibraryA.KERNEL32(0048008E), ref: 0048009A
                                              • Sleep.KERNEL32(00001388,00000000,00000000), ref: 004800FB
                                              • lstrlenA.KERNEL32(ilo.brenz.pl), ref: 00480125
                                              • GetVersionExA.KERNEL32(?,?,0047FBBE,00000010), ref: 004801BF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: LibraryLoadSleepVersionlstrlen
                                              • String ID: ilo.brenz.pl
                                              • API String ID: 3609553399-878173267
                                              • Opcode ID: 174516e84d9c669cdc790a5bd5a266766651d9cd51a165662f06c8ce5e18c4ab
                                              • Instruction ID: cc84fb61209408f574a2dd9875626c80196d9c769dfaae8b703c4eca60857b41
                                              • Opcode Fuzzy Hash: 174516e84d9c669cdc790a5bd5a266766651d9cd51a165662f06c8ce5e18c4ab
                                              • Instruction Fuzzy Hash: 2E614732614205BFDB61EF24C819BDE3F6DAF41301F04085AE8699E081D7F89F09C7AA
                                              APIs
                                              • CloseHandle.KERNEL32(?), ref: 00401C02
                                              • CloseHandle.KERNEL32(?), ref: 00401C3F
                                              • LoadLibraryA.KERNEL32(PlusCtrl.dll), ref: 00401C52
                                              • CreateFileA.KERNEL32(PlusCtrl.dll,40000000,00000001,00000000,00000002,00000000,00000000), ref: 00401CF9
                                              • CloseHandle.KERNEL32(00000000,?,00000000,00000000), ref: 00401D37
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: CloseHandle$CreateFileLibraryLoad
                                              • String ID: PlusCtrl.dll
                                              • API String ID: 4073770061-3813448905
                                              • Opcode ID: c6c2baf483a5c7817c0615bf604dfdbf5b4d22fa498cde7f9790926ec1ef48c2
                                              • Instruction ID: da15035d668b36466e8179076398aeffbcb361aec3f94f14ce4845e29cafbb59
                                              • Opcode Fuzzy Hash: c6c2baf483a5c7817c0615bf604dfdbf5b4d22fa498cde7f9790926ec1ef48c2
                                              • Instruction Fuzzy Hash: 214171715443019BE720CF34DD44B2BBBE4AB84764F140A2EF9A1B63F0E778D9458B9A
                                              APIs
                                              • GetProcAddress.KERNEL32(00000000,0047FFCB), ref: 0047FFD8
                                              • GetModuleFileNameA.KERNEL32(00000000,00482C2E,000000C8), ref: 0047FFED
                                              • CreateThread.KERNEL32(00000000,00000000,0047F985,00000000,00000000), ref: 0048004B
                                              • CloseHandle.KERNEL32(?,0C1A4F68), ref: 00480054
                                              • Sleep.KERNEL32(00001388,00000000,00000000), ref: 004800FB
                                                • Part of subcall function 0047F6F9: NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 0047F73E
                                                • Part of subcall function 0047F6F9: NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 0047F75D
                                                • Part of subcall function 0047F6F9: MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 0047F787
                                                • Part of subcall function 0047F6F9: CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 0047F794
                                                • Part of subcall function 0047F6F9: UnmapViewOfFile.KERNEL32(?), ref: 0047F7AC
                                              Strings
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 00480017
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: File$CloseHandleView$AddressCreateInformationModuleNameOpenProcQuerySectionSleepSystemThreadUnmap
                                              • String ID: SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 3454824499-621207024
                                              • Opcode ID: 5a2e8885b122901e0e527b3c98aa0eb90efe88ce56f4889f66029a75c3141c74
                                              • Instruction ID: babc94883a302b9edaef80eb811b418dc2df77098cc16885f94b522768664b27
                                              • Opcode Fuzzy Hash: 5a2e8885b122901e0e527b3c98aa0eb90efe88ce56f4889f66029a75c3141c74
                                              • Instruction Fuzzy Hash: 3B318F31510605BBDB71AB65DC0EFEF362CDF42701F00451AF9196A080DAF45F0986AA
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: ExitSleepThread
                                              • String ID: (8@$:8@$L8@$8@
                                              • API String ID: 2532117645-3614555925
                                              • Opcode ID: 03f13d39a4d50158b3b0a3e900b25450fd1bb83df8e0ac367b200edcad169de3
                                              • Instruction ID: 45af933c2d0913eb26ad9620014091e4a7ed23ef7f5d571b2848da93812ef47f
                                              • Opcode Fuzzy Hash: 03f13d39a4d50158b3b0a3e900b25450fd1bb83df8e0ac367b200edcad169de3
                                              • Instruction Fuzzy Hash: EE310231604300ABD310AF24ED45BAFB7A8EF95311F00443DF689A72C1CA7499098B9A
                                              APIs
                                                • Part of subcall function 00402500: EnumResourceNamesA.KERNEL32(00000000,0000000A,Function_00002430,00000000), ref: 0040250B
                                                • Part of subcall function 00402520: lstrcpyA.KERNEL32(?,SYSTEM\CurrentControlSet\Services\), ref: 00402533
                                                • Part of subcall function 00402520: lstrcatA.KERNEL32(?,100200), ref: 00402543
                                                • Part of subcall function 00401980: LoadLibraryA.KERNEL32 ref: 004019A0
                                                • Part of subcall function 004012B0: CreateThread.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 004012C2
                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,Function_000019C0,00000000), ref: 00402864
                                              • CloseHandle.KERNEL32(?), ref: 0040286D
                                              • Sleep.KERNEL32(0000012C), ref: 00402887
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: CloseCreateEnumHandleLibraryLoadNamesObjectResourceSingleSleepThreadWaitlstrcatlstrcpy
                                              • String ID: <6@$hra%u.dll$8@
                                              • API String ID: 3019664125-4073101535
                                              • Opcode ID: b727a94cfc5c1870f1e87c0db4c5fd5ae21f5c357b8a6d8ebe3cffbda59e6732
                                              • Instruction ID: b4c6470f87cb35eaba9384fad452608e987ecd5d27c4b6046072c90e75b6b2b8
                                              • Opcode Fuzzy Hash: b727a94cfc5c1870f1e87c0db4c5fd5ae21f5c357b8a6d8ebe3cffbda59e6732
                                              • Instruction Fuzzy Hash: B701D275240300ABD200BB70EE8AFAAB364AB48710F10063EFA51721E2DEF994018B6D
                                              APIs
                                              • LoadLibraryA.KERNEL32(0047FFB4), ref: 0047FFC0
                                                • Part of subcall function 0047FFD7: GetProcAddress.KERNEL32(00000000,0047FFCB), ref: 0047FFD8
                                                • Part of subcall function 0047FFD7: GetModuleFileNameA.KERNEL32(00000000,00482C2E,000000C8), ref: 0047FFED
                                                • Part of subcall function 0047FFD7: CreateThread.KERNEL32(00000000,00000000,0047F985,00000000,00000000), ref: 0048004B
                                                • Part of subcall function 0047FFD7: CloseHandle.KERNEL32(?,0C1A4F68), ref: 00480054
                                                • Part of subcall function 0047FFD7: Sleep.KERNEL32(00001388,00000000,00000000), ref: 004800FB
                                              Strings
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 00480017
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: AddressCloseCreateFileHandleLibraryLoadModuleNameProcSleepThread
                                              • String ID: SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 1503743874-621207024
                                              • Opcode ID: 8f19a037a4958f9c4e4be2aea23628189e7a365a9e4db52631885ff5fdbb2ecd
                                              • Instruction ID: 9c6ffb664d20bb682cef52620ddec7ad9b3dc09c4fee0253c243f4b9eb5d7768
                                              • Opcode Fuzzy Hash: 8f19a037a4958f9c4e4be2aea23628189e7a365a9e4db52631885ff5fdbb2ecd
                                              • Instruction Fuzzy Hash: C5312671528615BBD762AE219C0EBEF366CDF42301F00452AF8599E0C2DAF45F0A86E9
                                              APIs
                                              • Sleep.KERNEL32(00000032,?,00000000), ref: 004044EC
                                              • ExitThread.KERNEL32 ref: 004044F6
                                                • Part of subcall function 00403B40: GetTickCount.KERNEL32 ref: 00403B41
                                                • Part of subcall function 00403B40: rand.MSVCRT ref: 00403B49
                                              Strings
                                              • <6@, xrefs: 00404449, 0040448B
                                              • GET %s HTTP/1.1Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */*Accept-Language: zh-cnAccept-Encoding: gzip, deflateUser-Agent:Mo, xrefs: 00404485
                                              • GET %s HTTP/1.1Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */*Accept-Language: zh-cnAccept-Encoding: gzip, deflateUser-Agent:Mo, xrefs: 00404443
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: CountExitSleepThreadTickrand
                                              • String ID: <6@$GET %s HTTP/1.1Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */*Accept-Language: zh-cnAccept-Encoding: gzip, deflateUser-Agent:Mo$GET %s HTTP/1.1Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */*Accept-Language: zh-cnAccept-Encoding: gzip, deflateUser-Agent:Mo
                                              • API String ID: 896407411-1180673266
                                              • Opcode ID: 9c0648faaa7c580b1096e69dcd622242baed2352659d7df1ab5bc987a3810d2b
                                              • Instruction ID: fa830c5a6accc8db5a56bc8424976762d41b4de0ccec1c973aff273b9f1804e2
                                              • Opcode Fuzzy Hash: 9c0648faaa7c580b1096e69dcd622242baed2352659d7df1ab5bc987a3810d2b
                                              • Instruction Fuzzy Hash: 0831DBF15043406BE210EB24DC46FFBB3ACEB94305F04093DF645E21C2EA756A0886AB
                                              APIs
                                              • ExitThread.KERNEL32 ref: 00403E83
                                                • Part of subcall function 00403B40: GetTickCount.KERNEL32 ref: 00403B41
                                                • Part of subcall function 00403B40: rand.MSVCRT ref: 00403B49
                                              • Sleep.KERNEL32(00000005), ref: 00403E6D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: CountExitSleepThreadTickrand
                                              • String ID: :8@$L8@$p8@
                                              • API String ID: 896407411-1348165829
                                              • Opcode ID: 3e75125e98315a6c303164bdcc62422dc0ac1f7090f3bf2c4196777fe1904896
                                              • Instruction ID: c0699dc0de98f8c7b82e62ff3ffffc6daf283feedac10fb4a2c39f1d9fb6e09f
                                              • Opcode Fuzzy Hash: 3e75125e98315a6c303164bdcc62422dc0ac1f7090f3bf2c4196777fe1904896
                                              • Instruction Fuzzy Hash: 1821F3316043006BE3109B15DD45BABB7EAAFC8705F00093DF689B72C1DAB45A088BDB
                                              APIs
                                              • CloseHandle.KERNEL32(?), ref: 00401C02
                                              • CloseHandle.KERNEL32(?), ref: 00401C3F
                                              • LoadLibraryA.KERNEL32(PlusCtrl.dll), ref: 00401C52
                                              • lstrlenA.KERNEL32(?), ref: 00401EB1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: CloseHandle$LibraryLoadlstrlen
                                              • String ID: PlusCtrl.dll
                                              • API String ID: 1302537757-3813448905
                                              • Opcode ID: 9d6033b6bf4a2c9d292d010c3143f14cd85b7083ffd7105bc62b5e031c1c6f82
                                              • Instruction ID: fe13cccd782696a5966384611aa504fe5a24fcd4d90c73c14022dd0c19df5bb8
                                              • Opcode Fuzzy Hash: 9d6033b6bf4a2c9d292d010c3143f14cd85b7083ffd7105bc62b5e031c1c6f82
                                              • Instruction Fuzzy Hash: 303160715443019BE720CF24DD44E6BB7E8ABC4754F144A2EF9A1A32E0E738E845CB56
                                              APIs
                                                • Part of subcall function 00403B40: GetTickCount.KERNEL32 ref: 00403B41
                                                • Part of subcall function 00403B40: rand.MSVCRT ref: 00403B49
                                              • Sleep.KERNEL32(00000014), ref: 00403D53
                                              • ExitThread.KERNEL32 ref: 00403D65
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: CountExitSleepThreadTickrand
                                              • String ID: :8@$L8@$p8@
                                              • API String ID: 896407411-1348165829
                                              • Opcode ID: 653889bf93ce3dc5ae69bcf3ca1f034d621d2bbf8dda7ff92a3885e57a6f8e2a
                                              • Instruction ID: 61c35c1a6ef796fb9a95b154365f1d274a12748536e75e316c168b2b6ba842ad
                                              • Opcode Fuzzy Hash: 653889bf93ce3dc5ae69bcf3ca1f034d621d2bbf8dda7ff92a3885e57a6f8e2a
                                              • Instruction Fuzzy Hash: 0321D131244304ABE3249B14DD16B6BB7A9EB84B04F00093DF689A72D1CBB59A08879A
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: ExitSleepThread
                                              • String ID: :8@$L8@$p8@
                                              • API String ID: 2532117645-1348165829
                                              • Opcode ID: 4ec5ed0947da0d90acb00254561b95d3ed25ab39c8d3cff82c102e6db47b881b
                                              • Instruction ID: 5552c68df3c5ec419ed120abdad0def72af0b1e7849d46ccb2dcea0349e472ec
                                              • Opcode Fuzzy Hash: 4ec5ed0947da0d90acb00254561b95d3ed25ab39c8d3cff82c102e6db47b881b
                                              • Instruction Fuzzy Hash: 45119030244304ABE324DB50DE4AB6B77E9EF85704F00092DF689B61D1DBF49D088B9B
                                              APIs
                                              • lstrcpyA.KERNEL32(?,SYSTEM\CurrentControlSet\Services\), ref: 00402AF6
                                              • lstrcatA.KERNEL32(00000000,100200), ref: 00402B06
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: lstrcatlstrcpy
                                              • String ID: 100200$F7@$SYSTEM\CurrentControlSet\Services\
                                              • API String ID: 3905823039-3017750547
                                              • Opcode ID: 99f8f17f0a694f6518748ee4b6ac97a82841e6c45d2c058385b64cf9619508e7
                                              • Instruction ID: 81adf45cb320d8295d14ce0b174844155e5595c11b4d55a8e5ae176a8c1ac5a8
                                              • Opcode Fuzzy Hash: 99f8f17f0a694f6518748ee4b6ac97a82841e6c45d2c058385b64cf9619508e7
                                              • Instruction Fuzzy Hash: B5F08231248206BEE750D764DD05FAAB7A8ABD4700F108D3DB2C9A20E0D9B8915D8716
                                              APIs
                                              • GetTempPathA.KERNEL32(00000104), ref: 0047F40B
                                                • Part of subcall function 0047F426: GetTempFileNameA.KERNEL32(?,0047F422,00000000,?), ref: 0047F427
                                                • Part of subcall function 0047F426: CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000,?,0047F422,00000000,?), ref: 0047F442
                                                • Part of subcall function 0047F426: WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000104,?,00000000,?,0047F422,00000000,?), ref: 0047F472
                                                • Part of subcall function 0047F426: CloseHandle.KERNEL32(?,00000104,?,00000000,?,0047F422,00000000,?), ref: 0047F47E
                                                • Part of subcall function 0047F426: CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000104,?,00000000,?,0047F422), ref: 0047F4A2
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: File$CreateTemp$CloseHandleNamePathProcessWrite
                                              • String ID:
                                              • API String ID: 3982275768-0
                                              • Opcode ID: bf7059baa2945a1e10e6b512662fb3aa47ecbf22e134ef99b631c6adeccb2904
                                              • Instruction ID: 6e4a7348b10211cf4712877dfb9ac28625f2a5f97d324a036b6cfd784416edba
                                              • Opcode Fuzzy Hash: bf7059baa2945a1e10e6b512662fb3aa47ecbf22e134ef99b631c6adeccb2904
                                              • Instruction Fuzzy Hash: 5C2105B1250206BFE7301B20DC4DFEB3B2CEF95711F008129FA4988182D7F59E1586BA
                                              APIs
                                              • GetTempPathA.KERNEL32(00000104), ref: 7FE32703
                                                • Part of subcall function 7FE3271E: GetTempFileNameA.KERNEL32(?,7FE3271A,00000000,?), ref: 7FE3271F
                                                • Part of subcall function 7FE3271E: CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000,?,7FE3271A,00000000,?), ref: 7FE3273A
                                                • Part of subcall function 7FE3271E: WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000104,?,00000000,?,7FE3271A,00000000,?), ref: 7FE3276A
                                                • Part of subcall function 7FE3271E: CloseHandle.KERNEL32(?,00000104,?,00000000,?,7FE3271A,00000000,?), ref: 7FE32776
                                                • Part of subcall function 7FE3271E: CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000104,?,00000000,?,7FE3271A), ref: 7FE3279A
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043960210.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7fe30000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: File$CreateTemp$CloseHandleNamePathProcessWrite
                                              • String ID:
                                              • API String ID: 3982275768-0
                                              • Opcode ID: bf7059baa2945a1e10e6b512662fb3aa47ecbf22e134ef99b631c6adeccb2904
                                              • Instruction ID: e8ff87219964215428be11df8a01d81b33858c950305ba854321610fda46bc39
                                              • Opcode Fuzzy Hash: bf7059baa2945a1e10e6b512662fb3aa47ecbf22e134ef99b631c6adeccb2904
                                              • Instruction Fuzzy Hash: 1621C3B1645306BFE7215B20CC4DFEB7B2CEF86711F404114F94689081E7B1AE15C6A6
                                              APIs
                                              • GetTempPathA.KERNEL32(00000104), ref: 009B2703
                                                • Part of subcall function 009B271E: GetTempFileNameA.KERNEL32(?,009B271A,00000000,?), ref: 009B271F
                                                • Part of subcall function 009B271E: CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000,?,009B271A,00000000,?), ref: 009B273A
                                                • Part of subcall function 009B271E: WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000104,?,00000000,?,009B271A,00000000,?), ref: 009B276A
                                                • Part of subcall function 009B271E: CloseHandle.KERNEL32(?,00000104,?,00000000,?,009B271A,00000000,?), ref: 009B2776
                                                • Part of subcall function 009B271E: CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000104,?,00000000,?,009B271A), ref: 009B279A
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043369977.00000000009B0000.00000040.10000000.00040000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_9b0000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: File$CreateTemp$CloseHandleNamePathProcessWrite
                                              • String ID:
                                              • API String ID: 3982275768-0
                                              • Opcode ID: bf7059baa2945a1e10e6b512662fb3aa47ecbf22e134ef99b631c6adeccb2904
                                              • Instruction ID: bb98266c0c4909428bae064e5a6579769b35f4bb0196a88a69a698cbba0bd75a
                                              • Opcode Fuzzy Hash: bf7059baa2945a1e10e6b512662fb3aa47ecbf22e134ef99b631c6adeccb2904
                                              • Instruction Fuzzy Hash: EA21E7B1254206BFE7215B20CD8DFEF7B2CDF85721F004118FA4589092EBF1AE15866A
                                              APIs
                                              • GetTempFileNameA.KERNEL32(?,0047F422,00000000,?), ref: 0047F427
                                              • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000,?,0047F422,00000000,?), ref: 0047F442
                                              • WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000104,?,00000000,?,0047F422,00000000,?), ref: 0047F472
                                              • CloseHandle.KERNEL32(?,00000104,?,00000000,?,0047F422,00000000,?), ref: 0047F47E
                                              • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000104,?,00000000,?,0047F422), ref: 0047F4A2
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: File$Create$CloseHandleNameProcessTempWrite
                                              • String ID:
                                              • API String ID: 463619559-0
                                              • Opcode ID: 46a42b1a7938ce57373cf3b37306313736b16861edf51c12b33c8459ee93000f
                                              • Instruction ID: f6e628fe1b3beb17eff2ae29096c1357e7e40e27f82544d6363832bbd8262412
                                              • Opcode Fuzzy Hash: 46a42b1a7938ce57373cf3b37306313736b16861edf51c12b33c8459ee93000f
                                              • Instruction Fuzzy Hash: FA116DB1210606FFEB241B20DC4DFEB7A2CEF95B11F008529FA0998080DBF49E1586B9
                                              APIs
                                              • GetTempFileNameA.KERNEL32(?,7FE3271A,00000000,?), ref: 7FE3271F
                                              • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000,?,7FE3271A,00000000,?), ref: 7FE3273A
                                              • WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000104,?,00000000,?,7FE3271A,00000000,?), ref: 7FE3276A
                                              • CloseHandle.KERNEL32(?,00000104,?,00000000,?,7FE3271A,00000000,?), ref: 7FE32776
                                              • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000104,?,00000000,?,7FE3271A), ref: 7FE3279A
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043960210.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7fe30000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: File$Create$CloseHandleNameProcessTempWrite
                                              • String ID:
                                              • API String ID: 463619559-0
                                              • Opcode ID: 46a42b1a7938ce57373cf3b37306313736b16861edf51c12b33c8459ee93000f
                                              • Instruction ID: 53811a8245002154d32b689494dec5e7fa63c0c5570ca99e0030f64d1e6d62be
                                              • Opcode Fuzzy Hash: 46a42b1a7938ce57373cf3b37306313736b16861edf51c12b33c8459ee93000f
                                              • Instruction Fuzzy Hash: C91161B1600605BFE7251B20CC4DFEB7A2CEF89B11F404518FA4698480EBF1AE1186A5
                                              APIs
                                              • GetTempFileNameA.KERNEL32(?,009B271A,00000000,?), ref: 009B271F
                                              • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000,?,009B271A,00000000,?), ref: 009B273A
                                              • WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000104,?,00000000,?,009B271A,00000000,?), ref: 009B276A
                                              • CloseHandle.KERNEL32(?,00000104,?,00000000,?,009B271A,00000000,?), ref: 009B2776
                                              • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000104,?,00000000,?,009B271A), ref: 009B279A
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043369977.00000000009B0000.00000040.10000000.00040000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_9b0000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: File$Create$CloseHandleNameProcessTempWrite
                                              • String ID:
                                              • API String ID: 463619559-0
                                              • Opcode ID: 46a42b1a7938ce57373cf3b37306313736b16861edf51c12b33c8459ee93000f
                                              • Instruction ID: e4fe958aa0864510b1c7d500b69813437f25d16c9c7639d70e6d4f095df6ecff
                                              • Opcode Fuzzy Hash: 46a42b1a7938ce57373cf3b37306313736b16861edf51c12b33c8459ee93000f
                                              • Instruction Fuzzy Hash: D01184B1210605FFE7241B20CD8DFEF7A2CEF89B11F004518FA1598490EBF0AF1186A9
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: CountExitThreadTick
                                              • String ID: 8@$[@
                                              • API String ID: 2794094058-2583875052
                                              • Opcode ID: ff3c58b0bdba37a238cd5a4d168293157beaed9c7ed117d7eea0098dd14a9af2
                                              • Instruction ID: 469505ee80aad82e613372910616f7cc737cc72fb2d144b40eece11ab5930af1
                                              • Opcode Fuzzy Hash: ff3c58b0bdba37a238cd5a4d168293157beaed9c7ed117d7eea0098dd14a9af2
                                              • Instruction Fuzzy Hash: BF31C2715043409BE320EB14DC09B9BB7A5AB84715F04493EF789BB2D1D675A5088B9B
                                              APIs
                                              • Sleep.KERNEL32(00000005,?,00000000), ref: 00404A80
                                              • ExitThread.KERNEL32 ref: 00404A8D
                                              Strings
                                              • <6@, xrefs: 004049E2
                                              • GET %s HTTP/1.1Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */*Accept-Language: zh-cnAccept-Encoding: gzip, deflateUser-Agent:Mo, xrefs: 00404A2E
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: ExitSleepThread
                                              • String ID: <6@$GET %s HTTP/1.1Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */*Accept-Language: zh-cnAccept-Encoding: gzip, deflateUser-Agent:Mo
                                              • API String ID: 2532117645-2365876256
                                              • Opcode ID: c3d47d769dcbd41a8f4167cd28f1adef2b6d86539016551bb7ef57a848531342
                                              • Instruction ID: e6dcf0b5b1e536148edb8c7bcee7a6828d1d94e54290116fa950f8d1a6053691
                                              • Opcode Fuzzy Hash: c3d47d769dcbd41a8f4167cd28f1adef2b6d86539016551bb7ef57a848531342
                                              • Instruction Fuzzy Hash: 0E21A572144344AFD324DB24DD45FEB73A8EF85315F00493DF685A2281EF7565098BAB
                                              APIs
                                              • __common_dcos_data.LIBCMT ref: 0047DDB4
                                              • GetModuleHandleA.KERNEL32(0019FF10), ref: 0047DDF0
                                              • GetProcAddress.KERNEL32(00000000,0047DE89), ref: 0047DDFB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: AddressHandleModuleProc__common_dcos_data
                                              • String ID: .DLL
                                              • API String ID: 2806178913-899428287
                                              • Opcode ID: 0fa01848d210b57bb453f32dbcffa362a82695b600437f2d08515dbb2483781a
                                              • Instruction ID: c5ec6d486fce7f0b5af40ab92ba6bfa2d864c272dae36f1ef15e8a9f11e87408
                                              • Opcode Fuzzy Hash: 0fa01848d210b57bb453f32dbcffa362a82695b600437f2d08515dbb2483781a
                                              • Instruction Fuzzy Hash: 8301DF31920404ABCF75CE3CC549AEB3B79DF19341F108416F41D8E955C6B8CE41CBAA
                                              APIs
                                              • GetProcAddress.KERNEL32(?,ProcessTrans), ref: 0040182F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: AddressProc
                                              • String ID: %u.%u.%u.%u$<6@$ProcessTrans
                                              • API String ID: 190572456-2997530932
                                              • Opcode ID: 923ab22f828fa07c49138cca62a50a6aac9a6e92c9ae45124c644abfdc677477
                                              • Instruction ID: 3a4176f581b1380518edbe1a1b49e1bd09d6b00a217a4bcfab538be4d270b979
                                              • Opcode Fuzzy Hash: 923ab22f828fa07c49138cca62a50a6aac9a6e92c9ae45124c644abfdc677477
                                              • Instruction Fuzzy Hash: E901A172414302AFD314DB24CD85E7B77A8EFC4704F048A3CF895A62D0DB78D9088B9A
                                              APIs
                                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00403C20
                                              • lstrcatA.KERNEL32(?,\Program Files\Internet Explorer\iexplore.exe,?,00000104), ref: 00403C35
                                              • lstrcpyA.KERNEL32(?,?,?,\Program Files\Internet Explorer\iexplore.exe,?,00000104), ref: 00403C48
                                              Strings
                                              • \Program Files\Internet Explorer\iexplore.exe, xrefs: 00403C2A
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: DirectorySystemlstrcatlstrcpy
                                              • String ID: \Program Files\Internet Explorer\iexplore.exe
                                              • API String ID: 2630975639-1907246925
                                              • Opcode ID: 9d610355a3853537af27de88a3b84bfec3623b09a142c4852019a6b4888a0da7
                                              • Instruction ID: 58d9aff6231955fab03da148272387ac6a18f6e7ddf61f3ccb84cd9a8b5690bb
                                              • Opcode Fuzzy Hash: 9d610355a3853537af27de88a3b84bfec3623b09a142c4852019a6b4888a0da7
                                              • Instruction Fuzzy Hash: 4FE086F4548340ABD710D754D948FAA77A4BB94305F45882CB5CDD2190D6B8809CC71A
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32.dll,TerminateProcess), ref: 0040451A
                                              • GetProcAddress.KERNEL32(00000000), ref: 00404521
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: TerminateProcess$kernel32.dll
                                              • API String ID: 2574300362-189552057
                                              • Opcode ID: 6f636aeb74e389af04e2a293c086324e8f42b9283dc5f0b57c6f061e2f8a9beb
                                              • Instruction ID: 033c7f9598048c8c3c56f6b884b3fb58df83f6f11900fedc1394fc5852d01883
                                              • Opcode Fuzzy Hash: 6f636aeb74e389af04e2a293c086324e8f42b9283dc5f0b57c6f061e2f8a9beb
                                              • Instruction Fuzzy Hash: 78C012B2681300AAC2806BA0BE08A643710A285A2A320103BF602B00E0CA3A00208B2D
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32.dll,SizeofResource), ref: 004012EA
                                              • GetProcAddress.KERNEL32(00000000), ref: 004012F1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: SizeofResource$kernel32.dll
                                              • API String ID: 2574300362-1445693867
                                              • Opcode ID: 971289207801f0adfb33d8d7a52fdaf637566f62aa59e6dc078033588d0b97f7
                                              • Instruction ID: 1f67b7e38132fca7fb6d3c7304225dc3284bb93b5259144f6b05d2bd588ba888
                                              • Opcode Fuzzy Hash: 971289207801f0adfb33d8d7a52fdaf637566f62aa59e6dc078033588d0b97f7
                                              • Instruction Fuzzy Hash: B4C09B705C1300DBC7406BF07F0DA0537556645F41311007EB843F11F0CEB910115B1D
                                              APIs
                                              • Sleep.KERNEL32(00001388,00000000,00000000), ref: 004800FB
                                              • lstrlenA.KERNEL32(ilo.brenz.pl), ref: 00480125
                                              • GetVersionExA.KERNEL32(?,?,0047FBBE,00000010), ref: 004801BF
                                              • Sleep.KERNEL32(00000064,?,?,00482C2E,00482E2D,00000000,?,00482C2E,00000000,?,?,00000000), ref: 0048031A
                                              • GetTickCount.KERNEL32 ref: 00480323
                                              • Sleep.KERNEL32(00007530), ref: 0048035B
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: Sleep$CountTickVersionlstrlen
                                              • String ID:
                                              • API String ID: 1148849038-0
                                              • Opcode ID: d8d5e14ce8bde0a1c939d63ec7781a2c4ff1cbe07d4ef513ca2b050a836d98cc
                                              • Instruction ID: ec02e8e6a0bf6e865ccdbaf95346e43bc2ffc7c41b9a36e3163303f580a99d9a
                                              • Opcode Fuzzy Hash: d8d5e14ce8bde0a1c939d63ec7781a2c4ff1cbe07d4ef513ca2b050a836d98cc
                                              • Instruction Fuzzy Hash: D421D771610215AFDFA47F24881DBEF3A6D9F41341F140946EC0A9A081DBF89F09975D
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: #2379#470#755MessageSend
                                              • String ID:
                                              • API String ID: 516545250-0
                                              • Opcode ID: 19307cc0112b641f42c05127e240e9b621d2d73733c872dcc2d07d297b7f00d4
                                              • Instruction ID: ae483ed0e89d9e4723fdc79b7f6c9c7c3acea37d86427cf1e14bb756db3c141b
                                              • Opcode Fuzzy Hash: 19307cc0112b641f42c05127e240e9b621d2d73733c872dcc2d07d297b7f00d4
                                              • Instruction Fuzzy Hash: 3D117C712143029BC214DF39DE89D6BBBEAFFD8205F084A2DF58AD32D0DA34E9058B55
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: Sleep
                                              • String ID: X7@
                                              • API String ID: 3472027048-2067089342
                                              • Opcode ID: 92fada5cfdbc6a922edbaf3abd6bdbc867ed69b1f2908b021d67a98f8e651ac5
                                              • Instruction ID: 56058c761996469b055373d7f4e5675fd511cabc212af0c966289d5b43759b51
                                              • Opcode Fuzzy Hash: 92fada5cfdbc6a922edbaf3abd6bdbc867ed69b1f2908b021d67a98f8e651ac5
                                              • Instruction Fuzzy Hash: EE21F9B12982129BDB00DF71EF08B5A3B66A7D8745F10843EE184762E4CFB95445CFAC
                                              APIs
                                              • #324.MFC42(00000066,00000000,?,?,00000000,00405C38,000000FF,004010ED,00000000), ref: 00401214
                                              • #1168.MFC42(00000066,00000000,?,?,00000000), ref: 00401227
                                              • #1146.MFC42(00000080,0000000E,00000080,00000066,00000000,?,?,00000000), ref: 00401238
                                              • LoadIconA.USER32(00000000,00000080), ref: 0040123E
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: #1146#1168#324IconLoad
                                              • String ID:
                                              • API String ID: 193567849-0
                                              • Opcode ID: b0d8ebbce458bee7b7671c312a9a251e003c61d6e3bc7029ecfa220d6c6ff1fb
                                              • Instruction ID: 5f364d0ca6f0da87c9e4d08cbfa7f53ff09ba6a78162f9d23447e03a582c3780
                                              • Opcode Fuzzy Hash: b0d8ebbce458bee7b7671c312a9a251e003c61d6e3bc7029ecfa220d6c6ff1fb
                                              • Instruction Fuzzy Hash: 0CF082B1644B50ABE310DF59CD42B0ABAD8FB04B11F008A2EF591A77C0CBBD95008B59
                                              APIs
                                              • GetModuleHandleA.KERNEL32(0380FF20), ref: 7FE310E8
                                              • GetProcAddress.KERNEL32(00000000,7FE31181), ref: 7FE310F3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043960210.000000007FE30000.00000040.10000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_7fe30000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: AddressHandleModuleProc
                                              • String ID: .DLL
                                              • API String ID: 1646373207-899428287
                                              • Opcode ID: 5fdbe1fdb9a291c56d0de1b0085fc354e7c21eb32f0bc32c042edfe8f07510ff
                                              • Instruction ID: 5900f217701f080c4111b40af2f692126b674fcdb3668acd741284d8170f4144
                                              • Opcode Fuzzy Hash: 5fdbe1fdb9a291c56d0de1b0085fc354e7c21eb32f0bc32c042edfe8f07510ff
                                              • Instruction Fuzzy Hash: B301C835D00584EBC7659F38C54DADF3B7BEF08266F800118E5268A455C6F8DA90CFA1
                                              APIs
                                              • GetModuleHandleA.KERNEL32(0380FF20), ref: 009B10E8
                                              • GetProcAddress.KERNEL32(00000000,009B1181), ref: 009B10F3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2043369977.00000000009B0000.00000040.10000000.00040000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_9b0000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: AddressHandleModuleProc
                                              • String ID: .DLL
                                              • API String ID: 1646373207-899428287
                                              • Opcode ID: 5fdbe1fdb9a291c56d0de1b0085fc354e7c21eb32f0bc32c042edfe8f07510ff
                                              • Instruction ID: 1c6890d85a86abcbc6d9420bd22c12546a7e0fbf6ad479b2fc1eb5b9443cc219
                                              • Opcode Fuzzy Hash: 5fdbe1fdb9a291c56d0de1b0085fc354e7c21eb32f0bc32c042edfe8f07510ff
                                              • Instruction Fuzzy Hash: 77019631104445EBDB78AF3CC75AEEB3B6DEF18362F900414E9258A556C6F48EC08BA5
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.2041574826.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000007.00000002.2041535304.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041611547.0000000000406000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041707592.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041744590.000000000040A000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041780728.0000000000411000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041817144.0000000000414000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041856155.000000000041A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041889922.000000000041B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041925085.0000000000420000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041960628.0000000000422000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2041998511.0000000000428000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042034583.0000000000429000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042070942.000000000042E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042109164.0000000000430000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042142445.0000000000436000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042178619.0000000000437000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042214148.000000000043C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042250391.000000000043E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042287121.000000000043F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042322483.0000000000444000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042357404.0000000000445000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042391202.000000000044A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042425715.000000000044C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042459631.0000000000452000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042494427.0000000000453000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042529261.0000000000458000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042564892.000000000045A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042599424.000000000045B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042632509.0000000000460000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042665134.0000000000461000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042698465.0000000000466000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042729811.0000000000468000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042768818.0000000000469000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042801538.000000000046E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042833900.000000000046F000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042866159.0000000000474000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042900352.0000000000476000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042933732.0000000000477000.00000080.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000007.00000002.2042970923.000000000047C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_400000_hrl97AF.jbxd
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID: <6@$hra%u.dll
                                              • API String ID: 1029625771-964591844
                                              • Opcode ID: 2390837fc517bc62a5bb002552fb09d752def2f0a1c79550ccc7e106046599eb
                                              • Instruction ID: e7fbf41a89d2fe79915ad9526865f0c88ed692e155a9173a154c572c31764057
                                              • Opcode Fuzzy Hash: 2390837fc517bc62a5bb002552fb09d752def2f0a1c79550ccc7e106046599eb
                                              • Instruction Fuzzy Hash: C1D0A77059030167D710A770ED4AAA633646B54700F444A3D7686D11D0EABD815CC689

