Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
aQ7bSXduYp.exe

Overview

General Information

Sample name:aQ7bSXduYp.exe
renamed because original name is a hash value
Original sample name:9755ac9d8308666a712c1e3e3d28c497e58be9592ce2556cf374ecac2e88b8ee.exe
Analysis ID:1579608
MD5:042ebfc9792a51bd61554078b19c7e6c
SHA1:5cc50b4a2634ce0986b20eb55c650d2cfd01ec70
SHA256:9755ac9d8308666a712c1e3e3d28c497e58be9592ce2556cf374ecac2e88b8ee
Tags:backdoorexepurplefoxupxuser-zhuzhu0009
Infos:

Detection

GhostRat, Nitol
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GhostRat
Yara detected Nitol
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Checks if browser processes are running
Contains functionality to capture and log keystrokes
Found stalling execution ending in API Sleep call
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks for available system drives (often done to infect USB drives)
Contains functionality for read data from the clipboard
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to communicate with device drivers
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to launch a process as a different user
Contains functionality to modify clipboard data
Contains functionality to read device registry values (via SetupAPI)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates or modifies windows services
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (may stop execution after accessing registry keys)
Found inlined nop instructions (likely shell or obfuscated code)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries device information via Setup API
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Communication To Uncommon Destination Ports
Sleep loop found (likely to delay execution)
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • aQ7bSXduYp.exe (PID: 7536 cmdline: "C:\Users\user\Desktop\aQ7bSXduYp.exe" MD5: 042EBFC9792A51BD61554078B19C7E6C)
  • cleanup
{"C2 url": "156.225.22.155"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpJoeSecurity_GhostRatYara detected GhostRatJoe Security
    00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpJoeSecurity_NitolYara detected NitolJoe Security
      00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_NitolYara detected NitolJoe Security
        Process Memory Space: aQ7bSXduYp.exe PID: 7536JoeSecurity_NitolYara detected NitolJoe Security
          SourceRuleDescriptionAuthorStrings
          0.2.aQ7bSXduYp.exe.10000000.1.unpackJoeSecurity_GhostRatYara detected GhostRatJoe Security
            0.2.aQ7bSXduYp.exe.10000000.1.unpackJoeSecurity_NitolYara detected NitolJoe Security
              0.2.aQ7bSXduYp.exe.10000000.1.unpackMALWARE_Win_NitolDetects Nitol backdoorditekSHen
              • 0x11978:$s2: Applications\iexplore.exe\shell\open\command
              • 0x12ad8:$s3: taskkill /f /im rundll32.exe
              • 0x11024:$s4: \Tencent\Users\*.*
              • 0x11634:$s5: [Pause Break]
              • 0x1187a:$s6: :]%d-%d-%d %d:%d:%d
              • 0x11ac8:$domain: www.xy999.com
              0.2.aQ7bSXduYp.exe.400000.0.unpackJoeSecurity_GhostRatYara detected GhostRatJoe Security
                0.2.aQ7bSXduYp.exe.400000.0.unpackJoeSecurity_NitolYara detected NitolJoe Security
                  Click to see the 1 entries

                  System Summary

                  barindex
                  Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 156.225.22.155, DestinationIsIpv6: false, DestinationPort: 8080, EventID: 3, Image: C:\Users\user\Desktop\aQ7bSXduYp.exe, Initiated: true, ProcessId: 7536, Protocol: tcp, SourceIp: 192.168.2.8, SourceIsIpv6: false, SourcePort: 49706
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-23T05:19:54.763350+010028511791Malware Command and Control Activity Detected192.168.2.849714156.225.22.1558080TCP
                  2024-12-23T05:20:02.449574+010028511791Malware Command and Control Activity Detected192.168.2.849706156.225.22.1558080TCP
                  2024-12-23T05:20:23.825452+010028511791Malware Command and Control Activity Detected192.168.2.849706156.225.22.1558080TCP
                  2024-12-23T05:20:24.764822+010028511791Malware Command and Control Activity Detected192.168.2.849709156.225.22.1558080TCP
                  2024-12-23T05:20:46.388737+010028511791Malware Command and Control Activity Detected192.168.2.849709156.225.22.1558080TCP
                  2024-12-23T05:20:47.288726+010028511791Malware Command and Control Activity Detected192.168.2.849710156.225.22.1558080TCP
                  2024-12-23T05:21:08.951009+010028511791Malware Command and Control Activity Detected192.168.2.849710156.225.22.1558080TCP
                  2024-12-23T05:21:09.840927+010028511791Malware Command and Control Activity Detected192.168.2.849712156.225.22.1558080TCP
                  2024-12-23T05:21:31.498441+010028511791Malware Command and Control Activity Detected192.168.2.849712156.225.22.1558080TCP
                  2024-12-23T05:21:32.411046+010028511791Malware Command and Control Activity Detected192.168.2.849713156.225.22.1558080TCP
                  2024-12-23T05:21:54.014295+010028511791Malware Command and Control Activity Detected192.168.2.849713156.225.22.1558080TCP
                  2024-12-23T05:21:54.928786+010028511791Malware Command and Control Activity Detected192.168.2.849714156.225.22.1558080TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 0.2.aQ7bSXduYp.exe.10000000.1.unpackMalware Configuration Extractor: GhostRat {"C2 url": "156.225.22.155"}
                  Source: aQ7bSXduYp.exeVirustotal: Detection: 71%Perma Link
                  Source: aQ7bSXduYp.exeReversingLabs: Detection: 71%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.8% probability
                  Source: aQ7bSXduYp.exeJoe Sandbox ML: detected
                  Source: aQ7bSXduYp.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeFile opened: z:Jump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeFile opened: x:Jump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeFile opened: v:Jump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeFile opened: t:Jump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeFile opened: r:Jump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeFile opened: p:Jump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeFile opened: n:Jump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeFile opened: l:Jump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeFile opened: j:Jump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeFile opened: h:Jump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeFile opened: f:Jump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeFile opened: b:Jump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeFile opened: y:Jump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeFile opened: w:Jump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeFile opened: u:Jump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeFile opened: s:Jump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeFile opened: q:Jump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeFile opened: o:Jump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeFile opened: m:Jump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeFile opened: k:Jump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeFile opened: i:Jump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeFile opened: g:Jump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeFile opened: e:Jump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeFile opened: [:Jump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_10001560 SHGetSpecialFolderPathA,FindFirstFileA,FindNextFileA,FindNextFileA,FindNextFileA,FindNextFileA,FindNextFileA,0_2_10001560
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 4x nop then push 00000014h0_2_0040149C
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 4x nop then mov eax, dword ptr [ebp-48h]0_2_00401EB4
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 4x nop then mov ecx, dword ptr [ebp-18h]0_2_00401B9F
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 4x nop then inc eax0_2_004012C7
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 4x nop then mov edx, dword ptr [ebp-20h]0_2_00401D14

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2851179 - Severity 1 - ETPRO MALWARE PurpleFox Backdoor/Rootkit Checkin M2 : 192.168.2.8:49706 -> 156.225.22.155:8080
                  Source: Network trafficSuricata IDS: 2851179 - Severity 1 - ETPRO MALWARE PurpleFox Backdoor/Rootkit Checkin M2 : 192.168.2.8:49712 -> 156.225.22.155:8080
                  Source: Network trafficSuricata IDS: 2851179 - Severity 1 - ETPRO MALWARE PurpleFox Backdoor/Rootkit Checkin M2 : 192.168.2.8:49713 -> 156.225.22.155:8080
                  Source: Network trafficSuricata IDS: 2851179 - Severity 1 - ETPRO MALWARE PurpleFox Backdoor/Rootkit Checkin M2 : 192.168.2.8:49709 -> 156.225.22.155:8080
                  Source: Network trafficSuricata IDS: 2851179 - Severity 1 - ETPRO MALWARE PurpleFox Backdoor/Rootkit Checkin M2 : 192.168.2.8:49714 -> 156.225.22.155:8080
                  Source: Network trafficSuricata IDS: 2851179 - Severity 1 - ETPRO MALWARE PurpleFox Backdoor/Rootkit Checkin M2 : 192.168.2.8:49710 -> 156.225.22.155:8080
                  Source: Malware configuration extractorURLs: 156.225.22.155
                  Source: global trafficTCP traffic: 192.168.2.8:49706 -> 156.225.22.155:8080
                  Source: Joe Sandbox ViewASN Name: XIAOZHIYUN1-AS-APICIDCNETWORKUS XIAOZHIYUN1-AS-APICIDCNETWORKUS
                  Source: global trafficHTTP traffic detected: GET /1.jpg HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: x.vay.ccConnection: Keep-Alive
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_10001E20 recv,select,recv,0_2_10001E20
                  Source: global trafficHTTP traffic detected: GET /1.jpg HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: x.vay.ccConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: x.vay.cc
                  Source: aQ7bSXduYp.exe, aQ7bSXduYp.exe, 00000000.00000003.1870370198.000000000072E000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2321479805.000000000072E000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2096068480.000000000072E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x.vay.cc/
                  Source: aQ7bSXduYp.exe, aQ7bSXduYp.exe, 00000000.00000002.2650988632.000000000072E000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2546503244.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000003.1870370198.000000000072E000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2321479805.000000000072E000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2096068480.000000000072E000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.1870265040.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2650988632.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2650988632.000000000070E000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2095867332.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2546573333.000000000072E000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2650696741.0000000000630000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2321396688.0000000000774000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x.vay.cc/1.jpg
                  Source: aQ7bSXduYp.exe, 00000000.00000003.2546503244.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.1870265040.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2650988632.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2095867332.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2321396688.0000000000774000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x.vay.cc/1.jpg(M
                  Source: aQ7bSXduYp.exe, 00000000.00000002.2650696741.0000000000630000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x.vay.cc/1.jpg:
                  Source: aQ7bSXduYp.exe, 00000000.00000003.2546503244.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.1870265040.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2650988632.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2095867332.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2321396688.0000000000774000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x.vay.cc/1.jpg:M.
                  Source: aQ7bSXduYp.exe, 00000000.00000002.2650988632.000000000070E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x.vay.cc/1.jpgiy9
                  Source: aQ7bSXduYp.exe, 00000000.00000003.2546503244.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.1870265040.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2650988632.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2095867332.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2321396688.0000000000774000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: <BackSpace>0_2_100026A0
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: <Enter>0_2_100026A0
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_10001A30 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_10001A30
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_10001A30 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_10001A30
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_100014C0 OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,0_2_100014C0
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_100026A0 GetKeyState,Sleep,lstrlenA,GetKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,lstrcatA,lstrlenA,lstrcatA,lstrcatA,0_2_100026A0

                  E-Banking Fraud

                  barindex
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: lstrlenA,strstr,lstrcpyA,CreateProcessA, Applications\iexplore.exe\shell\open\command0_2_100035C0