                                              Execution Graph

                                              Execution Coverage:3.4%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:0%
                                              Total number of Nodes:1497
                                              Total number of Limit Nodes:5
                                              execution_graph 11857 401040 11858 401048 11857->11858 11859 401058 11858->11859 11860 40104f #825 11858->11860 11860->11859 12741 622665 12743 62266b CreateThread CloseHandle 12741->12743 12744 623c38 12743->12744 12746 623c3d 12744->12746 12747 623ca9 12746->12747 12750 623c5b GetWindowsDirectoryA 12746->12750 12801 62252f NtOpenSection 12747->12801 12749 623cae 12752 623cfb GetSystemDirectoryA 12749->12752 12802 623cc2 GetModuleHandleA 12749->12802 12755 623d11 12750->12755 12851 623d1f lstrcat 12752->12851 12893 623d36 LoadLibraryA 12755->12893 12801->12749 12803 623cde 12802->12803 12804 623ccc 12802->12804 12934 623cf0 GetModuleHandleA 12803->12934 12806 623cd4 GetProcAddress 12804->12806 12806->12803 12852 623d26 12851->12852 12853 623d36 151 API calls 12852->12853 12854 623d2a GetProcAddress LoadLibraryA 12853->12854 12856 6210ce 2 API calls 12854->12856 12857 623d7d 12856->12857 12858 623d92 GetTickCount 12857->12858 12859 623daa 12858->12859 12860 623e47 GetVolumeInformationA 12859->12860 12861 623e7a 12860->12861 12862 623f25 12861->12862 12863 623eb5 96 API calls 12861->12863 12864 623f31 CreateThread CloseHandle 12862->12864 12865 623f4f 12862->12865 12866 623ea9 12863->12866 12864->12865 12867 623f60 43 API calls 12865->12867 12866->12862 12868 623eca GetModuleFileNameA wsprintfA 12866->12868 12869 623f54 12867->12869 12872 623f14 12868->12872 12870 6210ce 2 API calls 12869->12870 12871 623f7e 12870->12871 12873 623f8f 23 API calls 12871->12873 12872->12862 12874 623405 5 API calls 12872->12874 12875 623f83 12873->12875 12874->12862 12876 623fd3 CreateThread CloseHandle 12875->12876 12877 623ffa CreateEventA 12875->12877 12876->12877 12890 624012 12877->12890 12878 624056 lstrlen 12878->12878 12879 624065 gethostbyname 12878->12879 12879->12890 12880 624081 socket 12882 6240a6 connect 12880->12882 12880->12890 12881 624320 RtlExitUserThread 12885 6242b7 closesocket 12882->12885 12882->12890 12883 6242d0 SetEvent 12883->12890 12884 6242f2 Sleep ResetEvent 12884->12890 12885->12890 12886 6240ef GetVersionExA 12886->12890 12887 624172 wsprintfA 12887->12890 12888 6241a7 CreateThread CloseHandle 12888->12890 12889 6241f6 GetTickCount 12889->12890 12890->12878 12890->12879 12890->12880 12890->12881 12890->12883 12890->12884 12890->12885 12890->12886 12890->12887 12890->12888 12890->12889 12891 624288 Sleep 12890->12891 12891->12890 12892 624294 GetTickCount 12891->12892 12892->12890 13097 623d4b GetProcAddress LoadLibraryA 12893->13097 12935 623cfb GetSystemDirectoryA 12934->12935 12979 6226d4 12934->12979 12937 623d1f 179 API calls 12935->12937 12938 623d11 12937->12938 12939 623d36 151 API calls 12938->12939 12940 623d2a GetProcAddress LoadLibraryA 12939->12940 12981 6210ce 12940->12981 12943 623d7d 12944 623d92 GetTickCount 12943->12944 12945 623daa 12944->12945 12946 623e47 GetVolumeInformationA 12945->12946 12947 623e7a 12946->12947 12948 623f25 12947->12948 12985 623eb5 LoadLibraryA 12947->12985 12950 623f31 CreateThread CloseHandle 12948->12950 12951 623f4f 12948->12951 12950->12951 13017 623f60 LoadLibraryA 12951->13017 12980 6226c8 12979->12980 12980->12935 12984 6210db 12981->12984 12982 62115c 12982->12943 12983 621133 GetModuleHandleA GetProcAddress 12983->12984 12984->12981 12984->12982 12984->12983 13039 623ecc GetProcAddress GetModuleFileNameA wsprintfA 12985->13039 13018 623f7e 13017->13018 13019 6210ce 2 API calls 13017->13019 13020 623f8f 23 API calls 13018->13020 13019->13018 13021 623f83 13020->13021 13022 623fd3 CreateThread CloseHandle 13021->13022 13023 623ffa CreateEventA 13021->13023 13022->13023 13026 624012 13023->13026 13024 624056 lstrlen 13024->13024 13025 624065 gethostbyname 13024->13025 13025->13026 13026->13024 13026->13025 13027 624081 socket 13026->13027 13028 624320 RtlExitUserThread 13026->13028 13030 6242d0 SetEvent 13026->13030 13031 6242f2 Sleep ResetEvent 13026->13031 13032 6242b7 closesocket 13026->13032 13033 6240ef GetVersionExA 13026->13033 13034 624172 wsprintfA 13026->13034 13035 6241a7 CreateThread CloseHandle 13026->13035 13036 6241f6 GetTickCount 13026->13036 13037 624288 Sleep 13026->13037 13027->13026 13029 6240a6 connect 13027->13029 13029->13026 13029->13032 13030->13026 13031->13026 13032->13026 13033->13026 13034->13026 13035->13026 13036->13026 13037->13026 13038 624294 GetTickCount 13037->13038 13038->13026 13040 623f14 13039->13040 13041 623f25 13040->13041 13068 623405 13040->13068 13043 623f31 CreateThread CloseHandle 13041->13043 13044 623f4f 13041->13044 13043->13044 13045 623f60 43 API calls 13044->13045 13046 623f54 13045->13046 13047 6210ce 2 API calls 13046->13047 13048 623f7e 13047->13048 13076 623f8f LoadLibraryA 13048->13076 13069 62343b 13068->13069 13069->13069 13070 623440 NtOpenSection 13069->13070 13071 62345f NtQuerySystemInformation 13070->13071 13075 6235f3 13070->13075 13072 62346f MapViewOfFile CloseHandle 13071->13072 13074 6234b0 13072->13074 13072->13075 13073 6234b7 UnmapViewOfFile 13073->13075 13074->13073 13074->13075 13075->13041 13077 624320 RtlExitUserThread 13076->13077 13078 623f9d 13076->13078 13079 6210ce 2 API calls 13078->13079 13080 623fb5 13079->13080 13080->13077 13081 623fc2 WSAStartup CreateThread CloseHandle 13080->13081 13082 623ffa CreateEventA 13081->13082 13094 624012 13082->13094 13083 624056 lstrlen 13083->13083 13084 624065 gethostbyname 13083->13084 13084->13094 13085 624081 socket 13086 6240a6 connect 13085->13086 13085->13094 13089 6242b7 closesocket 13086->13089 13086->13094 13087 6242d0 SetEvent 13087->13094 13088 6242f2 Sleep ResetEvent 13088->13094 13089->13094 13090 6240ef GetVersionExA 13090->13094 13091 624172 wsprintfA 13091->13094 13092 6241a7 CreateThread CloseHandle 13092->13094 13093 6241f6 GetTickCount 13093->13094 13094->13077 13094->13083 13094->13084 13094->13085 13094->13087 13094->13088 13094->13089 13094->13090 13094->13091 13094->13092 13094->13093 13095 624288 Sleep 13094->13095 13095->13094 13096 624294 GetTickCount 13095->13096 13096->13094 13098 623d7d 13097->13098 13099 6210ce 2 API calls 13097->13099 13100 623d92 GetTickCount 13098->13100 13099->13098 13101 623daa 13100->13101 13102 623e47 GetVolumeInformationA 13101->13102 13103 623e7a 13102->13103 13104 623f25 13103->13104 13105 623eb5 96 API calls 13103->13105 13106 623f31 CreateThread CloseHandle 13104->13106 13107 623f4f 13104->13107 13108 623ea9 13105->13108 13106->13107 13109 623f60 43 API calls 13107->13109 13108->13104 13110 623eca GetModuleFileNameA wsprintfA 13108->13110 13111 623f54 13109->13111 13113 623f14 13110->13113 13112 6210ce 2 API calls 13111->13112 13114 623f7e 13112->13114 13113->13104 13116 623405 5 API calls 13113->13116 13115 623f8f 23 API calls 13114->13115 13117 623f83 13115->13117 13116->13104 13118 623fd3 CreateThread CloseHandle 13117->13118 13119 623ffa CreateEventA 13117->13119 13118->13119 13132 624012 13119->13132 13120 624056 lstrlen 13120->13120 13121 624065 gethostbyname 13120->13121 13121->13132 13122 624081 socket 13124 6240a6 connect 13122->13124 13122->13132 13123 624320 RtlExitUserThread 13127 6242b7 closesocket 13124->13127 13124->13132 13125 6242d0 SetEvent 13125->13132 13126 6242f2 Sleep ResetEvent 13126->13132 13127->13132 13128 6240ef GetVersionExA 13128->13132 13129 624172 wsprintfA 13129->13132 13130 6241a7 CreateThread CloseHandle 13130->13132 13131 6241f6 GetTickCount 13131->13132 13132->13120 13132->13121 13132->13122 13132->13123 13132->13125 13132->13126 13132->13127 13132->13128 13132->13129 13132->13130 13132->13131 13133 624288 Sleep 13132->13133 13133->13132 13134 624294 GetTickCount 13133->13134 13134->13132 11837 62116f LoadLibraryA 11842 621196 GetProcAddress 11837->11842 11839 621277 11840 62142f LookupPrivilegeValueA NtAdjustPrivilegesToken 11841 621180 11841->11839 11841->11840 11842->11841 11861 40384d 11863 403814 11861->11863 11863->11861 11864 403920 11863->11864 11865 40397e 11864->11865 11866 4039c3 LoadLibraryA 11865->11866 11868 403a13 InterlockedExchange 11865->11868 11871 403a35 11865->11871 11879 403a91 11865->11879 11867 4039d2 GetLastError 11866->11867 11866->11868 11873 4039f2 RaiseException 11867->11873 11874 4039e4 11867->11874 11869 403a21 11868->11869 11870 403a47 FreeLibrary 11868->11870 11869->11871 11875 403a27 LocalAlloc 11869->11875 11870->11871 11872 403aa5 GetProcAddress 11871->11872 11871->11879 11876 403ab5 GetLastError 11872->11876 11872->11879 11873->11879 11874->11868 11874->11873 11875->11871 11877 403ac7 11876->11877 11878 403ad5 RaiseException 11877->11878 11877->11879 11878->11879 11879->11863 13135 40364f 13136 403628 13135->13136 13136->13135 13137 403920 9 API calls 13136->13137 13137->13136 13416 405b51 13417 405b56 13416->13417 13420 405b28 #1168 13417->13420 13421 405b42 _setmbcp 13420->13421 13422 405b4b 13420->13422 13421->13422 11883 424462 11885 424468 11883->11885 11886 424480 GetTempPathA 11885->11886 11887 424529 11885->11887 11893 4244a7 GetTempFileNameA CreateFileA 11886->11893 11890 4244ce 11891 4244fe CloseHandle CreateProcessA 11890->11891 11892 4244ea WriteFile 11890->11892 11891->11887 11892->11890 11892->11891 11894 4244a3 CreateFileA 11893->11894 11895 4244ce 11893->11895 11894->11887 11894->11890 11896 4244fe CloseHandle CreateProcessA 11895->11896 11897 4244ea WriteFile 11895->11897 11896->11894 11897->11895 11897->11896 11898 403c60 11906 403b40 GetTickCount rand 11898->11906 11900 403c85 11907 403b40 GetTickCount rand 11900->11907 11902 403d63 ExitThread 11903 403c94 11903->11902 11904 403d51 Sleep 11903->11904 11904->11903 11905 403d62 11904->11905 11905->11902 11906->11900 11907->11903 11790 7fe35ac1 11793 7fe35ace 11790->11793 11794 7fe35acb 11793->11794 11795 7fe35ad9 11793->11795 11797 7fe35adf 11795->11797 11800 7fe324eb 11797->11800 11819 7fe324a6 NtOpenSection 11800->11819 11802 7fe324f3 11803 7fe324f9 NtMapViewOfSection CloseHandle 11802->11803 11804 7fe325d8 11802->11804 11803->11804 11806 7fe32531 11803->11806 11804->11794 11805 7fe32566 11821 7fe323ee NtProtectVirtualMemory NtWriteVirtualMemory 11805->11821 11806->11805 11820 7fe323ee NtProtectVirtualMemory NtWriteVirtualMemory 11806->11820 11809 7fe32577 11822 7fe323ee NtProtectVirtualMemory NtWriteVirtualMemory 11809->11822 11811 7fe32588 11823 7fe323ee NtProtectVirtualMemory NtWriteVirtualMemory 11811->11823 11813 7fe32599 11814 7fe325ae 11813->11814 11824 7fe323ee NtProtectVirtualMemory NtWriteVirtualMemory 11813->11824 11815 7fe325c3 11814->11815 11825 7fe323ee NtProtectVirtualMemory NtWriteVirtualMemory 11814->11825 11815->11804 11826 7fe323ee NtProtectVirtualMemory NtWriteVirtualMemory 11815->11826 11819->11802 11820->11805 11821->11809 11822->11811 11823->11813 11824->11814 11825->11815 11826->11804 13426 424365 13428 42436b CreateThread CloseHandle 13426->13428 13429 425938 13428->13429 13431 42593d 13429->13431 13432 4259a9 13431->13432 13435 42595b GetWindowsDirectoryA 13431->13435 13465 42422f NtOpenSection 13432->13465 13434 4259ae 13437 4259fb GetSystemDirectoryA 13434->13437 13466 4259c2 GetModuleHandleA 13434->13466 13439 425a11 13435->13439 13494 425a1f lstrcatA 13437->13494 13515 425a36 LoadLibraryA 13439->13515 13465->13434 13467 4259de 13466->13467 13468 4259cc 13466->13468 13535 4259f0 GetModuleHandleA 13467->13535 13470 4259d4 GetProcAddress 13468->13470 13470->13467 13495 425a26 13494->13495 13496 425a36 21 API calls 13495->13496 13497 425a2a GetProcAddress LoadLibraryA 13496->13497 13499 422dce 2 API calls 13497->13499 13500 425a7d 13499->13500 13501 425b47 GetVolumeInformationA 13500->13501 13502 425b7a 13501->13502 13503 425bfd 13502->13503 13504 425bb5 8 API calls 13502->13504 13505 425c31 CreateThread CloseHandle 13503->13505 13506 425c4f 13503->13506 13507 425ba9 13504->13507 13505->13506 13508 425c60 2 API calls 13506->13508 13507->13503 13510 425bca GetModuleFileNameA 13507->13510 13509 425c54 13508->13509 13511 425c7e 13509->13511 13512 422dce 2 API calls 13509->13512 13510->13503 13513 425c8f 2 API calls 13511->13513 13512->13511 13514 425c83 13513->13514 13596 425a4b GetProcAddress LoadLibraryA 13515->13596 13536 4259fb GetSystemDirectoryA 13535->13536 13559 4243d4 13535->13559 13538 425a1f 28 API calls 13536->13538 13539 425a11 13538->13539 13540 425a36 21 API calls 13539->13540 13541 425a2a GetProcAddress LoadLibraryA 13540->13541 13543 422dce 2 API calls 13541->13543 13544 425a7d 13543->13544 13545 425b47 GetVolumeInformationA 13544->13545 13546 425b7a 13545->13546 13547 425bfd 13546->13547 13561 425bb5 13546->13561 13549 425c31 CreateThread CloseHandle 13547->13549 13550 425c4f 13547->13550 13549->13550 13575 425c60 13550->13575 13560 4243c8 13559->13560 13560->13536 13562 425bbb 13561->13562 13581 425bcc 13562->13581 13576 425c66 13575->13576 13577 422dce 2 API calls 13576->13577 13578 425c7e 13577->13578 13579 425c8f 2 API calls 13578->13579 13580 425c83 13579->13580 13582 425bd3 GetModuleFileNameA 13581->13582 13583 425bfd 13582->13583 13584 425c31 CreateThread CloseHandle 13583->13584 13585 425c4f 13583->13585 13584->13585 13586 425c60 2 API calls 13585->13586 13587 425c54 13586->13587 13588 425c7e 13587->13588 13589 422dce 2 API calls 13587->13589 13592 425c8f 13588->13592 13589->13588 13593 425c95 13592->13593 13594 422dce 2 API calls 13593->13594 13595 425cb5 13593->13595 13594->13595 13597 422dce 2 API calls 13596->13597 13598 425a7d 13596->13598 13597->13598 13599 425b47 GetVolumeInformationA 13598->13599 13600 425b7a 13599->13600 13601 425bfd 13600->13601 13602 425bb5 8 API calls 13600->13602 13603 425c31 CreateThread CloseHandle 13601->13603 13604 425c4f 13601->13604 13605 425ba9 13602->13605 13603->13604 13606 425c60 2 API calls 13604->13606 13605->13601 13608 425bca GetModuleFileNameA 13605->13608 13607 425c54 13606->13607 13609 425c7e 13607->13609 13610 422dce 2 API calls 13607->13610 13608->13601 13611 425c8f 2 API calls 13609->13611 13610->13609 13612 425c83 13611->13612 11908 7fe32fcb 11909 7fe32ff0 11908->11909 11956 7fe330be lstrcat CreateFileA 11909->11956 11912 7fe33102 12001 7fe33112 LoadLibraryA 11912->12001 11913 7fe330df WriteFile CloseHandle 11913->11912 11918 7fe33159 11919 7fe3316e GetTickCount 11918->11919 11920 7fe33186 11919->11920 11921 7fe33223 GetVolumeInformationA 11920->11921 11922 7fe33256 11921->11922 11923 7fe3329a 11922->11923 11924 7fe33285 Sleep DeleteFileA 11922->11924 11925 7fe33328 11923->11925 12048 7fe332b8 LoadLibraryA 11923->12048 11924->11923 11924->11924 11927 7fe33352 11925->11927 11928 7fe33334 CreateThread CloseHandle 11925->11928 12088 7fe33363 LoadLibraryA 11927->12088 11928->11927 11931 7fe31079 2 API calls 11932 7fe33381 11931->11932 12112 7fe33392 LoadLibraryA 11932->12112 11937 7fe31079 2 API calls 11938 7fe333b8 11937->11938 11939 7fe333c5 WSAStartup 11938->11939 11940 7fe3365e 11938->11940 11953 7fe333dd 11939->11953 11941 7fe333ee Sleep 11941->11953 11942 7fe33411 gethostbyname 11943 7fe3341c lstrlen 11942->11943 11942->11953 11943->11942 11943->11953 11944 7fe3344d socket 11945 7fe33462 connect 11944->11945 11944->11953 11946 7fe3363e closesocket 11945->11946 11950 7fe3347b 11945->11950 11946->11953 11947 7fe3364e Sleep 11947->11953 11948 7fe334ab GetVersionExA 11948->11950 11950->11948 12133 7fe33537 wsprintfA 11950->12133 12150 7fe33565 wsprintfA 11950->12150 11953->11940 11953->11941 11953->11942 11953->11944 11953->11946 11953->11947 11954 7fe3360f Sleep 11953->11954 11954->11953 11955 7fe3361b GetTickCount 11954->11955 11955->11953 11957 7fe33102 11956->11957 11958 7fe330df WriteFile CloseHandle 11956->11958 11959 7fe33112 129 API calls 11957->11959 11958->11957 11960 7fe33107 GetProcAddress LoadLibraryA 11959->11960 11962 7fe31079 2 API calls 11960->11962 11963 7fe33159 11962->11963 11964 7fe3316e GetTickCount 11963->11964 11965 7fe33186 11964->11965 11966 7fe33223 GetVolumeInformationA 11965->11966 11967 7fe33256 11966->11967 11968 7fe3329a 11967->11968 11969 7fe33285 Sleep DeleteFileA 11967->11969 11970 7fe33328 11968->11970 11971 7fe332b8 88 API calls 11968->11971 11969->11968 11969->11969 11972 7fe33352 11970->11972 11973 7fe33334 CreateThread CloseHandle 11970->11973 11978 7fe332ac 11971->11978 11974 7fe33363 51 API calls 11972->11974 11973->11972 11975 7fe33357 11974->11975 11976 7fe31079 2 API calls 11975->11976 11977 7fe33381 11976->11977 11979 7fe33392 38 API calls 11977->11979 11978->11970 11980 7fe329f1 5 API calls 11978->11980 11981 7fe33386 11979->11981 11980->11970 11982 7fe31079 2 API calls 11981->11982 11983 7fe333b8 11982->11983 11984 7fe333c5 WSAStartup 11983->11984 11985 7fe330b7 CreateFileA 11983->11985 11988 7fe333dd 11984->11988 11985->11912 11985->11913 11986 7fe333ee Sleep 11986->11988 11987 7fe33411 gethostbyname 11987->11988 11989 7fe3341c lstrlen 11987->11989 11988->11985 11988->11986 11988->11987 11990 7fe3344d socket 11988->11990 11992 7fe3363e closesocket 11988->11992 11993 7fe3364e Sleep 11988->11993 11999 7fe3360f Sleep 11988->11999 11989->11987 11989->11988 11990->11988 11991 7fe33462 connect 11990->11991 11991->11992 11996 7fe3347b 11991->11996 11992->11988 11993->11988 11994 7fe334ab GetVersionExA 11994->11996 11995 7fe33537 23 API calls 11995->11996 11996->11994 11996->11995 11997 7fe33565 23 API calls 11996->11997 11998 7fe3355d wsprintfA 11997->11998 11998->11988 11999->11988 12000 7fe3361b GetTickCount 11999->12000 12000->11988 12167 7fe33127 GetProcAddress LoadLibraryA 12001->12167 12005 7fe31079 2 API calls 12006 7fe33159 12005->12006 12007 7fe3316e GetTickCount 12006->12007 12008 7fe33186 12007->12008 12009 7fe33223 GetVolumeInformationA 12008->12009 12010 7fe33256 12009->12010 12011 7fe3329a 12010->12011 12012 7fe33285 Sleep DeleteFileA 12010->12012 12013 7fe33328 12011->12013 12014 7fe332b8 88 API calls 12011->12014 12012->12011 12012->12012 12015 7fe33352 12013->12015 12016 7fe33334 CreateThread CloseHandle 12013->12016 12021 7fe332ac 12014->12021 12017 7fe33363 51 API calls 12015->12017 12016->12015 12018 7fe33357 12017->12018 12019 7fe31079 2 API calls 12018->12019 12020 7fe33381 12019->12020 12022 7fe33392 38 API calls 12020->12022 12021->12013 12023 7fe329f1 5 API calls 12021->12023 12024 7fe33386 12022->12024 12023->12013 12025 7fe31079 2 API calls 12024->12025 12026 7fe333b8 12025->12026 12027 7fe333c5 WSAStartup 12026->12027 12028 7fe33107 GetProcAddress LoadLibraryA 12026->12028 12033 7fe333dd 12027->12033 12044 7fe31079 12028->12044 12029 7fe333ee Sleep 12029->12033 12030 7fe33411 gethostbyname 12031 7fe3341c lstrlen 12030->12031 12030->12033 12031->12030 12031->12033 12032 7fe3344d socket 12032->12033 12034 7fe33462 connect 12032->12034 12033->12028 12033->12029 12033->12030 12033->12032 12035 7fe3363e closesocket 12033->12035 12036 7fe3364e Sleep 12033->12036 12042 7fe3360f Sleep 12033->12042 12034->12035 12039 7fe3347b 12034->12039 12035->12033 12036->12033 12037 7fe334ab GetVersionExA 12037->12039 12038 7fe33537 23 API calls 12038->12039 12039->12037 12039->12038 12040 7fe33565 23 API calls 12039->12040 12041 7fe3355d wsprintfA 12040->12041 12041->12033 12042->12033 12043 7fe3361b GetTickCount 12042->12043 12043->12033 12046 7fe31086 12044->12046 12045 7fe31107 12045->11918 12046->12044 12046->12045 12047 7fe310de GetModuleHandleA GetProcAddress 12046->12047 12047->12046 12207 7fe332cf GetProcAddress GetModuleFileNameA wsprintfA 12048->12207 12051 7fe33352 12053 7fe33363 51 API calls 12051->12053 12052 7fe33334 CreateThread CloseHandle 12052->12051 12054 7fe33357 12053->12054 12057 7fe31079 2 API calls 12054->12057 12055 7fe33328 12055->12051 12055->12052 12056 7fe329f1 5 API calls 12056->12055 12058 7fe33381 12057->12058 12059 7fe33392 38 API calls 12058->12059 12060 7fe33386 12059->12060 12061 7fe31079 2 API calls 12060->12061 12062 7fe333b8 12061->12062 12063 7fe333c5 WSAStartup 12062->12063 12064 7fe332ac 12062->12064 12077 7fe333dd 12063->12077 12064->11925 12080 7fe329f1 12064->12080 12065 7fe333ee Sleep 12065->12077 12066 7fe33411 gethostbyname 12067 7fe3341c lstrlen 12066->12067 12066->12077 12067->12066 12067->12077 12068 7fe3344d socket 12069 7fe33462 connect 12068->12069 12068->12077 12070 7fe3363e closesocket 12069->12070 12074 7fe3347b 12069->12074 12070->12077 12071 7fe3364e Sleep 12071->12077 12072 7fe334ab GetVersionExA 12072->12074 12073 7fe33537 23 API calls 12073->12074 12074->12072 12074->12073 12075 7fe33565 23 API calls 12074->12075 12076 7fe3355d wsprintfA 12075->12076 12076->12077 12077->12064 12077->12065 12077->12066 12077->12068 12077->12070 12077->12071 12078 7fe3360f Sleep 12077->12078 12078->12077 12079 7fe3361b GetTickCount 12078->12079 12079->12077 12081 7fe32a27 12080->12081 12081->12081 12082 7fe32a2c NtOpenSection 12081->12082 12083 7fe32a4b NtQuerySystemInformation 12082->12083 12087 7fe32bdf 12082->12087 12084 7fe32a5b MapViewOfFile CloseHandle 12083->12084 12086 7fe32a9c 12084->12086 12084->12087 12085 7fe32aa3 UnmapViewOfFile 12085->12087 12086->12085 12086->12087 12087->11925 12089 7fe33381 12088->12089 12090 7fe31079 2 API calls 12088->12090 12091 7fe33392 38 API calls 12089->12091 12090->12089 12092 7fe33386 12091->12092 12093 7fe31079 2 API calls 12092->12093 12094 7fe333b8 12093->12094 12095 7fe333c5 WSAStartup 12094->12095 12096 7fe33357 12094->12096 12101 7fe333dd 12095->12101 12096->11931 12097 7fe333ee Sleep 12097->12101 12098 7fe33411 gethostbyname 12099 7fe3341c lstrlen 12098->12099 12098->12101 12099->12098 12099->12101 12100 7fe3344d socket 12100->12101 12102 7fe33462 connect 12100->12102 12101->12096 12101->12097 12101->12098 12101->12100 12103 7fe3363e closesocket 12101->12103 12104 7fe3364e Sleep 12101->12104 12110 7fe3360f Sleep 12101->12110 12102->12103 12107 7fe3347b 12102->12107 12103->12101 12104->12101 12105 7fe334ab GetVersionExA 12105->12107 12106 7fe33537 23 API calls 12106->12107 12107->12105 12107->12106 12108 7fe33565 23 API calls 12107->12108 12109 7fe3355d wsprintfA 12108->12109 12109->12101 12110->12101 12111 7fe3361b GetTickCount 12110->12111 12111->12101 12113 7fe333a0 12112->12113 12114 7fe33386 12112->12114 12115 7fe333b8 12113->12115 12116 7fe31079 2 API calls 12113->12116 12114->11937 12115->12114 12117 7fe333c5 WSAStartup 12115->12117 12116->12115 12122 7fe333dd 12117->12122 12118 7fe333ee Sleep 12118->12122 12119 7fe33411 gethostbyname 12120 7fe3341c lstrlen 12119->12120 12119->12122 12120->12119 12120->12122 12121 7fe3344d socket 12121->12122 12123 7fe33462 connect 12121->12123 12122->12114 12122->12118 12122->12119 12122->12121 12124 7fe3363e closesocket 12122->12124 12125 7fe3364e Sleep 12122->12125 12131 7fe3360f Sleep 12122->12131 12123->12124 12128 7fe3347b 12123->12128 12124->12122 12125->12122 12126 7fe334ab GetVersionExA 12126->12128 12127 7fe33537 23 API calls 12127->12128 12128->12126 12128->12127 12129 7fe33565 23 API calls 12128->12129 12130 7fe3355d wsprintfA 12129->12130 12130->12122 12131->12122 12132 7fe3361b GetTickCount 12131->12132 12132->12122 12134 7fe3347b 12133->12134 12135 7fe33565 11 API calls 12134->12135 12146 7fe334ab GetVersionExA 12134->12146 12149 7fe33537 11 API calls 12134->12149 12136 7fe3355d wsprintfA 12135->12136 12142 7fe333dd 12136->12142 12137 7fe3363e closesocket 12137->12142 12138 7fe3365e 12138->11950 12139 7fe3364e Sleep 12139->12142 12140 7fe333ee Sleep 12140->12142 12141 7fe33411 gethostbyname 12141->12142 12143 7fe3341c lstrlen 12141->12143 12142->12137 12142->12138 12142->12139 12142->12140 12142->12141 12144 7fe3344d socket 12142->12144 12147 7fe3360f Sleep 12142->12147 12143->12141 12143->12142 12144->12142 12145 7fe33462 connect 12144->12145 12145->12134 12145->12137 12146->12134 12147->12142 12148 7fe3361b GetTickCount 12147->12148 12148->12142 12149->12134 12156 7fe333dd 12150->12156 12151 7fe3363e closesocket 12151->12156 12152 7fe3355d wsprintfA 12152->11953 12153 7fe3364e Sleep 12153->12156 12154 7fe333ee Sleep 12154->12156 12155 7fe33411 gethostbyname 12155->12156 12157 7fe3341c lstrlen 12155->12157 12156->12151 12156->12152 12156->12153 12156->12154 12156->12155 12158 7fe3344d socket 12156->12158 12162 7fe3360f Sleep 12156->12162 12157->12155 12157->12156 12158->12156 12159 7fe33462 connect 12158->12159 12159->12151 12160 7fe3347b 12159->12160 12161 7fe334ab GetVersionExA 12160->12161 12164 7fe33537 12 API calls 12160->12164 12165 7fe33565 12 API calls 12160->12165 12161->12160 12162->12156 12163 7fe3361b GetTickCount 12162->12163 12163->12156 12164->12160 12166 7fe3355d wsprintfA 12165->12166 12166->12156 12168 7fe33159 12167->12168 12169 7fe31079 2 API calls 12167->12169 12170 7fe3316e GetTickCount 12168->12170 12169->12168 12171 7fe33186 12170->12171 12172 7fe33223 GetVolumeInformationA 12171->12172 12173 7fe33256 12172->12173 12174 7fe3329a 12173->12174 12175 7fe33285 Sleep DeleteFileA 12173->12175 12176 7fe33328 12174->12176 12177 7fe332b8 88 API calls 12174->12177 12175->12174 12175->12175 12178 7fe33352 12176->12178 12179 7fe33334 CreateThread CloseHandle 12176->12179 12184 7fe332ac 12177->12184 12180 7fe33363 51 API calls 12178->12180 12179->12178 12181 7fe33357 12180->12181 12182 7fe31079 2 API calls 12181->12182 12183 7fe33381 12182->12183 12185 7fe33392 38 API calls 12183->12185 12184->12176 12186 7fe329f1 5 API calls 12184->12186 12187 7fe33386 12185->12187 12186->12176 12188 7fe31079 2 API calls 12187->12188 12189 7fe333b8 12188->12189 12190 7fe333c5 WSAStartup 12189->12190 12191 7fe3311d GetProcAddress LoadLibraryA 12189->12191 12194 7fe333dd 12190->12194 12191->12005 12192 7fe333ee Sleep 12192->12194 12193 7fe33411 gethostbyname 12193->12194 12195 7fe3341c lstrlen 12193->12195 12194->12191 12194->12192 12194->12193 12196 7fe3344d socket 12194->12196 12198 7fe3363e closesocket 12194->12198 12199 7fe3364e Sleep 12194->12199 12205 7fe3360f Sleep 12194->12205 12195->12193 12195->12194 12196->12194 12197 7fe33462 connect 12196->12197 12197->12198 12200 7fe3347b 12197->12200 12198->12194 12199->12194 12201 7fe334ab GetVersionExA 12200->12201 12202 7fe33537 23 API calls 12200->12202 12203 7fe33565 23 API calls 12200->12203 12201->12200 12202->12200 12204 7fe3355d wsprintfA 12203->12204 12204->12194 12205->12194 12206 7fe3361b GetTickCount 12205->12206 12206->12194 12208 7fe33317 12207->12208 12209 7fe33328 12208->12209 12210 7fe329f1 5 API calls 12208->12210 12211 7fe33352 12209->12211 12212 7fe33334 CreateThread CloseHandle 12209->12212 12210->12209 12213 7fe33363 51 API calls 12211->12213 12212->12211 12214 7fe33357 12213->12214 12215 7fe31079 2 API calls 12214->12215 12216 7fe33381 12215->12216 12217 7fe33392 38 API calls 12216->12217 12218 7fe33386 12217->12218 12219 7fe31079 2 API calls 12218->12219 12220 7fe333b8 12219->12220 12221 7fe333c5 WSAStartup 12220->12221 12222 7fe332c3 12220->12222 12227 7fe333dd 12221->12227 12222->12055 12222->12056 12223 7fe333ee Sleep 12223->12227 12224 7fe33411 gethostbyname 12225 7fe3341c lstrlen 12224->12225 12224->12227 12225->12224 12225->12227 12226 7fe3344d socket 12226->12227 12228 7fe33462 connect 12226->12228 12227->12222 12227->12223 12227->12224 12227->12226 12229 7fe3363e closesocket 12227->12229 12230 7fe3364e Sleep 12227->12230 12236 7fe3360f Sleep 12227->12236 12228->12229 12233 7fe3347b 12228->12233 12229->12227 12230->12227 12231 7fe334ab GetVersionExA 12231->12233 12232 7fe33537 23 API calls 12232->12233 12233->12231 12233->12232 12234 7fe33565 23 API calls 12233->12234 12235 7fe3355d wsprintfA 12234->12235 12235->12227 12236->12227 12237 7fe3361b GetTickCount 12236->12237 12237->12227 12585 403d6b 12588 403db8 12585->12588 12586 403e81 ExitThread 12587 403b40 GetTickCount rand 12587->12588 12588->12586 12588->12587 12589 403e6b Sleep 12588->12589 12589->12588 12238 482c65 12239 482c67 12238->12239 12240 482c7e CloseHandle 12239->12240 12241 482c91 12240->12241 13145 422e6f LoadLibraryA 13150 422e96 GetProcAddress 13145->13150 13147 422f77 13148 422e80 13148->13147 13149 423160 NtAdjustPrivilegesToken 13148->13149 13150->13148 12242 401070 12243 401075 12242->12243 12246 40343c 12243->12246 12249 403410 12246->12249 12248 40109a 12250 403425 __dllonexit 12249->12250 12251 403419 _onexit 12249->12251 12250->12248 12251->12248 11831 42887f 11835 4288de 11831->11835 11834 428899 11836 428889 GetPEB 11835->11836 11836->11834 13162 7fe325dc 13164 7fe325e2 CreateThread CloseHandle 13162->13164 13165 7fe32fc3 13164->13165 13166 7fe32fc9 13165->13166 13619 401300 Sleep 12257 422000 12258 422115 12257->12258 12260 42212d 12258->12260 12289 422dce 12260->12289 12262 42218f 12263 4221dd 12262->12263 12264 4221b0 GetModuleHandleA 12262->12264 12265 4221f8 GetVersion 12263->12265 12264->12263 12266 42220f VirtualAlloc 12265->12266 12280 4222ca 12265->12280 12267 4222a9 CloseHandle 12266->12267 12270 422232 12266->12270 12267->12280 12268 4222d3 SetProcessAffinityMask 12296 4222f2 GetModuleHandleA 12268->12296 12270->12267 12293 4222ba 12270->12293 12271 4223fc lstrcpyW 12320 4241ae lstrcpyW lstrlenW 12271->12320 12273 422417 GetPEB lstrcpyW lstrcatW 12275 4241ae 3 API calls 12273->12275 12274 42244c NtMapViewOfSection 12274->12267 12274->12280 12275->12280 12277 422480 NtOpenProcessToken 12278 4224c5 CreateToolhelp32Snapshot Process32First 12277->12278 12277->12280 12279 4224eb Process32Next 12278->12279 12279->12280 12281 422565 CloseHandle 12279->12281 12280->12267 12280->12268 12280->12271 12280->12273 12280->12274 12280->12277 12280->12279 12282 4224fd OpenProcess 12280->12282 12285 4224b7 CreateToolhelp32Snapshot Process32First 12280->12285 12286 42255c CloseHandle 12280->12286 12287 422534 CreateRemoteThread 12280->12287 12288 4222ba Sleep 12280->12288 12323 4224ac 12280->12323 12348 424274 12280->12348 12281->12267 12282->12279 12282->12280 12285->12279 12286->12279 12287->12280 12287->12286 12288->12286 12290 422ddb 12289->12290 12290->12289 12291 422e5c 12290->12291 12292 422e33 GetModuleHandleA GetProcAddress 12290->12292 12291->12262 12292->12290 12294 4222c9 12293->12294 12295 4222bf Sleep 12293->12295 12294->12267 12295->12293 12297 422dce 2 API calls 12296->12297 12306 4222ca 12297->12306 12298 4222a9 CloseHandle 12298->12306 12299 4222d3 SetProcessAffinityMask 12300 4222f2 29 API calls 12299->12300 12300->12306 12301 4223fc lstrcpyW 12302 4241ae 3 API calls 12301->12302 12302->12306 12303 422417 GetPEB lstrcpyW lstrcatW 12305 4241ae 3 API calls 12303->12305 12304 42244c NtMapViewOfSection 12304->12298 12304->12306 12305->12306 12306->12298 12306->12299 12306->12301 12306->12303 12306->12304 12307 422480 NtOpenProcessToken 12306->12307 12313 4224ac 29 API calls 12306->12313 12318 4224a5 12306->12318 12307->12306 12308 4224c5 CreateToolhelp32Snapshot Process32First 12307->12308 12309 4224eb Process32Next 12308->12309 12310 4224f7 12309->12310 12311 422565 CloseHandle 12309->12311 12310->12309 12312 4224fd OpenProcess 12310->12312 12311->12298 12312->12309 12312->12318 12313->12306 12314 424274 5 API calls 12314->12318 12315 4224b7 CreateToolhelp32Snapshot Process32First 12315->12309 12316 42255c CloseHandle 12316->12309 12317 422534 CreateRemoteThread 12317->12316 12317->12318 12318->12314 12318->12315 12318->12316 12318->12317 12319 4222ba Sleep 12318->12319 12319->12316 12367 428ab8 12320->12367 12369 42314a 12323->12369 12325 4224b2 FreeLibrary CloseHandle 12326 4224c5 CreateToolhelp32Snapshot Process32First 12325->12326 12327 4224eb Process32Next 12326->12327 12328 4224f7 12327->12328 12329 422565 CloseHandle 12327->12329 12328->12327 12331 4224fd OpenProcess 12328->12331 12330 4222a9 CloseHandle 12329->12330 12346 4222ca 12330->12346 12331->12327 12337 4224a5 12331->12337 12332 4222d3 SetProcessAffinityMask 12334 4222f2 28 API calls 12332->12334 12333 424274 5 API calls 12333->12337 12334->12346 12335 42255c CloseHandle 12335->12327 12336 422534 CreateRemoteThread 12336->12335 12336->12337 12337->12333 12337->12335 12337->12336 12338 4222ba Sleep 12337->12338 12347 4224b7 CreateToolhelp32Snapshot Process32First 12337->12347 12338->12335 12339 4223fc lstrcpyW 12340 4241ae 3 API calls 12339->12340 12340->12346 12341 422417 GetPEB lstrcpyW lstrcatW 12343 4241ae 3 API calls 12341->12343 12342 42244c NtMapViewOfSection 12342->12330 12342->12346 12343->12346 12344 422480 NtOpenProcessToken 12344->12326 12344->12346 12345 4224ac 28 API calls 12345->12346 12346->12330 12346->12332 12346->12337 12346->12339 12346->12341 12346->12342 12346->12344 12346->12345 12347->12327 12371 42422f NtOpenSection 12348->12371 12350 42427c 12351 424282 NtMapViewOfSection CloseHandle 12350->12351 12352 424361 12350->12352 12351->12352 12354 4242ba 12351->12354 12352->12280 12353 4242ef 12373 424177 NtProtectVirtualMemory NtWriteVirtualMemory 12353->12373 12354->12353 12372 424177 NtProtectVirtualMemory NtWriteVirtualMemory 12354->12372 12357 424300 12374 424177 NtProtectVirtualMemory NtWriteVirtualMemory 12357->12374 12359 424311 12375 424177 NtProtectVirtualMemory NtWriteVirtualMemory 12359->12375 12361 424322 12362 424337 12361->12362 12376 424177 NtProtectVirtualMemory NtWriteVirtualMemory 12361->12376 12364 42434c 12362->12364 12377 424177 NtProtectVirtualMemory NtWriteVirtualMemory 12362->12377 12364->12352 12378 424177 NtProtectVirtualMemory NtWriteVirtualMemory 12364->12378 12368 4241ea NtCreateSection 12367->12368 12368->12280 12370 423160 NtAdjustPrivilegesToken 12369->12370 12370->12325 12371->12350 12372->12353 12373->12357 12374->12359 12375->12361 12376->12362 12377->12364 12378->12352 13167 626620 13170 626647 13167->13170 13171 626652 13170->13171 13172 62662a 13170->13172 13174 626658 13171->13174 13177 622574 13174->13177 13196 62252f NtOpenSection 13177->13196 13179 62257c 13180 622582 NtMapViewOfSection CloseHandle 13179->13180 13181 622661 13179->13181 13180->13181 13183 6225ba 13180->13183 13181->13172 13182 6225ef 13198 622477 NtProtectVirtualMemory NtWriteVirtualMemory 13182->13198 13183->13182 13197 622477 NtProtectVirtualMemory NtWriteVirtualMemory 13183->13197 13186 622600 13199 622477 NtProtectVirtualMemory NtWriteVirtualMemory 13186->13199 13188 622611 13200 622477 NtProtectVirtualMemory NtWriteVirtualMemory 13188->13200 13190 622622 13191 622637 13190->13191 13201 622477 NtProtectVirtualMemory NtWriteVirtualMemory 13190->13201 13193 62264c 13191->13193 13202 622477 NtProtectVirtualMemory NtWriteVirtualMemory 13191->13202 13193->13181 13203 622477 NtProtectVirtualMemory NtWriteVirtualMemory 13193->13203 13196->13179 13197->13182 13198->13186 13199->13188 13200->13190 13201->13191 13202->13193 13203->13181 13620 7fe330ab lstrcat 13621 7fe330b2 13620->13621 13622 7fe330be 153 API calls 13621->13622 13623 7fe330b7 CreateFileA 13622->13623 13624 7fe33102 13623->13624 13625 7fe330df WriteFile CloseHandle 13623->13625 13626 7fe33112 129 API calls 13624->13626 13625->13624 13627 7fe33107 GetProcAddress LoadLibraryA 13626->13627 13629 7fe31079 2 API calls 13627->13629 13630 7fe33159 13629->13630 13631 7fe3316e GetTickCount 13630->13631 13632 7fe33186 13631->13632 13633 7fe33223 GetVolumeInformationA 13632->13633 13634 7fe33256 13633->13634 13635 7fe3329a 13634->13635 13636 7fe33285 Sleep DeleteFileA 13634->13636 13637 7fe33328 13635->13637 13638 7fe332b8 88 API calls 13635->13638 13636->13635 13636->13636 13639 7fe33352 13637->13639 13640 7fe33334 CreateThread CloseHandle 13637->13640 13645 7fe332ac 13638->13645 13641 7fe33363 51 API calls 13639->13641 13640->13639 13642 7fe33357 13641->13642 13643 7fe31079 2 API calls 13642->13643 13644 7fe33381 13643->13644 13646 7fe33392 38 API calls 13644->13646 13645->13637 13647 7fe329f1 5 API calls 13645->13647 13648 7fe33386 13646->13648 13647->13637 13649 7fe31079 2 API calls 13648->13649 13650 7fe333b8 13649->13650 13651 7fe333c5 WSAStartup 13650->13651 13652 7fe3365e 13650->13652 13657 7fe333dd 13651->13657 13653 7fe333ee Sleep 13653->13657 13654 7fe33411 gethostbyname 13655 7fe3341c lstrlen 13654->13655 13654->13657 13655->13654 13655->13657 13656 7fe3344d socket 13656->13657 13658 7fe33462 connect 13656->13658 13657->13652 13657->13653 13657->13654 13657->13656 13659 7fe3363e closesocket 13657->13659 13660 7fe3364e Sleep 13657->13660 13666 7fe3360f Sleep 13657->13666 13658->13659 13663 7fe3347b 13658->13663 13659->13657 13660->13657 13661 7fe334ab GetVersionExA 13661->13663 13662 7fe33537 23 API calls 13662->13663 13663->13661 13663->13662 13664 7fe33565 23 API calls 13663->13664 13665 7fe3355d wsprintfA 13664->13665 13665->13657 13666->13657 13667 7fe3361b GetTickCount 13666->13667 13667->13657 13671 404715 13690 403c10 GetSystemDirectoryA lstrcatA lstrcpyA 13671->13690 13673 40477f 13674 40480e CreateProcessA 13673->13674 13685 4047e0 13673->13685 13675 404850 13674->13675 13676 404838 Sleep 13674->13676 13691 403b40 GetTickCount rand 13675->13691 13676->13675 13678 404995 ExitThread 13679 404856 13680 4048f4 13679->13680 13681 4048b9 13679->13681 13679->13685 13694 403b40 GetTickCount rand 13680->13694 13692 403b40 GetTickCount rand 13681->13692 13684 4048be 13693 403b40 GetTickCount rand 13684->13693 13685->13678 13689 40498b Sleep 13685->13689 13686 4048f9 13695 403b40 GetTickCount rand 13686->13695 13689->13685 13690->13673 13691->13679 13692->13684 13693->13685 13694->13686 13695->13685 12382 62443b 12385 62144a LookupPrivilegeValueA NtAdjustPrivilegesToken 12382->12385 12384 624441 12385->12384 13696 436719 13697 43671e 13696->13697 13698 43675d 13696->13698 13697->13698 13700 4369d9 13697->13700 13704 4366ea 13700->13704 13703 4368ec 13703->13698 13705 436700 GetPEB 13704->13705 13705->13703 12615 425519 12617 42551f WaitForSingleObject 12615->12617 12618 42553b 12617->12618 13210 40361c 13211 403628 13210->13211 13212 403920 9 API calls 13211->13212 13212->13211 12386 41a81c 12387 41a820 12386->12387 12388 41a8f0 12387->12388 12390 41a736 12387->12390 12394 41a9ee 12390->12394 12393 41a755 12393->12388 12395 41a740 GetPEB 12394->12395 12395->12393 12396 401020 #561 12619 423122 12620 42312f NtAdjustPrivilegesToken 12619->12620 13213 405620 13216 405685 13213->13216 13214 40589b 13215 405894 ExitThread 13216->13214 13216->13215 13217 403b40 GetTickCount rand 13216->13217 13218 405885 Sleep 13216->13218 13217->13216 13218->13216 12397 620000 12398 620004 12397->12398 12399 6200a1 12398->12399 12401 62025e 12398->12401 12405 620105 12401->12405 12404 620278 12404->12399 12406 620116 GetPEB 12405->12406 12406->12404 13706 428320 13709 428347 13706->13709 13710 428352 13709->13710 13711 42832a 13709->13711 13713 428358 13710->13713 13714 424274 5 API calls 13713->13714 13715 42836a 13714->13715 13715->13711 13719 42832d 13720 428347 5 API calls 13719->13720 13721 428337 13720->13721 12410 402430 FindResourceA LoadLibraryA GetProcAddress 12411 402472 LoadResource 12410->12411 12412 4024e9 12410->12412 12411->12412 12414 402484 12411->12414 12414->12412 12415 402488 LockResource 12414->12415 12415->12412 12416 402495 CreateFileA 12415->12416 12416->12412 12418 4024ca WriteFile CloseHandle 12416->12418 12418->12412 12622 404530 12623 404595 12622->12623 12624 40464f 12622->12624 12637 403c10 GetSystemDirectoryA lstrcatA lstrcpyA 12623->12637 12638 403b40 GetTickCount rand 12624->12638 12627 404655 12635 40465c 12627->12635 12639 403b40 GetTickCount rand 12627->12639 12629 4045a2 12630 404647 ExitThread 12629->12630 12631 404607 CreateProcessA 12629->12631 12632 404641 Sleep 12631->12632 12633 40462d Sleep 12631->12633 12632->12629 12633->12632 12634 40470d ExitThread 12635->12634 12636 404702 Sleep 12635->12636 12636->12635 12637->12629 12638->12627 12639->12635 13722 402730 13723 40274a Sleep 13722->13723 13725 4027c1 CreateMutexA GetLastError 13723->13725 13726 4027e6 13725->13726 13727 4027db ExitProcess 13725->13727 13737 402500 EnumResourceNamesA 13726->13737 13729 4027eb 13738 402520 lstrcpyA lstrcatA 13729->13738 13731 402807 13732 401980 LoadLibraryA 13731->13732 13733 40280c 13732->13733 13761 4012b0 CreateThread 13733->13761 13735 40285c WaitForSingleObject CloseHandle 13736 402878 Sleep 13735->13736 13736->13733 13737->13729 13739 402565 13738->13739 13740 402575 RtlZeroMemory 13739->13740 13741 402569 13739->13741 13742 4025ab 13740->13742 13741->13731 13743 4025af 13742->13743 13744 4025d1 GetFileAttributesA 13742->13744 13743->13731 13745 4025e1 13744->13745 13746 4025ed CreateFileA 13744->13746 13745->13731 13747 40261a GetFileSize 13746->13747 13748 40260e 13746->13748 13749 40262b CloseHandle 13747->13749 13750 40263e GlobalAlloc 13747->13750 13748->13731 13749->13731 13751 402660 ReadFile 13750->13751 13752 40264d CloseHandle 13750->13752 13753 402692 CloseHandle BeginUpdateResourceA 13751->13753 13754 402678 GlobalFree CloseHandle 13751->13754 13752->13731 13755 4026c2 UpdateResourceA 13753->13755 13756 4026af GlobalFree 13753->13756 13754->13731 13757 4026fb EndUpdateResourceA 13755->13757 13758 4026de lstrlenA UpdateResourceA 13755->13758 13756->13731 13759 40270a GlobalFree 13757->13759 13760 40271c GlobalFree 13757->13760 13758->13757 13759->13731 13760->13731 13761->13735 13765 428735 13767 428739 13765->13767 13766 4287db 13767->13766 13768 42887f GetPEB 13767->13768 13768->13766 12655 42613b 12656 42314a NtAdjustPrivilegesToken 12655->12656 12657 426141 12656->12657 12419 7fe31399 LookupPrivilegeValueA NtAdjustPrivilegesToken 12420 623819 12422 62381f WaitForSingleObject 12420->12422 12423 623845 12422->12423 12424 62383b closesocket 12422->12424 12424->12423 12658 4019c0 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 12683 401660 strstr 12658->12683 12660 402254 12661 401a45 12661->12660 12687 402f70 GetLocaleInfoW GetComputerNameA lstrcpyA 12661->12687 12665 401acc 12666 40222c 12666->12660 12669 40224d CloseHandle 12666->12669 12667 401c3e CloseHandle LoadLibraryA 12682 401a80 12667->12682 12668 401820 GetProcAddress 12668->12682 12669->12660 12670 401c01 CloseHandle 12670->12682 12671 401e2a lstrcpynA lstrlenA lstrcpynA 12675 4015d0 CreateThread 12671->12675 12672 401d4e lstrcpynA 12677 401330 CreateThread 12672->12677 12673 401d9f lstrcpynA lstrlenA lstrcpynA 12678 4014f0 CreateThread 12673->12678 12674 401eff 6 API calls 12676 401f45 ReleaseMutex CloseHandle 12674->12676 12674->12682 12675->12682 12676->12682 12677->12682 12678->12682 12679 40206e lstrcatA LoadLibraryA GetProcAddress 12681 4020af WinExec 12679->12681 12680 401f77 LoadLibraryA GetProcAddress 12680->12682 12681->12682 12682->12665 12682->12666 12682->12667 12682->12668 12682->12670 12682->12671 12682->12672 12682->12673 12682->12674 12682->12679 12682->12680 12684 401712 atoi 12683->12684 12685 4016b4 strcspn strncpy strcspn 12683->12685 12686 40176f 12684->12686 12685->12684 12686->12661 12688 402fdd strstr 12687->12688 12690 403048 strstr 12688->12690 12697 40302d lstrcpyA lstrcpyA 12688->12697 12692 40306b strstr 12690->12692 12690->12697 12693 403096 strstr 12692->12693 12692->12697 12694 4030bd strstr 12693->12694 12693->12697 12696 4030e1 strstr 12694->12696 12694->12697 12695 40315d GlobalMemoryStatusEx 12699 4031dd 12695->12699 12696->12697 12697->12695 12700 4031f2 lstrcpyA 12699->12700 12701 401a78 12700->12701 12702 40320c GetTickCount 12700->12702 12703 401980 12701->12703 12702->12701 12704 401998 LoadLibraryA 12703->12704 12704->12682 12428 41a8c0 12429 41a8c8 12428->12429 12430 41a736 GetPEB 12429->12430 12431 41a8f0 12429->12431 12430->12431 13776 4043c1 13777 404413 13776->13777 13778 404454 13776->13778 13788 403b40 GetTickCount rand 13777->13788 13790 403b40 GetTickCount rand 13778->13790 13781 404461 13791 403b40 GetTickCount rand 13781->13791 13782 40441f 13789 403b40 GetTickCount rand 13782->13789 13785 4044f4 ExitThread 13786 40442d 13786->13785 13787 4044ea Sleep 13786->13787 13787->13786 13788->13782 13789->13786 13790->13781 13791->13786 13792 6233e0 13793 6233e5 13792->13793 13794 62346f MapViewOfFile CloseHandle 13793->13794 13795 623440 NtOpenSection 13793->13795 13798 6234b0 13794->13798 13799 6235f3 13794->13799 13797 62345f NtQuerySystemInformation 13795->13797 13795->13799 13796 6234b7 UnmapViewOfFile 13796->13799 13797->13794 13798->13796 13798->13799 12705 4041cf 12706 40420b 12705->12706 12707 404246 malloc 12706->12707 12712 4042ab 12707->12712 12708 4043b9 ExitThread 12709 403b40 GetTickCount rand 12709->12712 12710 404304 sprintf 12710->12712 12711 404336 sprintf 12711->12712 12712->12708 12712->12709 12712->12710 12712->12711 13240 4012d0 13241 4012e0 LoadLibraryA GetProcAddress 13240->13241 12435 4020d3 OpenMutexA 12436 4020eb ReleaseMutex CloseHandle 12435->12436 12437 4020f9 12435->12437 12436->12437 12452 403b40 GetTickCount rand 12437->12452 12439 402147 12453 403b40 GetTickCount rand 12439->12453 12441 402155 12454 403b40 GetTickCount rand 12441->12454 12443 402163 12455 403b40 GetTickCount rand 12443->12455 12445 402171 12456 403b40 GetTickCount rand 12445->12456 12447 40217f lstrcatA 12449 4021b9 GetProcAddress 12447->12449 12450 4021da WinExec ExitProcess 12449->12450 12452->12439 12453->12441 12454->12443 12455->12445 12456->12447 12457 422cd6 12458 422da0 12457->12458 12459 422e5c 12458->12459 12460 422e33 GetModuleHandleA GetProcAddress 12458->12460 12460->12458 13242 6202fe 13243 620415 13242->13243 13245 62042d 13243->13245 13246 6210ce 2 API calls 13245->13246 13247 62048f 13246->13247 13248 6204dd 13247->13248 13249 6204b0 GetModuleHandleA 13247->13249 13250 6204f8 GetVersion 13248->13250 13249->13248 13251 62050f VirtualAlloc 13250->13251 13272 6205ca 13250->13272 13252 6205a9 CloseHandle 13251->13252 13255 620532 13251->13255 13252->13272 13253 6205d3 SetProcessAffinityMask 13277 6205f2 GetModuleHandleA 13253->13277 13255->13252 13274 6205ba 13255->13274 13256 6206fc lstrcpyW 13299 6224ae lstrcpyW lstrlenW 13256->13299 13258 620717 GetPEB lstrcpyW lstrcatW 13260 6224ae 3 API calls 13258->13260 13259 62074c NtMapViewOfSection 13259->13252 13259->13272 13260->13272 13262 620780 NtOpenProcessToken 13263 6207c5 CreateToolhelp32Snapshot Process32First 13262->13263 13262->13272 13264 6207eb Process32Next 13263->13264 13265 620865 CloseHandle 13264->13265 13264->13272 13265->13252 13266 6207fd OpenProcess 13266->13264 13266->13272 13268 622574 5 API calls 13268->13272 13269 6207b7 CreateToolhelp32Snapshot Process32First 13269->13264 13270 62085c CloseHandle 13270->13264 13271 620834 CreateRemoteThread 13271->13270 13271->13272 13272->13252 13272->13253 13272->13256 13272->13258 13272->13259 13272->13262 13272->13264 13272->13266 13272->13268 13272->13269 13272->13270 13272->13271 13273 6205ba Sleep 13272->13273 13302 6207ac 13272->13302 13273->13270 13275 6205c9 13274->13275 13276 6205bf Sleep 13274->13276 13275->13252 13276->13274 13278 6210ce 2 API calls 13277->13278 13290 6205ca 13278->13290 13279 6205a9 CloseHandle 13279->13290 13280 6205d3 SetProcessAffinityMask 13281 6205f2 30 API calls 13280->13281 13281->13290 13282 6206fc lstrcpyW 13283 6224ae 3 API calls 13282->13283 13283->13290 13284 620717 GetPEB lstrcpyW lstrcatW 13286 6224ae 3 API calls 13284->13286 13285 62074c NtMapViewOfSection 13285->13279 13285->13290 13286->13290 13287 620780 NtOpenProcessToken 13288 6207c5 CreateToolhelp32Snapshot Process32First 13287->13288 13287->13290 13289 6207eb Process32Next 13288->13289 13289->13290 13291 620865 CloseHandle 13289->13291 13290->13279 13290->13280 13290->13282 13290->13284 13290->13285 13290->13287 13290->13289 13292 6207fd OpenProcess 13290->13292 13293 6207ac 30 API calls 13290->13293 13294 622574 5 API calls 13290->13294 13295 6207b7 CreateToolhelp32Snapshot Process32First 13290->13295 13296 62085c CloseHandle 13290->13296 13297 620834 CreateRemoteThread 13290->13297 13298 6205ba Sleep 13290->13298 13291->13279 13292->13289 13292->13290 13293->13290 13294->13290 13295->13289 13296->13289 13297->13290 13297->13296 13298->13296 13300 626db8 13299->13300 13301 6224ea NtCreateSection 13300->13301 13301->13272 13325 62144a LookupPrivilegeValueA NtAdjustPrivilegesToken 13302->13325 13304 6207b2 FreeLibrary CloseHandle 13305 6207c5 CreateToolhelp32Snapshot Process32First 13304->13305 13306 6207eb Process32Next 13305->13306 13307 6205ca 13306->13307 13308 620865 CloseHandle 13306->13308 13307->13306 13309 6207fd OpenProcess 13307->13309 13310 6205a9 CloseHandle 13307->13310 13311 622574 5 API calls 13307->13311 13312 6205d3 SetProcessAffinityMask 13307->13312 13314 62085c CloseHandle 13307->13314 13315 620834 CreateRemoteThread 13307->13315 13316 6205ba Sleep 13307->13316 13317 6206fc lstrcpyW 13307->13317 13319 620717 GetPEB lstrcpyW lstrcatW 13307->13319 13320 62074c NtMapViewOfSection 13307->13320 13322 620780 NtOpenProcessToken 13307->13322 13323 6207ac 29 API calls 13307->13323 13324 6207b7 CreateToolhelp32Snapshot Process32First 13307->13324 13308->13310 13309->13306 13309->13307 13310->13307 13311->13307 13313 6205f2 29 API calls 13312->13313 13313->13307 13314->13306 13315->13307 13315->13314 13316->13314 13318 6224ae 3 API calls 13317->13318 13318->13307 13321 6224ae 3 API calls 13319->13321 13320->13307 13320->13310 13321->13307 13322->13305 13322->13307 13323->13307 13324->13306 13325->13304 13806 7fe3307c GetModuleHandleA 13854 7fe3264b 13806->13854 13809 7fe3309e CreateFileA 13810 7fe33102 13809->13810 13811 7fe330df WriteFile CloseHandle 13809->13811 13812 7fe33112 129 API calls 13810->13812 13811->13810 13813 7fe33107 GetProcAddress LoadLibraryA 13812->13813 13815 7fe31079 2 API calls 13813->13815 13816 7fe33159 13815->13816 13817 7fe3316e GetTickCount 13816->13817 13818 7fe33186 13817->13818 13819 7fe33223 GetVolumeInformationA 13818->13819 13820 7fe33256 13819->13820 13821 7fe3329a 13820->13821 13822 7fe33285 Sleep DeleteFileA 13820->13822 13823 7fe33328 13821->13823 13824 7fe332b8 88 API calls 13821->13824 13822->13821 13822->13822 13825 7fe33352 13823->13825 13826 7fe33334 CreateThread CloseHandle 13823->13826 13831 7fe332ac 13824->13831 13827 7fe33363 51 API calls 13825->13827 13826->13825 13828 7fe33357 13827->13828 13829 7fe31079 2 API calls 13828->13829 13830 7fe33381 13829->13830 13832 7fe33392 38 API calls 13830->13832 13831->13823 13833 7fe329f1 5 API calls 13831->13833 13834 7fe33386 13832->13834 13833->13823 13835 7fe31079 2 API calls 13834->13835 13836 7fe333b8 13835->13836 13837 7fe333c5 WSAStartup 13836->13837 13838 7fe3365e 13836->13838 13843 7fe333dd 13837->13843 13839 7fe333ee Sleep 13839->13843 13840 7fe33411 gethostbyname 13841 7fe3341c lstrlen 13840->13841 13840->13843 13841->13840 13841->13843 13842 7fe3344d socket 13842->13843 13844 7fe33462 connect 13842->13844 13843->13838 13843->13839 13843->13840 13843->13842 13845 7fe3363e closesocket 13843->13845 13846 7fe3364e Sleep 13843->13846 13852 7fe3360f Sleep 13843->13852 13844->13845 13849 7fe3347b 13844->13849 13845->13843 13846->13843 13847 7fe334ab GetVersionExA 13847->13849 13848 7fe33537 23 API calls 13848->13849 13849->13847 13849->13848 13850 7fe33565 23 API calls 13849->13850 13851 7fe3355d wsprintfA 13850->13851 13851->13843 13852->13843 13853 7fe3361b GetTickCount 13852->13853 13853->13843 13855 7fe3263f GetSystemDirectoryA 13854->13855 13855->13809 11745 4029e0 #4710 SendMessageA SendMessageA 11746 402a1b SetWindowLongA #6197 WinExec 11745->11746 11756 402ad0 lstrcpyA lstrcatA 11746->11756 11750 402a9d 11758 402b40 LoadLibraryA GetProcAddress 11750->11758 11751 402a6e 11753 402ab1 11753->11751 11780 402330 LoadLibraryA GetProcAddress 11753->11780 11757 402a68 11756->11757 11757->11750 11757->11751 11759 402c13 GetSystemDirectoryA strncmp 11758->11759 11760 402c55 11759->11760 11765 402d26 11759->11765 11784 403b40 GetTickCount rand 11760->11784 11762 402c5c 11785 403b40 GetTickCount rand 11762->11785 11764 402e2c 11764->11753 11765->11764 11769 402d8f GetLastError 11765->11769 11773 402d9c 11765->11773 11766 402c6a 11786 403b40 GetTickCount rand 11766->11786 11768 402c78 11787 403b40 GetTickCount rand 11768->11787 11769->11773 11771 402c86 11788 403b40 GetTickCount rand 11771->11788 11773->11764 11775 402dd5 lstrcpyA lstrcatA 11773->11775 11774 402c94 11789 403b40 GetTickCount rand 11774->11789 11778 402e0a lstrlenA 11775->11778 11777 402ca2 lstrcatA lstrcatA CopyFileA lstrcpyA 11777->11765 11778->11764 11781 4023d1 GetTempPathA lstrcatA MoveFileExA 11780->11781 11782 402420 ExitProcess 11781->11782 11783 402412 MoveFileExA 11781->11783 11783->11782 11784->11762 11785->11766 11786->11768 11787->11771 11788->11774 11789->11777 12713 4035e1 _exit 13329 7fe31141 GetProcAddress 13856 4027e2 13857 4027e6 13856->13857 13867 402500 EnumResourceNamesA 13857->13867 13859 4027eb 13860 402520 21 API calls 13859->13860 13861 402807 13860->13861 13862 401980 LoadLibraryA 13861->13862 13863 40280c 13862->13863 13868 4012b0 CreateThread 13863->13868 13865 40285c WaitForSingleObject CloseHandle 13866 402878 Sleep 13865->13866 13866->13863 13867->13859 13868->13865 13869 4037e9 13870 4037f4 13869->13870 13871 403920 9 API calls 13870->13871 13872 4037fe 13871->13872 12471 4040f0 12473 404115 12471->12473 12472 404144 ExitThread 12473->12472 12474 404138 Sleep 12473->12474 12474->12473 12714 4289f2 12715 4289f7 12714->12715 12716 428a1c 12715->12716 12718 42887f 12715->12718 12719 4288de 12718->12719 12720 428889 GetPEB 12719->12720 12721 428899 12720->12721 13333 402e80 13334 402e90 13333->13334 13335 402f27 #2379 13334->13335 13336 402e98 #470 SendMessageA 13334->13336 13337 402ecb #755 13336->13337 13342 403e89 13343 403ebd 13342->13343 13344 403f1b 13343->13344 13352 403b40 GetTickCount rand 13343->13352 13346 403f3d 13353 403b40 GetTickCount rand 13346->13353 13348 403f4c 13349 403fa2 ExitThread 13348->13349 13350 403f9c Sleep 13348->13350 13350->13348 13352->13346 13353->13348 13877 7fe3042a 13878 7fe30436 13877->13878 13880 7fe30442 13878->13880 13881 7fe31079 2 API calls 13880->13881 13882 7fe304a4 13881->13882 13883 7fe304ec 13882->13883 13884 7fe304c5 GetModuleHandleA 13882->13884 13885 7fe30507 GetVersion 13883->13885 13884->13883 13886 7fe305d9 13885->13886 13887 7fe3051e VirtualAlloc 13885->13887 13888 7fe305b8 CloseHandle 13886->13888 13889 7fe305e2 SetThreadAffinityMask 13886->13889 13887->13888 13895 7fe30541 13887->13895 13891 7fe30601 GetModuleHandleA 13888->13891 13916 7fe30601 GetModuleHandleA 13889->13916 13893 7fe31079 2 API calls 13891->13893 13911 7fe3061d 13893->13911 13895->13888 13913 7fe305c9 13895->13913 13896 7fe3070b lstrcpyW 13935 7fe32425 lstrcpyW lstrlenW 13896->13935 13899 7fe30726 GetPEB lstrcpyW lstrcatW 13901 7fe32425 3 API calls 13899->13901 13900 7fe30755 NtMapViewOfSection 13900->13888 13900->13911 13901->13911 13902 7fe30789 NtOpenProcessToken 13903 7fe307ce CreateToolhelp32Snapshot Process32First 13902->13903 13902->13911 13904 7fe307f4 Process32Next 13903->13904 13905 7fe3086e CloseHandle 13904->13905 13904->13911 13905->13888 13907 7fe30806 OpenProcess 13907->13904 13907->13911 13908 7fe324eb 5 API calls 13908->13911 13909 7fe30865 CloseHandle 13909->13904 13910 7fe3083d CreateRemoteThread 13910->13909 13910->13911 13911->13888 13911->13896 13911->13899 13911->13900 13911->13902 13911->13903 13911->13904 13911->13907 13911->13908 13911->13909 13911->13910 13912 7fe305c9 Sleep 13911->13912 13938 7fe307b5 13911->13938 13912->13909 13914 7fe305d8 13913->13914 13915 7fe305ce Sleep 13913->13915 13914->13888 13915->13913 13917 7fe31079 2 API calls 13916->13917 13927 7fe3061d 13917->13927 13918 7fe305b8 CloseHandle 13918->13916 13919 7fe3070b lstrcpyW 13920 7fe32425 3 API calls 13919->13920 13920->13927 13921 7fe30726 GetPEB lstrcpyW lstrcatW 13923 7fe32425 3 API calls 13921->13923 13922 7fe30755 NtMapViewOfSection 13922->13918 13922->13927 13923->13927 13924 7fe30789 NtOpenProcessToken 13925 7fe307ce CreateToolhelp32Snapshot Process32First 13924->13925 13924->13927 13926 7fe307f4 Process32Next 13925->13926 13926->13927 13928 7fe3086e CloseHandle 13926->13928 13927->13918 13927->13919 13927->13921 13927->13922 13927->13924 13927->13925 13927->13926 13929 7fe307b5 30 API calls 13927->13929 13930 7fe30806 OpenProcess 13927->13930 13931 7fe324eb 5 API calls 13927->13931 13932 7fe30865 CloseHandle 13927->13932 13933 7fe3083d CreateRemoteThread 13927->13933 13934 7fe305c9 Sleep 13927->13934 13928->13918 13929->13927 13930->13926 13930->13927 13931->13927 13932->13926 13933->13927 13933->13932 13934->13932 13936 7fe360a7 13935->13936 13937 7fe32461 NtCreateSection 13936->13937 13937->13911 13960 7fe313c1 LookupPrivilegeValueA NtAdjustPrivilegesToken 13938->13960 13940 7fe307bb FreeLibrary CloseHandle 13941 7fe307ce CreateToolhelp32Snapshot Process32First 13940->13941 13942 7fe307f4 Process32Next 13941->13942 13943 7fe3086e CloseHandle 13942->13943 13957 7fe3061d 13942->13957 13944 7fe305b8 CloseHandle 13943->13944 13946 7fe30601 GetModuleHandleA 13944->13946 13945 7fe30806 OpenProcess 13945->13942 13945->13957 13948 7fe31079 2 API calls 13946->13948 13947 7fe324eb 5 API calls 13947->13957 13948->13957 13949 7fe30865 CloseHandle 13949->13942 13950 7fe3083d CreateRemoteThread 13950->13949 13950->13957 13951 7fe305c9 Sleep 13951->13949 13952 7fe3070b lstrcpyW 13953 7fe32425 3 API calls 13952->13953 13953->13957 13954 7fe30726 GetPEB lstrcpyW lstrcatW 13956 7fe32425 3 API calls 13954->13956 13955 7fe30755 NtMapViewOfSection 13955->13944 13955->13957 13956->13957 13957->13941 13957->13942 13957->13944 13957->13945 13957->13947 13957->13949 13957->13950 13957->13951 13957->13952 13957->13954 13957->13955 13958 7fe30789 NtOpenProcessToken 13957->13958 13959 7fe307b5 13 API calls 13957->13959 13958->13941 13958->13957 13959->13957 13960->13940 12726 425588 12728 42558e GetSystemTime 12726->12728 12731 4255d2 12728->12731 12729 42560c Sleep 12729->12731 12730 425732 12731->12729 12731->12730 12732 4256b9 Sleep 12731->12732 12732->12731 11843 40348f __set_app_type __p__fmode __p__commode 11844 4034fe 11843->11844 11845 403512 11844->11845 11846 403506 __setusermatherr 11844->11846 11855 403600 _controlfp 11845->11855 11846->11845 11848 403517 _initterm __getmainargs _initterm 11849 40356b GetStartupInfoA 11848->11849 11851 40359f GetModuleHandleA 11849->11851 11856 405b10 #1576 11851->11856 11854 4035c3 exit _XcptFilter 11855->11848 11856->11854 12480 402890 12481 4029b4 12480->12481 12482 4028a5 12480->12482 12482->12481 12483 402921 Sleep 12482->12483 12484 402973 Sleep 12482->12484 12485 4028ac Sleep 12482->12485 12489 40296f 12483->12489 12484->12481 12490 40291d 12485->12490 13354 404a93 13356 404ad2 13354->13356 13355 404ea9 13356->13355 13366 403b40 GetTickCount rand 13356->13366 13358 404bcb 13367 403b40 GetTickCount rand 13358->13367 13360 404c0a 13368 403b40 GetTickCount rand 13360->13368 13362 404ea2 ExitThread 13363 404c2f 13363->13362 13364 403b40 GetTickCount rand 13363->13364 13365 404e95 Sleep 13363->13365 13364->13363 13365->13363 13366->13358 13367->13360 13368->13363 12494 7fe33735 12499 7fe313c1 LookupPrivilegeValueA NtAdjustPrivilegesToken 12494->12499 12496 7fe3373b 12500 7fe33752 12496->12500 12499->12496 12505 7fe313c1 LookupPrivilegeValueA NtAdjustPrivilegesToken 12500->12505 12502 7fe33758 12506 7fe33775 12502->12506 12505->12502 12509 7fe313c1 LookupPrivilegeValueA NtAdjustPrivilegesToken 12506->12509 12508 7fe33740 12509->12508 13964 6213ba 13965 62137f LookupPrivilegeValueA NtAdjustPrivilegesToken 13964->13965 12510 425099 12512 4250a2 12510->12512 12513 4250a9 Sleep 12512->12513 12513->12513 13372 401e9c 13373 401ea9 lstrlenA 13372->13373 13374 401b79 13372->13374 13373->13374 13375 40222c 13374->13375 13376 401c3e CloseHandle LoadLibraryA 13374->13376 13377 401820 GetProcAddress 13374->13377 13380 401c01 CloseHandle 13374->13380 13381 401e2a lstrcpynA lstrlenA lstrcpynA 13374->13381 13382 401d4e lstrcpynA 13374->13382 13383 401d9f lstrcpynA lstrlenA lstrcpynA 13374->13383 13384 401eff 6 API calls 13374->13384 13389 40206e lstrcatA LoadLibraryA GetProcAddress 13374->13389 13390 401f77 LoadLibraryA GetProcAddress 13374->13390 13378 402254 13375->13378 13379 40224d CloseHandle 13375->13379 13376->13374 13377->13374 13379->13378 13380->13374 13385 4015d0 CreateThread 13381->13385 13387 401330 CreateThread 13382->13387 13388 4014f0 CreateThread 13383->13388 13384->13374 13386 401f45 ReleaseMutex CloseHandle 13384->13386 13385->13374 13386->13374 13387->13374 13388->13374 13391 4020af WinExec 13389->13391 13390->13374 13391->13374 11827 482cae 11829 482c67 11827->11829 11828 482c91 11829->11828 11830 482c7e CloseHandle 11829->11830 11830->11828 12517 623888 12519 62388e GetSystemTime 12517->12519 12526 6238d2 12519->12526 12520 62390c Sleep 12520->12526 12521 623a32 12522 623954 gethostbyname 12523 62397a socket 12522->12523 12522->12526 12524 623990 ioctlsocket connect Sleep 12523->12524 12523->12526 12524->12526 12525 623a1f closesocket 12525->12526 12526->12520 12526->12521 12526->12522 12526->12525 11741 4010b0 #1134 11744 4011f0 #324 #1168 #1146 LoadIconA 11741->11744 11743 4010ed #2514 #641 11744->11743 13970 403fb1 13971 403fca 13970->13971 13972 40400f 13971->13972 13973 40402c GetTickCount 13971->13973 13979 403b40 GetTickCount rand 13973->13979 13975 40407d 13980 403b40 GetTickCount rand 13975->13980 13978 40408c ExitThread 13979->13975 13980->13978 12527 401cb5 12528 401ce5 CreateFileA 12527->12528 12545 401b79 12527->12545 12529 401d0b 12528->12529 12528->12545 12530 401d36 CloseHandle 12529->12530 12529->12545 12530->12545 12531 40222c 12534 402254 12531->12534 12535 40224d CloseHandle 12531->12535 12532 401c3e CloseHandle LoadLibraryA 12532->12545 12535->12534 12536 401c01 CloseHandle 12536->12545 12537 401e2a lstrcpynA lstrlenA lstrcpynA 12563 4015d0 12537->12563 12538 401d4e lstrcpynA 12551 401330 12538->12551 12539 401d9f lstrcpynA lstrlenA lstrcpynA 12557 4014f0 12539->12557 12540 401eff 6 API calls 12542 401f45 ReleaseMutex CloseHandle 12540->12542 12540->12545 12542->12545 12545->12531 12545->12532 12545->12536 12545->12537 12545->12538 12545->12539 12545->12540 12546 40206e lstrcatA LoadLibraryA GetProcAddress 12545->12546 12547 401f77 LoadLibraryA GetProcAddress 12545->12547 12549 401820 GetProcAddress 12545->12549 12548 4020af WinExec 12546->12548 12547->12545 12548->12545 12550 40183f 12549->12550 12550->12545 12552 401482 12551->12552 12556 40134c 12551->12556 12552->12545 12553 401471 12570 4012b0 CreateThread 12553->12570 12556->12553 12569 4012b0 CreateThread 12556->12569 12558 4015ac 12557->12558 12560 401510 12557->12560 12558->12545 12559 40159b 12571 4012b0 CreateThread 12559->12571 12560->12559 12562 4012b0 CreateThread 12560->12562 12562->12560 12564 401651 12563->12564 12568 401612 12563->12568 12564->12545 12565 401640 12573 4012b0 CreateThread 12565->12573 12568->12565 12572 4012b0 CreateThread 12568->12572 12569->12556 12570->12552 12571->12558 12572->12568 12573->12564 12574 4230ba 12577 42307f 12574->12577 12575 423160 NtAdjustPrivilegesToken 12576 423103 12577->12575 12577->12576