                  System Summary

                  barindex
                  Source: 0.2.aQ7bSXduYp.exe.10000000.1.unpack, type: UNPACKEDPEMatched rule: Detects Nitol backdoor Author: ditekSHen
                  Source: 0.2.aQ7bSXduYp.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Nitol backdoor Author: ditekSHen
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_100016D0: CreateFileA,DeviceIoControl,DeviceIoControl,WriteFile,DeviceIoControl,CloseHandle,Sleep,GetVersion,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,exit,0_2_100016D0
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_10003CE0 Sleep,OpenSCManagerA,OpenServiceA,DeleteService,GetSystemDirectoryA,lstrcatA,DeleteFileA,exit,VirtualAlloc,VirtualAlloc,Sleep,Sleep,VirtualAlloc,0_2_10003CE0
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_10006880 LoadLibraryA,LoadLibraryA,GetProcAddress,GetCurrentProcess,OpenProcessToken,DuplicateTokenEx,LoadLibraryA,GetProcAddress,SetTokenInformation,CreateProcessAsUserA,CloseHandle,CloseHandle,CloseHandle,FreeLibrary,0_2_10006880
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_100016D0 CreateFileA,DeviceIoControl,DeviceIoControl,WriteFile,DeviceIoControl,CloseHandle,Sleep,GetVersion,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,exit,0_2_100016D0
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_10002DA0 ExitWindowsEx,0_2_10002DA0
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_004074000_2_00407400
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_004026030_2_00402603
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_1000B4600_2_1000B460
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_100098990_2_10009899
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_1000A8B00_2_1000A8B0
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_10008EE00_2_10008EE0
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_1000AD500_2_1000AD50
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_1000B1D00_2_1000B1D0
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_100095EE0_2_100095EE
                  Source: aQ7bSXduYp.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                  Source: 0.2.aQ7bSXduYp.exe.10000000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Nitol author = ditekSHen, description = Detects Nitol backdoor
                  Source: 0.2.aQ7bSXduYp.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Nitol author = ditekSHen, description = Detects Nitol backdoor
                  Source: classification engineClassification label: mal100.bank.troj.spyw.evad.winEXE@1/0@1/1
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_100016D0 CreateFileA,DeviceIoControl,DeviceIoControl,WriteFile,DeviceIoControl,CloseHandle,Sleep,GetVersion,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,exit,0_2_100016D0
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_100059D0 lstrcpyA,lstrcpyA,lstrcpyA,getsockname,GetVersionExA,RegOpenKeyA,RegQueryValueExA,RegCloseKey,wsprintfA,wsprintfA,wsprintfA,GlobalMemoryStatusEx,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetLastInputInfo,GetTickCount,lstrcpyA,0_2_100059D0
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: GetModuleFileNameA,ExpandEnvironmentStringsA,strncmp,wsprintfA,CopyFileA,SetFileAttributesA,OpenSCManagerA,CreateServiceA,LockServiceDatabase,ChangeServiceConfig2A,ChangeServiceConfig2A,UnlockServiceDatabase,GetLastError,OpenServiceA,StartServiceA,StartServiceA,RegOpenKeyA,lstrlenA,RegSetValueExA,0_2_100076E0
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_10007070 LoadLibraryA,GetProcAddress,OutputDebugStringA,CreateToolhelp32Snapshot,Process32First,Process32Next,0_2_10007070
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_10007BC0 GetInputState,GetCurrentThreadId,PostThreadMessageA,GetMessageA,GetCurrentProcessId,ExitProcess,GetVersionExA,GetVersionExA,GetVersionExA,CreateThread,WaitForSingleObject,CloseHandle,Sleep,Sleep,Sleep,Sleep,StartServiceCtrlDispatcherA,StartServiceCtrlDispatcherA,Sleep,StartServiceCtrlDispatcherA,ExpandEnvironmentStringsA,wsprintfA,GetModuleFileNameA,CopyFileA,Sleep,ExitProcess,CreateThread,WaitForSingleObject,CloseHandle,Sleep,Sleep,sprintf,lstrlenA,wsprintfA,GetModuleFileNameA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,MoveFileA,GetModuleFileNameA,Sleep,Sleep,WaitForSingleObject,CloseHandle,Sleep,0_2_10007BC0
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_10007BC0 GetInputState,GetCurrentThreadId,PostThreadMessageA,GetMessageA,GetCurrentProcessId,ExitProcess,GetVersionExA,GetVersionExA,GetVersionExA,CreateThread,WaitForSingleObject,CloseHandle,Sleep,Sleep,Sleep,Sleep,StartServiceCtrlDispatcherA,StartServiceCtrlDispatcherA,Sleep,StartServiceCtrlDispatcherA,ExpandEnvironmentStringsA,wsprintfA,GetModuleFileNameA,CopyFileA,Sleep,ExitProcess,CreateThread,WaitForSingleObject,CloseHandle,Sleep,Sleep,sprintf,lstrlenA,wsprintfA,GetModuleFileNameA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,MoveFileA,GetModuleFileNameA,Sleep,Sleep,WaitForSingleObject,CloseHandle,Sleep,0_2_10007BC0
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_10007200 GetInputState,GetCurrentThreadId,PostThreadMessageA,GetMessageA,OutputDebugStringA,GetCurrentProcessId,ExitProcess,GetVersionExA,GetVersionExA,GetVersionExA,CreateThread,WaitForSingleObject,CloseHandle,Sleep,Sleep,Sleep,Sleep,StartServiceCtrlDispatcherA,StartServiceCtrlDispatcherA,Sleep,StartServiceCtrlDispatcherA,ExpandEnvironmentStringsA,wsprintfA,GetModuleFileNameA,CopyFileA,Sleep,ExitProcess,CreateThread,WaitForSingleObject,CloseHandle,Sleep,Sleep,sprintf,lstrlenA,wsprintfA,GetModuleFileNameA,SHGetSpecialFolderPathA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,MoveFileA,Sleep,Sleep,WaitForSingleObject,CloseHandle,Sleep,0_2_10007200
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeMutant created: \Sessions\1\BaseNamedObjects\156.225.22.155:8080:Rsssqi yqeaiusa
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: aQ7bSXduYp.exeVirustotal: Detection: 71%
                  Source: aQ7bSXduYp.exeReversingLabs: Detection: 71%
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: napinsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: pnrpnsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: wshbth.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: nlaapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: winrnr.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: devenum.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: devobj.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: msdmo.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: avicap32.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: msvfw32.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: avicap32.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: msvfw32.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: avicap32.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: msvfw32.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: avicap32.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: msvfw32.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: avicap32.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: msvfw32.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: avicap32.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeSection loaded: msvfw32.dllJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_0040149C LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,VirtualAlloc,VirtualAlloc,VirtualAlloc,0_2_0040149C
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_0040AF30 push eax; ret 0_2_0040AF5E
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_1000B780 push eax; ret 0_2_1000B7AE
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Rsssqi yqeaiusaJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_10007BC0 GetInputState,GetCurrentThreadId,PostThreadMessageA,GetMessageA,GetCurrentProcessId,ExitProcess,GetVersionExA,GetVersionExA,GetVersionExA,CreateThread,WaitForSingleObject,CloseHandle,Sleep,Sleep,Sleep,Sleep,StartServiceCtrlDispatcherA,StartServiceCtrlDispatcherA,Sleep,StartServiceCtrlDispatcherA,ExpandEnvironmentStringsA,wsprintfA,GetModuleFileNameA,CopyFileA,Sleep,ExitProcess,CreateThread,WaitForSingleObject,CloseHandle,Sleep,Sleep,sprintf,lstrlenA,wsprintfA,GetModuleFileNameA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,MoveFileA,GetModuleFileNameA,Sleep,Sleep,WaitForSingleObject,CloseHandle,Sleep,0_2_10007BC0

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: icon289.png
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_10002E20 OpenEventLogA,ClearEventLogA,OpenEventLogA,ClearEventLogA,CloseEventLog,0_2_10002E20

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeStalling execution: Execution stalls by calling Sleepgraph_0-10197
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_10001860 SetupDiGetClassDevsA,SetupDiEnumDeviceInfo,GetLastError,SetupDiGetDeviceRegistryPropertyA,SetupDiGetDeviceRegistryPropertyA,GetLastError,GetLastError,GetLastError,LocalFree,SetupDiGetDeviceRegistryPropertyA,GetLastError,_strcmpi,SetupDiSetClassInstallParamsA,GetLastError,SetupDiCallClassInstaller,GetLastError,SetupDiEnumDeviceInfo,GetLastError,SetupDiDestroyDeviceInfoList,SetLastError,0_2_10001860
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeWindow / User API: threadDelayed 7334Jump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_0-10936
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exe TID: 7652Thread sleep count: 7334 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exe TID: 7652Thread sleep time: -73340s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeLast function: Thread delayed
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeLast function: Thread delayed
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeThread sleep count: Count: 7334 delay: -10Jump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_10001560 SHGetSpecialFolderPathA,FindFirstFileA,FindNextFileA,FindNextFileA,FindNextFileA,FindNextFileA,FindNextFileA,0_2_10001560
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_10004D90 GetSystemInfo,wsprintfA,0_2_10004D90
                  Source: aQ7bSXduYp.exe, 00000000.00000002.2650988632.000000000072E000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.1870370198.000000000072E000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2321479805.000000000072E000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2096068480.000000000072E000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2546573333.000000000072E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWX)y%SystemRoot%\system32\mswsock.dll]
                  Source: aQ7bSXduYp.exe, 00000000.00000003.2321396688.0000000000791000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.1870265040.0000000000791000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2095867332.0000000000791000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2650988632.0000000000789000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWwk
                  Source: aQ7bSXduYp.exe, aQ7bSXduYp.exe, 00000000.00000003.2095867332.0000000000789000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2321396688.0000000000789000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2546503244.0000000000789000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.1870265040.0000000000789000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2650988632.0000000000789000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeAPI call chain: ExitProcess graph end nodegraph_0-10848
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_0040149C LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,VirtualAlloc,VirtualAlloc,VirtualAlloc,0_2_0040149C
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_10004620 VirtualAlloc,VirtualAlloc,VirtualAlloc,GetProcessHeap,HeapAlloc,VirtualAlloc,VirtualAlloc,0_2_10004620
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_00404740 SetUnhandledExceptionFilter,0_2_00404740
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_00404760 SetUnhandledExceptionFilter,0_2_00404760
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: LoadLibraryA,OutputDebugStringA,GetProcAddress,OutputDebugStringA,CreateToolhelp32Snapshot,Process32First,_strcmpi,_strcmpi,Process32Next, explorer.exe0_2_10007120
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_10001860 SetupDiGetClassDevsA,SetupDiEnumDeviceInfo,GetLastError,SetupDiGetDeviceRegistryPropertyA,SetupDiGetDeviceRegistryPropertyA,GetLastError,GetLastError,GetLastError,LocalFree,SetupDiGetDeviceRegistryPropertyA,GetLastError,_strcmpi,SetupDiSetClassInstallParamsA,GetLastError,SetupDiCallClassInstaller,GetLastError,SetupDiEnumDeviceInfo,GetLastError,SetupDiDestroyDeviceInfoList,SetLastError,0_2_10001860
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_10005D90 GetVersionExA,wsprintfA,wsprintfA,GetLocalTime,wsprintfA,lstrlenA,0_2_10005D90
                  Source: C:\Users\user\Desktop\aQ7bSXduYp.exeCode function: 0_2_00403260 EntryPoint,GetVersion,0_2_00403260
                  Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vsserv.exe
                  Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: avcenter.exe
                  Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: kxetray.exe
                  Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: cpf.exe
                  Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: avp.exe
                  Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: F-PROT.exe
                  Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: spidernt.exe
                  Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: F-PROT.EXE
                  Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: rtvscan.exe
                  Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: nspupsvc.exe
                  Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: 360tray.exe
                  Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: ashDisp.exe
                  Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: TMBMSRV.exe
                  Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: SBAMSvc.exe
                  Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: a2guard.exe
                  Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: avgwdsvc.exe
                  Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: AYAgent.aye
                  Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vsmon.exe
                  Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: QUHLPSVC.EXE
                  Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: RavMonD.exe
                  Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe
                  Source: aQ7bSXduYp.exe, aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Mcshield.exe
                  Source: aQ7bSXduYp.exe, 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: K7TSecurity.exe