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 75 62042d-6204a4 call 6210ce 78 6204a6-6204db call 62273c GetModuleHandleA 75->78 79 6204dd 75->79 81 6204e4-620509 call 622750 GetVersion 78->81 79->81 85 6205ca-6205d1 81->85 86 62050f-620530 VirtualAlloc 81->86 88 6205a9-6205b3 CloseHandle 85->88 89 6205d3-6205fc SetProcessAffinityMask call 6205f2 85->89 87 620532-620562 call 620305 86->87 86->88 87->88 99 620564-62057b 87->99 88->85 94 620621-620623 89->94 95 6205fe-62061c 89->95 97 620625-620630 94->97 98 62064c-620652 94->98 95->94 100 620632 97->100 101 620639-620648 97->101 98->88 102 620658-620671 98->102 99->88 106 62057d-6205a4 call 6205ba 99->106 100->101 101->98 102->88 103 620677-620690 102->103 103->88 105 620696-62069c 103->105 107 6206d8-6206de 105->107 108 62069e-6206b1 105->108 106->88 110 6206e0-6206f3 107->110 111 6206fc-620715 lstrcpyW call 6224ae 107->111 108->88 109 6206b7-6206bd 108->109 109->107 114 6206bf-6206d2 109->114 110->111 115 6206f5 110->115 117 620717-620746 GetPEB lstrcpyW lstrcatW call 6224ae 111->117 118 62074c-620775 NtMapViewOfSection 111->118 114->88 114->107 115->111 117->88 117->118 118->88 121 62077b-62078f call 620305 NtOpenProcessToken 118->121 126 620791-6207a3 call 62115d call 6207ac 121->126 127 6207c5-6207e4 CreateToolhelp32Snapshot Process32First 121->127 138 6207a5 126->138 139 62080e-62080f 126->139 128 6207eb-6207f5 Process32Next 127->128 130 6207f7-6207fb 128->130 131 620865-620872 CloseHandle 128->131 130->128 133 6207fd-62080d OpenProcess 130->133 131->88 133->128 135 62080f 133->135 137 620810-620818 call 622574 135->137 144 62081a-620820 137->144 145 62085c-620863 CloseHandle 137->145 138->137 140 6207a7-6207e4 CreateToolhelp32Snapshot Process32First 138->140 139->137 140->128 144->145 146 620822-620832 144->146 145->128 146->145 147 620834-62084b CreateRemoteThread 146->147 147->145 148 62084d-620857 call 6205ba 147->148 148->145
                                              APIs
                                              • GetModuleHandleA.KERNEL32(00000000), ref: 006204BE
                                              • GetVersion.KERNEL32 ref: 00620500
                                              • VirtualAlloc.KERNEL32(00000000,000077C4,08001000,00000040), ref: 00620528
                                              • CloseHandle.KERNELBASE(?), ref: 006205AD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066207224.0000000000620000.00000040.10000000.00040000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_620000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Handle$AllocCloseModuleVersionVirtual
                                              • String ID: \BaseNamedObjects\krktVt$\BaseNamedObjects\krktVt$csrs
                                              • API String ID: 3017432202-347219270
                                              • Opcode ID: 9a339cd436d9dcaabdfac7e0ef4a3ddf49aaf66cc73df8b107168bbacab3095e
                                              • Instruction ID: d5d1b59b2121d74a7099891947e66a799ca06236f1af9dcf9398221eb3284368
                                              • Opcode Fuzzy Hash: 9a339cd436d9dcaabdfac7e0ef4a3ddf49aaf66cc73df8b107168bbacab3095e
                                              • Instruction Fuzzy Hash: 3DB19C71505669FFFB219F24D80ABEA3BAAEF45710F100028F9099E182C7F49F558F69

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 42212d-4221a4 call 422dce 3 4221a6-4221db call 42443c GetModuleHandleA 0->3 4 4221dd 0->4 6 4221e4-422209 call 424450 GetVersion 3->6 4->6 10 4222ca-4222d1 6->10 11 42220f-422230 VirtualAlloc 6->11 13 4222a9-4222b3 CloseHandle 10->13 14 4222d3-4222fc SetProcessAffinityMask call 4222f2 10->14 12 422232-422262 call 422005 11->12 11->13 12->13 24 422264-42227b 12->24 13->10 19 422321-422323 14->19 20 4222fe-42231c 14->20 22 422325-422330 19->22 23 42234c-422352 19->23 20->19 25 422332 22->25 26 422339-422348 22->26 23->13 27 422358-422371 23->27 24->13 31 42227d-4222a4 call 4222ba 24->31 25->26 26->23 27->13 28 422377-422390 27->28 28->13 30 422396-42239c 28->30 32 4223d8-4223de 30->32 33 42239e-4223b1 30->33 31->13 35 4223e0-4223f3 32->35 36 4223fc-422415 lstrcpyW call 4241ae 32->36 33->13 34 4223b7-4223bd 33->34 34->32 40 4223bf-4223d2 34->40 35->36 37 4223f5 35->37 42 422417-422446 GetPEB lstrcpyW lstrcatW call 4241ae 36->42 43 42244c-422475 NtMapViewOfSection 36->43 37->36 40->13 40->32 42->13 42->43 43->13 46 42247b-42248f call 422005 NtOpenProcessToken 43->46 51 422491-4224a3 call 422e5d call 4224ac 46->51 52 4224c5-4224e4 CreateToolhelp32Snapshot Process32First 46->52 62 4224a5 51->62 63 42250e-42250f 51->63 53 4224eb-4224f5 Process32Next 52->53 55 4224f7-4224fb 53->55 56 422565-422572 CloseHandle 53->56 55->53 58 4224fd-42250d OpenProcess 55->58 56->13 58->53 60 42250f 58->60 64 422510-422518 call 424274 60->64 62->64 65 4224a7-4224e4 CreateToolhelp32Snapshot Process32First 62->65 63->64 69 42251a-422520 64->69 70 42255c-422563 CloseHandle 64->70 65->53 69->70 71 422522-422532 69->71 70->53 71->70 72 422534-42254b CreateRemoteThread 71->72 72->70 73 42254d-422557 call 4222ba 72->73 73->70
                                              APIs
                                              • GetModuleHandleA.KERNEL32(00000000), ref: 004221BE
                                              • GetVersion.KERNEL32 ref: 00422200
                                              • VirtualAlloc.KERNEL32(00000000,000077C4,08001000,00000040), ref: 00422228
                                              • CloseHandle.KERNEL32(?), ref: 004222AD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2065117221.0000000000422000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000015.00000002.2064795062.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064830909.0000000000401000.00000020.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064865379.0000000000406000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064896028.0000000000408000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064927902.000000000040A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064959905.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064992453.0000000000414000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065024303.000000000041A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065055495.000000000041B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065086646.0000000000420000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065150592.0000000000429000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065181608.000000000042E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065213605.0000000000430000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065247297.0000000000436000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065278608.0000000000437000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065314228.000000000043C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065345921.000000000043E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065376800.000000000043F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065412995.0000000000444000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065444222.0000000000445000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065477000.000000000044A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065510299.000000000044C000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065543439.0000000000452000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065574043.0000000000453000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065609286.0000000000458000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065641477.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065672358.000000000045B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065703455.0000000000460000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065733984.0000000000461000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065770490.0000000000466000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065800883.0000000000468000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065830355.0000000000469000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065861085.000000000046E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065891278.000000000046F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065923953.0000000000474000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065955831.0000000000476000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065987198.0000000000477000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066018174.000000000047C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066052063.000000000047D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066082716.0000000000482000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_400000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Handle$AllocCloseModuleVersionVirtual
                                              • String ID: \BaseNamedObjects\krktVt$\BaseNamedObjects\krktVt$csrs
                                              • API String ID: 3017432202-347219270
                                              • Opcode ID: 9a339cd436d9dcaabdfac7e0ef4a3ddf49aaf66cc73df8b107168bbacab3095e
                                              • Instruction ID: ab43ec103d91c20fb762d4f2d0bd0909c8bf0e1cd49eb0996e426fc676339bad
                                              • Opcode Fuzzy Hash: 9a339cd436d9dcaabdfac7e0ef4a3ddf49aaf66cc73df8b107168bbacab3095e
                                              • Instruction Fuzzy Hash: 92B1CF31604215FFEB319F25ED0ABAA3BA9FF45314F40002AE9089E181C7F99F45CB69

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 208 6205f2-620615 GetModuleHandleA call 6210ce 211 620617-620630 208->211 212 6205a9-6205b3 CloseHandle 208->212 213 620632 211->213 214 620639-620648 211->214 216 6205ca-6205d1 212->216 213->214 215 62064c-620652 214->215 215->212 217 620658-620671 215->217 216->212 218 6205d3-6205fc SetProcessAffinityMask call 6205f2 216->218 217->212 219 620677-620690 217->219 223 620621-620623 218->223 224 6205fe-62061c 218->224 219->212 222 620696-62069c 219->222 225 6206d8-6206de 222->225 226 62069e-6206b1 222->226 223->215 227 620625-620630 223->227 224->223 229 6206e0-6206f3 225->229 230 6206fc-620715 lstrcpyW call 6224ae 225->230 226->212 228 6206b7-6206bd 226->228 227->213 227->214 228->225 232 6206bf-6206d2 228->232 229->230 233 6206f5 229->233 235 620717-620746 GetPEB lstrcpyW lstrcatW call 6224ae 230->235 236 62074c-620775 NtMapViewOfSection 230->236 232->212 232->225 233->230 235->212 235->236 236->212 238 62077b-62078f call 620305 NtOpenProcessToken 236->238 242 620791-6207a3 call 62115d call 6207ac 238->242 243 6207c5-6207e4 CreateToolhelp32Snapshot Process32First 238->243 254 6207a5 242->254 255 62080e-62080f 242->255 244 6207eb-6207f5 Process32Next 243->244 246 6207f7-6207fb 244->246 247 620865-620872 CloseHandle 244->247 246->244 249 6207fd-62080d OpenProcess 246->249 247->212 249->244 251 62080f 249->251 253 620810-620818 call 622574 251->253 260 62081a-620820 253->260 261 62085c-620863 CloseHandle 253->261 254->253 256 6207a7-6207e4 CreateToolhelp32Snapshot Process32First 254->256 255->253 256->244 260->261 262 620822-620832 260->262 261->244 262->261 263 620834-62084b CreateRemoteThread 262->263 263->261 264 62084d-620857 call 6205ba 263->264 264->261
                                              APIs
                                              • CloseHandle.KERNELBASE(?), ref: 006205AD
                                              • GetModuleHandleA.KERNEL32(006205EC), ref: 006205F2
                                              • lstrcpyW.KERNEL32(\BaseNamedObjects\krktVt,\BaseNamedObjects\krktVt,?,?,?,?), ref: 0062070A
                                              • lstrcpyW.KERNEL32(\BaseNamedObjects\krktVt,?), ref: 0062072D
                                              • lstrcatW.KERNEL32(\BaseNamedObjects\krktVt,\krktVt), ref: 0062073B
                                              • NtMapViewOfSection.NTDLL(00000000,000000FF,?,00000000,000077C4,00000000,?,00000002,00000000,00000040), ref: 0062076B
                                              • NtOpenProcessToken.NTDLL(000000FF,00000020), ref: 00620786
                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 006207C9
                                              • Process32First.KERNEL32 ref: 006207DC
                                              • Process32Next.KERNEL32 ref: 006207ED
                                              • OpenProcess.KERNEL32(0000002A,00000000,?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 00620805
                                              • CreateRemoteThread.KERNELBASE(?,00000000,00000000,-00003C38,00000002,00000000), ref: 00620842
                                              • CloseHandle.KERNELBASE(?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 0062085D
                                              • CloseHandle.KERNEL32 ref: 0062086C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066207224.0000000000620000.00000040.10000000.00040000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_620000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Handle$Close$CreateOpenProcessProcess32lstrcpy$FirstModuleNextRemoteSectionSnapshotThreadTokenToolhelp32Viewlstrcat
                                              • String ID: \BaseNamedObjects\krktVt$\BaseNamedObjects\krktVt$csrs
                                              • API String ID: 1545766225-347219270
                                              • Opcode ID: 57f894cdfc26879085bf4d227c0781f2b86f7acd2af6685888add29e9757d882
                                              • Instruction ID: 0c1df76fe7d731215c3ff0e0b7db9cb95728a89a8d29f74c0954788d009010a9
                                              • Opcode Fuzzy Hash: 57f894cdfc26879085bf4d227c0781f2b86f7acd2af6685888add29e9757d882
                                              • Instruction Fuzzy Hash: 0C71AC31505529FFEB219F10EC4ABAE3BAEEF45311F100028F909AE192C7B59F459F69