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.aQ7bSXduYp.exe.10000000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.aQ7bSXduYp.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0.2.aQ7bSXduYp.exe.10000000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.aQ7bSXduYp.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: aQ7bSXduYp.exe PID: 7536, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.aQ7bSXduYp.exe.10000000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.aQ7bSXduYp.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0.2.aQ7bSXduYp.exe.10000000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.aQ7bSXduYp.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: aQ7bSXduYp.exe PID: 7536, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure1
                  Valid Accounts
                  1
                  Native API
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  21
                  Obfuscated Files or Information
                  111
                  Input Capture
                  1
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  2
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomains1
                  Replication Through Removable Media
                  12
                  Service Execution
                  1
                  Valid Accounts
                  1
                  Valid Accounts
                  1
                  Software Packing
                  LSASS Memory11
                  Peripheral Device Discovery
                  Remote Desktop Protocol111
                  Input Capture
                  1
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAt23
                  Windows Service
                  11
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  Security Account Manager1
                  File and Directory Discovery
                  SMB/Windows Admin Shares3
                  Clipboard Data
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook23
                  Windows Service
                  1
                  Masquerading
                  NTDS16
                  System Information Discovery
                  Distributed Component Object ModelInput Capture2
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script11
                  Process Injection
                  1
                  Valid Accounts
                  LSA Secrets1
                  Query Registry
                  SSHKeylogging112
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials21
                  Security Software Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                  Access Token Manipulation
                  DCSync2
                  Virtualization/Sandbox Evasion
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
                  Process Injection
                  Proc Filesystem12
                  Process Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                  Indicator Removal
                  /etc/passwd and /etc/shadow1
                  Application Window Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  aQ7bSXduYp.exe72%VirustotalBrowse
                  aQ7bSXduYp.exe71%ReversingLabsWin32.Trojan.PolyPatch
                  aQ7bSXduYp.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  x.vay.cc
                  156.225.22.155
                  truetrue
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    156.225.22.155true
                      unknown
                      http://x.vay.cc/1.jpgtrue
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://x.vay.cc/aQ7bSXduYp.exe, aQ7bSXduYp.exe, 00000000.00000003.1870370198.000000000072E000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2321479805.000000000072E000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2096068480.000000000072E000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://x.vay.cc/1.jpg(MaQ7bSXduYp.exe, 00000000.00000003.2546503244.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.1870265040.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2650988632.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2095867332.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2321396688.0000000000774000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://x.vay.cc/1.jpg:M.aQ7bSXduYp.exe, 00000000.00000003.2546503244.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.1870265040.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000002.2650988632.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2095867332.0000000000774000.00000004.00000020.00020000.00000000.sdmp, aQ7bSXduYp.exe, 00000000.00000003.2321396688.0000000000774000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://x.vay.cc/1.jpg:aQ7bSXduYp.exe, 00000000.00000002.2650696741.0000000000630000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://x.vay.cc/1.jpgiy9aQ7bSXduYp.exe, 00000000.00000002.2650988632.000000000070E000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  156.225.22.155
                                  x.vay.ccSeychelles
                                  136800XIAOZHIYUN1-AS-APICIDCNETWORKUStrue
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1579608
                                  Start date and time:2024-12-23 05:19:05 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 4m 42s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:7
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:aQ7bSXduYp.exe
                                  renamed because original name is a hash value
                                  Original Sample Name:9755ac9d8308666a712c1e3e3d28c497e58be9592ce2556cf374ecac2e88b8ee.exe
                                  Detection:MAL
                                  Classification:mal100.bank.troj.spyw.evad.winEXE@1/0@1/1
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HCA Information:
                                  • Successful, ratio: 98%
                                  • Number of executed functions: 40
                                  • Number of non-executed functions: 92
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                  • Excluded IPs from analysis (whitelisted): 52.149.20.212
                                  • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  TimeTypeDescription
                                  23:20:51API Interceptor4408x Sleep call for process: aQ7bSXduYp.exe modified
                                  No context
                                  No context
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  XIAOZHIYUN1-AS-APICIDCNETWORKUSmipsel.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                  • 103.199.102.178
                                  nsharm.elfGet hashmaliciousMiraiBrowse
                                  • 156.234.199.255
                                  loligang.arm7.elfGet hashmaliciousMiraiBrowse
                                  • 156.234.199.204
                                  loligang.spc.elfGet hashmaliciousMiraiBrowse
                                  • 45.207.113.55
                                  arm5.nn-20241218-0633.elfGet hashmaliciousMirai, OkiruBrowse
                                  • 156.226.203.160
                                  jew.mpsl.elfGet hashmaliciousUnknownBrowse
                                  • 156.226.185.157
                                  powerpc.elfGet hashmaliciousUnknownBrowse
                                  • 154.222.104.79
                                  arm6.elfGet hashmaliciousUnknownBrowse
                                  • 156.241.59.21
                                  x86_64.elfGet hashmaliciousMiraiBrowse
                                  • 156.253.67.13
                                  i686.elfGet hashmaliciousMiraiBrowse
                                  • 156.226.137.248
                                  No context
                                  No context
                                  No created / dropped files found
                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                  Entropy (8bit):3.3897809942320607
                                  TrID:
                                  • Win32 Executable (generic) a (10002005/4) 99.39%
                                  • UPX compressed Win32 Executable (30571/9) 0.30%
                                  • Win32 EXE Yoda's Crypter (26571/9) 0.26%
                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                  • DOS Executable Generic (2002/1) 0.02%
                                  File name:aQ7bSXduYp.exe
                                  File size:507'904 bytes
                                  MD5:042ebfc9792a51bd61554078b19c7e6c
                                  SHA1:5cc50b4a2634ce0986b20eb55c650d2cfd01ec70
                                  SHA256:9755ac9d8308666a712c1e3e3d28c497e58be9592ce2556cf374ecac2e88b8ee
                                  SHA512:1b3a1bdfe82668b74578b056c215db7e02236686e8b85da06c7b2fbc6c6224ac12de76f58708e008558b2f2e734a184bf36f2dffd451da841d8e767ef5c73ab0
                                  SSDEEP:3072:3yZK/yLrQbWaR5Qax8c2JKgm45EWWdfnaZfw4luiu2/ZVXfR:CQyLEbWaR5Cc5E6nmomxF
                                  TLSH:4CB4C001F640C419E1C5C1B6E6BEC7BFB82D9EB0134528D3A2E4B6AA37352D159339DB
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Mdy.Mdy.Mdy..xw.Xdy.{Bs..dy..k$.Ndy.Mdx..dy.{Br.Fdy.RichMdy.................PE..L....(.b.....................@......`2.....
                                  Icon Hash:74f2d1d1d3d3d752
                                  Entrypoint:0x403260
                                  Entrypoint Section:UPX0
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                  DLL Characteristics:
                                  Time Stamp:0x620B28E9 [Tue Feb 15 04:15:37 2022 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:032ac126bef9dc99c70a99a6b91b16f2
                                  Instruction
                                  push ebp
                                  mov ebp, esp
                                  push FFFFFFFFh
                                  push 0040F128h
                                  push 00405AF8h
                                  mov eax, dword ptr fs:[00000000h]
                                  push eax
                                  mov dword ptr fs:[00000000h], esp
                                  add esp, FFFFFFA4h
                                  push ebx
                                  push esi
                                  push edi
                                  mov dword ptr [ebp-18h], esp
                                  call dword ptr [0040F028h]
                                  mov dword ptr [0045DCE0h], eax
                                  mov eax, dword ptr [0045DCE0h]
                                  shr eax, 08h
                                  and eax, 000000FFh
                                  mov dword ptr [0045DCECh], eax
                                  mov ecx, dword ptr [0045DCE0h]
                                  and ecx, 000000FFh
                                  mov dword ptr [0045DCE8h], ecx
                                  mov edx, dword ptr [0045DCE8h]
                                  shl edx, 08h
                                  add edx, dword ptr [0045DCECh]
                                  mov dword ptr [0045DCE4h], edx
                                  mov eax, dword ptr [0045DCE0h]
                                  shr eax, 10h
                                  and eax, 0000FFFFh
                                  mov dword ptr [0045DCE0h], eax
                                  push 00000001h
                                  call 00007F8D69488E42h
                                  add esp, 04h
                                  test eax, eax
                                  jne 00007F8D694866CCh
                                  push 0000001Ch
                                  call 00007F8D694867D4h
                                  add esp, 04h
                                  call 00007F8D6948783Ch
                                  test eax, eax
                                  jne 00007F8D694866CCh
                                  push 00000010h
                                  call 00007F8D694867C1h
                                  add esp, 04h
                                  mov dword ptr [ebp-04h], 00000000h
                                  call 00007F8D69488852h
                                  call dword ptr [0040F024h]
                                  mov dword ptr [0045F378h], eax
                                  call 00007F8D69488622h
                                  mov dword ptr [0045DC68h], eax
                                  Programming Language:
                                  • [ C ] VS98 (6.0) SP6 build 8804
                                  • [C++] VS98 (6.0) SP6 build 8804
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x6e0000x14.rsrc
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x670000x3750.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  UPX00x10000x490000x490004846e42971a99b098aeccd5ada1e28f9False0.365257785744863data4.602843880355792IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  UPX10x4a0000x1d0000x1d0001f49befe1249d80d39aab52aafefd609False0.07623080549568965data0.9890847068640483IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .rsrc0x670000x150000x150004ebb12fea01399f8300fe6b5e15f0eaaFalse0.07845052083333333data1.4073187956554571IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_ICON0x670d40x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600ChineseChina0.3865145228215768
                                  RT_ICON0x696800x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224ChineseChina0.4523921200750469
                                  RT_GROUP_ICON0x6a72c0x22dataChineseChina0.9117647058823529
                                  DLLImport
                                  KERNEL32.DLLGetProcAddress, LoadLibraryA, VirtualAlloc, VirtualFree, FreeLibrary, RtlUnwind, RaiseException, GetModuleHandleA, GetStartupInfoA, GetCommandLineA, GetVersion, ExitProcess, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, HeapFree, GetCurrentThreadId, TlsSetValue, TlsAlloc, SetLastError, TlsGetValue, GetLastError, SetUnhandledExceptionFilter, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, GetModuleFileNameA, FreeEnvironmentStringsA, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStrings, GetEnvironmentStringsW, SetHandleCount, GetStdHandle, GetFileType, GetEnvironmentVariableA, GetVersionExA, HeapDestroy, HeapCreate, WriteFile, IsBadWritePtr, IsBadReadPtr, HeapValidate, HeapAlloc, HeapReAlloc, DebugBreak, InterlockedDecrement, OutputDebugStringA, InterlockedIncrement, IsBadCodePtr, GetCPInfo, GetACP, GetOEMCP, MultiByteToWideChar, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, SetFilePointer, SetStdHandle, FlushFileBuffers, CloseHandle
                                  Language of compilation systemCountry where language is spokenMap
                                  ChineseChina
                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                  2024-12-23T05:19:54.763350+01002851179ETPRO MALWARE PurpleFox Backdoor/Rootkit Checkin M21192.168.2.849714156.225.22.1558080TCP
                                  2024-12-23T05:20:02.449574+01002851179ETPRO MALWARE PurpleFox Backdoor/Rootkit Checkin M21192.168.2.849706156.225.22.1558080TCP
                                  2024-12-23T05:20:23.825452+01002851179ETPRO MALWARE PurpleFox Backdoor/Rootkit Checkin M21192.168.2.849706156.225.22.1558080TCP
                                  2024-12-23T05:20:24.764822+01002851179ETPRO MALWARE PurpleFox Backdoor/Rootkit Checkin M21192.168.2.849709156.225.22.1558080TCP
                                  2024-12-23T05:20:46.388737+01002851179ETPRO MALWARE PurpleFox Backdoor/Rootkit Checkin M21192.168.2.849709156.225.22.1558080TCP
                                  2024-12-23T05:20:47.288726+01002851179ETPRO MALWARE PurpleFox Backdoor/Rootkit Checkin M21192.168.2.849710156.225.22.1558080TCP
                                  2024-12-23T05:21:08.951009+01002851179ETPRO MALWARE PurpleFox Backdoor/Rootkit Checkin M21192.168.2.849710156.225.22.1558080TCP
                                  2024-12-23T05:21:09.840927+01002851179ETPRO MALWARE PurpleFox Backdoor/Rootkit Checkin M21192.168.2.849712156.225.22.1558080TCP
                                  2024-12-23T05:21:31.498441+01002851179ETPRO MALWARE PurpleFox Backdoor/Rootkit Checkin M21192.168.2.849712156.225.22.1558080TCP
                                  2024-12-23T05:21:32.411046+01002851179ETPRO MALWARE PurpleFox Backdoor/Rootkit Checkin M21192.168.2.849713156.225.22.1558080TCP
                                  2024-12-23T05:21:54.014295+01002851179ETPRO MALWARE PurpleFox Backdoor/Rootkit Checkin M21192.168.2.849713156.225.22.1558080TCP
                                  2024-12-23T05:21:54.928786+01002851179ETPRO MALWARE PurpleFox Backdoor/Rootkit Checkin M21192.168.2.849714156.225.22.1558080TCP
                                  TimestampSource PortDest PortSource IPDest IP
                                  Dec 23, 2024 05:20:01.782222986 CET497068080192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:20:01.902033091 CET808049706156.225.22.155192.168.2.8
                                  Dec 23, 2024 05:20:01.904166937 CET497068080192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:20:02.449573994 CET497068080192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:20:02.569108009 CET808049706156.225.22.155192.168.2.8
                                  Dec 23, 2024 05:20:03.255043030 CET4970780192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:20:03.374679089 CET8049707156.225.22.155192.168.2.8
                                  Dec 23, 2024 05:20:03.374767065 CET4970780192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:20:03.375006914 CET4970780192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:20:03.494469881 CET8049707156.225.22.155192.168.2.8
                                  Dec 23, 2024 05:20:23.824930906 CET808049706156.225.22.155192.168.2.8
                                  Dec 23, 2024 05:20:23.825227022 CET497068080192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:20:23.825452089 CET497068080192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:20:24.331134081 CET497098080192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:20:24.450859070 CET808049709156.225.22.155192.168.2.8
                                  Dec 23, 2024 05:20:24.450931072 CET497098080192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:20:24.764822006 CET497098080192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:20:24.884560108 CET808049709156.225.22.155192.168.2.8
                                  Dec 23, 2024 05:20:25.278244019 CET8049707156.225.22.155192.168.2.8
                                  Dec 23, 2024 05:20:25.278458118 CET4970780192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:20:25.279560089 CET4970780192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:20:25.399266005 CET8049707156.225.22.155192.168.2.8
                                  Dec 23, 2024 05:20:46.388504982 CET808049709156.225.22.155192.168.2.8
                                  Dec 23, 2024 05:20:46.388596058 CET497098080192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:20:46.388736963 CET497098080192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:20:46.893873930 CET497108080192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:20:47.013875961 CET808049710156.225.22.155192.168.2.8
                                  Dec 23, 2024 05:20:47.014132023 CET497108080192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:20:47.288726091 CET497108080192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:20:47.408508062 CET808049710156.225.22.155192.168.2.8
                                  Dec 23, 2024 05:21:08.950860023 CET808049710156.225.22.155192.168.2.8
                                  Dec 23, 2024 05:21:08.950936079 CET497108080192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:21:08.951009035 CET497108080192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:21:09.456084013 CET497128080192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:21:09.575834990 CET808049712156.225.22.155192.168.2.8
                                  Dec 23, 2024 05:21:09.575948954 CET497128080192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:21:09.840926886 CET497128080192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:21:09.960597992 CET808049712156.225.22.155192.168.2.8
                                  Dec 23, 2024 05:21:31.498214006 CET808049712156.225.22.155192.168.2.8
                                  Dec 23, 2024 05:21:31.498322010 CET497128080192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:21:31.498440981 CET497128080192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:21:32.003227949 CET497138080192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:21:32.123182058 CET808049713156.225.22.155192.168.2.8
                                  Dec 23, 2024 05:21:32.123321056 CET497138080192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:21:32.411046028 CET497138080192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:21:32.530920982 CET808049713156.225.22.155192.168.2.8
                                  Dec 23, 2024 05:21:54.014118910 CET808049713156.225.22.155192.168.2.8
                                  Dec 23, 2024 05:21:54.014202118 CET497138080192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:21:54.014295101 CET497138080192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:21:54.518939018 CET497148080192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:21:54.638712883 CET808049714156.225.22.155192.168.2.8
                                  Dec 23, 2024 05:21:54.638804913 CET497148080192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:21:54.928786039 CET497148080192.168.2.8156.225.22.155
                                  Dec 23, 2024 05:21:55.048449039 CET808049714156.225.22.155192.168.2.8
                                  TimestampSource PortDest PortSource IPDest IP
                                  Dec 23, 2024 05:20:02.473928928 CET5878653192.168.2.81.1.1.1
                                  Dec 23, 2024 05:20:02.700536013 CET53587861.1.1.1192.168.2.8
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Dec 23, 2024 05:20:02.473928928 CET192.168.2.81.1.1.10x4cfdStandard query (0)x.vay.ccA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Dec 23, 2024 05:20:02.700536013 CET1.1.1.1192.168.2.80x4cfdNo error (0)x.vay.cc156.225.22.155A (IP address)IN (0x0001)false
                                  • x.vay.cc
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.849707156.225.22.155807536C:\Users\user\Desktop\aQ7bSXduYp.exe
                                  TimestampBytes transferredDirectionData
                                  Dec 23, 2024 05:20:03.375006914 CET272OUTGET /1.jpg HTTP/1.1
                                  Accept: */*
                                  Accept-Encoding: gzip, deflate
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                  Host: x.vay.cc
                                  Connection: Keep-Alive


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Target ID:0
                                  Start time:23:19:59
                                  Start date:22/12/2024
                                  Path:C:\Users\user\Desktop\aQ7bSXduYp.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\aQ7bSXduYp.exe"
                                  Imagebase:0x400000
                                  File size:507'904 bytes
                                  MD5 hash:042EBFC9792A51BD61554078B19C7E6C
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:false