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 150 4222f2-422315 GetModuleHandleA call 422dce 153 422317-422330 150->153 154 4222a9-4222d1 CloseHandle 150->154 155 422332 153->155 156 422339-422348 153->156 160 4222d3-4222e7 SetProcessAffinityMask call 4222f2 154->160 155->156 157 42234c-422352 156->157 157->154 159 422358-422371 157->159 159->154 162 422377-422390 159->162 163 4222ec-4222fc 160->163 162->154 164 422396-42239c 162->164 165 422321-422323 163->165 166 4222fe-42231c 163->166 167 4223d8-4223de 164->167 168 42239e-4223b1 164->168 165->157 169 422325-422330 165->169 166->165 171 4223e0-4223f3 167->171 172 4223fc-422415 lstrcpyW call 4241ae 167->172 168->154 170 4223b7-4223bd 168->170 169->155 169->156 170->167 175 4223bf-4223d2 170->175 171->172 173 4223f5 171->173 177 422417-422446 GetPEB lstrcpyW lstrcatW call 4241ae 172->177 178 42244c-422475 NtMapViewOfSection 172->178 173->172 175->154 175->167 177->154 177->178 178->154 180 42247b-42248f call 422005 NtOpenProcessToken 178->180 184 422491-4224a3 call 422e5d call 4224ac 180->184 185 4224c5-4224e4 CreateToolhelp32Snapshot Process32First 180->185 195 4224a5 184->195 196 42250e-42250f 184->196 186 4224eb-4224f5 Process32Next 185->186 188 4224f7-4224fb 186->188 189 422565-422572 CloseHandle 186->189 188->186 191 4224fd-42250d OpenProcess 188->191 189->154 191->186 193 42250f 191->193 197 422510-422518 call 424274 193->197 195->197 198 4224a7-4224e4 CreateToolhelp32Snapshot Process32First 195->198 196->197 202 42251a-422520 197->202 203 42255c-422563 CloseHandle 197->203 198->186 202->203 204 422522-422532 202->204 203->186 204->203 205 422534-42254b CreateRemoteThread 204->205 205->203 206 42254d-422557 call 4222ba 205->206 206->203
                                              APIs
                                              • CloseHandle.KERNEL32(?), ref: 004222AD
                                              • GetModuleHandleA.KERNEL32(004222EC), ref: 004222F2
                                              • lstrcpyW.KERNEL32(\BaseNamedObjects\krktVt,\BaseNamedObjects\krktVt,?,?,?,?), ref: 0042240A
                                              • lstrcpyW.KERNEL32(\BaseNamedObjects\krktVt,?), ref: 0042242D
                                              • lstrcatW.KERNEL32(\BaseNamedObjects\krktVt,\krktVt), ref: 0042243B
                                              • NtMapViewOfSection.NTDLL(00000000,000000FF,?,00000000,000077C4,00000000,?,00000002,00000000,00000040), ref: 0042246B
                                              • NtOpenProcessToken.NTDLL(000000FF,00000020), ref: 00422486
                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 004224C9
                                              • Process32First.KERNEL32 ref: 004224DC
                                              • Process32Next.KERNEL32 ref: 004224ED
                                              • OpenProcess.KERNEL32(0000002A,00000000,?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 00422505
                                              • CreateRemoteThread.KERNEL32(?,00000000,00000000,-00003C38,00000002,00000000), ref: 00422542
                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 0042255D
                                              • CloseHandle.KERNEL32 ref: 0042256C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2065117221.0000000000422000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000015.00000002.2064795062.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064830909.0000000000401000.00000020.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064865379.0000000000406000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064896028.0000000000408000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064927902.000000000040A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064959905.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064992453.0000000000414000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065024303.000000000041A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065055495.000000000041B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065086646.0000000000420000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065150592.0000000000429000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065181608.000000000042E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065213605.0000000000430000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065247297.0000000000436000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065278608.0000000000437000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065314228.000000000043C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065345921.000000000043E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065376800.000000000043F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065412995.0000000000444000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065444222.0000000000445000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065477000.000000000044A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065510299.000000000044C000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065543439.0000000000452000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065574043.0000000000453000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065609286.0000000000458000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065641477.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065672358.000000000045B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065703455.0000000000460000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065733984.0000000000461000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065770490.0000000000466000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065800883.0000000000468000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065830355.0000000000469000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065861085.000000000046E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065891278.000000000046F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065923953.0000000000474000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065955831.0000000000476000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065987198.0000000000477000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066018174.000000000047C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066052063.000000000047D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066082716.0000000000482000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_400000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Handle$Close$CreateOpenProcessProcess32lstrcpy$FirstModuleNextRemoteSectionSnapshotThreadTokenToolhelp32Viewlstrcat
                                              • String ID: \BaseNamedObjects\krktVt$\BaseNamedObjects\krktVt$csrs
                                              • API String ID: 1545766225-347219270
                                              • Opcode ID: 57f894cdfc26879085bf4d227c0781f2b86f7acd2af6685888add29e9757d882
                                              • Instruction ID: 3c9358d8d222a599120c2d10c72e25c251bd3198cb915bbaa848e733c4282ddf
                                              • Opcode Fuzzy Hash: 57f894cdfc26879085bf4d227c0781f2b86f7acd2af6685888add29e9757d882
                                              • Instruction Fuzzy Hash: 7C71CC31200215FFEB20AF11ED0ABAE3B6DEF44315F90402AE9099E191C7F99F45DB69

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 337 62116f-621187 LoadLibraryA call 621196 340 6211f2 337->340 341 621189 337->341 342 6211f4-6211f8 340->342 341->342 343 62118b-621192 341->343 344 6211f9-62120f 342->344 343->344 345 621194-6211a0 343->345 346 621211-621215 344->346 347 6211ef 344->347 348 6211a2-6211c7 345->348 349 6211c9-6211dc 345->349 353 621216-62121e 346->353 354 62127f-621286 346->354 351 6211f1 347->351 352 62125f-62126a 347->352 348->349 359 6211e0-6211ec 349->359 351->340 357 62126b-621272 352->357 353->359 360 621220-621230 353->360 358 621287-62129e 354->358 362 621273 357->362 369 62129f-6212a4 358->369 359->347 370 621237-62123a 360->370 362->353 364 621275 362->364 367 621277 364->367 368 62123c-62125c 364->368 368->352 371 6212a7-6212ad 369->371 370->368 373 62130f-621311 371->373 374 6212af-6212b1 371->374 375 621303-621305 373->375 376 621313-621315 373->376 377 621323-621325 374->377 378 6212b3-6212b5 374->378 375->358 379 621307-621309 375->379 380 621327-621329 376->380 381 621317-621319 376->381 377->380 382 621357 377->382 378->370 383 6212b7-6212b9 378->383 386 62136b-62136d 379->386 387 62130b-62130d 379->387 389 62137b 380->389 390 62132b-621331 380->390 384 62131b-62131d 381->384 385 6212bb-6212bc 381->385 388 62135b-62135d 382->388 383->384 383->385 393 62138f 384->393 394 62131f-621321 384->394 391 6212bd 385->391 398 62133f-621341 386->398 399 62136f-621375 386->399 387->369 387->373 395 6213cf-6213d1 388->395 396 62135f-621361 388->396 392 62137f-621382 389->392 390->375 397 621333-621335 390->397 400 6212ff-621301 391->400 401 6212bf-6212c1 391->401 402 621383-62138e 392->402 403 621393-621396 393->403 394->377 394->402 407 621403-62140a 395->407 408 6213d3-6213d5 395->408 405 621353-621355 396->405 406 621363-621367 396->406 409 6212c7-6212c9 397->409 410 621337-621339 397->410 398->403 404 621343 398->404 411 621347-621349 399->411 412 621377-621379 399->412 400->375 400->397 401->362 413 6212c3 401->413 402->393 421 621397-6213a1 403->421 414 621345 404->414 415 62133d 404->415 405->382 405->412 406->386 418 62142f-621474 LookupPrivilegeValueA NtAdjustPrivilegesToken 407->418 422 6213e7 408->422 423 6213d7-6213e5 408->423 409->390 419 6212cb-6212cd 409->419 410->386 424 62133b-62133c 410->424 416 6213bb-6213c5 411->416 417 62134b-62134d 411->417 412->389 412->390 413->391 426 6212c5 413->426 414->379 414->411 415->394 415->398 430 6213a7-6213af 416->430 431 6213c7-6213c9 416->431 417->396 427 62134f 417->427 419->400 428 6212cf-6212d1 419->428 429 6213a3-6213a6 421->429 425 6213eb-6213ed 422->425 423->422 436 6213f7-6213f9 423->436 424->415 425->392 433 6213ef-6213f5 425->433 426->371 426->409 427->405 428->375 434 6212d3-6212d5 428->434 429->430 430->416 431->425 435 6213cb-6213cd 431->435 433->421 433->436 434->358 439 6212d7-6212d9 434->439 435->395 435->418 436->425 438 6213fb-621401 436->438 438->407 438->429 439->357 440 6212db-6212e1 439->440 441 6212f3-6212f5 440->441 442 6212e3-6212e9 440->442 441->379 444 6212f7-6212f9 441->444 442->388 443 6212eb-6212ed 442->443 443->428 445 6212ef-6212f1 443->445 444->388 446 6212fb-6212fd 444->446 445->441 445->442 446->354 446->400
                                              APIs
                                              • LoadLibraryA.KERNELBASE(00621162,00620796,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 0062116F
                                                • Part of subcall function 00621196: GetProcAddress.KERNEL32(00000000,00621180), ref: 00621197
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066207224.0000000000620000.00000040.10000000.00040000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_620000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: \krktVt
                                              • API String ID: 2574300362-2624516082
                                              • Opcode ID: b3d31ded32db33cd3ae954c65ddfb718b03c4fc3f7067655557bcd1aa46c43b3
                                              • Instruction ID: f6b39b0716105c9636956b78a380bf725fc2df5302bcfb6971b735261a2162f4
                                              • Opcode Fuzzy Hash: b3d31ded32db33cd3ae954c65ddfb718b03c4fc3f7067655557bcd1aa46c43b3
                                              • Instruction Fuzzy Hash: 71A1AB21C4DEB19BC731EA70A8595EE7FA7EB33751708014EE4A08FB42C661CE438E81

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 447 4241ae-42422e lstrcpyW lstrlenW call 428ab8 NtCreateSection
                                              APIs
                                              • lstrcpyW.KERNEL32(?,\BaseNamedObjects\krktVt), ref: 004241BA
                                              • lstrlenW.KERNEL32(?), ref: 004241C1
                                              • NtCreateSection.NTDLL(?,0000000E,?,?,00000040,08000000,00000000), ref: 00424216
                                              Strings
                                              • \BaseNamedObjects\krktVt, xrefs: 004241B8
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2065117221.0000000000422000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000015.00000002.2064795062.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064830909.0000000000401000.00000020.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064865379.0000000000406000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064896028.0000000000408000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064927902.000000000040A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064959905.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064992453.0000000000414000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065024303.000000000041A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065055495.000000000041B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065086646.0000000000420000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065150592.0000000000429000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065181608.000000000042E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065213605.0000000000430000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065247297.0000000000436000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065278608.0000000000437000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065314228.000000000043C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065345921.000000000043E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065376800.000000000043F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065412995.0000000000444000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065444222.0000000000445000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065477000.000000000044A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065510299.000000000044C000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065543439.0000000000452000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065574043.0000000000453000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065609286.0000000000458000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065641477.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065672358.000000000045B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065703455.0000000000460000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065733984.0000000000461000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065770490.0000000000466000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065800883.0000000000468000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065830355.0000000000469000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065861085.000000000046E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065891278.000000000046F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065923953.0000000000474000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065955831.0000000000476000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065987198.0000000000477000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066018174.000000000047C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066052063.000000000047D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066082716.0000000000482000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_400000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CreateSectionlstrcpylstrlen
                                              • String ID: \BaseNamedObjects\krktVt
                                              • API String ID: 2597515329-3192795942
                                              • Opcode ID: cf07b347a0e0c1752a31311e41616237b242cbc7e37ea3d0786b3fde4713166c
                                              • Instruction ID: 5581d7c1f524575fc82b5bcc0b50f8a90625ae7a2541484ae94f258f7c10a4df
                                              • Opcode Fuzzy Hash: cf07b347a0e0c1752a31311e41616237b242cbc7e37ea3d0786b3fde4713166c
                                              • Instruction Fuzzy Hash: 510181B0781304BAF7309B29CC4BF5F7929DFC1B50F908558F608AE1C4DAB89A0483A9

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 453 62252f-622573 NtOpenSection
                                              APIs
                                              • NtOpenSection.NTDLL(?,0000000E), ref: 0062255E
                                              Strings
                                              • \BaseNamedObjects\krktVt, xrefs: 0062254B
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066207224.0000000000620000.00000040.10000000.00040000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_620000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: OpenSection
                                              • String ID: \BaseNamedObjects\krktVt
                                              • API String ID: 1950954290-3192795942
                                              • Opcode ID: 070b698a65d812778bebda462e03455ac2d4d74c25fc029a23958a9dd811b266
                                              • Instruction ID: cc492c20b74137972e1aeb42a549193fdcd5baff80c1f90c3202c4eb3a6ea2fd
                                              • Opcode Fuzzy Hash: 070b698a65d812778bebda462e03455ac2d4d74c25fc029a23958a9dd811b266
                                              • Instruction Fuzzy Hash: A1E0DFF1342105BAFB288B19CC07FB7220DCBC0600F048604F918DA090E6F4AF104278

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 454 622574-62257c call 62252f 457 622582-6225b4 NtMapViewOfSection CloseHandle 454->457 458 622661-622664 454->458 457->458 459 6225ba-6225c0 457->459 460 6225c2-6225cb 459->460 461 6225ce-6225d8 459->461 460->461 462 6225da-6225e2 461->462 463 6225ef-62262a call 622477 * 3 461->463 462->463 464 6225e4-6225ea call 622477 462->464 472 622637-62263f 463->472 473 62262c-622632 call 622477 463->473 464->463 475 622641-622647 call 622477 472->475 476 62264c-622654 472->476 473->472 475->476 476->458 478 622656-62265c call 622477 476->478 478->458
                                              APIs
                                                • Part of subcall function 0062252F: NtOpenSection.NTDLL(?,0000000E), ref: 0062255E
                                              • NtMapViewOfSection.NTDLL(00000000,?,?,00000000,0000B7C4,00000000,?,00000002,00100000,00000040), ref: 006225A4
                                              • CloseHandle.KERNELBASE(00000000,0000B7C4,00000000,?,00000002,00100000,00000040,00000000,0000B7C4,00000000,?,00620815), ref: 006225AC
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066207224.0000000000620000.00000040.10000000.00040000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_620000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Section$CloseHandleOpenView
                                              • String ID:
                                              • API String ID: 2731707328-0
                                              • Opcode ID: 7e6d81ae67240a40e11905e7904a542b9946b97cc322a4af05470e0a41c17acf
                                              • Instruction ID: fb11ac53935d8031ec5bad1668b5c05ae43543006b902a121762c3944df32a90
                                              • Opcode Fuzzy Hash: 7e6d81ae67240a40e11905e7904a542b9946b97cc322a4af05470e0a41c17acf
                                              • Instruction Fuzzy Hash: 2F211D71300957BBDB24EE25ECA6FE9736AAF80744F40411CF8199E2D4DFB1AE14CA18

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 480 621422-621474 LookupPrivilegeValueA NtAdjustPrivilegesToken
                                              APIs
                                              • LookupPrivilegeValueA.ADVAPI32(00000000,?,?,00000001,00000000,00000000,00000002), ref: 0062145A
                                              • NtAdjustPrivilegesToken.NTDLL(?,00000000,?,00000000,00000000,00000000,?,00000001,00000000,00000000,00000002), ref: 0062146A
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066207224.0000000000620000.00000040.10000000.00040000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_620000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AdjustLookupPrivilegePrivilegesTokenValue
                                              • String ID:
                                              • API String ID: 3615134276-0
                                              • Opcode ID: 4d961b29825b6918877cf0b8ca3bbdf1a1a783037955428b050f6265267c3a26
                                              • Instruction ID: ddbff97e699881e74d61e2820170bd54818263a6fff0c1519b9bac5ac29647fb
                                              • Opcode Fuzzy Hash: 4d961b29825b6918877cf0b8ca3bbdf1a1a783037955428b050f6265267c3a26
                                              • Instruction Fuzzy Hash: 5BF0AE36542510BBD7205F56CD8EED77F28EF533A0F144556F4484E151C2624BA5D3F4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 482 622477-6224ad NtProtectVirtualMemory NtWriteVirtualMemory
                                              APIs
                                              • NtProtectVirtualMemory.NTDLL(?,?,?,00000040), ref: 0062249B
                                              • NtWriteVirtualMemory.NTDLL ref: 006224A4
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066207224.0000000000620000.00000040.10000000.00040000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_620000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: MemoryVirtual$ProtectWrite
                                              • String ID:
                                              • API String ID: 151266762-0
                                              • Opcode ID: 3b89ad314080acfcfa5e752e4380cd5b7e8fc3aa7940f56e0bfe36a9f1ccff9c
                                              • Instruction ID: 6bbb67ea70d6ee96dfa5f1d7b4d314b28acc786a60d934acbd3f762ecc45b662
                                              • Opcode Fuzzy Hash: 3b89ad314080acfcfa5e752e4380cd5b7e8fc3aa7940f56e0bfe36a9f1ccff9c
                                              • Instruction Fuzzy Hash: 2AE012E07502007FF5185F55DC5FF7B391DDB41751F410208FA0A981C4F9A15E18467A

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 483 62144a-621474 LookupPrivilegeValueA NtAdjustPrivilegesToken
                                              APIs
                                              • LookupPrivilegeValueA.ADVAPI32(00000000,?,?,00000001,00000000,00000000,00000002), ref: 0062145A
                                              • NtAdjustPrivilegesToken.NTDLL(?,00000000,?,00000000,00000000,00000000,?,00000001,00000000,00000000,00000002), ref: 0062146A
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066207224.0000000000620000.00000040.10000000.00040000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_620000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AdjustLookupPrivilegePrivilegesTokenValue
                                              • String ID:
                                              • API String ID: 3615134276-0
                                              • Opcode ID: f45ad7484d04f34a0af0f423c52b42987f710650b5115a9fa6d287fad7b05342
                                              • Instruction ID: ee32c209e3d0a2de55b6acbdbca8a3d00d8b73f2470e3acbbab87dcaf3c2c19a
                                              • Opcode Fuzzy Hash: f45ad7484d04f34a0af0f423c52b42987f710650b5115a9fa6d287fad7b05342
                                              • Instruction Fuzzy Hash: F2D06731643034BBD6312A568C0EEE77D1DEF577A0F015041F9089A1A1C5A28EA1C7F5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 266 4029e0-402a19 #4710 SendMessageA * 2 267 402a1b-402a1d 266->267 268 402a1f 266->268 269 402a22-402a63 SetWindowLongA #6197 WinExec call 402ad0 267->269 268->269 271 402a68-402a6c 269->271 272 402a9d-402abb call 402b40 271->272 273 402a6e-402a87 271->273 275 402a94-402a9c 272->275 277 402abd-402ac4 call 402330 ExitProcess 272->277 273->275
                                              APIs
                                              • #4710.MFC42 ref: 004029EA
                                              • SendMessageA.USER32(?,00000080,00000001,?), ref: 00402A04
                                              • SendMessageA.USER32(?,00000080,00000000,?), ref: 00402A15
                                              • SetWindowLongA.USER32(?,000000EC,00000080), ref: 00402A2A
                                              • #6197.MFC42(00000000,0000009C,0000009C,00000000,00000000,00000001), ref: 00402A3E
                                              • WinExec.KERNEL32(taskkill /f /im ZhuDongFangYu.exe /t,00000000), ref: 00402A5D
                                                • Part of subcall function 00402B40: LoadLibraryA.KERNEL32(kernel32.dll,00000047), ref: 00402BF5
                                                • Part of subcall function 00402B40: GetProcAddress.KERNEL32(00000000), ref: 00402BFC
                                                • Part of subcall function 00402B40: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00402C1F
                                                • Part of subcall function 00402B40: strncmp.MSVCRT ref: 00402C44
                                              • ExitProcess.KERNEL32 ref: 00402AC4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2064830909.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000015.00000002.2064795062.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064865379.0000000000406000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064896028.0000000000408000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064927902.000000000040A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064959905.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064992453.0000000000414000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065024303.000000000041A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065055495.000000000041B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065086646.0000000000420000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065117221.0000000000422000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065150592.0000000000429000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065181608.000000000042E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065213605.0000000000430000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065247297.0000000000436000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065278608.0000000000437000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065314228.000000000043C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065345921.000000000043E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065376800.000000000043F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065412995.0000000000444000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065444222.0000000000445000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065477000.000000000044A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065510299.000000000044C000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065543439.0000000000452000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065574043.0000000000453000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065609286.0000000000458000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065641477.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065672358.000000000045B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065703455.0000000000460000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065733984.0000000000461000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065770490.0000000000466000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065800883.0000000000468000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065830355.0000000000469000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065861085.000000000046E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065891278.000000000046F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065923953.0000000000474000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065955831.0000000000476000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065987198.0000000000477000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066018174.000000000047C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066052063.000000000047D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066082716.0000000000482000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_400000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: MessageSend$#4710#6197AddressDirectoryExecExitLibraryLoadLongProcProcessSystemWindowstrncmp
                                              • String ID: 100200$100200$100200$taskkill /f /im ZhuDongFangYu.exe /t$|7@
                                              • API String ID: 3614577793-2301931671
                                              • Opcode ID: e673e02340e5bd4efe8e554bec7010853af1fda679b9e67aa24c048e2f3451a8
                                              • Instruction ID: 36d68f4db7c25d412b264195875051be24fd626328578f2d4964cd317598fecc
                                              • Opcode Fuzzy Hash: e673e02340e5bd4efe8e554bec7010853af1fda679b9e67aa24c048e2f3451a8
                                              • Instruction Fuzzy Hash: 6E11B4307407107BD730AB659E0AF5B77A8BB44B04F10462EFA85B72C1CFF8A8048A5C

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 280 6207ac-6207bf call 62144a FreeLibrary CloseHandle 283 6207c5-6207e4 CreateToolhelp32Snapshot Process32First 280->283 284 6207eb-6207f5 Process32Next 283->284 285 6207f7-6207fb 284->285 286 620865-620872 CloseHandle 284->286 285->284 287 6207fd-62080d OpenProcess 285->287 288 6205a9-6205d1 CloseHandle 286->288 287->284 289 62080f 287->289 293 6205d3-6205fc SetProcessAffinityMask call 6205f2 288->293 290 620810-620818 call 622574 289->290 297 62081a-620820 290->297 298 62085c-620863 CloseHandle 290->298 299 620621-620623 293->299 300 6205fe-62061c 293->300 297->298 301 620822-620832 297->301 298->284 302 620625-620630 299->302 303 62064c-620652 299->303 300->299 301->298 304 620834-62084b CreateRemoteThread 301->304 305 620632 302->305 306 620639-620648 302->306 303->288 307 620658-620671 303->307 304->298 308 62084d-620857 call 6205ba 304->308 305->306 306->303 307->288 309 620677-620690 307->309 308->298 309->288 311 620696-62069c 309->311 312 6206d8-6206de 311->312 313 62069e-6206b1 311->313 315 6206e0-6206f3 312->315 316 6206fc-620715 lstrcpyW call 6224ae 312->316 313->288 314 6206b7-6206bd 313->314 314->312 318 6206bf-6206d2 314->318 315->316 319 6206f5 315->319 321 620717-620746 GetPEB lstrcpyW lstrcatW call 6224ae 316->321 322 62074c-620775 NtMapViewOfSection 316->322 318->288 318->312 319->316 321->288 321->322 322->288 324 62077b-62078f call 620305 NtOpenProcessToken 322->324 324->283 328 620791-6207a3 call 62115d call 6207ac 324->328 333 6207a5 328->333 334 62080e-62080f 328->334 333->290 335 6207a7-6207e4 CreateToolhelp32Snapshot Process32First 333->335 334->290 335->284
                                              APIs
                                                • Part of subcall function 0062144A: LookupPrivilegeValueA.ADVAPI32(00000000,?,?,00000001,00000000,00000000,00000002), ref: 0062145A
                                                • Part of subcall function 0062144A: NtAdjustPrivilegesToken.NTDLL(?,00000000,?,00000000,00000000,00000000,?,00000001,00000000,00000000,00000002), ref: 0062146A
                                              • CloseHandle.KERNELBASE(?), ref: 006205AD
                                              • FreeLibrary.KERNELBASE(76DA0000,?,0062079B,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 006207B8
                                              • CloseHandle.KERNELBASE(?,?,0062079B,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 006207BF
                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 006207C9
                                              • Process32First.KERNEL32 ref: 006207DC
                                              • Process32Next.KERNEL32 ref: 006207ED
                                              • OpenProcess.KERNEL32(0000002A,00000000,?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 00620805
                                              • CreateRemoteThread.KERNELBASE(?,00000000,00000000,-00003C38,00000002,00000000), ref: 00620842
                                              • CloseHandle.KERNELBASE(?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 0062085D
                                              • CloseHandle.KERNEL32 ref: 0062086C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066207224.0000000000620000.00000040.10000000.00040000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_620000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CloseHandle$CreateProcess32$AdjustFirstFreeLibraryLookupNextOpenPrivilegePrivilegesProcessRemoteSnapshotThreadTokenToolhelp32Value
                                              • String ID: csrs
                                              • API String ID: 3908997113-2321902090
                                              • Opcode ID: 214ed8d877d5af5bdcbfeb92dfaf8d9be1786541dc830f75d8708442990ea625
                                              • Instruction ID: 433a8f3ae285678310bf14c62dc6cbc29417924331ab8289fee92d48ec8e0363
                                              • Opcode Fuzzy Hash: 214ed8d877d5af5bdcbfeb92dfaf8d9be1786541dc830f75d8708442990ea625
                                              • Instruction Fuzzy Hash: B2113030505625BBFB255F21DD49BBF3EAEEF44701F00402DF94A99142C6B49F019E6A

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 450 4010b0-4011bf #1134 call 4011f0 #2514 #641
                                              APIs
                                              • #1134.MFC42(00000000), ref: 004010D0
                                                • Part of subcall function 004011F0: #324.MFC42(00000066,00000000,?,?,00000000,00405C38,000000FF,004010ED,00000000), ref: 00401214
                                                • Part of subcall function 004011F0: #1168.MFC42(00000066,00000000,?,?,00000000), ref: 00401227
                                                • Part of subcall function 004011F0: #1146.MFC42(00000080,0000000E,00000080,00000066,00000000,?,?,00000000), ref: 00401238
                                                • Part of subcall function 004011F0: LoadIconA.USER32(00000000,00000080), ref: 0040123E
                                              • #2514.MFC42(00000000), ref: 004010FD
                                              • #641.MFC42(00000000), ref: 004011AA
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2064830909.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000015.00000002.2064795062.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064865379.0000000000406000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064896028.0000000000408000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064927902.000000000040A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064959905.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064992453.0000000000414000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065024303.000000000041A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065055495.000000000041B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065086646.0000000000420000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065117221.0000000000422000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065150592.0000000000429000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065181608.000000000042E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065213605.0000000000430000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065247297.0000000000436000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065278608.0000000000437000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065314228.000000000043C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065345921.000000000043E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065376800.000000000043F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065412995.0000000000444000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065444222.0000000000445000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065477000.000000000044A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065510299.000000000044C000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065543439.0000000000452000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065574043.0000000000453000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065609286.0000000000458000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065641477.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065672358.000000000045B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065703455.0000000000460000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065733984.0000000000461000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065770490.0000000000466000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065800883.0000000000468000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065830355.0000000000469000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065861085.000000000046E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065891278.000000000046F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065923953.0000000000474000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065955831.0000000000476000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065987198.0000000000477000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066018174.000000000047C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066052063.000000000047D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066082716.0000000000482000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_400000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: #1134#1146#1168#2514#324#641IconLoad
                                              • String ID:
                                              • API String ID: 684539369-0
                                              • Opcode ID: d0dbdc0e91b82d1144f430ae13d057aa2d360b1f2b28aa11f9f2600f3695659b
                                              • Instruction ID: e887a676387cd3a6316cff733c1d11cddbc99e07af3dfecb023e529bfa9dd79e
                                              • Opcode Fuzzy Hash: d0dbdc0e91b82d1144f430ae13d057aa2d360b1f2b28aa11f9f2600f3695659b
                                              • Instruction Fuzzy Hash: 07F09671854618EBC724EFA4CC42B9DB778FB05724F10033EE815A36C1EB785605CB85

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 484 405b10-405b25 #1576
                                              APIs
                                              • #1576.MFC42(004035C3,004035C3,004035C3,004035C3,004035C3,00000000,?,0000000A), ref: 00405B20
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2064830909.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000015.00000002.2064795062.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064865379.0000000000406000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064896028.0000000000408000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064927902.000000000040A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064959905.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064992453.0000000000414000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065024303.000000000041A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065055495.000000000041B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065086646.0000000000420000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065117221.0000000000422000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065150592.0000000000429000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065181608.000000000042E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065213605.0000000000430000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065247297.0000000000436000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065278608.0000000000437000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065314228.000000000043C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065345921.000000000043E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065376800.000000000043F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065412995.0000000000444000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065444222.0000000000445000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065477000.000000000044A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065510299.000000000044C000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065543439.0000000000452000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065574043.0000000000453000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065609286.0000000000458000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065641477.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065672358.000000000045B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065703455.0000000000460000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065733984.0000000000461000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065770490.0000000000466000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065800883.0000000000468000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065830355.0000000000469000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065861085.000000000046E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065891278.000000000046F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065923953.0000000000474000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065955831.0000000000476000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065987198.0000000000477000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066018174.000000000047C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066052063.000000000047D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066082716.0000000000482000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_400000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: #1576
                                              • String ID:
                                              • API String ID: 1976119259-0
                                              • Opcode ID: 47d5a98b55b57ba85a66e84109f2227387a3d22cae08d4c422bb556fe884a3cf
                                              • Instruction ID: d2ca0a3b883f0518e56937479b7600124a2c67ba881e6fa747779e696d41ac8e
                                              • Opcode Fuzzy Hash: 47d5a98b55b57ba85a66e84109f2227387a3d22cae08d4c422bb556fe884a3cf
                                              • Instruction Fuzzy Hash: 36B0087601C786ABDB02DE91880192BBAA2BB98704F485C1DB2A1140A187768478EB16
                                              APIs
                                              • CloseHandle.KERNELBASE(00000004,CA1AE9E0,?,?,?,?,?,?,?,?,?,?,?,?,?,07704390), ref: 00482C82
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066082716.0000000000482000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000015.00000002.2064795062.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064830909.0000000000401000.00000020.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064865379.0000000000406000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064896028.0000000000408000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064927902.000000000040A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064959905.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064992453.0000000000414000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065024303.000000000041A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065055495.000000000041B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065086646.0000000000420000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065117221.0000000000422000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065150592.0000000000429000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065181608.000000000042E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065213605.0000000000430000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065247297.0000000000436000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065278608.0000000000437000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065314228.000000000043C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065345921.000000000043E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065376800.000000000043F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065412995.0000000000444000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065444222.0000000000445000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065477000.000000000044A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065510299.000000000044C000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065543439.0000000000452000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065574043.0000000000453000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065609286.0000000000458000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065641477.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065672358.000000000045B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065703455.0000000000460000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065733984.0000000000461000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065770490.0000000000466000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065800883.0000000000468000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065830355.0000000000469000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065861085.000000000046E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065891278.000000000046F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065923953.0000000000474000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065955831.0000000000476000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065987198.0000000000477000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066018174.000000000047C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066052063.000000000047D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_400000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CloseHandle
                                              • String ID:
                                              • API String ID: 2962429428-0
                                              • Opcode ID: 2941891f3795c6f05a293b06209a9f50f08dfe53ecc95c981ceb5e51ef49c74a
                                              • Instruction ID: a1d831deead5511c42865662fe48a5713adfdc2882c533367e09d43fbcf8ea79
                                              • Opcode Fuzzy Hash: 2941891f3795c6f05a293b06209a9f50f08dfe53ecc95c981ceb5e51ef49c74a
                                              • Instruction Fuzzy Hash: 2621797A5056219FCB15FA19DA822EDB3E1FF41724B501D1FFA818B201C6A89E47C7CA
                                              APIs
                                              • CloseHandle.KERNELBASE(00000004,CA1AE9E0,?,?,?,?,?,?,?,?,?,?,?,?,?,07704390), ref: 00482C82
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066082716.0000000000482000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000015.00000002.2064795062.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064830909.0000000000401000.00000020.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064865379.0000000000406000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064896028.0000000000408000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064927902.000000000040A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064959905.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064992453.0000000000414000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065024303.000000000041A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065055495.000000000041B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065086646.0000000000420000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065117221.0000000000422000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065150592.0000000000429000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065181608.000000000042E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065213605.0000000000430000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065247297.0000000000436000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065278608.0000000000437000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065314228.000000000043C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065345921.000000000043E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065376800.000000000043F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065412995.0000000000444000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065444222.0000000000445000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065477000.000000000044A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065510299.000000000044C000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065543439.0000000000452000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065574043.0000000000453000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065609286.0000000000458000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065641477.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065672358.000000000045B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065703455.0000000000460000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065733984.0000000000461000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065770490.0000000000466000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065800883.0000000000468000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065830355.0000000000469000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065861085.000000000046E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065891278.000000000046F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065923953.0000000000474000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065955831.0000000000476000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065987198.0000000000477000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066018174.000000000047C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066052063.000000000047D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_400000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CloseHandle
                                              • String ID:
                                              • API String ID: 2962429428-0
                                              • Opcode ID: 2ef6b8e0adac193261cfa0d2a5bee3fdbc2c21d07b809aa780d6ca7f1990f43e
                                              • Instruction ID: 91acae21fac1e4a6c4b2e5db99c7eb7ecfa0cfdef3ce7ae895fde2adf8682098
                                              • Opcode Fuzzy Hash: 2ef6b8e0adac193261cfa0d2a5bee3fdbc2c21d07b809aa780d6ca7f1990f43e
                                              • Instruction Fuzzy Hash: C3E0D8365246189ECA10BA59EE524DD77E1FEC1724B504E1BE581460419B142E4797CA
                                              APIs
                                              • Sleep.KERNELBASE(0000000A,0062085C,?,00000000,00000000,-00003C38,00000002,00000000,?,00000000), ref: 006205C1
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066207224.0000000000620000.00000040.10000000.00040000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_620000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Sleep
                                              • String ID:
                                              • API String ID: 3472027048-0
                                              • Opcode ID: 3c1f989dfd13240381299ec7adf5382b251643946d8aa86ca05208ab7bb78418
                                              • Instruction ID: 1995448df91c11655b7e35f5ad4549aff7238c710e58d2d15a2b44631638ce87
                                              • Opcode Fuzzy Hash: 3c1f989dfd13240381299ec7adf5382b251643946d8aa86ca05208ab7bb78418
                                              • Instruction Fuzzy Hash: AFB0122824071095FA140910660DB0416267F00B11FE00059F2066C0C507E407011C09
                                              APIs
                                              • GetWindowsDirectoryA.KERNEL32(020a00 . . :#a260b0403 +*,00000104), ref: 00623CA1
                                              • GetProcAddress.KERNEL32(00000000,00000002), ref: 00623CD4
                                              • GetProcAddress.KERNEL32(00000000,00623D41), ref: 00623D4C
                                              • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 00623D5F
                                              • GetTickCount.KERNEL32 ref: 00623D93
                                              • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00626EF6,00000000,00000000,00000000,00000000), ref: 00623E65
                                              • GetModuleFileNameA.KERNEL32(00000000,020a00 . . :#a260b0403 +*,000000C8), ref: 00623EE2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066207224.0000000000620000.00000040.10000000.00040000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_620000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressProc$CountDirectoryFileInformationLibraryLoadModuleNameTickVolumeWindows
                                              • String ID: 020a00 . . :#a260b0403 +*$ADVAPI32.DLL$C:,$C:\USERS\user\APPDATA\LOCAL\SYSTEMRESOURCES\HRLA367.TMP.MUN$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 1749273276-2126123959
                                              • Opcode ID: f516923bb6111dac5ea2ce27cbf4c730b644d8035d3db586d383e9b78a19a3eb
                                              • Instruction ID: 9686eb37e835eba57ca9fc3fe635cb560c48eb3413f9f2a6ef6d08adbe526383
                                              • Opcode Fuzzy Hash: f516923bb6111dac5ea2ce27cbf4c730b644d8035d3db586d383e9b78a19a3eb
                                              • Instruction Fuzzy Hash: BF020471508668BFEB259F24AC0ABEA7BADEF41300F00451DEC499F182D7F45F458BA6
                                              APIs
                                              • GetModuleHandleA.KERNEL32(00623CBA), ref: 00623CC2
                                              • GetProcAddress.KERNEL32(00000000,00000002), ref: 00623CD4
                                              • GetProcAddress.KERNEL32(00000000,00623D41), ref: 00623D4C
                                              • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 00623D5F
                                              • GetTickCount.KERNEL32 ref: 00623D93
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066207224.0000000000620000.00000040.10000000.00040000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_620000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressProc$CountHandleLibraryLoadModuleTick
                                              • String ID: 020a00 . . :#a260b0403 +*$ADVAPI32.DLL$C:,$C:\USERS\user\APPDATA\LOCAL\SYSTEMRESOURCES\HRLA367.TMP.MUN$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 2837544101-2126123959
                                              • Opcode ID: 5b48797bfded511fe3541d43c5fd4cc9561b065424dfc698fabc9acd851576a7
                                              • Instruction ID: b855e10cce06d21d4ce12ed9eeda7800841905188b9aad1667ca36872942227e
                                              • Opcode Fuzzy Hash: 5b48797bfded511fe3541d43c5fd4cc9561b065424dfc698fabc9acd851576a7
                                              • Instruction Fuzzy Hash: FAE12371508668BFEB259F24AC1ABEA7BADEF41300F00451DEC498E182D7F45F458BA5
                                              APIs
                                              • GetModuleHandleA.KERNEL32(00623CE5), ref: 00623CF0
                                              • GetSystemDirectoryA.KERNEL32(020a00 . . :#a260b0403 +*,00000104), ref: 00623D07
                                                • Part of subcall function 00623D1F: lstrcat.KERNEL32(020a00 . . :#a260b0403 +*,00623D12), ref: 00623D20
                                                • Part of subcall function 00623D1F: GetProcAddress.KERNEL32(00000000,00623D41), ref: 00623D4C
                                                • Part of subcall function 00623D1F: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 00623D5F
                                                • Part of subcall function 00623D1F: GetTickCount.KERNEL32 ref: 00623D93
                                                • Part of subcall function 00623D1F: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00626EF6,00000000,00000000,00000000,00000000), ref: 00623E65
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066207224.0000000000620000.00000040.10000000.00040000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_620000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressCountDirectoryHandleInformationLibraryLoadModuleProcSystemTickVolumelstrcat
                                              • String ID: 020a00 . . :#a260b0403 +*$ADVAPI32.DLL$C:,$C:\USERS\user\APPDATA\LOCAL\SYSTEMRESOURCES\HRLA367.TMP.MUN$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 215653160-2126123959
                                              • Opcode ID: 260c0d83971146764b612a54da98fff840ddc31a6bb3a69eed28180f54add843
                                              • Instruction ID: 9c15a6135af06ea68eed38e66590967a2724b4dedff14192887d9629bceb03d3
                                              • Opcode Fuzzy Hash: 260c0d83971146764b612a54da98fff840ddc31a6bb3a69eed28180f54add843
                                              • Instruction Fuzzy Hash: 27E11271408668BFEB25AF24EC1ABEA7BADEF41300F00455DEC498E182D7F45F458BA5
                                              APIs
                                              • lstrcat.KERNEL32(020a00 . . :#a260b0403 +*,00623D12), ref: 00623D20
                                                • Part of subcall function 00623D36: LoadLibraryA.KERNEL32(00623D2B), ref: 00623D36
                                                • Part of subcall function 00623D36: GetProcAddress.KERNEL32(00000000,00623D41), ref: 00623D4C
                                                • Part of subcall function 00623D36: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 00623D5F
                                                • Part of subcall function 00623D36: GetTickCount.KERNEL32 ref: 00623D93
                                                • Part of subcall function 00623D36: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00626EF6,00000000,00000000,00000000,00000000), ref: 00623E65
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066207224.0000000000620000.00000040.10000000.00040000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_620000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: LibraryLoad$AddressCountInformationProcTickVolumelstrcat
                                              • String ID: 020a00 . . :#a260b0403 +*$ADVAPI32.DLL$C:,$C:\USERS\user\APPDATA\LOCAL\SYSTEMRESOURCES\HRLA367.TMP.MUN$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 2038497427-2126123959
                                              • Opcode ID: 9a3d42354aede4d92b231a7e1a08d8f1ff67a071c39a48690dfdf21ca6a4930c
                                              • Instruction ID: e8454bb418bd3bdec4a6cc5325a6ee504a2468e02d95ec0b778fd102973512ec
                                              • Opcode Fuzzy Hash: 9a3d42354aede4d92b231a7e1a08d8f1ff67a071c39a48690dfdf21ca6a4930c
                                              • Instruction Fuzzy Hash: 99E10171408668BFEB25AF24AC1ABEA7BAEEF01300F00455DEC499E182D7F45F458B65
                                              APIs
                                              • LoadLibraryA.KERNEL32(00623D2B), ref: 00623D36
                                                • Part of subcall function 00623D4B: GetProcAddress.KERNEL32(00000000,00623D41), ref: 00623D4C
                                                • Part of subcall function 00623D4B: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 00623D5F
                                                • Part of subcall function 00623D4B: GetTickCount.KERNEL32 ref: 00623D93
                                                • Part of subcall function 00623D4B: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00626EF6,00000000,00000000,00000000,00000000), ref: 00623E65
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066207224.0000000000620000.00000040.10000000.00040000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_620000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: LibraryLoad$AddressCountInformationProcTickVolume
                                              • String ID: 020a00 . . :#a260b0403 +*$ADVAPI32.DLL$C:,$C:\USERS\user\APPDATA\LOCAL\SYSTEMRESOURCES\HRLA367.TMP.MUN$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 3734769084-2126123959
                                              • Opcode ID: fe378de023044d5e93c1fdb9f401057012e9a432939cf19daad1b95bd79d3ac1
                                              • Instruction ID: feafba773b1dc8f60771043ce649bfabc7d85728c15cf534095bfd7e5b85db19
                                              • Opcode Fuzzy Hash: fe378de023044d5e93c1fdb9f401057012e9a432939cf19daad1b95bd79d3ac1
                                              • Instruction Fuzzy Hash: C7D1F371408668BFEB259F24DC1ABEA7BAEEF41300F00055DEC499E282D7F45F458B65
                                              APIs
                                              • GetProcAddress.KERNEL32(00000000,00623D41), ref: 00623D4C
                                              • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 00623D5F
                                              • GetTickCount.KERNEL32 ref: 00623D93
                                              • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00626EF6,00000000,00000000,00000000,00000000), ref: 00623E65
                                              • GetModuleFileNameA.KERNEL32(00000000,020a00 . . :#a260b0403 +*,000000C8), ref: 00623EE2
                                              • wsprintfA.USER32 ref: 00623EF7
                                              • CreateThread.KERNEL32(00000000,00000000,00623691,00000000,00000000), ref: 00623F40
                                              • CloseHandle.KERNEL32(?,1C567C50), ref: 00623F49
                                              • CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 00623FE9
                                              • CloseHandle.KERNEL32(?,00000000), ref: 00623FF2
                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 00623FFF
                                              • socket.WS2_32(00000002,00000001,00000000), ref: 00624097
                                              • connect.WS2_32(6F6C6902,00623B09,00000010), ref: 006240B1
                                              • GetVersionExA.KERNEL32(?,?,00000000), ref: 006240FB
                                              • wsprintfA.USER32 ref: 00624179
                                              • SetEvent.KERNEL32(0000065C,?,00000000), ref: 006242D6
                                              • Sleep.KERNEL32(00007530,?,00000000), ref: 006242F7
                                              • ResetEvent.KERNEL32(0000065C,?,00000000), ref: 0062430A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066207224.0000000000620000.00000040.10000000.00040000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_620000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CreateEvent$CloseHandleThreadwsprintf$AddressCountFileInformationLibraryLoadModuleNameProcResetSleepTickVersionVolumeconnectsocket
                                              • String ID: 020a00 . . :#a260b0403 +*$ADVAPI32.DLL$C:,$C:\USERS\user\APPDATA\LOCAL\SYSTEMRESOURCES\HRLA367.TMP.MUN$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 1567941233-2126123959
                                              • Opcode ID: d164329b401e47e84a28de3fe606969c9cc020fa4a70ab4836cae6f21abb50e9
                                              • Instruction ID: 36a1f7aeb34ce33386af3ace0f3500c6af14510dc7c4c35f01c35bb194b0b2dc
                                              • Opcode Fuzzy Hash: d164329b401e47e84a28de3fe606969c9cc020fa4a70ab4836cae6f21abb50e9
                                              • Instruction Fuzzy Hash: BCE1F171408668BFEB259F24AC0ABEA7BADEF41300F004559EC499E282D7F45F45CB65
                                              APIs
                                              • GetModuleHandleA.KERNEL32(00000000), ref: 7FE304CD
                                              • GetVersion.KERNEL32 ref: 7FE3050F
                                              • VirtualAlloc.KERNEL32(00000000,000065A4,08001000,00000040), ref: 7FE30537
                                              • CloseHandle.KERNEL32(?), ref: 7FE305BC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066853464.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_7fe30000_hrlA367.jbxd
                                              Similarity
                                              • API ID: Handle$AllocCloseModuleVersionVirtual
                                              • String ID: "'3$\BaseNamedObjects\imktVt$\BaseNamedObjects\imktVt$csrs
                                              • API String ID: 3017432202-3310801285
                                              • Opcode ID: 7ac06902b526b320f932b07ff4c1ff8a544c7f655dd6fa859a553a943bad6a44
                                              • Instruction ID: bf6e148d40060bb9ff3a14a9286da860fd85a46fac5c7d6c15dd231958de371b
                                              • Opcode Fuzzy Hash: 7ac06902b526b320f932b07ff4c1ff8a544c7f655dd6fa859a553a943bad6a44
                                              • Instruction Fuzzy Hash: 95B16C31A05359FFEB619F20C809BED3BADEF4571AF900024EA0A9E181C7F1AB45CB55
                                              APIs
                                              • CloseHandle.KERNEL32(?), ref: 7FE305BC
                                              • GetModuleHandleA.KERNEL32(7FE305FB), ref: 7FE30601
                                              • lstrcpyW.KERNEL32(\BaseNamedObjects\imktVt,\BaseNamedObjects\imktVt,?,?,?,?), ref: 7FE30719
                                              • lstrcpyW.KERNEL32(\BaseNamedObjects\imktVt,?), ref: 7FE30736
                                              • lstrcatW.KERNEL32(\BaseNamedObjects\imktVt,\imktVt), ref: 7FE30744
                                              • NtMapViewOfSection.NTDLL(00000000,000000FF,?,00000000,000065A4,00000000,?,00000002,00000000,00000040), ref: 7FE30774
                                              • NtOpenProcessToken.NTDLL(000000FF,00000020), ref: 7FE3078F
                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,000065A4,00000000,?,00000002,00000000,00000040,00000000,000065A4), ref: 7FE307D2
                                              • Process32First.KERNEL32 ref: 7FE307E5
                                              • Process32Next.KERNEL32 ref: 7FE307F6
                                              • OpenProcess.KERNEL32(0000002A,00000000,?,?,?,?,?,?,00000002,00000000,00000040,00000000,000065A4), ref: 7FE3080E
                                              • CreateRemoteThread.KERNEL32(?,00000000,00000000,-00002FC3,00000002,00000000), ref: 7FE3084B
                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,00000002,00000000,00000040,00000000,000065A4), ref: 7FE30866
                                              • CloseHandle.KERNEL32 ref: 7FE30875
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066853464.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_7fe30000_hrlA367.jbxd
                                              Similarity
                                              • API ID: Handle$Close$CreateOpenProcessProcess32lstrcpy$FirstModuleNextRemoteSectionSnapshotThreadTokenToolhelp32Viewlstrcat
                                              • String ID: \BaseNamedObjects\imktVt$\BaseNamedObjects\imktVt$csrs
                                              • API String ID: 1545766225-3978125692
                                              • Opcode ID: dcfbda88c1452e16d26fd376d2d59b1fd8c40ae983f26fda525faf50f22b961d
                                              • Instruction ID: 4034ee1ac34cf344d60b1b743f91cb73119df433e2ee071f6ee9a8f8d678e866
                                              • Opcode Fuzzy Hash: dcfbda88c1452e16d26fd376d2d59b1fd8c40ae983f26fda525faf50f22b961d
                                              • Instruction Fuzzy Hash: 0961BD31A05209FFDB619F10C84DBEE3B6EEF45719F904068EA0A9E590C7B1AF05CB95
                                              APIs
                                              • lstrlen.KERNEL32(ilo.brenz.pl,?,00000000), ref: 00624057
                                              • gethostbyname.WS2_32(ilo.brenz.pl), ref: 00624066
                                              • socket.WS2_32(00000002,00000001,00000000), ref: 00624097
                                              • connect.WS2_32(6F6C6902,00623B09,00000010), ref: 006240B1
                                              • GetVersionExA.KERNEL32(?,?,00000000), ref: 006240FB
                                              • wsprintfA.USER32 ref: 00624179
                                              • CreateThread.KERNEL32(00000000,00000000,Function_00003819,6F6C6902,00000000), ref: 006241B4
                                              • CloseHandle.KERNEL32(?,00000000,6F6C6902,00626AA2,00000000,00000000), ref: 006241BD
                                              • GetTickCount.KERNEL32 ref: 006241F6
                                              • Sleep.KERNEL32(00000064,?,00000000,6F6C6902,00626AA2,00000000,00000000), ref: 0062428B
                                              • GetTickCount.KERNEL32 ref: 00624294
                                              • closesocket.WS2_32(6F6C6902), ref: 006242B8
                                              • SetEvent.KERNEL32(0000065C,?,00000000), ref: 006242D6
                                              • Sleep.KERNEL32(00007530,?,00000000), ref: 006242F7
                                              • ResetEvent.KERNEL32(0000065C,?,00000000), ref: 0062430A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066207224.0000000000620000.00000040.10000000.00040000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_620000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CountEventSleepTick$CloseCreateHandleResetThreadVersionclosesocketconnectgethostbynamelstrlensocketwsprintf
                                              • String ID: 020a00 . . :#a260b0403 +*$C:\USERS\user\APPDATA\LOCAL\SYSTEMRESOURCES\HRLA367.TMP.MUN
                                              • API String ID: 883794535-2044341515
                                              • Opcode ID: 6b0defe1960dce2cb68afb5d2726ae1425874940fd6c70606eed0c1c35355a33
                                              • Instruction ID: 14abf7b43081687a8610e7fc544324c7f9e4e2bc87c005dd4b205ad0919b7ac0
                                              • Opcode Fuzzy Hash: 6b0defe1960dce2cb68afb5d2726ae1425874940fd6c70606eed0c1c35355a33
                                              • Instruction Fuzzy Hash: 5071EE71508669BAEB319F34981D7EEBFAEEF41310F040508E85A9E281CBF45F81CB65
                                              APIs
                                              • NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 7FE32A36
                                              • NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 7FE32A55
                                              • MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 7FE32A7F
                                              • CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 7FE32A8C
                                              • UnmapViewOfFile.KERNEL32(?), ref: 7FE32AA4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066853464.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_7fe30000_hrlA367.jbxd
                                              Similarity
                                              • API ID: FileView$CloseHandleInformationOpenQuerySectionSystemUnmap
                                              • String ID: C:,$\Device\PhysicalMemory
                                              • API String ID: 2985292042-1440550476
                                              • Opcode ID: d4bbd99800a5ed16e67fd9b1e1255b72b407661223bcf3a707d0e03b541c6dfc
                                              • Instruction ID: f784499129cf61d4ff85df333bf3b76779e152c7d281c3d08bc0d42cf97a2f12
                                              • Opcode Fuzzy Hash: d4bbd99800a5ed16e67fd9b1e1255b72b407661223bcf3a707d0e03b541c6dfc
                                              • Instruction Fuzzy Hash: 1C817A71A00219FFDB208F24CC89FAA77BDEF44705F614258ED499B295D3B0AF45CA91
                                              APIs
                                              • NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 0062344A
                                              • NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 00623469
                                              • MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 00623493
                                              • CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 006234A0
                                              • UnmapViewOfFile.KERNEL32(?), ref: 006234B8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066207224.0000000000620000.00000040.10000000.00040000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_620000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: FileView$CloseHandleInformationOpenQuerySectionSystemUnmap
                                              • String ID: C:,$\Device\PhysicalMemory
                                              • API String ID: 2985292042-1440550476
                                              • Opcode ID: e2b0c8f568571b3f59211b8063e335b2ad8ba4e779b6cb58c9455f457ca39783
                                              • Instruction ID: 7418f092b1e62fe4d4d8e9f3a6c3b4afbefc4c590a82baf4574825cb8f1529aa
                                              • Opcode Fuzzy Hash: e2b0c8f568571b3f59211b8063e335b2ad8ba4e779b6cb58c9455f457ca39783
                                              • Instruction Fuzzy Hash: 43819A71500628FFEB209F14DC89EAA3BAEEF45704F500658ED199B291D3F4AF458A64
                                              APIs
                                              • NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 7FE32A36
                                              • NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 7FE32A55
                                              • MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 7FE32A7F
                                              • CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 7FE32A8C
                                              • UnmapViewOfFile.KERNEL32(?), ref: 7FE32AA4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066853464.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_7fe30000_hrlA367.jbxd
                                              Similarity
                                              • API ID: FileView$CloseHandleInformationOpenQuerySectionSystemUnmap
                                              • String ID: C:,$ysic
                                              • API String ID: 2985292042-2852681185
                                              • Opcode ID: e096a308c09e6b02b95fe1d014301fff9b14a95bfc109e57e88e1af0ff91d58a
                                              • Instruction ID: 318294e3e7f85719ab3bc7b1e15188bdad7b77c11d20dad426282bd8f2c8130f
                                              • Opcode Fuzzy Hash: e096a308c09e6b02b95fe1d014301fff9b14a95bfc109e57e88e1af0ff91d58a
                                              • Instruction Fuzzy Hash: 77116D70640705FBEB218F10CC49FAA3B7DEF88704F544218EE1A9A290D7B4AF14C655
                                              APIs
                                              • NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 0062344A
                                              • NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 00623469
                                              • MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 00623493
                                              • CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 006234A0
                                              • UnmapViewOfFile.KERNEL32(?), ref: 006234B8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066207224.0000000000620000.00000040.10000000.00040000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_620000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: FileView$CloseHandleInformationOpenQuerySectionSystemUnmap
                                              • String ID: C:,$ysic
                                              • API String ID: 2985292042-2852681185
                                              • Opcode ID: 75692eae59ef229a2f56f45455e385a3c03fd5a3a941212ab90a82f7e6085517
                                              • Instruction ID: ceab1a854a36252622730ee1a45ea5bc64af8449a512478180185dcd8d4cf5c9
                                              • Opcode Fuzzy Hash: 75692eae59ef229a2f56f45455e385a3c03fd5a3a941212ab90a82f7e6085517
                                              • Instruction Fuzzy Hash: 4A116070140618BBEB24DF14DC55FDA367DEF88744F50461CEA199B390D7F86F188A58
                                              APIs
                                              • lstrcpyW.KERNEL32(?,\BaseNamedObjects\imktVt), ref: 7FE32431
                                              • lstrlenW.KERNEL32(?), ref: 7FE32438
                                              • NtCreateSection.NTDLL(?,0000000E,?,?,00000040,08000000,00000000), ref: 7FE3248D
                                              Strings
                                              • \BaseNamedObjects\imktVt, xrefs: 7FE3242F
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066853464.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_7fe30000_hrlA367.jbxd
                                              Similarity
                                              • API ID: CreateSectionlstrcpylstrlen
                                              • String ID: \BaseNamedObjects\imktVt
                                              • API String ID: 2597515329-288789118
                                              • Opcode ID: 20bdb40ffb474c402f65f73e914af13d443f92d4dff509730c57e181749428e4
                                              • Instruction ID: 36e2f0a27fad33023740782982cd1b2969f7fc0a37d941ebf6b0748064d4bf92
                                              • Opcode Fuzzy Hash: 20bdb40ffb474c402f65f73e914af13d443f92d4dff509730c57e181749428e4
                                              • Instruction Fuzzy Hash: 9F0181B0790344BAF7305B29CC8BF5A3929DF81B51F948154F604AE1C4D5B99A0487AA
                                              APIs
                                              • lstrcpyW.KERNEL32(?,\BaseNamedObjects\krktVt), ref: 006224BA
                                              • lstrlenW.KERNEL32(?), ref: 006224C1
                                              • NtCreateSection.NTDLL(?,0000000E,?,?,00000040,08000000,00000000), ref: 00622516
                                              Strings
                                              • \BaseNamedObjects\krktVt, xrefs: 006224B8
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066207224.0000000000620000.00000040.10000000.00040000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_620000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CreateSectionlstrcpylstrlen
                                              • String ID: \BaseNamedObjects\krktVt
                                              • API String ID: 2597515329-3192795942
                                              • Opcode ID: cf07b347a0e0c1752a31311e41616237b242cbc7e37ea3d0786b3fde4713166c
                                              • Instruction ID: 6d4e25ebd380c40ec09386432a58d0543d8ac5973b6ffef799dd038e088c6b64
                                              • Opcode Fuzzy Hash: cf07b347a0e0c1752a31311e41616237b242cbc7e37ea3d0786b3fde4713166c
                                              • Instruction Fuzzy Hash: DD0181B0781304BAF7309B29CC4BF5F7929DF81B50F908558F608AE1C4DAB89A0483A9
                                              APIs
                                              • lstrcpyA.KERNEL32(?,SYSTEM\CurrentControlSet\Services\), ref: 00402533
                                              • lstrcatA.KERNEL32(?,100200), ref: 00402543
                                              • RtlZeroMemory.KERNEL32 ref: 00402587
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2064830909.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000015.00000002.2064795062.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064865379.0000000000406000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064896028.0000000000408000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064927902.000000000040A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064959905.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064992453.0000000000414000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065024303.000000000041A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065055495.000000000041B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065086646.0000000000420000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065117221.0000000000422000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065150592.0000000000429000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065181608.000000000042E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065213605.0000000000430000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065247297.0000000000436000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065278608.0000000000437000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065314228.000000000043C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065345921.000000000043E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065376800.000000000043F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065412995.0000000000444000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065444222.0000000000445000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065477000.000000000044A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065510299.000000000044C000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065543439.0000000000452000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065574043.0000000000453000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065609286.0000000000458000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065641477.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065672358.000000000045B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065703455.0000000000460000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065733984.0000000000461000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065770490.0000000000466000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065800883.0000000000468000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065830355.0000000000469000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065861085.000000000046E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065891278.000000000046F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065923953.0000000000474000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065955831.0000000000476000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065987198.0000000000477000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066018174.000000000047C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066052063.000000000047D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066082716.0000000000482000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_400000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: MemoryZerolstrcatlstrcpy
                                              • String ID: "7@$100200$47@$F7@$ImagePath$SYSTEM\CurrentControlSet\Services\
                                              • API String ID: 1768957353-3519508139
                                              • Opcode ID: 8a600dd736f3a178a13575e9a99342727ac9e09ed908883fd0121ec29af1dff4
                                              • Instruction ID: a495424809a9f9f54fedb59a1f20414eed3fe88150acac704cb64e1485c9eeb3
                                              • Opcode Fuzzy Hash: 8a600dd736f3a178a13575e9a99342727ac9e09ed908883fd0121ec29af1dff4
                                              • Instruction Fuzzy Hash: 8C51B435780305AFE320DB34ED49FEB37A8EB84721F504839FA46E11D0E6BD9519866D
                                              APIs
                                              • LoadLibraryA.KERNEL32(00623F83), ref: 00623F8F
                                              • WSAStartup.WS2_32(00000101), ref: 00623FCE
                                              • CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 00623FE9
                                              • CloseHandle.KERNEL32(?,00000000), ref: 00623FF2
                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 00623FFF
                                              • lstrlen.KERNEL32(ilo.brenz.pl,?,00000000), ref: 00624057
                                              • gethostbyname.WS2_32(ilo.brenz.pl), ref: 00624066
                                              • socket.WS2_32(00000002,00000001,00000000), ref: 00624097
                                              • connect.WS2_32(6F6C6902,00623B09,00000010), ref: 006240B1
                                              • GetVersionExA.KERNEL32(?,?,00000000), ref: 006240FB
                                              • wsprintfA.USER32 ref: 00624179
                                              • CreateThread.KERNEL32(00000000,00000000,Function_00003819,6F6C6902,00000000), ref: 006241B4
                                              • CloseHandle.KERNEL32(?,00000000,6F6C6902,00626AA2,00000000,00000000), ref: 006241BD
                                              • GetTickCount.KERNEL32 ref: 006241F6
                                              • RtlExitUserThread.NTDLL(00000000), ref: 00624322
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066207224.0000000000620000.00000040.10000000.00040000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_620000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CreateThread$CloseHandle$CountEventExitLibraryLoadStartupTickUserVersionconnectgethostbynamelstrlensocketwsprintf
                                              • String ID: 020a00 . . :#a260b0403 +*$C:\USERS\user\APPDATA\LOCAL\SYSTEMRESOURCES\HRLA367.TMP.MUN$ilo.brenz.pl
                                              • API String ID: 3316401344-3049915909
                                              • Opcode ID: ee4b1f535ca79d9535994823dd2765b1aa6c936bb005bd660b800cb5032af16f
                                              • Instruction ID: 6de5a9507a9dafb89a264d096665bf43d600a00cf0e9e960769836268c5fcd92
                                              • Opcode Fuzzy Hash: ee4b1f535ca79d9535994823dd2765b1aa6c936bb005bd660b800cb5032af16f
                                              • Instruction Fuzzy Hash: E891CB31508669FAEB319F24981DBEE7BAEEF41300F040548E95A9E281CBF45F85CB65
                                              APIs
                                              • GetModuleHandleA.KERNEL32(7FE33071), ref: 7FE3307C
                                              • GetSystemDirectoryA.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,00000104), ref: 7FE33093
                                              • CreateFileA.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,40000000,00000000,00000000,00000003,00000000,00000000), ref: 7FE330D4
                                              • WriteFile.KERNEL32(00000000,7FE33EDB,00000019,C:\Windows\sysWOW64\wbem\wmiprvse.exe,00000000,00000000), ref: 7FE330F6
                                              • CloseHandle.KERNEL32(?,00000003), ref: 7FE330FC
                                              • GetProcAddress.KERNEL32(00000000,7FE3311D), ref: 7FE33128
                                              • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE3313B
                                              • GetTickCount.KERNEL32 ref: 7FE3316F
                                              • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,7FE3637A,00000000,00000000,00000000,00000000), ref: 7FE33241
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066853464.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_7fe30000_hrlA367.jbxd
                                              Similarity
                                              • API ID: FileHandle$AddressCloseCountCreateDirectoryInformationLibraryLoadModuleProcSystemTickVolumeWrite
                                              • String ID: "'$"'$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 1729360627-1059917411
                                              • Opcode ID: 19b44635278fe99a4415179c49d6eb8c4f8a4d309380675498a1a4a2d9bdcc0e
                                              • Instruction ID: 6b64a43cb509898f68348655a96a0e184e2e065f58832200b8bd953c97f5cb1b
                                              • Opcode Fuzzy Hash: 19b44635278fe99a4415179c49d6eb8c4f8a4d309380675498a1a4a2d9bdcc0e
                                              • Instruction Fuzzy Hash: 2591F271954358BFEB269F20CC0EFEA3B6CDF41311F80011AED5A9A081DAF46F06D6A5
                                              APIs
                                              • LoadLibraryA.KERNEL32(00623EA9), ref: 00623EB5
                                                • Part of subcall function 00623ECC: GetProcAddress.KERNEL32(00000000,00623EC0), ref: 00623ECD
                                                • Part of subcall function 00623ECC: GetModuleFileNameA.KERNEL32(00000000,020a00 . . :#a260b0403 +*,000000C8), ref: 00623EE2
                                                • Part of subcall function 00623ECC: wsprintfA.USER32 ref: 00623EF7
                                                • Part of subcall function 00623ECC: CreateThread.KERNEL32(00000000,00000000,00623691,00000000,00000000), ref: 00623F40
                                                • Part of subcall function 00623ECC: CloseHandle.KERNEL32(?,1C567C50), ref: 00623F49
                                              • CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 00623FE9
                                              • CloseHandle.KERNEL32(?,00000000), ref: 00623FF2
                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 00623FFF
                                              • socket.WS2_32(00000002,00000001,00000000), ref: 00624097
                                              • connect.WS2_32(6F6C6902,00623B09,00000010), ref: 006240B1
                                              • GetVersionExA.KERNEL32(?,?,00000000), ref: 006240FB