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:9.3%
                                    Dynamic/Decrypted Code Coverage:46.4%
                                    Signature Coverage:17.2%
                                    Total number of Nodes:1742
                                    Total number of Limit Nodes:22
                                    execution_graph 11021 10007200 GetInputState GetCurrentThreadId PostThreadMessageA GetMessageA 11022 1000723a OutputDebugStringA 11021->11022 11023 1000726d GetVersionExA 11021->11023 11024 10007120 8 API calls 11022->11024 11025 10007291 11023->11025 11026 100072a2 11023->11026 11027 1000724a GetCurrentProcessId 11024->11027 11028 10008140 3 API calls 11025->11028 11029 100072b2 11026->11029 11033 10005d20 12 API calls 11026->11033 11032 10007070 6 API calls 11027->11032 11028->11026 11030 10007541 sprintf 11029->11030 11031 100072be GetVersionExA 11029->11031 11036 10004dc0 13 API calls 11030->11036 11034 100058d0 3 API calls 11031->11034 11035 10007258 11032->11035 11033->11029 11037 100072e1 11034->11037 11035->11023 11038 10007266 ExitProcess 11035->11038 11039 100075da lstrlenA 11036->11039 11040 1000733a 11037->11040 11044 100072f6 CreateThread 11037->11044 11041 10007608 11039->11041 11042 100075ef 11039->11042 11046 10007347 11040->11046 11047 100074d9 11040->11047 11043 10007020 4 API calls 11041->11043 11045 10003050 14 API calls 11042->11045 11048 10007610 8 API calls 11043->11048 11049 10008140 3 API calls 11044->11049 11050 100075fe 11045->11050 11082 10007b20 RegOpenKeyExA 11046->11082 11052 100076cc 11047->11052 11057 10003050 14 API calls 11047->11057 11053 10008140 3 API calls 11048->11053 11054 10007316 WaitForSingleObject 11049->11054 11055 10005d90 16 API calls 11050->11055 11058 100076ae WaitForSingleObject 11053->11058 11066 1000732b 11054->11066 11055->11041 11056 1000734c 11059 10007350 Sleep StartServiceCtrlDispatcherA Sleep StartServiceCtrlDispatcherA 11056->11059 11060 10007395 ExpandEnvironmentStringsA wsprintfA 11056->11060 11061 100074f0 11057->11061 11069 100076c3 Sleep 11058->11069 11062 100074cd 11059->11062 11064 10007406 GetModuleFileNameA CopyFileA 11060->11064 11065 100073ee 11060->11065 11063 10005d90 16 API calls 11061->11063 11070 100067a0 4 API calls 11062->11070 11067 100074fa CreateThread 11063->11067 11068 100076e0 35 API calls 11064->11068 11065->11064 11071 10007331 Sleep 11066->11071 11072 10008140 3 API calls 11067->11072 11073 100074a5 11068->11073 11069->11069 11074 100074d2 ExitProcess 11070->11074 11071->11071 11075 1000751d WaitForSingleObject 11072->11075 11076 10003050 14 API calls 11073->11076 11078 10007532 11075->11078 11077 100074b4 11076->11077 11079 10005d90 16 API calls 11077->11079 11080 10007538 Sleep 11078->11080 11081 100074be Sleep 11079->11081 11080->11080 11081->11062 11082->11056 11083 409640 InterlockedIncrement 11084 4096e0 11083->11084 11085 409653 11083->11085 11093 409702 ArrayUnwindFilter 11084->11093 11105 40b7a0 11084->11105 11086 40965c LoadLibraryA 11085->11086 11087 40969e OutputDebugStringA InterlockedDecrement 11085->11087 11088 409696 11086->11088 11089 409676 GetProcAddress 11086->11089 11104 4095b0 DebugBreak 11087->11104 11089->11087 11089->11088 11111 40b6a0 11093->11111 11095 4097d5 ArrayUnwindFilter 11098 40984c ArrayUnwindFilter 11095->11098 11099 409830 11095->11099 11096 40989b 11097 4098ac OutputDebugStringA 11096->11097 11102 4098b9 11096->11102 11097->11102 11098->11096 11100 40987f WriteFile 11098->11100 11099->11088 11101 409836 InterlockedDecrement 11099->11101 11100->11096 11101->11088 11102->11088 11103 409925 InterlockedDecrement 11102->11103 11103->11088 11104->11088 11106 40b7af 11105->11106 11117 40c570 11106->11117 11109 40b856 11109->11093 11112 40b6b5 11111->11112 11113 40c570 14 API calls 11112->11113 11114 40b73e 11113->11114 11115 40b75c 11114->11115 11116 40c2f0 10 API calls 11114->11116 11115->11095 11116->11115 11120 40c59b ArrayUnwindFilter _get_int_arg _get_short_arg 11117->11120 11118 40b838 11118->11109 11124 40c2f0 11118->11124 11119 40d330 10 API calls 11119->11120 11120->11118 11120->11119 11121 40d3b0 10 API calls 11120->11121 11122 40d3f0 10 API calls 11120->11122 11123 40dd30 LeaveCriticalSection InterlockedIncrement InterlockedDecrement InterlockedDecrement WideCharToMultiByte 11120->11123 11121->11120 11122->11120 11123->11120 11128 40c2f9 11124->11128 11125 40c443 11129 40c4aa 11125->11129 11132 40c4c6 11125->11132 11126 40c51b 11127 40d6e0 10 API calls 11126->11127 11131 40c34f 11127->11131 11128->11125 11128->11126 11128->11131 11134 40d6e0 11129->11134 11131->11109 11132->11131 11142 40d590 11132->11142 11135 40d6ef 11134->11135 11141 40d711 11134->11141 11135->11141 11150 40e020 11135->11150 11137 40d735 11157 40d770 11137->11157 11139 40d749 11167 40e0b0 LeaveCriticalSection 11139->11167 11141->11131 11143 40d59f 11142->11143 11148 40d5c1 11142->11148 11144 40e020 3 API calls 11143->11144 11143->11148 11145 40d5e5 11144->11145 11146 40d620 2 API calls 11145->11146 11147 40d5f9 11146->11147 11174 40e0b0 LeaveCriticalSection 11147->11174 11148->11131 11151 40e081 EnterCriticalSection 11150->11151 11152 40e048 11150->11152 11151->11137 11153 40e077 11152->11153 11154 40e05b InitializeCriticalSection 11152->11154 11168 403510 LeaveCriticalSection 11153->11168 11154->11153 11156 40e07e 11156->11151 11158 40d796 11157->11158 11165 40d78f 11157->11165 11159 40d7c5 11158->11159 11169 40d620 11158->11169 11161 40d8fc WriteFile 11159->11161 11163 40d7f0 11159->11163 11162 40d943 GetLastError 11161->11162 11161->11165 11162->11165 11164 40d887 WriteFile 11163->11164 11163->11165 11164->11163 11166 40d8ea GetLastError 11164->11166 11165->11139 11166->11165 11167->11141 11168->11156 11170 40d62f 11169->11170 11171 40d64e SetFilePointer 11170->11171 11173 40d63b 11170->11173 11172 40d66b GetLastError 11171->11172 11171->11173 11172->11173 11173->11159 11174->11148 11964 404740 SetUnhandledExceptionFilter 11965 407142 11967 407154 11965->11967 11966 40b4c0 6 API calls 11966->11967 11967->11965 11967->11966 11968 40ab44 11970 40ab4d 11968->11970 11969 40b4c0 6 API calls 11969->11970 11970->11969 11971 40ac7b 11970->11971 11972 40a145 11973 40a14e 11972->11973 11974 40a29f GetCPInfo 11973->11974 11976 40a29a 11973->11976 11986 40a16d 11973->11986 11975 40a3f2 11974->11975 11984 40a2b6 11974->11984 11977 40a413 11975->11977 11978 40a3fb 11975->11978 11976->11974 11995 403510 LeaveCriticalSection 11977->11995 11981 40a590 17 API calls 11978->11981 11980 40a290 11982 40a405 11981->11982 11994 403510 LeaveCriticalSection 11982->11994 11985 40a590 17 API calls 11984->11985 11987 40a3e4 11985->11987 11988 40a590 17 API calls 11986->11988 11993 403510 LeaveCriticalSection 11987->11993 11990 40a289 11988->11990 11992 403510 LeaveCriticalSection 11990->11992 11992->11980 11993->11980 11994->11980 11995->11980 11996 406348 11997 406360 11996->11997 11998 403530 10 API calls 11997->11998 11999 406513 11998->11999 11175 10003810 11176 100038c9 11175->11176 11177 1000382c ??2@YAPAXI 11175->11177 11178 10003851 11177->11178 11179 100038c0 ??3@YAXPAX 11178->11179 11185 100036b0 LoadLibraryA GetProcAddress 11178->11185 11179->11176 11181 10003860 11181->11179 11182 10008550 2 API calls 11181->11182 11183 1000386d 11182->11183 11183->11179 11184 10003874 CreateProcessA ??3@YAXPAX 11183->11184 11186 100036f3 11185->11186 11187 10003723 11186->11187 11188 100036fd GetProcAddress 11186->11188 11189 10003727 FreeLibrary 11187->11189 11190 1000372e 11187->11190 11191 1000371b 11188->11191 11189->11190 11190->11181 11191->11187 11192 1000373b CreateFileA 11191->11192 11193 10003761 GetProcAddress 11192->11193 11194 100037d4 Sleep GetProcAddress 11192->11194 11195 1000378c 11193->11195 11196 100037ed 11194->11196 11195->11193 11197 10003799 WriteFile 11195->11197 11198 100037c0 11195->11198 11199 100037f4 FreeLibrary 11196->11199 11200 100037fb 11196->11200 11197->11195 11197->11198 11198->11194 11199->11200 11200->11181 11201 10002a10 11204 10002970 11201->11204 11211 10004620 11204->11211 11206 100029e5 11207 100029fa 11206->11207 11208 100029ec VirtualFree 11206->11208 11208->11207 11209 100029ac 11209->11206 11228 10004ba0 11209->11228 11212 10004630 11211->11212 11213 10004638 11211->11213 11212->11209 11214 10004651 VirtualAlloc 11213->11214 11215 10004649 11213->11215 11216 10004688 GetProcessHeap HeapAlloc VirtualAlloc VirtualAlloc 11214->11216 11217 1000466e VirtualAlloc 11214->11217 11215->11209 11237 10004770 11216->11237 11217->11216 11218 10004682 11217->11218 11218->11209 11221 100046fb 11242 10004980 LoadLibraryA GetProcAddress 11221->11242 11223 10004724 11224 10004ba0 5 API calls 11223->11224 11227 10004752 11223->11227 11226 10004747 11224->11226 11226->11209 11227->11209 11229 10004c2e 11228->11229 11232 10004bad 11228->11232 11229->11206 11230 10004c09 11233 10004c10 VirtualFree 11230->11233 11234 10004c1e GetProcessHeap HeapFree 11230->11234 11231 10004bfb free 11231->11230 11232->11230 11232->11231 11235 10004bef FreeLibrary 11232->11235 11236 10004bfa 11232->11236 11233->11234 11234->11229 11235->11232 11236->11231 11238 1000482f 11237->11238 11239 10004799 11237->11239 11238->11221 11239->11238 11240 100047db VirtualAlloc 11239->11240 11241 100047ae VirtualAlloc 11239->11241 11240->11239 11241->11239 11243 10004a95 11242->11243 11248 100049c8 11242->11248 11244 10004717 11243->11244 11245 10004aa9 FreeLibrary 11243->11245 11244->11223 11250 10004840 11244->11250 11245->11244 11246 100049e8 LoadLibraryA 11246->11243 11247 100049fb realloc 11246->11247 11247->11243 11247->11248 11248->11243 11248->11246 11249 10004a57 GetProcAddress 11248->11249 11249->11243 11249->11248 11251 100048f2 11250->11251 11253 1000485f 11250->11253 11251->11223 11252 10004882 VirtualFree 11252->11253 11253->11251 11253->11252 11254 100048c9 VirtualProtect 11253->11254 11254->11253 12007 406b50 12008 406b63 12007->12008 12015 406b5c 12007->12015 12009 406b00 2 API calls 12008->12009 12010 406b73 12009->12010 12011 406bee 12010->12011 12013 406b8a 12010->12013 12010->12015 12012 406c5a HeapValidate 12011->12012 12016 406bf7 12011->12016 12012->12015 12014 406bd4 HeapValidate 12013->12014 12013->12015 12014->12015 12016->12015 12017 406c42 HeapValidate 12016->12017 12017->12015 12021 404559 12022 404565 TlsSetValue 12021->12022 12023 40459d 12021->12023 12022->12023 12025 40457a 12022->12025 12024 4033d0 7 API calls 12023->12024 12026 4045a4 12024->12026 12027 404583 GetCurrentThreadId 12025->12027 12028 4045a7 SetLastError 12026->12028 12027->12028 11010 40255c 11012 40257e 11010->11012 11011 4025e5 11012->11011 11014 402e70 KiUserExceptionDispatcher 11012->11014 11014->11012 10056 10001e20 10062 10001e2a 10056->10062 10057 10001ee4 10058 10001e59 select 10059 10001ef4 10058->10059 10058->10062 10088 100021c0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 10059->10088 10061 10001e8a recv 10061->10059 10061->10062 10062->10057 10062->10058 10062->10061 10064 10001f30 10062->10064 10065 10001fa8 10064->10065 10066 10001f69 10064->10066 10119 10001060 10065->10119 10066->10065 10068 10001f77 10066->10068 10089 10002230 10068->10089 10069 10001f95 10069->10062 10071 10001fee _CxxThrowException 10087 10001fb5 10071->10087 10073 10002068 ??2@YAPAXI ??2@YAPAXI 10074 