                                              • wsprintfA.USER32 ref: 00624179
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066207224.0000000000620000.00000040.10000000.00040000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_620000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Create$CloseHandleThreadwsprintf$AddressEventFileLibraryLoadModuleNameProcVersionconnectsocket
                                              • String ID: 020a00 . . :#a260b0403 +*$C:,$C:\USERS\user\APPDATA\LOCAL\SYSTEMRESOURCES\HRLA367.TMP.MUN$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 4150863296-3729073627
                                              • Opcode ID: 9f06b138147dde36dface2e64d8b648724a67120387ec8aabe41be75442747ba
                                              • Instruction ID: cb47e4cf2665802155ca7f40a2576fd2f8aab60c8582f78801048c38494bda4e
                                              • Opcode Fuzzy Hash: 9f06b138147dde36dface2e64d8b648724a67120387ec8aabe41be75442747ba
                                              • Instruction Fuzzy Hash: 45A10F71408669BFEB219F249C1EBEA7BAEEF41300F044549E8498E282D7F45F45CBA5
                                              APIs
                                              • lstrcat.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,7FE3309E), ref: 7FE330AC
                                                • Part of subcall function 7FE330BE: lstrcat.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,7FE330B7), ref: 7FE330BF
                                                • Part of subcall function 7FE330BE: CreateFileA.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,40000000,00000000,00000000,00000003,00000000,00000000), ref: 7FE330D4
                                                • Part of subcall function 7FE330BE: WriteFile.KERNEL32(00000000,7FE33EDB,00000019,C:\Windows\sysWOW64\wbem\wmiprvse.exe,00000000,00000000), ref: 7FE330F6
                                                • Part of subcall function 7FE330BE: CloseHandle.KERNEL32(?,00000003), ref: 7FE330FC
                                                • Part of subcall function 7FE330BE: GetProcAddress.KERNEL32(00000000,7FE3311D), ref: 7FE33128
                                                • Part of subcall function 7FE330BE: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE3313B
                                                • Part of subcall function 7FE330BE: GetTickCount.KERNEL32 ref: 7FE3316F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066853464.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_7fe30000_hrlA367.jbxd
                                              Similarity
                                              • API ID: Filelstrcat$AddressCloseCountCreateHandleLibraryLoadProcTickWrite
                                              • String ID: "'$"'$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 4135777234-1059917411
                                              • Opcode ID: 6958d413b6abf8e1b28038c6610194ed2bae6efbd87a574ee0b1bcde9ea0452d
                                              • Instruction ID: f56c8c8788c1527792fd5fee25e748029393f3a60fbf17811963ed314d73609c
                                              • Opcode Fuzzy Hash: 6958d413b6abf8e1b28038c6610194ed2bae6efbd87a574ee0b1bcde9ea0452d
                                              • Instruction Fuzzy Hash: 9091F171944718BFEB269F208C0EFEA3B6CDF41311F80011AED5A9E081DAF4AF05D6A5
                                              APIs
                                              • GetProcAddress.KERNEL32(00000000,00623EC0), ref: 00623ECD
                                              • GetModuleFileNameA.KERNEL32(00000000,020a00 . . :#a260b0403 +*,000000C8), ref: 00623EE2
                                              • wsprintfA.USER32 ref: 00623EF7
                                              • CreateThread.KERNEL32(00000000,00000000,00623691,00000000,00000000), ref: 00623F40
                                              • CloseHandle.KERNEL32(?,1C567C50), ref: 00623F49
                                              • CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 00623FE9
                                              • CloseHandle.KERNEL32(?,00000000), ref: 00623FF2
                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 00623FFF
                                                • Part of subcall function 00623405: NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 0062344A
                                                • Part of subcall function 00623405: NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 00623469
                                                • Part of subcall function 00623405: MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 00623493
                                                • Part of subcall function 00623405: CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 006234A0
                                                • Part of subcall function 00623405: UnmapViewOfFile.KERNEL32(?), ref: 006234B8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066207224.0000000000620000.00000040.10000000.00040000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_620000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CloseCreateFileHandle$ThreadView$AddressEventInformationModuleNameOpenProcQuerySectionSystemUnmapwsprintf
                                              • String ID: 020a00 . . :#a260b0403 +*$C:,$C:\USERS\user\APPDATA\LOCAL\SYSTEMRESOURCES\HRLA367.TMP.MUN$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 541178049-3729073627
                                              • Opcode ID: 3176691832235144c822bda6bdece0b9c65d83022bcced3ec1f9b4779e38ef98
                                              • Instruction ID: 08354d911600ba317626d8030ffd829120ca11e90e0c8ff691eb4b4f1537aea1
                                              • Opcode Fuzzy Hash: 3176691832235144c822bda6bdece0b9c65d83022bcced3ec1f9b4779e38ef98
                                              • Instruction Fuzzy Hash: FEA10F71408669BFEB219F249C1EBEA7BAEEF41300F044648F8499E182D7F45F45CBA5
                                              APIs
                                              • lstrcat.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,7FE330B7), ref: 7FE330BF
                                              • CreateFileA.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,40000000,00000000,00000000,00000003,00000000,00000000), ref: 7FE330D4
                                              • WriteFile.KERNEL32(00000000,7FE33EDB,00000019,C:\Windows\sysWOW64\wbem\wmiprvse.exe,00000000,00000000), ref: 7FE330F6
                                              • CloseHandle.KERNEL32(?,00000003), ref: 7FE330FC
                                              • GetProcAddress.KERNEL32(00000000,7FE3311D), ref: 7FE33128
                                              • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE3313B
                                              • GetTickCount.KERNEL32 ref: 7FE3316F
                                              • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,7FE3637A,00000000,00000000,00000000,00000000), ref: 7FE33241
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066853464.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_7fe30000_hrlA367.jbxd
                                              Similarity
                                              • API ID: File$AddressCloseCountCreateHandleInformationLibraryLoadProcTickVolumeWritelstrcat
                                              • String ID: "'$"'$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 3969241177-1059917411
                                              • Opcode ID: e99baabed080411f04b0d806c93d617434853b94cdc5a730a8b5d052636699dc
                                              • Instruction ID: 09541bb4dc3411c55ab005cb888b55fbb50cd13fbca17e3ae23e295a94b6b269
                                              • Opcode Fuzzy Hash: e99baabed080411f04b0d806c93d617434853b94cdc5a730a8b5d052636699dc
                                              • Instruction Fuzzy Hash: 7281BE71914718BFEB269F208C0EFEA3B6DDF41311F80011AED5A9E081EAF46F05D6A5
                                              APIs
                                              • CreateFileA.KERNEL32(C:\Windows\sysWOW64\wbem\wmiprvse.exe,40000000,00000000,00000000,00000003,00000000,00000000), ref: 7FE330D4
                                              • WriteFile.KERNEL32(00000000,7FE33EDB,00000019,C:\Windows\sysWOW64\wbem\wmiprvse.exe,00000000,00000000), ref: 7FE330F6
                                              • CloseHandle.KERNEL32(?,00000003), ref: 7FE330FC
                                              • GetProcAddress.KERNEL32(00000000,7FE3311D), ref: 7FE33128
                                              • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE3313B
                                              • GetTickCount.KERNEL32 ref: 7FE3316F
                                              Strings
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 7FE3330F
                                              • C:\Windows\sysWOW64\wbem\wmiprvse.exe, xrefs: 7FE330D3, 7FE330EE
                                              • "', xrefs: 7FE332BA
                                              • ADVAPI32.DLL, xrefs: 7FE3313A
                                              • "', xrefs: 7FE33114
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066853464.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_7fe30000_hrlA367.jbxd
                                              Similarity
                                              • API ID: File$AddressCloseCountCreateHandleLibraryLoadProcTickWrite
                                              • String ID: "'$"'$ADVAPI32.DLL$C:\Windows\sysWOW64\wbem\wmiprvse.exe$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 896256579-1059917411
                                              • Opcode ID: 725bb423a29dcd62c43598a103823de9de260c4f48a9b794d588fa8ccf6d82a8
                                              • Instruction ID: 9c4dac55b76228d7ff9437610bb880f50dd66be18c7f3b043a5811b11c928d4e
                                              • Opcode Fuzzy Hash: 725bb423a29dcd62c43598a103823de9de260c4f48a9b794d588fa8ccf6d82a8
                                              • Instruction Fuzzy Hash: E6A1F571954718BFEB269F208C0EFEA37ADDF41311F80011AED5A9E081DAF46F05D6A5
                                              APIs
                                              • LoadLibraryA.KERNEL32(7FE33107), ref: 7FE33112
                                                • Part of subcall function 7FE33127: GetProcAddress.KERNEL32(00000000,7FE3311D), ref: 7FE33128
                                                • Part of subcall function 7FE33127: LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE3313B
                                                • Part of subcall function 7FE33127: GetTickCount.KERNEL32 ref: 7FE3316F
                                                • Part of subcall function 7FE33127: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,7FE3637A,00000000,00000000,00000000,00000000), ref: 7FE33241
                                                • Part of subcall function 7FE33127: Sleep.KERNEL32(00000064,0000001E), ref: 7FE33288
                                                • Part of subcall function 7FE33127: DeleteFileA.KERNEL32(7FE36020), ref: 7FE3328F
                                              Strings
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 7FE3330F
                                              • "', xrefs: 7FE332BA
                                              • ADVAPI32.DLL, xrefs: 7FE3313A
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066853464.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_7fe30000_hrlA367.jbxd
                                              Similarity
                                              • API ID: LibraryLoad$AddressCountDeleteFileInformationProcSleepTickVolume
                                              • String ID: "'$ADVAPI32.DLL$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 3926103657-2346592412
                                              • Opcode ID: b10989e1a19bd5d43d225fa2a3c42957d908225e734b95b6c14a3a6c700d835d
                                              • Instruction ID: d292d2856ce22b528264e3fb5c31764abc2e853f458007e39b67dc21da23dd02
                                              • Opcode Fuzzy Hash: b10989e1a19bd5d43d225fa2a3c42957d908225e734b95b6c14a3a6c700d835d
                                              • Instruction Fuzzy Hash: BD71D271915718BFEB269F20CC0EEEA37ADDF41311F80011AED5A9E081DAF4AF05D6A5
                                              APIs
                                              • GetProcAddress.KERNEL32(00000000,7FE3311D), ref: 7FE33128
                                              • LoadLibraryA.KERNEL32(ADVAPI32.DLL), ref: 7FE3313B
                                              • GetTickCount.KERNEL32 ref: 7FE3316F
                                              • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,7FE3637A,00000000,00000000,00000000,00000000), ref: 7FE33241
                                              • Sleep.KERNEL32(00000064,0000001E), ref: 7FE33288
                                              • DeleteFileA.KERNEL32(7FE36020), ref: 7FE3328F
                                              • CreateThread.KERNEL32(00000000,00000000,7FE32C7D,00000000,00000000), ref: 7FE33343
                                              • CloseHandle.KERNEL32(?,0C1A4F68), ref: 7FE3334C
                                              • WSAStartup.WS2_32(00000101), ref: 7FE333D1
                                              • Sleep.KERNEL32(00001388,00000000,00000000), ref: 7FE333F3
                                              Strings
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 7FE3330F
                                              • "', xrefs: 7FE332BA
                                              • ADVAPI32.DLL, xrefs: 7FE3313A
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066853464.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_7fe30000_hrlA367.jbxd
                                              Similarity
                                              • API ID: Sleep$AddressCloseCountCreateDeleteFileHandleInformationLibraryLoadProcStartupThreadTickVolume
                                              • String ID: "'$ADVAPI32.DLL$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 2219344514-2346592412
                                              • Opcode ID: 5b9ba073255788373456750f45873bb949f55a25902f1e72925c0e661daa5f85
                                              • Instruction ID: 9bf7545e8cb9496520d09b0b1350cb01679fb2f5a0313100841ffea94c71ba5e
                                              • Opcode Fuzzy Hash: 5b9ba073255788373456750f45873bb949f55a25902f1e72925c0e661daa5f85
                                              • Instruction Fuzzy Hash: 2871A271915718BFEB269F20DC0EBEA37ACEF41311F80011AED5A9E081DAF46F05D6A5
                                              APIs
                                              • LoadLibraryA.KERNEL32(00623F54), ref: 00623F60
                                                • Part of subcall function 00623F8F: LoadLibraryA.KERNEL32(00623F83), ref: 00623F8F
                                                • Part of subcall function 00623F8F: WSAStartup.WS2_32(00000101), ref: 00623FCE
                                                • Part of subcall function 00623F8F: CreateThread.KERNEL32(00000000,00000000,Function_00003888,00000000,00000000), ref: 00623FE9
                                                • Part of subcall function 00623F8F: CloseHandle.KERNEL32(?,00000000), ref: 00623FF2
                                                • Part of subcall function 00623F8F: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000000), ref: 00623FFF
                                                • Part of subcall function 00623F8F: socket.WS2_32(00000002,00000001,00000000), ref: 00624097
                                                • Part of subcall function 00623F8F: connect.WS2_32(6F6C6902,00623B09,00000010), ref: 006240B1
                                                • Part of subcall function 00623F8F: GetVersionExA.KERNEL32(?,?,00000000), ref: 006240FB
                                              • lstrlen.KERNEL32(ilo.brenz.pl,?,00000000), ref: 00624057
                                              • gethostbyname.WS2_32(ilo.brenz.pl), ref: 00624066
                                              • wsprintfA.USER32 ref: 00624179
                                              • CreateThread.KERNEL32(00000000,00000000,Function_00003819,6F6C6902,00000000), ref: 006241B4
                                              • CloseHandle.KERNEL32(?,00000000,6F6C6902,00626AA2,00000000,00000000), ref: 006241BD
                                              • GetTickCount.KERNEL32 ref: 006241F6
                                              Strings
                                              • C:\USERS\user\APPDATA\LOCAL\SYSTEMRESOURCES\HRLA367.TMP.MUN, xrefs: 006241DA
                                              • 020a00 . . :#a260b0403 +*, xrefs: 00624195, 006241DB
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066207224.0000000000620000.00000040.10000000.00040000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_620000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Create$CloseHandleLibraryLoadThread$CountEventStartupTickVersionconnectgethostbynamelstrlensocketwsprintf
                                              • String ID: 020a00 . . :#a260b0403 +*$C:\USERS\user\APPDATA\LOCAL\SYSTEMRESOURCES\HRLA367.TMP.MUN
                                              • API String ID: 2996464229-2044341515
                                              • Opcode ID: 98c4dc3622c81e610166b3295d4bccfe550f8d2832964dac318e74891848542e
                                              • Instruction ID: d4868fcc2121b9a2e9753c400200a8588558dc7f0203b6bbf05a4192d1cc3bc8
                                              • Opcode Fuzzy Hash: 98c4dc3622c81e610166b3295d4bccfe550f8d2832964dac318e74891848542e
                                              • Instruction Fuzzy Hash: 4A810F715086A9BFEB219F349C19BEA7BAEEF41300F044558E8498E1C2C7F45F45CB66
                                              APIs
                                              • LoadLibraryA.KERNEL32(7FE33386), ref: 7FE33392
                                              • WSAStartup.WS2_32(00000101), ref: 7FE333D1
                                              • Sleep.KERNEL32(00001388,00000000,00000000), ref: 7FE333F3
                                              • gethostbyname.WS2_32(ilo.brenz.pl), ref: 7FE33412
                                              • lstrlen.KERNEL32(ilo.brenz.pl), ref: 7FE3341D
                                              • socket.WS2_32(00000002,00000001,00000000), ref: 7FE33453
                                              • connect.WS2_32(?,7FE32EB6,00000010), ref: 7FE3346D
                                              • GetVersionExA.KERNEL32(?,?,7FE32EB6,00000010), ref: 7FE334B7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066853464.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_7fe30000_hrlA367.jbxd
                                              Similarity
                                              • API ID: LibraryLoadSleepStartupVersionconnectgethostbynamelstrlensocket
                                              • String ID: C:\Windows\sysWOW64\wbem\wmiprvse.exe$ilo.brenz.pl
                                              • API String ID: 801863514-1010093679
                                              • Opcode ID: 174516e84d9c669cdc790a5bd5a266766651d9cd51a165662f06c8ce5e18c4ab
                                              • Instruction ID: ec9582b3104ee8db84d86a8e063e61350cf898793cca2a983ffbcde4064a8b90
                                              • Opcode Fuzzy Hash: 174516e84d9c669cdc790a5bd5a266766651d9cd51a165662f06c8ce5e18c4ab
                                              • Instruction Fuzzy Hash: 0361D132A04359BFEB22CF24C819FDE3BBDAF41715F440514E86A9E091D6F4AB04DBA5
                                              APIs
                                              • FindResourceA.KERNEL32(?,?,?), ref: 0040244F
                                              • LoadLibraryA.KERNEL32(kernel32.dll,SizeofResource), ref: 00402461
                                              • GetProcAddress.KERNEL32(00000000), ref: 00402468
                                              • LoadResource.KERNEL32(?,00000000), ref: 0040247A
                                              • LockResource.KERNEL32(00000000), ref: 00402489
                                              • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000), ref: 004024BD
                                              • WriteFile.KERNEL32 ref: 004024DC
                                              • CloseHandle.KERNEL32(00000000), ref: 004024E3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2064830909.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000015.00000002.2064795062.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064865379.0000000000406000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064896028.0000000000408000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064927902.000000000040A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064959905.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064992453.0000000000414000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065024303.000000000041A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065055495.000000000041B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065086646.0000000000420000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065117221.0000000000422000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065150592.0000000000429000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065181608.000000000042E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065213605.0000000000430000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065247297.0000000000436000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065278608.0000000000437000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065314228.000000000043C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065345921.000000000043E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065376800.000000000043F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065412995.0000000000444000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065444222.0000000000445000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065477000.000000000044A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065510299.000000000044C000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065543439.0000000000452000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065574043.0000000000453000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065609286.0000000000458000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065641477.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065672358.000000000045B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065703455.0000000000460000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065733984.0000000000461000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065770490.0000000000466000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065800883.0000000000468000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065830355.0000000000469000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065861085.000000000046E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065891278.000000000046F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065923953.0000000000474000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065955831.0000000000476000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065987198.0000000000477000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066018174.000000000047C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066052063.000000000047D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066082716.0000000000482000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_400000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Resource$FileLoad$AddressCloseCreateFindHandleLibraryLockProcWrite
                                              • String ID: <6@$SizeofResource$hra%u.dll$kernel32.dll
                                              • API String ID: 2921964263-2374908272
                                              • Opcode ID: 8a57ef22dd47a814e705dbe9eb76e98e586b3eddb95431373c2ff637a7035f3e
                                              • Instruction ID: 298c1543b4fc4cf1b22406217ce591795a308af8d218835589389581325cd5cf
                                              • Opcode Fuzzy Hash: 8a57ef22dd47a814e705dbe9eb76e98e586b3eddb95431373c2ff637a7035f3e
                                              • Instruction Fuzzy Hash: 9211E9321803007BE2309B659E4DFAB7BACDF85B10F054439FA42F21D0DBB9981586B9
                                              APIs
                                              • LoadLibraryA.KERNEL32(?), ref: 004039C6
                                              • GetLastError.KERNEL32 ref: 004039D2
                                              • RaiseException.KERNEL32(C06D007E,00000000,00000001,?), ref: 00403A05
                                              • InterlockedExchange.KERNEL32(?,00000000), ref: 00403A17
                                              • LocalAlloc.KERNEL32(00000040,00000008), ref: 00403A2B
                                              • FreeLibrary.KERNEL32(00000000), ref: 00403A48
                                              • GetProcAddress.KERNEL32(?,?), ref: 00403AA9
                                              • GetLastError.KERNEL32 ref: 00403AB5
                                              • RaiseException.KERNEL32(C06D007F,00000000,00000001,?), ref: 00403AE7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2064830909.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000015.00000002.2064795062.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064865379.0000000000406000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064896028.0000000000408000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064927902.000000000040A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064959905.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064992453.0000000000414000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065024303.000000000041A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065055495.000000000041B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065086646.0000000000420000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065117221.0000000000422000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065150592.0000000000429000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065181608.000000000042E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065213605.0000000000430000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065247297.0000000000436000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065278608.0000000000437000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065314228.000000000043C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065345921.000000000043E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065376800.000000000043F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065412995.0000000000444000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065444222.0000000000445000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065477000.000000000044A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065510299.000000000044C000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065543439.0000000000452000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065574043.0000000000453000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065609286.0000000000458000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065641477.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065672358.000000000045B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065703455.0000000000460000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065733984.0000000000461000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065770490.0000000000466000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065800883.0000000000468000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065830355.0000000000469000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065861085.000000000046E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065891278.000000000046F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065923953.0000000000474000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065955831.0000000000476000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065987198.0000000000477000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066018174.000000000047C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066052063.000000000047D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066082716.0000000000482000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_400000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ErrorExceptionLastLibraryRaise$AddressAllocExchangeFreeInterlockedLoadLocalProc
                                              • String ID: $
                                              • API String ID: 991255547-3993045852
                                              • Opcode ID: 256256f5bea5ef9629b74784c89f9cd366c968008bba8740bb1e0df359706086
                                              • Instruction ID: 003abd56770ea85181eee10679b32b4024c484e765cb6dd7374dfc17ffc6279b
                                              • Opcode Fuzzy Hash: 256256f5bea5ef9629b74784c89f9cd366c968008bba8740bb1e0df359706086
                                              • Instruction Fuzzy Hash: C3612DB5B006059FDB24CF99C984AAABBF9AB48301B10403EE956F7391D774EE04CF14
                                              APIs
                                              • GetProcAddress.KERNEL32(00000000,7FE332C3), ref: 7FE332D0
                                              • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\sysWOW64\wbem\wmiprvse.exe,000000C8), ref: 7FE332E5
                                              • wsprintfA.USER32 ref: 7FE332FA
                                              • CreateThread.KERNEL32(00000000,00000000,7FE32C7D,00000000,00000000), ref: 7FE33343
                                              • CloseHandle.KERNEL32(?,0C1A4F68), ref: 7FE3334C
                                              • WSAStartup.WS2_32(00000101), ref: 7FE333D1
                                              • Sleep.KERNEL32(00001388,00000000,00000000), ref: 7FE333F3
                                                • Part of subcall function 7FE329F1: NtOpenSection.NTDLL(?,00000006,?,00000018,?,?,00000040,?,?,63697379), ref: 7FE32A36
                                                • Part of subcall function 7FE329F1: NtQuerySystemInformation.NTDLL(0000000B,?,00000120,00000000), ref: 7FE32A55
                                                • Part of subcall function 7FE329F1: MapViewOfFile.KERNEL32(?,00000006,00000000,?,?,?,00000120,00000000), ref: 7FE32A7F
                                                • Part of subcall function 7FE329F1: CloseHandle.KERNEL32(?,00000000,?,00000120,00000000), ref: 7FE32A8C
                                                • Part of subcall function 7FE329F1: UnmapViewOfFile.KERNEL32(?), ref: 7FE32AA4
                                              Strings
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 7FE3330F
                                              • C:,, xrefs: 7FE332F9
                                              • C:\Windows\sysWOW64\wbem\wmiprvse.exe, xrefs: 7FE332E2, 7FE332F7
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066853464.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_7fe30000_hrlA367.jbxd
                                              Similarity
                                              • API ID: File$CloseHandleView$AddressCreateInformationModuleNameOpenProcQuerySectionSleepStartupSystemThreadUnmapwsprintf
                                              • String ID: C:,$C:\Windows\sysWOW64\wbem\wmiprvse.exe$SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 3988882592-2190306782
                                              • Opcode ID: 5a2e8885b122901e0e527b3c98aa0eb90efe88ce56f4889f66029a75c3141c74
                                              • Instruction ID: 806d303376319e10b4faa7ba5eb60574f11820cef6a731847cf1d174f778dc29
                                              • Opcode Fuzzy Hash: 5a2e8885b122901e0e527b3c98aa0eb90efe88ce56f4889f66029a75c3141c74
                                              • Instruction Fuzzy Hash: 82319031904719FFDB619F61CC0EFEA362CDF41711F404219F96A6A080DAF06F05CAA6
                                              APIs
                                              • OpenMutexA.KERNEL32(001F0001,00000000,100200), ref: 004020DF
                                              • ReleaseMutex.KERNEL32(00000000), ref: 004020EC
                                              • CloseHandle.KERNEL32(00000000), ref: 004020F3
                                              • lstrcatA.KERNEL32(?,?), ref: 004021AC
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 004021BF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2064830909.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000015.00000002.2064795062.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064865379.0000000000406000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064896028.0000000000408000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064927902.000000000040A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064959905.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064992453.0000000000414000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065024303.000000000041A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065055495.000000000041B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065086646.0000000000420000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065117221.0000000000422000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065150592.0000000000429000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065181608.000000000042E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065213605.0000000000430000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065247297.0000000000436000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065278608.0000000000437000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065314228.000000000043C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065345921.000000000043E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065376800.000000000043F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065412995.0000000000444000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065444222.0000000000445000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065477000.000000000044A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065510299.000000000044C000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065543439.0000000000452000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065574043.0000000000453000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065609286.0000000000458000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065641477.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065672358.000000000045B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065703455.0000000000460000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065733984.0000000000461000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065770490.0000000000466000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065800883.0000000000468000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065830355.0000000000469000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065861085.000000000046E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065891278.000000000046F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065923953.0000000000474000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065955831.0000000000476000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065987198.0000000000477000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066018174.000000000047C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066052063.000000000047D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066082716.0000000000482000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_400000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Mutex$AddressCloseHandleOpenProcReleaselstrcat
                                              • String ID: 100200$<6@$stf%c%c%c%c%c.exe
                                              • API String ID: 2376757572-3190100693
                                              • Opcode ID: d112f5c9d013e11b3731d5647da893e1883a61e01d2132f2d5a6d2d8178d5850
                                              • Instruction ID: 7c7aac5ec1300530b19c54ce4657de090f08845e18d217751b06ad59df05bcf8
                                              • Opcode Fuzzy Hash: d112f5c9d013e11b3731d5647da893e1883a61e01d2132f2d5a6d2d8178d5850
                                              • Instruction Fuzzy Hash: B731EBF26443007BE760AB60DD0AFAF7668BB44706F00453DF746B61C1EDB49604866B
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2064830909.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000015.00000002.2064795062.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064865379.0000000000406000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064896028.0000000000408000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064927902.000000000040A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064959905.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064992453.0000000000414000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065024303.000000000041A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065055495.000000000041B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065086646.0000000000420000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065117221.0000000000422000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065150592.0000000000429000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065181608.000000000042E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065213605.0000000000430000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065247297.0000000000436000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065278608.0000000000437000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065314228.000000000043C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065345921.000000000043E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065376800.000000000043F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065412995.0000000000444000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065444222.0000000000445000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065477000.000000000044A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065510299.000000000044C000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065543439.0000000000452000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065574043.0000000000453000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065609286.0000000000458000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065641477.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065672358.000000000045B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065703455.0000000000460000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065733984.0000000000461000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065770490.0000000000466000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065800883.0000000000468000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065830355.0000000000469000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065861085.000000000046E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065891278.000000000046F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065923953.0000000000474000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065955831.0000000000476000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065987198.0000000000477000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066018174.000000000047C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066052063.000000000047D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066082716.0000000000482000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_400000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                              • String ID:
                                              • API String ID: 801014965-0
                                              • Opcode ID: e284ab8ee17c914b7e9ddb28410b1748839fce9069ce7daa9396d3e96ef4b395
                                              • Instruction ID: dc900e3830a3569765129a6993a161ee3a7e101abcc0f586eb7ca925653150ca
                                              • Opcode Fuzzy Hash: e284ab8ee17c914b7e9ddb28410b1748839fce9069ce7daa9396d3e96ef4b395
                                              • Instruction Fuzzy Hash: 9C414AB1840304AFDB209FA4DD45AAA7FACEB09711F20057EE842B72E1D7785A41CF68
                                              APIs
                                              • GetSystemTime.KERNEL32(00627584), ref: 0062389F
                                              • Sleep.KERNEL32(0000EA60), ref: 00623911
                                              • gethostbyname.WS2_32(0D278125), ref: 0062396C
                                              • socket.WS2_32(00000002,00000001,00000000), ref: 00623981
                                              • ioctlsocket.WS2_32(?,8004667E), ref: 0062399A
                                              • connect.WS2_32(?,?,00000010), ref: 006239B3
                                              • Sleep.KERNEL32(?,00000010,BB010002,00000000,8004667E,?,00000001), ref: 006239C1
                                              • closesocket.WS2_32 ref: 00623A20
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066207224.0000000000620000.00000040.10000000.00040000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_620000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Sleep$SystemTimeclosesocketconnectgethostbynameioctlsocketsocket
                                              • String ID: siytue.com
                                              • API String ID: 2474828227-1949023271
                                              • Opcode ID: b9cbcd502034ca6391bc477693aeae1c9470f5e239758c46d06d44a479c792e4
                                              • Instruction ID: 38a217eff2ed79baba2bbb5fe916a7b752407042e9a19a4617fdf54229fef8c7
                                              • Opcode Fuzzy Hash: b9cbcd502034ca6391bc477693aeae1c9470f5e239758c46d06d44a479c792e4
                                              • Instruction Fuzzy Hash: A341B131604669BAEB319E249C4EBE97B9FAF85710F044029F949DE2C1D7F99F418B20
                                              APIs
                                                • Part of subcall function 7FE313C1: LookupPrivilegeValueA.ADVAPI32(00000000,?), ref: 7FE313D1
                                                • Part of subcall function 7FE313C1: NtAdjustPrivilegesToken.NTDLL(?,00000000,?,00000000,00000000,00000000), ref: 7FE313E1
                                              • CloseHandle.KERNEL32(?), ref: 7FE305BC
                                              • FreeLibrary.KERNEL32(76DA0000,?,7FE307A4,00000000,000065A4,00000000,?,00000002,00000000,00000040,00000000,000065A4), ref: 7FE307C1
                                              • CloseHandle.KERNEL32(?,?,7FE307A4,00000000,000065A4,00000000,?,00000002,00000000,00000040,00000000,000065A4), ref: 7FE307C8
                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,000065A4,00000000,?,00000002,00000000,00000040,00000000,000065A4), ref: 7FE307D2
                                              • Process32First.KERNEL32 ref: 7FE307E5
                                              • Process32Next.KERNEL32 ref: 7FE307F6
                                              • OpenProcess.KERNEL32(0000002A,00000000,?,?,?,?,?,?,00000002,00000000,00000040,00000000,000065A4), ref: 7FE3080E
                                              • CreateRemoteThread.KERNEL32(?,00000000,00000000,-00002FC3,00000002,00000000), ref: 7FE3084B
                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,00000002,00000000,00000040,00000000,000065A4), ref: 7FE30866
                                              • CloseHandle.KERNEL32 ref: 7FE30875
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066853464.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_7fe30000_hrlA367.jbxd
                                              Similarity
                                              • API ID: CloseHandle$CreateProcess32$AdjustFirstFreeLibraryLookupNextOpenPrivilegePrivilegesProcessRemoteSnapshotThreadTokenToolhelp32Value
                                              • String ID: csrs
                                              • API String ID: 3908997113-2321902090
                                              • Opcode ID: 7a0311b27d1f69206ae28c9acee774715fd69c7f810f3bbf34c027bcac111cc0
                                              • Instruction ID: eba08b2346753bb0dc32dc5381f4741ba834f7a00a5bae23cd1368a28801996b
                                              • Opcode Fuzzy Hash: 7a0311b27d1f69206ae28c9acee774715fd69c7f810f3bbf34c027bcac111cc0
                                              • Instruction Fuzzy Hash: 6D119830A0A215FBEB255F21CC4DBBE3A7DDF44745F510028FA4799080DBB0DB41C6A6
                                              APIs
                                                • Part of subcall function 0042314A: NtAdjustPrivilegesToken.NTDLL(?,00000000,?,00000000,00000000,00000000,?,00000001,00000000,00000000,00000002), ref: 0042316A
                                              • CloseHandle.KERNEL32(?), ref: 004222AD
                                              • FreeLibrary.KERNEL32(000000D7,?,0042249B,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 004224B8
                                              • CloseHandle.KERNEL32(?,?,0042249B,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 004224BF
                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,000077C4,00000000,?,00000002,00000000,00000040,00000000,000077C4), ref: 004224C9
                                              • Process32First.KERNEL32 ref: 004224DC
                                              • Process32Next.KERNEL32 ref: 004224ED
                                              • OpenProcess.KERNEL32(0000002A,00000000,?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 00422505
                                              • CreateRemoteThread.KERNEL32(?,00000000,00000000,-00003C38,00000002,00000000), ref: 00422542
                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,00000002,00000000,00000040,00000000,000077C4), ref: 0042255D
                                              • CloseHandle.KERNEL32 ref: 0042256C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2065117221.0000000000422000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000015.00000002.2064795062.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064830909.0000000000401000.00000020.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064865379.0000000000406000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064896028.0000000000408000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064927902.000000000040A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064959905.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064992453.0000000000414000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065024303.000000000041A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065055495.000000000041B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065086646.0000000000420000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065150592.0000000000429000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065181608.000000000042E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065213605.0000000000430000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065247297.0000000000436000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065278608.0000000000437000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065314228.000000000043C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065345921.000000000043E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065376800.000000000043F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065412995.0000000000444000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065444222.0000000000445000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065477000.000000000044A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065510299.000000000044C000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065543439.0000000000452000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065574043.0000000000453000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065609286.0000000000458000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065641477.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065672358.000000000045B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065703455.0000000000460000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065733984.0000000000461000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065770490.0000000000466000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065800883.0000000000468000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065830355.0000000000469000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065861085.000000000046E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065891278.000000000046F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065923953.0000000000474000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065955831.0000000000476000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065987198.0000000000477000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066018174.000000000047C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066052063.000000000047D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066082716.0000000000482000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_400000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CloseHandle$CreateProcess32$AdjustFirstFreeLibraryNextOpenPrivilegesProcessRemoteSnapshotThreadTokenToolhelp32
                                              • String ID: csrs
                                              • API String ID: 931541398-2321902090
                                              • Opcode ID: 214ed8d877d5af5bdcbfeb92dfaf8d9be1786541dc830f75d8708442990ea625
                                              • Instruction ID: f64974346249c8fb2975e722d3b3f91fbe0a72320cd7a4aec69f7db5720a1b4d
                                              • Opcode Fuzzy Hash: 214ed8d877d5af5bdcbfeb92dfaf8d9be1786541dc830f75d8708442990ea625
                                              • Instruction Fuzzy Hash: 78116030600125BBFB256F21DE49BBF3A6DEF44742F40406EFD4A99181C6B88F519A6E
                                              APIs
                                              • Sleep.KERNEL32(00001388,00000000,00000000), ref: 7FE333F3
                                              • gethostbyname.WS2_32(ilo.brenz.pl), ref: 7FE33412
                                              • lstrlen.KERNEL32(ilo.brenz.pl), ref: 7FE3341D
                                              • socket.WS2_32(00000002,00000001,00000000), ref: 7FE33453
                                              • connect.WS2_32(?,7FE32EB6,00000010), ref: 7FE3346D
                                              • GetVersionExA.KERNEL32(?,?,7FE32EB6,00000010), ref: 7FE334B7
                                              • wsprintfA.USER32 ref: 7FE33566
                                              • Sleep.KERNEL32(00000064,?,?,C:\Windows\sysWOW64\wbem\wmiprvse.exe,7FE36125,00000000,?,C:\Windows\sysWOW64\wbem\wmiprvse.exe,00000000,?,?,00000000), ref: 7FE33612
                                              • GetTickCount.KERNEL32 ref: 7FE3361B
                                              • closesocket.WS2_32 ref: 7FE3363F
                                              • Sleep.KERNEL32(00007530), ref: 7FE33653
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066853464.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_7fe30000_hrlA367.jbxd
                                              Similarity