10002162 _CxxThrowException 10073->10074 10073->10087 10075 10002187 10074->10075 10076 1000217e ??3@YAXPAX 10074->10076 10077 10002197 10075->10077 10078 1000218e ??3@YAXPAX 10075->10078 10076->10075 10128 100013e0 10077->10128 10078->10077 10079 10001110 6 API calls 10079->10087 10082 10002148 ??3@YAXPAX ??3@YAXPAX 10082->10087 10083 10002230 14 API calls 10084 100021ad 10083->10084 10084->10062 10085 10001060 6 API calls 10085->10087 10086 100013e0 VirtualFree 10086->10087 10087->10069 10087->10071 10087->10074 10087->10079 10087->10082 10087->10085 10087->10086 10123 10001110 10087->10123 10088->10057 10090 100013e0 VirtualFree 10089->10090 10091 10002247 10090->10091 10092 10002360 10091->10092 10093 10002253 ??2@YAPAXI 10091->10093 10096 10001060 6 API calls 10092->10096 10094 10002270 10093->10094 10095 10002266 10093->10095 10097 10001060 6 API calls 10094->10097 10095->10069 10098 1000236d 10096->10098 10100 100022a4 10097->10100 10099 100013e0 VirtualFree 10098->10099 10101 10002377 10099->10101 10102 10001060 6 API calls 10100->10102 10103 10001060 6 API calls 10101->10103 10104 100022b2 10102->10104 10108 10002334 10103->10108 10105 10001060 6 API calls 10104->10105 10106 100022c0 10105->10106 10107 10001060 6 API calls 10106->10107 10109 100022d6 10107->10109 10131 10002390 10108->10131 10110 10001060 6 API calls 10109->10110 10111 100022df ??3@YAXPAX ??2@YAPAXI 10110->10111 10112 100013e0 VirtualFree 10111->10112 10114 1000231a 10112->10114 10116 10001060 6 API calls 10114->10116 10117 10002327 10116->10117 10117->10108 10118 1000232b ??3@YAXPAX 10117->10118 10118->10108 10120 10001069 10119->10120 10139 10001230 10120->10139 10122 10001077 10122->10087 10125 10001119 10123->10125 10124 10001121 10124->10073 10125->10124 10153 10001300 10125->10153 10127 1000118c 10127->10073 10129 100013f8 10128->10129 10130 100013ea VirtualFree 10128->10130 10129->10083 10130->10129 10132 100023a5 10131->10132 10133 100023ba 10132->10133 10138 10002403 10132->10138 10134 100023c2 send 10133->10134 10135 10002356 10133->10135 10137 100023e9 Sleep 10133->10137 10134->10133 10135->10069 10136 10002409 send 10136->10135 10136->10138 10137->10133 10137->10138 10138->10135 10138->10136 10140 1000123d 10139->10140 10141 10001245 10140->10141 10148 100011c0 10140->10148 10141->10122 10143 10001271 _ftol VirtualAlloc 10144 10001298 10143->10144 10145 100012a4 10143->10145 10144->10122 10146 100012d3 VirtualFree 10145->10146 10147 100012e5 10145->10147 10146->10147 10147->10122 10149 100011e0 _ftol 10148->10149 10150 100011f1 10148->10150 10149->10143 10151 10001202 _ftol 10150->10151 10152 10001213 _ftol 10150->10152 10151->10143 10152->10143 10154 1000130d 10153->10154 10155 10001315 10154->10155 10156 100011c0 3 API calls 10154->10156 10155->10127 10157 10001341 _ftol 10156->10157 10158 10001355 10157->10158 10159 10001364 VirtualAlloc 10158->10159 10160 10001359 10158->10160 10161 1000137e 10159->10161 10163 1000138a 10159->10163 10160->10127 10161->10127 10162 100013b0 VirtualFree 10162->10127 10163->10162 10164 403260 GetVersion 10165 405a60 10164->10165 11255 10002c20 11256 10001b60 2 API calls 11255->11256 11257 10002c41 11256->11257 11258 10001d00 15 API calls 11257->11258 11259 10002c5d 11258->11259 11260 10002c61 11259->11260 11261 10002c86 11259->11261 11262 10001c50 10 API calls 11260->11262 11270 100041c0 11261->11270 11264 10002c72 11262->11264 11267 10002ca2 11268 10001c50 10 API calls 11267->11268 11269 10002cc1 11268->11269 11271 100041e7 11270->11271 11272 10004500 CreateEventA 11270->11272 11278 10004250 11271->11278 11272->11271 11276 10002c94 11277 10001f10 WaitForSingleObject 11276->11277 11277->11267 11282 10004580 11278->11282 11281 100045f0 WaitForSingleObject Sleep 11281->11276 11283 10002230 14 API calls 11282->11283 11284 100041fc 11283->11284 11284->11281 11285 402c60 11286 402c74 11285->11286 11287 402c85 11285->11287 11291 4037c0 11287->11291 11292 4037d1 11291->11292 11293 4037da 11291->11293 11295 4037ef 11292->11295 11296 40381e 11292->11296 11301 404650 11293->11301 11299 402cb2 11295->11299 11305 403d30 11295->11305 11296->11299 11311 4038b0 11296->11311 11299->11286 11300 402a40 RtlUnwind 11299->11300 11300->11286 11303 404686 11301->11303 11331 4046ba 11303->11331 11310 403d5f __CallSettingFrame@12 11305->11310 11306 403df4 11308 403dfc 11306->11308 11309 404650 CatchIt 8 API calls 11306->11309 11307 404650 CatchIt 8 API calls 11307->11310 11308->11299 11309->11308 11310->11306 11310->11307 11312 4038c9 11311->11312 11313 404650 CatchIt 8 API calls 11312->11313 11323 4038d4 11312->11323 11313->11323 11314 403999 11315 403b0c 11314->11315 11320 4039d1 11314->11320 11316 403b43 11315->11316 11317 403b19 11315->11317 11318 4045c0 ArrayUnwindFilter 8 API calls 11316->11318 11370 403b50 11317->11370 11322 403929 CatchIt 11318->11322 11353 402cf0 11320->11353 11322->11299 11323->11314 11323->11322 11351 409c60 IsBadReadPtr 11323->11351 11326 404650 CatchIt 8 API calls 11328 40395a 11326->11328 11327 4039ea ___CxxFrameHandler 11327->11322 11359 403e60 11327->11359 11328->11314 11330 404650 CatchIt 8 API calls 11328->11330 11330->11314 11334 4045c0 11331->11334 11335 4045f2 11334->11335 11338 40462e 11335->11338 11341 40a030 11338->11341 11340 40462c 11340->11292 11342 405c20 ArrayUnwindFilter 7 API calls 11341->11342 11343 40a03a 11342->11343 11346 40b8a0 11343->11346 11345 40a044 ArrayUnwindFilter 11345->11340 11347 40b8c6 ArrayUnwindFilter 11346->11347 11349 40b96e 11346->11349 11347->11349 11350 403510 LeaveCriticalSection 11347->11350 11349->11345 11350->11349 11352 403953 11351->11352 11352->11326 11352->11328 11354 402d0e 11353->11354 11355 402d46 11353->11355 11354->11355 11357 404650 CatchIt 8 API calls 11354->11357 11356 404650 CatchIt 8 API calls 11355->11356 11358 402d62 11355->11358 11356->11358 11357->11354 11358->11327 11360 403e72 11359->11360 11361 403e87 11359->11361 11376 4040c0 11360->11376 11363 403e90 11361->11363 11364 403e9f 11361->11364 11407 402a40 RtlUnwind 11363->11407 11408 402a40 RtlUnwind 11364->11408 11367 403e9d 11368 403d30 CatchIt 8 API calls 11367->11368 11369 403ec3 CatchIt 11368->11369 11369->11327 11371 403b5b ___CxxFrameHandler 11370->11371 11372 402cf0 ___CxxFrameHandler 8 API calls 11371->11372 11373 403b89 11371->11373 11374 403ba7 11372->11374 11373->11322 11374->11373 11375 403e60 CatchIt 12 API calls 11374->11375 11375->11374 11377 4040ef 11376->11377 11406 404106 CatchIt ___AdjustPointer 11376->11406 11378 404186 11377->11378 11379 40412e 11377->11379 11377->11406 11380 404192 11378->11380 11381 40420a 11378->11381 11382 409c60 CatchIt IsBadReadPtr 11379->11382 11383 409c60 CatchIt IsBadReadPtr 11380->11383 11384 404270 11381->11384 11385 404213 11381->11385 11386 40413c 11382->11386 11388 4041a0 11383->11388 11387 409c60 CatchIt IsBadReadPtr 11384->11387 11389 409c60 CatchIt IsBadReadPtr 11385->11389 11390 40414e 11386->11390 11409 409c90 IsBadWritePtr 11386->11409 11392 40427e 11387->11392 11393 4041b2 11388->11393 11398 409c90 CatchIt IsBadWritePtr 11388->11398 11394 404221 11389->11394 11391 404650 CatchIt 8 API calls 11390->11391 11390->11406 11391->11406 11397 4042a7 11392->11397 11401 409c90 CatchIt IsBadWritePtr 11392->11401 11396 404650 CatchIt 8 API calls 11393->11396 11393->11406 11399 404233 11394->11399 11403 409c90 CatchIt IsBadWritePtr 11394->11403 11396->11406 11402 404650 CatchIt 8 API calls 11397->11402 11397->11406 11398->11393 11400 404650 CatchIt 8 API calls 11399->11400 11399->11406 11400->11406 11404 404294 11401->11404 11402->11406 11403->11399 11404->11397 11411 409cc0 IsBadCodePtr 11404->11411 11406->11361 11407->11367 11408->11367 11410 409cad 11409->11410 11410->11390 11412 409cd9 11411->11412 11412->11397 11413 10004420 11414 10004436 11413->11414 11415 1000443b 11413->11415 11421 100042d0 GetSystemDirectoryA CreateFileA 11414->11421 11416 10004447 11415->11416 11427 10004610 SetEvent 11415->11427 11419 10004450 GetSystemDirectoryA DeleteFileA 11416->11419 11420 100044f3 11416->11420 11419->11420 11422 100043b0 GetFileSize ??2@YAPAXI ReadFile 11421->11422 11425 100043fe 11421->11425 11423 100043da 11422->11423 11428 10004270 LocalAlloc 11423->11428 11425->11415 11426 100043f3 ??3@YAXPAX 11426->11425 11427->11416 11429 10004580 14 API calls 11428->11429 11430 100042b0 LocalFree 11429->11430 11430->11426 11431 10001020 11432 10001040 VirtualFree 11431->11432 11433 10001028 11432->11433 11434 10001038 11433->11434 11435 1000102f ??3@YAXPAX 11433->11435 11435->11434 11440 405862 11441 40586b 11440->11441 11442 40587e GetEnvironmentVariableA 11440->11442 11441->11442 11445 405874 11441->11445 11443 405a24 11442->11443 11446 40589d 11442->11446 11447 4057d0 GetModuleHandleA 11443->11447 11448 4057fa 11447->11448 11448->11445 11449 408263 11450 408272 11449->11450 11451 408284 IsBadWritePtr 11450->11451 11454 4082a9 11450->11454 11452 4082b3 11451->11452 11451->11454 11453 40836c IsBadWritePtr 11452->11453 11452->11454 11453->11454 12030 409963 12031 40997b 12030->12031 12032 409988 GetModuleFileNameA 12031->12032 12042 4095b0 DebugBreak 12031->12042 12035 4099a6 ArrayUnwindFilter 12032->12035 12036 40b6a0 14 API calls 12035->12036 12037 409bf2 ArrayUnwindFilter 12036->12037 12038 40af60 ArrayUnwindFilter 4 API calls 12037->12038 12039 409c23 12038->12039 12040 409c3c ArrayUnwindFilter 12039->12040 12041 40b8a0 ArrayUnwindFilter LeaveCriticalSection 12039->12041 12041->12040 12042->12032 11455 10001c30 11456 10001c50 10 API calls 11455->11456 11457 10001c38 11456->11457 11458 10001c48 11457->11458 11459 10001c3f ??3@YAXPAX 11457->11459 11459->11458 11460 10001a30 11461 10001a4a 11460->11461 11462 10001a3f 11460->11462 11463 10001a5b 11461->11463 11464 10001a4e 11461->11464 11479 10004610 SetEvent 11462->11479 11468 10001a80 11463->11468 11486 10001560 SHGetSpecialFolderPathA FindFirstFileA FindNextFileA FindNextFileA 11463->11486 11480 100014c0 OpenClipboard 11464->11480 11466 10001a44 11471 10001a8a 11468->11471 11490 100016d0 CreateFileA 11468->11490 11474 10001a94 OpenClipboard 11471->11474 11496 10001a10 11471->11496 11475 10001aa0 6 API calls 11474->11475 11476 10001af7 11474->11476 11475->11476 11477 10004580 14 API calls 11477->11468 11479->11466 11481 100014d6 GetClipboardData GlobalLock 11480->11481 11482 1000155a 11480->11482 11483 100014ef 11481->11483 11484 10004580 14 API calls 11483->11484 11485 1000154b GlobalUnlock CloseClipboard 11484->11485 11485->11482 11487 10001641 FindNextFileA 11486->11487 11488 100016bc 11486->11488 11487->11488 11488->11477 11491 10001784 DeviceIoControl WriteFile DeviceIoControl 11490->11491 11492 1000184f 11490->11492 11493 100017d7 Sleep GetVersion 11491->11493 11492->11471 11494 1000183d ExitWindowsEx exit 11493->11494 11495 100017ef GetCurrentProcess OpenProcessToken LookupPrivilegeValueA AdjustTokenPrivileges 11493->11495 11494->11492 11495->11494 11501 10001860 SetupDiGetClassDevsA 11496->11501 11498 10001a17 Sleep 11499 10001860 18 API calls 11498->11499 11500 10001a2c 11499->11500 11500->11474 11502 10001893 11501->11502 11503 1000189e SetupDiEnumDeviceInfo 11501->11503 11502->11498 11504 100019e8 GetLastError SetupDiDestroyDeviceInfoList SetLastError 11503->11504 11505 100018cc 11503->11505 11504->11498 11506 100018d2 SetupDiGetDeviceRegistryPropertyA 11505->11506 11507 10001957 