                                              • API ID: Sleep$CountTickVersionclosesocketconnectgethostbynamelstrlensocketwsprintf
                                              • String ID: C:\Windows\sysWOW64\wbem\wmiprvse.exe
                                              • API String ID: 2598339483-2345302899
                                              • Opcode ID: d8d5e14ce8bde0a1c939d63ec7781a2c4ff1cbe07d4ef513ca2b050a836d98cc
                                              • Instruction ID: d85bbd76be20f0a00c0cc1f3b58fd3048d72df3a51a8d270456399880643c19b
                                              • Opcode Fuzzy Hash: d8d5e14ce8bde0a1c939d63ec7781a2c4ff1cbe07d4ef513ca2b050a836d98cc
                                              • Instruction Fuzzy Hash: AC219171A04355BFEB259F24880DFAE3A7EEF41616F900504E80A9E194CBF0AB01DBA5
                                              APIs
                                              • LoadLibraryA.KERNEL32(7FE332AC), ref: 7FE332B8
                                                • Part of subcall function 7FE332CF: GetProcAddress.KERNEL32(00000000,7FE332C3), ref: 7FE332D0
                                                • Part of subcall function 7FE332CF: GetModuleFileNameA.KERNEL32(00000000,C:\Windows\sysWOW64\wbem\wmiprvse.exe,000000C8), ref: 7FE332E5
                                                • Part of subcall function 7FE332CF: wsprintfA.USER32 ref: 7FE332FA
                                                • Part of subcall function 7FE332CF: CreateThread.KERNEL32(00000000,00000000,7FE32C7D,00000000,00000000), ref: 7FE33343
                                                • Part of subcall function 7FE332CF: CloseHandle.KERNEL32(?,0C1A4F68), ref: 7FE3334C
                                                • Part of subcall function 7FE332CF: WSAStartup.WS2_32(00000101), ref: 7FE333D1
                                                • Part of subcall function 7FE332CF: Sleep.KERNEL32(00001388,00000000,00000000), ref: 7FE333F3
                                              Strings
                                              • SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List, xrefs: 7FE3330F
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066853464.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_7fe30000_hrlA367.jbxd
                                              Similarity
                                              • API ID: AddressCloseCreateFileHandleLibraryLoadModuleNameProcSleepStartupThreadwsprintf
                                              • String ID: SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
                                              • API String ID: 1694642180-621207024
                                              • Opcode ID: 8f19a037a4958f9c4e4be2aea23628189e7a365a9e4db52631885ff5fdbb2ecd
                                              • Instruction ID: 12527aadef34871a68a9f0f3636c4070517339c0fc18d64a5fb64a9bfd057a23
                                              • Opcode Fuzzy Hash: 8f19a037a4958f9c4e4be2aea23628189e7a365a9e4db52631885ff5fdbb2ecd
                                              • Instruction Fuzzy Hash: F031E471918715BFD7229A208C4EFEA366CDF41711F804219F85A9E081DAF46F06D6A5
                                              APIs
                                              • CloseHandle.KERNEL32(?), ref: 00401C02
                                              • CloseHandle.KERNEL32(?), ref: 00401C3F
                                              • LoadLibraryA.KERNEL32(PlusCtrl.dll), ref: 00401C52
                                              • CreateFileA.KERNEL32(PlusCtrl.dll,40000000,00000001,00000000,00000002,00000000,00000000), ref: 00401CF9
                                              • CloseHandle.KERNEL32(00000000,?,00000000,00000000), ref: 00401D37
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2064830909.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000015.00000002.2064795062.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064865379.0000000000406000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064896028.0000000000408000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064927902.000000000040A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064959905.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064992453.0000000000414000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065024303.000000000041A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065055495.000000000041B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065086646.0000000000420000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065117221.0000000000422000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065150592.0000000000429000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065181608.000000000042E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065213605.0000000000430000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065247297.0000000000436000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065278608.0000000000437000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065314228.000000000043C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065345921.000000000043E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065376800.000000000043F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065412995.0000000000444000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065444222.0000000000445000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065477000.000000000044A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065510299.000000000044C000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065543439.0000000000452000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065574043.0000000000453000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065609286.0000000000458000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065641477.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065672358.000000000045B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065703455.0000000000460000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065733984.0000000000461000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065770490.0000000000466000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065800883.0000000000468000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065830355.0000000000469000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065861085.000000000046E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065891278.000000000046F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065923953.0000000000474000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065955831.0000000000476000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065987198.0000000000477000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066018174.000000000047C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066052063.000000000047D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066082716.0000000000482000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_400000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CloseHandle$CreateFileLibraryLoad
                                              • String ID: PlusCtrl.dll
                                              • API String ID: 4073770061-3813448905
                                              • Opcode ID: c6c2baf483a5c7817c0615bf604dfdbf5b4d22fa498cde7f9790926ec1ef48c2
                                              • Instruction ID: da15035d668b36466e8179076398aeffbcb361aec3f94f14ce4845e29cafbb59
                                              • Opcode Fuzzy Hash: c6c2baf483a5c7817c0615bf604dfdbf5b4d22fa498cde7f9790926ec1ef48c2
                                              • Instruction Fuzzy Hash: 214171715443019BE720CF34DD44B2BBBE4AB84764F140A2EF9A1B63F0E778D9458B9A
                                              APIs
                                              • ExitThread.KERNEL32 ref: 00403E83
                                                • Part of subcall function 00403B40: GetTickCount.KERNEL32 ref: 00403B41
                                                • Part of subcall function 00403B40: rand.MSVCRT ref: 00403B49
                                              • Sleep.KERNEL32(00000005), ref: 00403E6D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2064830909.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000015.00000002.2064795062.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064865379.0000000000406000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064896028.0000000000408000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064927902.000000000040A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064959905.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064992453.0000000000414000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065024303.000000000041A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065055495.000000000041B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065086646.0000000000420000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065117221.0000000000422000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065150592.0000000000429000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065181608.000000000042E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065213605.0000000000430000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065247297.0000000000436000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065278608.0000000000437000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065314228.000000000043C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065345921.000000000043E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065376800.000000000043F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065412995.0000000000444000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065444222.0000000000445000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065477000.000000000044A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065510299.000000000044C000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065543439.0000000000452000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065574043.0000000000453000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065609286.0000000000458000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065641477.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065672358.000000000045B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065703455.0000000000460000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065733984.0000000000461000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065770490.0000000000466000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065800883.0000000000468000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065830355.0000000000469000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065861085.000000000046E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065891278.000000000046F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065923953.0000000000474000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065955831.0000000000476000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065987198.0000000000477000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066018174.000000000047C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066052063.000000000047D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066082716.0000000000482000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_400000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CountExitSleepThreadTickrand
                                              • String ID: :8@$L8@$p8@
                                              • API String ID: 896407411-1348165829
                                              • Opcode ID: 3e75125e98315a6c303164bdcc62422dc0ac1f7090f3bf2c4196777fe1904896
                                              • Instruction ID: c0699dc0de98f8c7b82e62ff3ffffc6daf283feedac10fb4a2c39f1d9fb6e09f
                                              • Opcode Fuzzy Hash: 3e75125e98315a6c303164bdcc62422dc0ac1f7090f3bf2c4196777fe1904896
                                              • Instruction Fuzzy Hash: 1821F3316043006BE3109B15DD45BABB7EAAFC8705F00093DF689B72C1DAB45A088BDB
                                              APIs
                                                • Part of subcall function 00403B40: GetTickCount.KERNEL32 ref: 00403B41
                                                • Part of subcall function 00403B40: rand.MSVCRT ref: 00403B49
                                              • Sleep.KERNEL32(00000014), ref: 00403D53
                                              • ExitThread.KERNEL32 ref: 00403D65
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2064830909.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000015.00000002.2064795062.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064865379.0000000000406000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064896028.0000000000408000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064927902.000000000040A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064959905.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064992453.0000000000414000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065024303.000000000041A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065055495.000000000041B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065086646.0000000000420000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065117221.0000000000422000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065150592.0000000000429000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065181608.000000000042E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065213605.0000000000430000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065247297.0000000000436000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065278608.0000000000437000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065314228.000000000043C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065345921.000000000043E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065376800.000000000043F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065412995.0000000000444000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065444222.0000000000445000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065477000.000000000044A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065510299.000000000044C000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065543439.0000000000452000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065574043.0000000000453000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065609286.0000000000458000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065641477.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065672358.000000000045B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065703455.0000000000460000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065733984.0000000000461000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065770490.0000000000466000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065800883.0000000000468000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065830355.0000000000469000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065861085.000000000046E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065891278.000000000046F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065923953.0000000000474000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065955831.0000000000476000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065987198.0000000000477000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066018174.000000000047C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066052063.000000000047D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066082716.0000000000482000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_400000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CountExitSleepThreadTickrand
                                              • String ID: :8@$L8@$p8@
                                              • API String ID: 896407411-1348165829
                                              • Opcode ID: 653889bf93ce3dc5ae69bcf3ca1f034d621d2bbf8dda7ff92a3885e57a6f8e2a
                                              • Instruction ID: 61c35c1a6ef796fb9a95b154365f1d274a12748536e75e316c168b2b6ba842ad
                                              • Opcode Fuzzy Hash: 653889bf93ce3dc5ae69bcf3ca1f034d621d2bbf8dda7ff92a3885e57a6f8e2a
                                              • Instruction Fuzzy Hash: 0321D131244304ABE3249B14DD16B6BB7A9EB84B04F00093DF689A72D1CBB59A08879A
                                              APIs
                                              • GetTempPathA.KERNEL32(00000104), ref: 7FE32703
                                                • Part of subcall function 7FE3271E: GetTempFileNameA.KERNEL32(?,7FE3271A,00000000,?), ref: 7FE3271F
                                                • Part of subcall function 7FE3271E: CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000,?,7FE3271A,00000000,?), ref: 7FE3273A
                                                • Part of subcall function 7FE3271E: WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000104,?,00000000,?,7FE3271A,00000000,?), ref: 7FE3276A
                                                • Part of subcall function 7FE3271E: CloseHandle.KERNEL32(?,00000104,?,00000000,?,7FE3271A,00000000,?), ref: 7FE32776
                                                • Part of subcall function 7FE3271E: CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000104,?,00000000,?,7FE3271A), ref: 7FE3279A
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066853464.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_7fe30000_hrlA367.jbxd
                                              Similarity
                                              • API ID: File$CreateTemp$CloseHandleNamePathProcessWrite
                                              • String ID:
                                              • API String ID: 3982275768-0
                                              • Opcode ID: bf7059baa2945a1e10e6b512662fb3aa47ecbf22e134ef99b631c6adeccb2904
                                              • Instruction ID: e8ff87219964215428be11df8a01d81b33858c950305ba854321610fda46bc39
                                              • Opcode Fuzzy Hash: bf7059baa2945a1e10e6b512662fb3aa47ecbf22e134ef99b631c6adeccb2904
                                              • Instruction Fuzzy Hash: 1621C3B1645306BFE7215B20CC4DFEB7B2CEF86711F404114F94689081E7B1AE15C6A6
                                              APIs
                                              • GetTempPathA.KERNEL32(00000104), ref: 0062278C
                                                • Part of subcall function 006227A7: GetTempFileNameA.KERNEL32(?,006227A3,00000000,?), ref: 006227A8
                                                • Part of subcall function 006227A7: CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000,?,006227A3,00000000,?), ref: 006227C3
                                                • Part of subcall function 006227A7: WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000104,?,00000000,?,006227A3,00000000,?), ref: 006227F3
                                                • Part of subcall function 006227A7: CloseHandle.KERNEL32(?,00000104,?,00000000,?,006227A3,00000000,?), ref: 006227FF
                                                • Part of subcall function 006227A7: CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000104,?,00000000,?,006227A3), ref: 00622823
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066207224.0000000000620000.00000040.10000000.00040000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_620000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$CreateTemp$CloseHandleNamePathProcessWrite
                                              • String ID:
                                              • API String ID: 3982275768-0
                                              • Opcode ID: 2d38deb6aefaf5fafd3701ae89f7df2c8b85ad1d9cd8c4e8e23ab3e50bde978c
                                              • Instruction ID: f0251b56ee7af4157c7df50fe2b929d7d35b0229e94f199e9e6ecdc0e43652fd
                                              • Opcode Fuzzy Hash: 2d38deb6aefaf5fafd3701ae89f7df2c8b85ad1d9cd8c4e8e23ab3e50bde978c
                                              • Instruction Fuzzy Hash: 732102B1144616BFE7315A20DC9EFFF3A2DEF95B00F000118FA0989082D7B19E058AB6
                                              APIs
                                              • GetTempPathA.KERNEL32(00000104), ref: 0042448C
                                                • Part of subcall function 004244A7: GetTempFileNameA.KERNEL32(?,004244A3,00000000,?), ref: 004244A8
                                                • Part of subcall function 004244A7: CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000,?,004244A3,00000000,?), ref: 004244C3
                                                • Part of subcall function 004244A7: WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000104,?,00000000,?,004244A3,00000000,?), ref: 004244F3
                                                • Part of subcall function 004244A7: CloseHandle.KERNEL32(?,00000104,?,00000000,?,004244A3,00000000,?), ref: 004244FF
                                                • Part of subcall function 004244A7: CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000104,?,00000000,?,004244A3), ref: 00424523
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2065117221.0000000000422000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000015.00000002.2064795062.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064830909.0000000000401000.00000020.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064865379.0000000000406000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064896028.0000000000408000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064927902.000000000040A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064959905.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064992453.0000000000414000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065024303.000000000041A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065055495.000000000041B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065086646.0000000000420000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065150592.0000000000429000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065181608.000000000042E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065213605.0000000000430000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065247297.0000000000436000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065278608.0000000000437000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065314228.000000000043C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065345921.000000000043E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065376800.000000000043F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065412995.0000000000444000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065444222.0000000000445000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065477000.000000000044A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065510299.000000000044C000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065543439.0000000000452000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065574043.0000000000453000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065609286.0000000000458000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065641477.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065672358.000000000045B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065703455.0000000000460000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065733984.0000000000461000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065770490.0000000000466000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065800883.0000000000468000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065830355.0000000000469000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065861085.000000000046E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065891278.000000000046F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065923953.0000000000474000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065955831.0000000000476000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065987198.0000000000477000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066018174.000000000047C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066052063.000000000047D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066082716.0000000000482000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_400000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$CreateTemp$CloseHandleNamePathProcessWrite
                                              • String ID:
                                              • API String ID: 3982275768-0
                                              • Opcode ID: 2d38deb6aefaf5fafd3701ae89f7df2c8b85ad1d9cd8c4e8e23ab3e50bde978c
                                              • Instruction ID: ade2bb2f786261a5918a1b351a8f844443322dd67a8450dbd47c2130aefd2b38
                                              • Opcode Fuzzy Hash: 2d38deb6aefaf5fafd3701ae89f7df2c8b85ad1d9cd8c4e8e23ab3e50bde978c
                                              • Instruction Fuzzy Hash: D02105B1240216BFE7215A20DC4EFFF3A2CEFD5700F004519FA4989581D7F59E4586BA
                                              APIs
                                              • GetTempFileNameA.KERNEL32(?,7FE3271A,00000000,?), ref: 7FE3271F
                                              • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000,?,7FE3271A,00000000,?), ref: 7FE3273A
                                              • WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000104,?,00000000,?,7FE3271A,00000000,?), ref: 7FE3276A
                                              • CloseHandle.KERNEL32(?,00000104,?,00000000,?,7FE3271A,00000000,?), ref: 7FE32776
                                              • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000104,?,00000000,?,7FE3271A), ref: 7FE3279A
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066853464.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_7fe30000_hrlA367.jbxd
                                              Similarity
                                              • API ID: File$Create$CloseHandleNameProcessTempWrite
                                              • String ID:
                                              • API String ID: 463619559-0
                                              • Opcode ID: 46a42b1a7938ce57373cf3b37306313736b16861edf51c12b33c8459ee93000f
                                              • Instruction ID: 53811a8245002154d32b689494dec5e7fa63c0c5570ca99e0030f64d1e6d62be
                                              • Opcode Fuzzy Hash: 46a42b1a7938ce57373cf3b37306313736b16861edf51c12b33c8459ee93000f
                                              • Instruction Fuzzy Hash: C91161B1600605BFE7251B20CC4DFEB7A2CEF89B11F404518FA4698480EBF1AE1186A5
                                              APIs
                                              • GetTempFileNameA.KERNEL32(?,006227A3,00000000,?), ref: 006227A8
                                              • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000,?,006227A3,00000000,?), ref: 006227C3
                                              • WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000104,?,00000000,?,006227A3,00000000,?), ref: 006227F3
                                              • CloseHandle.KERNEL32(?,00000104,?,00000000,?,006227A3,00000000,?), ref: 006227FF
                                              • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000104,?,00000000,?,006227A3), ref: 00622823
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066207224.0000000000620000.00000040.10000000.00040000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_620000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$Create$CloseHandleNameProcessTempWrite
                                              • String ID:
                                              • API String ID: 463619559-0
                                              • Opcode ID: bbf5c5561a5178fb7ef464295b4b729c13e68fcf671b41c3dcb44b7c67eff673
                                              • Instruction ID: a6986dfba7254dbe453632d597a5047be3938c9d4990d5f82cce52c44193abb5
                                              • Opcode Fuzzy Hash: bbf5c5561a5178fb7ef464295b4b729c13e68fcf671b41c3dcb44b7c67eff673
                                              • Instruction Fuzzy Hash: 1B1184B1100A16BBFB250F20DC5DFFF7A2DEF84B10F004519FA0A99080DBF59E5196A8
                                              APIs
                                              • GetTempFileNameA.KERNEL32(?,004244A3,00000000,?), ref: 004244A8
                                              • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000,?,004244A3,00000000,?), ref: 004244C3
                                              • WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000104,?,00000000,?,004244A3,00000000,?), ref: 004244F3
                                              • CloseHandle.KERNEL32(?,00000104,?,00000000,?,004244A3,00000000,?), ref: 004244FF
                                              • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000104,?,00000000,?,004244A3), ref: 00424523
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2065117221.0000000000422000.00000040.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000015.00000002.2064795062.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064830909.0000000000401000.00000020.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064865379.0000000000406000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064896028.0000000000408000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064927902.000000000040A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064959905.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064992453.0000000000414000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065024303.000000000041A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065055495.000000000041B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065086646.0000000000420000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065150592.0000000000429000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065181608.000000000042E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065213605.0000000000430000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065247297.0000000000436000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065278608.0000000000437000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065314228.000000000043C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065345921.000000000043E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065376800.000000000043F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065412995.0000000000444000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065444222.0000000000445000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065477000.000000000044A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065510299.000000000044C000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065543439.0000000000452000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065574043.0000000000453000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065609286.0000000000458000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065641477.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065672358.000000000045B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065703455.0000000000460000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065733984.0000000000461000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065770490.0000000000466000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065800883.0000000000468000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065830355.0000000000469000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065861085.000000000046E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065891278.000000000046F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065923953.0000000000474000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065955831.0000000000476000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065987198.0000000000477000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066018174.000000000047C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066052063.000000000047D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066082716.0000000000482000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_400000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$Create$CloseHandleNameProcessTempWrite
                                              • String ID:
                                              • API String ID: 463619559-0
                                              • Opcode ID: bbf5c5561a5178fb7ef464295b4b729c13e68fcf671b41c3dcb44b7c67eff673
                                              • Instruction ID: 561451de1182f26b83a4d0c89bf44bc0519aa6c32ef9bdd59d17316bb2afed01
                                              • Opcode Fuzzy Hash: bbf5c5561a5178fb7ef464295b4b729c13e68fcf671b41c3dcb44b7c67eff673
                                              • Instruction Fuzzy Hash: DE11ADB1200616BBEB251B20DC4AFFB3A2CEFC4B01F004519FA0A89480DBF59E5086A9
                                              APIs
                                              • GetProcAddress.KERNEL32(?,ProcessTrans), ref: 0040182F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2064830909.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000015.00000002.2064795062.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064865379.0000000000406000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064896028.0000000000408000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064927902.000000000040A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064959905.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064992453.0000000000414000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065024303.000000000041A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065055495.000000000041B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065086646.0000000000420000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065117221.0000000000422000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065150592.0000000000429000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065181608.000000000042E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065213605.0000000000430000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065247297.0000000000436000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065278608.0000000000437000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065314228.000000000043C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065345921.000000000043E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065376800.000000000043F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065412995.0000000000444000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065444222.0000000000445000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065477000.000000000044A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065510299.000000000044C000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065543439.0000000000452000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065574043.0000000000453000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065609286.0000000000458000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065641477.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065672358.000000000045B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065703455.0000000000460000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065733984.0000000000461000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065770490.0000000000466000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065800883.0000000000468000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065830355.0000000000469000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065861085.000000000046E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065891278.000000000046F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065923953.0000000000474000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065955831.0000000000476000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065987198.0000000000477000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066018174.000000000047C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066052063.000000000047D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066082716.0000000000482000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_400000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressProc
                                              • String ID: %u.%u.%u.%u$<6@$ProcessTrans
                                              • API String ID: 190572456-2997530932
                                              • Opcode ID: 923ab22f828fa07c49138cca62a50a6aac9a6e92c9ae45124c644abfdc677477
                                              • Instruction ID: 3a4176f581b1380518edbe1a1b49e1bd09d6b00a217a4bcfab538be4d270b979
                                              • Opcode Fuzzy Hash: 923ab22f828fa07c49138cca62a50a6aac9a6e92c9ae45124c644abfdc677477
                                              • Instruction Fuzzy Hash: E901A172414302AFD314DB24CD85E7B77A8EFC4704F048A3CF895A62D0DB78D9088B9A
                                              APIs
                                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00403C20
                                              • lstrcatA.KERNEL32(?,\Program Files\Internet Explorer\iexplore.exe,?,00000104), ref: 00403C35
                                              • lstrcpyA.KERNEL32(?,?,?,\Program Files\Internet Explorer\iexplore.exe,?,00000104), ref: 00403C48
                                              Strings
                                              • \Program Files\Internet Explorer\iexplore.exe, xrefs: 00403C2A
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2064830909.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000015.00000002.2064795062.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064865379.0000000000406000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064896028.0000000000408000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064927902.000000000040A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064959905.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064992453.0000000000414000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065024303.000000000041A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065055495.000000000041B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065086646.0000000000420000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065117221.0000000000422000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065150592.0000000000429000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065181608.000000000042E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065213605.0000000000430000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065247297.0000000000436000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065278608.0000000000437000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065314228.000000000043C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065345921.000000000043E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065376800.000000000043F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065412995.0000000000444000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065444222.0000000000445000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065477000.000000000044A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065510299.000000000044C000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065543439.0000000000452000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065574043.0000000000453000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065609286.0000000000458000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065641477.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065672358.000000000045B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065703455.0000000000460000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065733984.0000000000461000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065770490.0000000000466000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065800883.0000000000468000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065830355.0000000000469000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065861085.000000000046E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065891278.000000000046F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065923953.0000000000474000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065955831.0000000000476000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065987198.0000000000477000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066018174.000000000047C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066052063.000000000047D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066082716.0000000000482000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_400000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: DirectorySystemlstrcatlstrcpy
                                              • String ID: \Program Files\Internet Explorer\iexplore.exe
                                              • API String ID: 2630975639-1907246925
                                              • Opcode ID: 9d610355a3853537af27de88a3b84bfec3623b09a142c4852019a6b4888a0da7
                                              • Instruction ID: 58d9aff6231955fab03da148272387ac6a18f6e7ddf61f3ccb84cd9a8b5690bb
                                              • Opcode Fuzzy Hash: 9d610355a3853537af27de88a3b84bfec3623b09a142c4852019a6b4888a0da7
                                              • Instruction Fuzzy Hash: 4FE086F4548340ABD710D754D948FAA77A4BB94305F45882CB5CDD2190D6B8809CC71A
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32.dll,TerminateProcess), ref: 0040451A
                                              • GetProcAddress.KERNEL32(00000000), ref: 00404521
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2064830909.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000015.00000002.2064795062.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064865379.0000000000406000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064896028.0000000000408000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064927902.000000000040A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064959905.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064992453.0000000000414000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065024303.000000000041A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065055495.000000000041B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065086646.0000000000420000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065117221.0000000000422000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065150592.0000000000429000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065181608.000000000042E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065213605.0000000000430000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065247297.0000000000436000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065278608.0000000000437000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065314228.000000000043C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065345921.000000000043E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065376800.000000000043F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065412995.0000000000444000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065444222.0000000000445000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065477000.000000000044A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065510299.000000000044C000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065543439.0000000000452000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065574043.0000000000453000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065609286.0000000000458000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065641477.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065672358.000000000045B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065703455.0000000000460000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065733984.0000000000461000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065770490.0000000000466000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065800883.0000000000468000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065830355.0000000000469000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065861085.000000000046E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065891278.000000000046F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065923953.0000000000474000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065955831.0000000000476000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065987198.0000000000477000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066018174.000000000047C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066052063.000000000047D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066082716.0000000000482000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_400000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: TerminateProcess$kernel32.dll
                                              • API String ID: 2574300362-189552057
                                              • Opcode ID: 6f636aeb74e389af04e2a293c086324e8f42b9283dc5f0b57c6f061e2f8a9beb
                                              • Instruction ID: 033c7f9598048c8c3c56f6b884b3fb58df83f6f11900fedc1394fc5852d01883
                                              • Opcode Fuzzy Hash: 6f636aeb74e389af04e2a293c086324e8f42b9283dc5f0b57c6f061e2f8a9beb
                                              • Instruction Fuzzy Hash: 78C012B2681300AAC2806BA0BE08A643710A285A2A320103BF602B00E0CA3A00208B2D
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2064830909.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000015.00000002.2064795062.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064865379.0000000000406000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064896028.0000000000408000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064927902.000000000040A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064959905.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2064992453.0000000000414000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065024303.000000000041A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065055495.000000000041B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065086646.0000000000420000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065117221.0000000000422000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065150592.0000000000429000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065181608.000000000042E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065213605.0000000000430000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065247297.0000000000436000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065278608.0000000000437000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065314228.000000000043C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065345921.000000000043E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065376800.000000000043F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065412995.0000000000444000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065444222.0000000000445000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065477000.000000000044A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065510299.000000000044C000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065543439.0000000000452000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065574043.0000000000453000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065609286.0000000000458000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065641477.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065672358.000000000045B000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065703455.0000000000460000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065733984.0000000000461000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065770490.0000000000466000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065800883.0000000000468000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065830355.0000000000469000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065861085.000000000046E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065891278.000000000046F000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065923953.0000000000474000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065955831.0000000000476000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2065987198.0000000000477000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066018174.000000000047C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066052063.000000000047D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000015.00000002.2066082716.0000000000482000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_400000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Sleep
                                              • String ID: X7@
                                              • API String ID: 3472027048-2067089342
                                              • Opcode ID: 92fada5cfdbc6a922edbaf3abd6bdbc867ed69b1f2908b021d67a98f8e651ac5
                                              • Instruction ID: 56058c761996469b055373d7f4e5675fd511cabc212af0c966289d5b43759b51
                                              • Opcode Fuzzy Hash: 92fada5cfdbc6a922edbaf3abd6bdbc867ed69b1f2908b021d67a98f8e651ac5
                                              • Instruction Fuzzy Hash: EE21F9B12982129BDB00DF71EF08B5A3B66A7D8745F10843EE184762E4CFB95445CFAC
                                              APIs
                                              • GetModuleHandleA.KERNEL32(03A0FB94), ref: 7FE310E8
                                              • GetProcAddress.KERNEL32(00000000,7FE31181), ref: 7FE310F3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066853464.000000007FE30000.00000040.80000000.00040000.00000000.sdmp, Offset: 7FE30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_7fe30000_hrlA367.jbxd
                                              Similarity
                                              • API ID: AddressHandleModuleProc
                                              • String ID: .DLL
                                              • API String ID: 1646373207-899428287
                                              • Opcode ID: 5fdbe1fdb9a291c56d0de1b0085fc354e7c21eb32f0bc32c042edfe8f07510ff
                                              • Instruction ID: 5900f217701f080c4111b40af2f692126b674fcdb3668acd741284d8170f4144
                                              • Opcode Fuzzy Hash: 5fdbe1fdb9a291c56d0de1b0085fc354e7c21eb32f0bc32c042edfe8f07510ff
                                              • Instruction Fuzzy Hash: B301C835D00584EBC7659F38C54DADF3B7BEF08266F800118E5268A455C6F8DA90CFA1
                                              APIs
                                              • GetModuleHandleA.KERNEL32(0390FA58), ref: 0062113D
                                              • GetProcAddress.KERNEL32(00000000,006211D6), ref: 00621148
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000015.00000002.2066207224.0000000000620000.00000040.10000000.00040000.00000000.sdmp, Offset: 00620000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_21_2_620000_hrlA367.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressHandleModuleProc
                                              • String ID: .DLL
                                              • API String ID: 1646373207-899428287
                                              • Opcode ID: 82aecbdba2b6c313781f1a35b90d956a9f8d4ce40e6713e346beece58f6b0b34
                                              • Instruction ID: e7eacefbbe85ef6b3bee5713e82fc3bf577c7ddb6905f9b8c12ca08ac2adc72a
                                              • Opcode Fuzzy Hash: 82aecbdba2b6c313781f1a35b90d956a9f8d4ce40e6713e346beece58f6b0b34
                                              • Instruction Fuzzy Hash: 2501C83060F820FADF648E6CE84D7EA3B6EEF26341F104114DA198F256C7708E618E95