GetLastError 11506->11507 11508 1000190e GetLastError GetLastError 11506->11508 11510 100019ca SetupDiEnumDeviceInfo 11507->11510 11511 1000195e 11507->11511 11508->11507 11509 10001917 GetLastError 11508->11509 11509->11504 11512 10001922 11509->11512 11510->11504 11510->11506 11511->11510 11513 10001966 _strcmpi 11511->11513 11514 10001935 SetupDiGetDeviceRegistryPropertyA 11512->11514 11515 1000192a LocalFree 11512->11515 11513->11510 11516 1000197d SetupDiSetClassInstallParamsA 11513->11516 11514->11507 11514->11508 11515->11514 11517 100019b4 GetLastError 11516->11517 11518 100019b6 SetupDiCallClassInstaller 11516->11518 11517->11518 11518->11510 11519 100019c8 GetLastError 11518->11519 11519->11510 11520 401871 11521 402310 7 API calls 11520->11521 11522 40187a 11521->11522 11523 406271 11526 406282 11523->11526 11529 403510 LeaveCriticalSection 11526->11529 11528 406280 11529->11528 12047 10004132 12048 10004500 CreateEventA 12047->12048 12049 100041e7 12048->12049 12050 10004250 14 API calls 12049->12050 12051 100041fc 12050->12051 12054 100045f0 WaitForSingleObject Sleep 12051->12054 12053 10004203 12054->12053 10776 401f7b 10777 401f84 10776->10777 10778 401fbf 10777->10778 10779 401fa2 LoadLibraryA 10777->10779 10779->10778 10780 401fcb 10779->10780 10787 40127b 10780->10787 10782 402092 10783 4020a1 GetProcAddress 10782->10783 10784 4020bd GetProcAddress 10782->10784 10785 401fed 10783->10785 10784->10785 10785->10778 10785->10782 10791 402e70 KiUserExceptionDispatcher 10785->10791 10788 4012c2 10787->10788 10789 4012ad 10787->10789 10788->10785 10792 402e70 KiUserExceptionDispatcher 10789->10792 10791->10785 10792->10788 10166 10006440 10205 1000b780 10166->10205 10169 100064a3 GetLastError 10170 100064c6 10169->10170 10171 100064b0 ReleaseMutex 10169->10171 10207 10005d90 wsprintfA GetLocalTime wsprintfA lstrlenA 10170->10207 10174 100064be exit 10171->10174 10174->10170 10176 100064dc 10177 100064f0 10176->10177 10189 10006529 10176->10189 10260 10003b10 10177->10260 10179 10006745 10271 100021c0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 10179->10271 10182 10006562 strstr 10187 100065a7 strcspn strncpy strcspn lstrcatA atoi 10182->10187 10182->10189 10183 1000661d lstrcatA 10183->10189 10186 1000674e 10273 10001c50 WaitForSingleObject 10186->10273 10187->10189 10189->10179 10189->10182 10189->10183 10192 10006679 GetTickCount 10189->10192 10194 1000669b GetTickCount 10189->10194 10197 10006713 WaitForSingleObject Sleep 10189->10197 10199 10006750 10189->10199 10203 100066f1 10189->10203 10231 100059d0 lstrcpyA 10189->10231 10213 10001d00 10192->10213 10226 10003a50 10194->10226 10197->10189 10197->10203 10272 100021c0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 10199->10272 10201 10003ac0 TerminateThread 10201->10203 10202 10006759 10204 10003ac0 TerminateThread 10202->10204 10203->10189 10203->10199 10203->10201 10270 100021c0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 10203->10270 10204->10186 10206 1000645f wsprintfA CreateMutexA 10205->10206 10206->10169 10206->10170 10285 10008a30 7 API calls 10207->10285 10210 10001b60 10211 10001b8a 10210->10211 10212 10001bbd WSAStartup CreateEventA 10211->10212 10212->10176 10296 100021c0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 10213->10296 10215 10001d0c ResetEvent socket 10216 10001d38 gethostbyname 10215->10216 10217 10001d2e 10215->10217 10218 10001d53 htons connect 10216->10218 10219 10001d49 10216->10219 10217->10189 10220 10001d95 setsockopt 10218->10220 10221 10001d8b 10218->10221 10219->10189 10222 10001df0 10220->10222 10223 10001db9 WSAIoctl 10220->10223 10221->10189 10297 10008140 CreateEventA _beginthreadex WaitForSingleObject 10222->10297 10223->10222 10299 10004500 10226->10299 10228 10003a5d 10229 10003a77 10228->10229 10230 10003a6b lstrcpyA 10228->10230 10229->10189 10230->10229 10303 10004f70 10231->10303 10233 10005a20 lstrcpyA 10308 10004f10 10233->10308 10236 10005a58 getsockname GetVersionExA 10313 100058d0 LoadLibraryW 10236->10313 10240 10005b67 10319 10005920 malloc 10240->10319 10242 10005b6f wsprintfA 10243 10005b97 wsprintfA 10242->10243 10244 10005ba9 GlobalMemoryStatusEx 10242->10244 10243->10244 10246 10005bce 10244->10246 10245 10005bdf GetDriveTypeA 10245->10246 10247 10005c03 GetDiskFreeSpaceExA 10245->10247 10246->10245 10248 10005c37 10246->10248 10247->10246 10328 10004c30 7 API calls 10248->10328 10250 10005c51 10335 10005070 LoadLibraryA GetProcAddress GetProcAddress 10250->10335 10255 10005cbd 10352 10005000 10255->10352 10257 10005cdf lstrcpyA 10258 10002230 14 API calls 10257->10258 10259 10005d0e 10258->10259 10259->10189 10261 10004500 CreateEventA 10260->10261 10262 10003b1d 10261->10262 10263 10003b40 10262->10263 10264 10008140 3 API calls 10263->10264 10265 10003b56 10264->10265 10266 10003ac0 10265->10266 10268 10003aff 10266->10268 10269 10003ad6 10266->10269 10267 10003ae1 TerminateThread 10267->10269 10268->10189 10269->10267 10269->10268 10270->10203 10271->10186 10272->10202 10274 10001c92 10273->10274 10275 10001c99 CloseHandle CloseHandle WSACleanup 10273->10275 10371 100021c0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 10274->10371 10372 10001040 10275->10372 10279 10001040 VirtualFree 10280 10001ccb 10279->10280 10281 10001040 VirtualFree 10280->10281 10282 10001cd8 10281->10282 10283 10001040 VirtualFree 10282->10283 10284 10001ce8 10283->10284 10286 10008ac4 10285->10286 10287 10008b4d 10285->10287 10286->10287 10288 10008af3 RegOpenKeyExA 10286->10288 10289 10008b35 10286->10289 10290 10008b26 lstrlenA 10286->10290 10291 10008acb RegCreateKeyExA 10286->10291 10294 10008bb8 FreeLibrary 10287->10294 10295 10005f89 10287->10295 10288->10287 10292 10008b10 10288->10292 10293 10008b3b RegSetValueExA 10289->10293 10290->10293 10291->10287 10291->10288 10292->10287 10292->10289 10292->10290 10293->10287 10294->10295 10295->10210 10296->10215 10298 10001e09 10297->10298 10298->10189 10302 10002440 10299->10302 10301 10004516 CreateEventA 10301->10228 10302->10301 10357 10004dc0 wsprintfA 10303->10357 10306 10004feb lstrlenA 10306->10233 10307 10004fdf lstrcpyA 10307->10306 10309 10004dc0 13 API calls 10308->10309 10310 10004f48 lstrlenA 10309->10310 10311 10004f60 lstrlenA 10310->10311 10312 10004f58 gethostname 10310->10312 10311->10236 10312->10311 10314 100058e5 GetProcAddress 10313->10314 10315 1000591b RegOpenKeyA RegQueryValueExA RegCloseKey 10313->10315 10316 10005914 FreeLibrary 10314->10316 10317 100058f5 10314->10317 10318 10004d90 GetSystemInfo wsprintfA 10315->10318 10316->10315 10317->10316 10318->10240 10320 10005941 10319->10320 10321 1000594c GetIfTable 10319->10321 10320->10242 10322 10005989 GetIfTable 10321->10322 10323 1000596b free malloc 10321->10323 10325 1000599a 10322->10325 10323->10322 10324 1000597e 10323->10324 10324->10242 10326 100059b8 free 10325->10326 10327 100059be 10325->10327 10326->10327 10327->10242 10334 10004c9d 10328->10334 10329 10004ca1 10329->10250 10330 10004d74 FreeLibrary 10331 10004d77 10330->10331 10332 10004d7b FreeLibrary 10331->10332 10333 10004d7e 10331->10333 10332->10333 10333->10250 10334->10329 10334->10330 10334->10331 10336 100050a5 10335->10336 10337 100050b3 FreeLibrary 10336->10337 10338 100050ba 10336->10338 10337->10338 10339 100050d0 LoadLibraryA GetProcAddress GetProcAddress GetProcAddress CreateToolhelp32Snapshot 10338->10339 10340 100057e3 strstr 10339->10340 10341 1000588e lstrlenA 10339->10341 10340->10341 10342 10005809 10340->10342 10345 100058b4 10341->10345 10346 100058a8 lstrcpyA 10341->10346 10344 1000580e Process32First 10342->10344 10347 1000586a strstr 10342->10347 10350 10005821 lstrcmpiA 10342->10350 10344->10342 10344->10347 10348 100058b8 FreeLibrary 10345->10348 10349 100058bf GetLastInputInfo GetTickCount 10345->10349 10346->10345 10347->10341 10347->10344 10348->10349 10349->10255 10350->10342 10351 10005847 lstrcatA lstrcatA 10350->10351 10351->10347 10353 10004dc0 13 API calls 10352->10353 10354 1000504b lstrlenA 10353->10354 10355 10005067 lstrlenA 10354->10355 10356 1000505b lstrcpyA 10354->10356 10355->10257 10356->10355 10360 10008760 7 API calls 10357->10360 10361 10008825 10360->10361 10362 10008819 10360->10362 10361->10362 10363 10008844 RegQueryValueExA 10361->10363 10364 10008887 10361->10364 10368 1000890d 10361->10368 10365 10004ef7 lstrlenA 10362->10365 10366 1000899a FreeLibrary 10362->10366 10363->10362 10367 10008871 lstrcpyA 10363->10367 10364->10362 10370 100088fa lstrcpyA 10364->10370 10365->10306 10365->10307 10366->10365 10367->10362 10368->10362 10369 1000897a wsprintfA 10368->10369 10369->10362 10370->10362 10371->10275 10373 1000105b 10372->10373 10374 1000104d VirtualFree 10372->10374 10373->10279 10374->10373 12062 40e500 12063 40e523 12062->12063 12065 40e511 12062->12065 12064 40e5cf 12064->12063 12068 403510 LeaveCriticalSection 12064->12068 12065->12063 12065->12064 12066 40e840 16 API calls 12065->12066 12066->12065 12068->12063 12069 40db00 12071 40db0d 12069->12071 12070 40db92 12071->12070 12072 4033d0 7 API calls 12071->12072 12072->12070 11530 404812 GetCurrentProcess TerminateProcess 11531 40483c 11530->11531 11534 404900 11531->11534 11537 403510 LeaveCriticalSection 11534->11537 11536 4048c9 11537->11536 11538 406615 11539 40661d 11538->11539 11542 403530 11539->11542 11543 403559 11542->11543 11544 40355e 11542->11544 11545 4035d4 11544->11545 11547 403567 11544->11547 11546 403652 HeapFree 11545->11546 11548 4035dd 11545->11548 11546->11543 11549 40359a 11547->11549 11559 407400 11547->11559 11550 40361c 11548->11550 11568 408c90 11548->11568 11565 4035ab 11549->11565 11572 40362d 11550->11572 11557 4035bc HeapFree 11557->11543 11558 40363e HeapFree 11558->11543 11560 40745d 11559->11560 11564 407458 CatchIt 11559->11564 11561 407884 VirtualFree 11560->11561 11560->11564 11562 407911 11561->11562 11563 407935 VirtualFree HeapFree 11562->11563 11562->11564 11563->11564 11564->11549 11575 403510 LeaveCriticalSection 11565->11575 11567 4035a9 11567->11543 11567->11557 11569 408cd8 11568->11569 11571 408cf5 11568->11571 11569->11571 11576 408aa0 11569->11576 11571->11550 11585 403510 LeaveCriticalSection 11572->11585 11574 40362b 11574->11543 11574->11558 11575->11567 11579 408aae 11576->11579 11577 408bf3 11577->11571 11578 408aff VirtualFree 11578->11579 11579->11577 11579->11578 11581 408a20 VirtualFree 11579->11581 11582 408a42 11581->11582 11583 408a87 11582->11583 11584 408a57 HeapFree 11582->11584 11583->11579 11584->11583 11585->11574 11586 404616 11587 404620 11586->11587 11588 40462e ArrayUnwindFilter 8 API calls 11587->11588 11589 40462c 11588->11589 11590 40ac1d 11591 40b4c0 6 API calls 11590->11591 11592 40ac31 11591->11592 11601 40c120 11592->11601 11594 40ac7b 11595 40abc6 11595->11594 11597 40b4c0 11595->11597 11598 40b4d3 11597->11598 11599 40b4ea 11597->11599 11598->11595 11600 40bea0 6 API calls 11599->11600 11600->11598 11602 40c147 InterlockedIncrement 11601->11602 11603 40c12d 11601->11603 11604 40c15b InterlockedDecrement 11602->11604 11605 40c16d 11602->11605 11603->11595 11604->11605 11611 40c1c0 11605->11611 11608 40c1a1 InterlockedDecrement 11608->11603 11609 40c195 11617 403510 LeaveCriticalSection 11609->11617 11612 40c1ec 11611->11612 11615 40c189 11611->11615 11613 40c209 11612->11613 11614 40b4c0 6 API calls 11612->11614 11613->11615 11616 40bb40 10 API calls 11613->11616 11614->11613 11615->11608 11615->11609 11616->11615 11617->11603 11618 40e420 11619 4033d0 7 API calls 11618->11619 11620 40e42a 11619->11620 11621 402421 11622 40242b 11621->11622 11626 4024be 11621->11626 11623 4024ae 11622->11623 11624 402499 FreeLibrary 11622->11624 11622->11626 11627 401138 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 11623->11627 11624->11622 11628 401235 11627->11628 11629 40124a 11627->11629 11631 402e70 KiUserExceptionDispatcher 11628->11631 11629->11626 11631->11629 12087 404322 12088 40432a 12087->12088 12089 4045c0 ArrayUnwindFilter 8 API calls 12087->12089 12089->12088 10643 10006170 10644 10006230 10643->10644 10645 10006192 malloc strrchr 10643->10645 10645->10644 10646 100061c1 wsprintfA URLDownloadToFileA 10645->10646 10646->10644 10647 100061ff 10646->10647 10652 10008550 GetFileAttributesA 10647->10652 10651 1000621c 10653 10008560 GetLastError 10652->10653 10654 10006209 10652->10654 10653->10654 10654->10644 10655 10005fa0 strrchr 10654->10655 10656 10005fe3 RegOpenKeyExA 10655->10656 10657 10005fd6 10655->10657 10658 10006001 10656->10658 10659 1000600e RegQueryValueA RegCloseKey wsprintfA RegOpenKeyExA 10656->10659 10657->10651 10658->10651 10660 1000608b RegQueryValueA RegCloseKey strstr 10659->10660 10661 1000607e 10659->10661 10662 100060d2 strstr 10660->10662 10663 10006108 lstrcpyA 10660->10663 10661->10651 10662->10663 10664 100060e5 lstrcatA lstrcatA 10662->10664 10665 10006117 CreateProcessA 10663->10665 10664->10665 10665->10651 11632 40dc30 11637 40e2d0 11632->11637 11635 40dc48 11647 40e2e0 11637->11647 11640 40e0e0 11646 40e0f4 11640->11646 11641 40e1a9 11673 403510 LeaveCriticalSection 11641->11673 11643 40e1b0 11643->11635 11645 40e167 DeleteCriticalSection 11645->11646 11646->11641 11646->11645 11665 40e610 11646->11665 11653 40e2fb 11647->11653 11648 40e403 11663 403510 LeaveCriticalSection 11648->11663 11650 40dc38 11650->11635 11650->11640 11653->11648 11654 40e1c0 12 API calls 11653->11654 11655 40dc90 11653->11655 11658 40dd00 11653->11658 11654->11653 11656 40dcaa EnterCriticalSection 11655->11656 11657 40dc99 11655->11657 11656->11657 11657->11653 11659 40dd09 11658->11659 11660 40dd1a LeaveCriticalSection 11658->11660 11664 403510 LeaveCriticalSection 11659->11664 11662 40dd15 11660->11662 11662->11653 11663->11650 11664->11662 11666 40e61e 11665->11666 11667 40e655 11666->11667 11674 40dc50 11666->11674 11667->11646 11669 40e66a 11678 40e6a0 11669->11678 11671 40e676 11684 40dcc0 11671->11684 11673->11643 11675 40dc5c 11674->11675 11676 40dc7e EnterCriticalSection 11674->11676 11675->11676 11677 40dc65 11675->11677 11676->11677 11677->11669 11679 40e6b6 11678->11679 11683 40e716 11679->11683 11690 40e210 11679->11690 11681 40e6f8 11694 40e9b0 11681->11694 11683->11671 11685 40dccc 11684->11685 11686 40dcee LeaveCriticalSection 11684->11686 11685->11686 11688 40dcd5 11685->11688 11687 40dce9 11686->11687 11687->11667 11718 403510 LeaveCriticalSection 11688->11718 11691 40e231 11690->11691 11693 40e26c 11690->11693 11692 40d6e0 10 API calls 11691->11692 11691->11693 11692->11693 11693->11681 11695 40e9bf 11694->11695 11697 40e9e1 11694->11697 11696 40e020 3 API calls 11695->11696 11695->11697 11698 40ea05 11696->11698 11697->11683 11702 40ea30 11698->11702 11700 40ea11 11709 40e0b0 LeaveCriticalSection 11700->11709 11705 40ea3e 11702->11705 11703 40ea83 11710 40ded0 11703->11710 11705->11703 11706 40ea75 CloseHandle 11705->11706 11706->11703 11707 40ea8c GetLastError 11706->11707 11707->11703 11708 40ea9e 11708->11700 11709->11697 11711 40dee3 11710->11711 11712 40df46 11710->11712 11711->11712 11713 40df48 SetStdHandle 11711->11713 11714 40df3a 11711->11714 11712->11708 11713->11712 11715 40df40 11714->11715 11716 40df54 SetStdHandle 11714->11716 11715->11712 11717 40df60 SetStdHandle 11715->11717 11716->11712 11717->11712 11718->11687 11719 40e430 11720 40e448 11719->11720 11721 40e483 11719->11721 11722 40e4da 11721->11722 11724 40e840 16 API calls 11721->11724 11722->11720 11725 403510 LeaveCriticalSection 11722->11725 11724->11721 11725->11720 10667 405e3a 10672 405eb0 10667->10672 10670 405e84 10671 405e33 10671->10667 10671->10670 10678 405e6d 10671->10678 10674 405ecc 10672->10674 10676 405efc 10672->10676 10674->10676 10698 406720 10674->10698 10677 405f36 10676->10677 10681 40b150 10676->10681 10677->10671 10775 403510 LeaveCriticalSection 10678->10775 10680 405e74 10680->10671 10682 40b1d3 10681->10682 10683 40b17c 10681->10683 10684 40b1e0 10682->10684 10685 40b1b3 10682->10685 10683->10685 10705 4079e0 10683->10705 10692 40b1e6 10684->10692 10686 40b26e RtlAllocateHeap 10685->10686 10687 40b1c6 10685->10687 10686->10687 10687->10677 10689 40b24d HeapAlloc 10689->10687 10692->10689 10714 408d00 10692->10714 10694 40b223 10721 40b237 10694->10721 10697 40b248 10697->10687 10699 406759 10698->10699 10703 40674f 10698->10703 10746 40b2b0 10699->10746 10702 40676f 10704 4068a1 10702->10704 10757 406a95 10702->10757 10703->10674 10704->10674 10708 407a18 10705->10708 10706 407b27 10710 407b30 10706->10710 10731 408030 10706->10731 10708->10706 10708->10710 10724 407f20 10708->10724 10711 40b1b5 10710->10711 10735 403510 LeaveCriticalSection 10711->10735 10713 40b1bc 10713->10685 10715 408d0e 10714->10715 10716 40904c 10715->10716 10719 408eaf VirtualAlloc 10715->10719 10720 408d9f 10715->10720 10736 408840 10716->10736 10719->10720 10720->10694 10745 403510 LeaveCriticalSection 10721->10745 10723 40b235 10723->10689 10723->10697 10725 407f31 HeapReAlloc 10724->10725 10726 407f7b HeapAlloc 10724->10726 10727 407f63 10725->10727 10728 407f5c 10725->10728 10726->10728 10729 407fb5 VirtualAlloc 10726->10729 10727->10726 10728->10706 10729->10728 10730 407fd8 HeapFree 10729->10730 10730->10728 10733 40804f VirtualAlloc 10731->10733 10734 4080e1 10733->10734 10734->10710 10735->10713 10737 408858 HeapAlloc 10736->10737 10738 40884f 10736->10738 10739 40887b VirtualAlloc 10737->10739 10744 408874 10737->10744 10738->10739 10740 4089fc 10739->10740 10741 40889c VirtualAlloc 10739->10741 10743 408a05 HeapFree 10740->10743 10740->10744 10742 4089eb VirtualFree 10741->10742 10741->10744 10742->10740 10743->10744 10744->10720 10745->10723 10748 40b2e3 10746->10748 10754 40b31f 10746->10754 10747 40b362 HeapValidate 10749 40b376 GetLastError 10747->10749 10750 40b381 10747->10750 10760 408220 IsBadWritePtr 10748->10760 10749->10750 10750->10702 10754->10747 10769 40b357 10754->10769 10756 40b310 10756->10747 10774 403510 LeaveCriticalSection 10757->10774 10759 406a9c 10759->10703 10761 40824b 10760->10761 10765 408243 10760->10765 10762 408284 IsBadWritePtr 10761->10762 10761->10765 10763 4082b3 10762->10763 10762->10765 10764 40836c IsBadWritePtr 10763->10764 10763->10765 10764->10765 10766 40b312 10765->10766 10772 403510 LeaveCriticalSection 10766->10772 10768 40b319 10768->10756 10773 403510 LeaveCriticalSection 10769->10773 10771 40b35e 10771->10756 10772->10768 10773->10771 10774->10759 10775->10680 11726 1000a880 malloc 11727 4012c7 6 API calls 11728 4013f5 11727->11728 12108 403dc9 12111 403e30 12108->12111 12112 403e51 12111->12112 12113 403dd2 12111->12113 12114 4045c0 ArrayUnwindFilter 8 API calls 12112->12114 12114->12113 11729 10003490 IsWindowVisible 11730 100034a9 SendMessageA lstrlenA 11729->11730 11732 1000350e 11729->11732 11731 100034e2 _strupr _strupr strstr 11730->11731 11730->11732 11731->11732 11733 10001490 11734 10001498 11733->11734 11735 100014a8 11734->11735 11736 1000149f ??3@YAXPAX 11734->11736 11736->11735 12115 403dd6 12120 403d5f __CallSettingFrame@12 12115->12120 12116 403df4 12118 403dfc 12116->12118 12119 404650 CatchIt 8 API calls 12116->12119 12117 404650 CatchIt 8 API calls 12117->12120 12119->12118 12120->12116 12120->12117 12121 4021de 12122 4021e7 12121->12122 12125 4021fc 12121->12125 12123 402219 12125->12123 12126 401011 12125->12126 12127 401049 12126->12127 12128 40105e 12126->12128 12130 402e70 KiUserExceptionDispatcher 12127->12130 12128->12125 12130->12128 10375 100026a0 10376 100026c3 10375->10376 10377 100026b6 10375->10377 10378 10002704 Sleep lstrlenA 10376->10378 10381 1000271b 10378->10381 10380 10002759 GetKeyState GetAsyncKeyState 10380->10381 10382 10002772 GetKeyState 10380->10382 10381->10378 10381->10380 10383 1000279a GetKeyState 10381->10383 10384 10002450 8 API calls 10381->10384 10385 10002804 lstrcatA 10381->10385 10386 1000281b lstrlenA 10381->10386 10387 10002839 lstrcatA 10381->10387 10388 10002896 lstrcatA 10381->10388 10389 10002590 GetForegroundWindow GetWindowTextA 10381->10389 10382->10381 10382->10383 10383->10381 10384->10381 10385->10381 10386->10381 10387->10381 10388->10381 10390 100025ec lstrlenA 10389->10390 10393 10002669 10389->10393 10391 100025ff GetLocalTime wsprintfA 10390->10391 10390->10393 10394 10002450 GetSystemDirectoryA CreateFileA GetFileSize 10391->10394 10393->10381 10395 10002532 lstrlenA ??2@YAPAXI 10394->10395 10396 10002525 SetFilePointer 10394->10396 10397 10002561 lstrlenA WriteFile 10395->10397 10398 10002551 10395->10398 10396->10395 10399 1000257f 10397->10399 10398->10397 10399->10393 11737 10003aa0 11738 10003ac0 TerminateThread 11737->11738 11739 10003aa8 11738->11739 11740 10003ab8 11739->11740 11741 10003aaf ??3@YAXPAX 11739->11741 11741->11740 11748 1000a8a0 free 11742 4046e0 11743 4046f0 11742->11743 11744 40470e 11742->11744 11743->11744 11747 4045c0 ArrayUnwindFilter 8 API calls 11743->11747 11745 404722 11744->11745 11746 409cc0 CatchIt IsBadCodePtr 11744->11746 11746->11745 11747->11744 11749 4070e1 11752 403510 LeaveCriticalSection 11749->11752 11751 4070e8 11752->11751 10400 4032e3 10401 4032f4 10400->10401 10402 4032ea 10400->10402 10427 404470 10401->10427 10488 403400 10402->10488 10407 403307 10435 4054a0 10407->10435 10408 4032fd 10410 403400 8 API calls 10408->10410 10412 403304 10410->10412 10411 403313 GetCommandLineA 10446 405280 10411->10446 10412->10407 10416 40332d 10473 404c20 10416->10473 10418 403332 10419 403337 GetStartupInfoA 10418->10419 10481 404b60 10419->10481 10421 40334d GetModuleHandleA 10485 40294f 10421->10485 10424 403386 10494 404940 10424->10494 10498 403430 InitializeCriticalSection InitializeCriticalSection InitializeCriticalSection InitializeCriticalSection 10427->10498 10429 404479 TlsAlloc 10430 404491 10429->10430 10431 4032f9 10429->10431 10430->10431 10432 4044af TlsSetValue 10430->10432 10431->10407 10431->10408 10432->10431 10433 4044c8 10432->10433 10434 4044d1 GetCurrentThreadId 10433->10434 10434->10431 10436 4054bc 10435->10436 10437 4054cf GetStartupInfoA 10436->10437 10499 4033d0 10436->10499 10443 4056c5 10437->10443 10445 40553e 10437->10445 10440 4057b4 SetHandleCount 10440->10411 10441 405724 GetStdHandle 10442 405737 GetFileType 10441->10442 10441->10443 10442->10443 10443->10440 10443->10441 10444 405680 GetFileType 10444->10445 10445->10443 10445->10444 10447 4052ac 10446->10447 10448 40529d GetEnvironmentStringsW 10446->10448 10450 4052e7 10447->10450 10451 4053de 10447->10451 10448->10447 10449 4052b8 GetEnvironmentStrings 10448->10449 10449->10447 10452 403323 10449->10452 10453 4052ed GetEnvironmentStringsW 10450->10453 10458 405303 WideCharToMultiByte 10450->10458 10451->10452 10454 4053f1 GetEnvironmentStrings 10451->10454 10459 405407 10451->10459 10466 404d70 10452->10466 10453->10452 10453->10458 10454->10452 10454->10459 10456 405384 FreeEnvironmentStringsW 10456->10452 10457 405366 10457->10456 10460 405395 WideCharToMultiByte 10457->10460 10458->10456 10458->10457 10461 405470 10459->10461 10462 405462 FreeEnvironmentStringsA 10459->10462 10463 4053b7 10460->10463 10464 4053cc FreeEnvironmentStringsW 10460->10464 10465 405481 FreeEnvironmentStringsA 10461->10465 10462->10452 10463->10464 10464->10452 10465->10452 10467 404d84 GetModuleFileNameA 10466->10467 10468 404d7f 10466->10468 10470 404dac 10467->10470 10525 40a8a0 10468->10525 10471 404e0b 10470->10471 10472 4033d0 7 API calls 10470->10472 10471->10416 10472->10471 10474 404c2f 10473->10474 10476 404c34 ArrayUnwindFilter 10473->10476 10475 40a8a0 21 API calls 10474->10475 10475->10476 10477 4033d0 7 API calls 10476->10477 10480 404cb1 ArrayUnwindFilter 10476->10480 10477->10480 10478 404d37 10478->10418 10479 4033d0 7 API calls 10479->10480 10480->10478 10480->10479 10482 404b6d 10481->10482 10484 404b72 10481->10484 10483 40a8a0 21 API calls 10482->10483 10483->10484 10484->10421 10609 40289b 10485->10609 10489 403411 10488->10489 10490 40340c 10488->10490 10492 405c20 ArrayUnwindFilter 7 API calls 10489->10492 10491 405bd0 7 API calls 10490->10491 10491->10489 10493 40341a ExitProcess 10492->10493 10495 40494b 10494->10495 10496 404973 UnhandledExceptionFilter 10495->10496 10497 4033a9 10495->10497 10496->10497 10498->10429 10500 4033e1 10499->10500 10501 4033dc 10499->10501 10511 405c20 10500->10511 10505 405bd0 10501->10505 10506 405bdc 10505->10506 10507 405c20 ArrayUnwindFilter 7 API calls 10506->10507 10510 405c14 10506->10510 10508 405bf8 10507->10508 10509 405c20 ArrayUnwindFilter 7 API calls 10508->10509 10509->10510 10510->10500 10512 405c35 10511->10512 10513 405caf ArrayUnwindFilter 10512->10513 10514 405ce8 10512->10514 10519 4033ea 10512->10519 10515 405cc5 GetStdHandle WriteFile 10513->10515 10516 405cf5 GetModuleFileNameA 10514->10516 10514->10519 10515->10519 10517 405d0d ArrayUnwindFilter 10516->10517 10520 40af60 10517->10520 10519->10437 10521 40af76 LoadLibraryA 10520->10521 10524 40afa7 10520->10524 10522 40af8a GetProcAddress 10521->10522 10521->10524 10523 40afab GetProcAddress GetProcAddress 10522->10523 10522->10524 10523->10524 10524->10519 10526 40a8b3 10525->10526 10527 40a8ac 10525->10527 10526->10467 10529 40a0e0 10527->10529 10530 40a0ed 10529->10530 10559 40a430 10530->10559 10533 40a10a 10572 403510 LeaveCriticalSection 10533->10572 10534 40a11b 10536 40a121 10534->10536 10537 40a13c 10534->10537 10540 40a590 17 API calls 10536->10540 10539 40a29f GetCPInfo 10537->10539 10542 40a29a 10537->10542 10553 40a16d 10537->10553 10538 40a111 10538->10526 10541 40a3f2 10539->10541 10551 40a2b6 10539->10551 10543 40a12b 10540->10543 10544 40a413 10541->10544 10545 40a3fb 10541->10545 10542->10539 10573 403510 LeaveCriticalSection 10543->10573 10577 403510 LeaveCriticalSection 10544->10577 10548 40a590 17 API calls 10545->10548 10549 40a405 10548->10549 10576 403510 LeaveCriticalSection 10549->10576 10564 40a590 GetCPInfo 10551->10564 10555 40a590 17 API calls 10553->10555 10557 40a289 10555->10557 10574 403510 LeaveCriticalSection 10557->10574 10560 40a443 GetOEMCP 10559->10560 10561 40a455 10559->10561 10563 40a0f9 10560->10563 10562 40a45b GetACP 10561->10562 10561->10563 10562->10563 10563->10533 10563->10534 10566 40a5b6 10564->10566 10571 40a3e4 10564->10571 10578 40bea0 10566->10578 10570 40bb40 10 API calls 10570->10571 10575 403510 LeaveCriticalSection 10571->10575 10572->10538 10573->10538 10574->10538 10575->10538 10576->10538 10577->10538 10579 40becf GetStringTypeW 10578->10579 10582 40bee6 10578->10582 10580 40bef2 GetStringTypeA 10579->10580 10579->10582 10581 40a681 10580->10581 10580->10582 10590 40bb40 10581->10590 10584 40bf27 GetStringTypeA 10582->10584 10585 40bf55 10582->10585 10584->10581 10585->10581 10586 40bf71 MultiByteToWideChar 10585->10586 10586->10581 10587 40bfa5 10586->10587 10587->10581 10588 40c005 MultiByteToWideChar 10587->10588 10588->10581 10589 40c02e GetStringTypeW 10588->10589 10589->10581 10591 40bb8b 10590->10591 10592 40bb6f LCMapStringW 10590->10592 10594 40bbe8 LCMapStringA 10591->10594 10595 40bc0b 10591->10595 10592->10591 10593 40bb97 LCMapStringA 10592->10593 10593->10591 10608 40a6b6 10593->10608 10594->10608 10596 40bc27 MultiByteToWideChar 10595->10596 10595->10608 10597 40bc5b 10596->10597 10596->10608 10598 40bcaa MultiByteToWideChar 10597->10598 10597->10608 10599 40bcd1 LCMapStringW 10598->10599 10598->10608 10600 40bcfb 10599->10600 10599->10608 10601 40bd08 10600->10601 10603 40bd4b 10600->10603 10602 40bd1d LCMapStringW 10601->10602 10601->10608 10602->10608 10604 40bda0 LCMapStringW 10603->10604 10603->10608 10605 40bdc6 10604->10605 10604->10608 10606 40bdfa WideCharToMultiByte 10605->10606 10607 40bdcc WideCharToMultiByte 10605->10607 10606->10608 10607->10608 10608->10570 10623 402510 10609->10623 10611 4028d4 10627 401447 10611->10627 10614 402906 10614->10424 10617 402921 10635 402310 6 API calls 10617->10635 10618 40292f 10618->10614 10621 402938 10618->10621 10620 40292a 10620->10614 10622 402310 7 API calls 10621->10622 10622->10620 10624 402542 10623->10624 10625 402557 10623->10625 10639 402e70 KiUserExceptionDispatcher 10624->10639 10625->10611 10628 401497 10627->10628 10629 40147c 10627->10629 10628->10614 10631 40216f 10628->10631 10640 402e70 KiUserExceptionDispatcher 10629->10640 10632 4021c4 10631->10632 10633 4021d9 10631->10633 10641 402e70 KiUserExceptionDispatcher 10632->10641 10633->10617 10633->10618 10636 402407 10635->10636 10637 40241c 10635->10637 10642 402e70 KiUserExceptionDispatcher 10636->10642 10637->10620 10639->10625 10640->10628 10641->10633 10642->10637 11753 4034e5 11754 4034e8 11753->11754 11757 403510 LeaveCriticalSection 11754->11757 11756 4034ef EnterCriticalSection 11757->11756 12131 40bfea 12132 40bffb 12131->12132 12133 40c001 12132->12133 12134 40c005 MultiByteToWideChar 12132->12134 12134->12133 12135 40c02e GetStringTypeW 12134->12135 12135->12133 12136 1000b7af ??1type_info@@UAE 12137 1000b7c5 12136->12137 12138 1000b7be ??3@YAXPAX 12136->12138 12138->12137 11758 405af0 11761 405af8 11758->11761 11759 405b8a 11761->11759 11762 402d80 RtlUnwind 11761->11762 11763 402d98 11762->11763 11763->11761 11764 1000b8b1 11765 1000b8c4 11764->11765 11769 1000b8cd 11764->11769 11766 10007bc0 158 API calls 11765->11766 11773 1000b8f5 11765->11773 11768 1000b901 11766->11768 11770 1000b915 11768->11770 11771 1000b806 3 API calls 11768->11771 11768->11773 11769->11765 11769->11773 11774 1000b806 11769->11774 11772 1000b806 3 API calls 11770->11772 11770->11773 11771->11770 11772->11773 11775 1000b80e 11774->11775 11776 1000b844 11775->11776 11777 1000b82f malloc 11775->11777 11779 1000b86e 11775->11779 11776->11765 11777->11776 11778 1000b848 _initterm 11777->11778 11778->11776 11779->11776 11780 1000b89b free 11779->11780 11780->11776 11781 405af8 11782 405b8a 11781->11782 11783 405b16 11781->11783 11783->11782 11784 402d80 RtlUnwind 11783->11784 11784->11783 12139 4059f8 12140 405a0a 12139->12140 12142 405a1c 12139->12142 12141 4057d0 GetModuleHandleA 12140->12141 12140->12142 12141->12142 11785 4058fa 11786 40597b 11785->11786 11787 4057d0 GetModuleHandleA 11786->11787 11789 4059a8 11786->11789 11788 405a30 11787->11788 11790 4082fa 11791 408303 11790->11791 11792 40836c IsBadWritePtr 11791->11792 11793 408382 11791->11793 11792->11793 11794 406c80 11795 406ca9 11794->11795 11797 406cd4 11794->11797 11798 406e08 11797->11798 11801 403510 LeaveCriticalSection 11798->11801 11800 406e0f 11800->11795 11801->11800 11802 100080c0 SetEvent 11803 10008102 11802->11803 11804 10008109 11802->11804 11806 100082c0 LoadLibraryA GetProcAddress GetProcAddress GetProcAddress 11803->11806 11807 10008337 11806->11807 11808 10008350 11807->11808 11812 100081b0 7 API calls 11807->11812 11816 10008381 11808->11816 11813 10008233 11812->11813 11819 100082a6 11813->11819 11817 10008385 FreeLibrary 11816->11817 11818 1000836a 11816->11818 11817->11818 11818->11804 11820 100082b1 11819->11820 11821 100082aa FreeLibrary 11819->11821 11822 100082b5 FreeLibrary 11820->11822 11823 1000828c 11820->11823 11821->11820 11822->11823 11823->11808 11824 10002ac0 11827 10002a30 11824->11827 11828 10004620 21 API calls 11827->11828 11832 10002a6c 11828->11832 11829 10002a97 11830 10002aac 11829->11830 11831 10002a9e VirtualFree 11829->11831 11831->11830 11832->11829 11833 10004ba0 5 API calls 11832->11833 11833->11829 12143 40bd82 12144 40bd93 12143->12144 12145 40bda0 LCMapStringW 12144->12145 12149 40bd99 12144->12149 12146 40bdc6 12145->12146 12145->12149 12147 40bdfa WideCharToMultiByte 12146->12147 12148 40bdcc WideCharToMultiByte 12146->12148 12147->12149 12148->12149 11834 40bc8c 11835 40bc9d 11834->11835 11836 40bcaa MultiByteToWideChar 11835->11836 11846 40bca3 11835->11846 11837 40bcd1 LCMapStringW 11836->11837 11836->11846 11838 40bcfb 11837->11838 11837->11846 11839 40bd08 11838->11839 11841 40bd4b 11838->11841 11840 40bd1d LCMapStringW 11839->11840 11839->11846 11840->11846 11842 40bda0 LCMapStringW 11841->11842 11841->11846 11843 40bdc6 11842->11843 11842->11846 11844 40bdfa WideCharToMultiByte 11843->11844 11845 40bdcc WideCharToMultiByte 11843->11845 11844->11846 11845->11846 11847 40aa8d 11848 40b4c0 6 API calls 11847->11848 11849 40aa84 11848->11849 11849->11847 11850 40688f 11851 406897 11850->11851 11852 406a95 LeaveCriticalSection 11851->11852 11854 4068a1 11851->11854 11853 406a93 11852->11853 12150 100069d0 RegisterServiceCtrlHandlerA SetServiceStatus Sleep GetVersionExA 12151 10006a68 SetServiceStatus 12150->12151 12152 10006a8b GetModuleFileNameA wsprintfA 12150->12152 12153 10006a80 12151->12153 12168 10006880 7 API calls 12152->12168 12155 100067a0 4 API calls 12153->12155 12157 10006a85 Sleep 12155->12157 12157->12153 12159 10006c24 SetServiceStatus 12160 10006b15 12160->12159 12161 10006b91 Sleep 12160->12161 12162 10006be3 Sleep 12160->12162 12163 10006b1c SetServiceStatus Sleep SetServiceStatus 12160->12163 12167 10006bdf 12161->12167 12162->12159 12169 100069ac 12168->12169 12170 1000693d SetTokenInformation 12168->12170 12172 100069b2 FreeLibrary 12169->12172 12173 100069b9 SetServiceStatus exit 12169->12173 12174 10006966 CreateProcessAsUserA CloseHandle CloseHandle 12170->12174 12172->12173 12173->12159 12173->12160 12174->12169 12175 10002dd0 MessageBoxA 11855 405a92 11856 405ac3 11855->11856 11857 405a9f 11855->11857 11858 405ac1 11856->11858 11860 408840 5 API calls 11856->11860 11865 4072d0 HeapAlloc 11857->11865 11862 405ad1 11860->11862 11862->11858 11864 405ad5 HeapDestroy 11862->11864 11863 405ab0 HeapDestroy 11863->11858 11864->11858 11866 405aa9 11865->11866 11866->11858 11866->11863 12176 401992 12181 4019a2 12176->12181 12177 401aa0 12178 401a1b VirtualAlloc 12178->12181 12179 4019e0 VirtualAlloc 12179->12181 12181->12177 12181->12178 12181->12179 12182 402e70 KiUserExceptionDispatcher 12181->12182 12182->12181 12183 40c992 12184 40c59b ArrayUnwindFilter _get_int_arg _get_short_arg 12183->12184 12185 40d21e 12184->12185 12186 40d3f0 10 API calls 12184->12186 12187 40d3b0 10 API calls 12184->12187 12188 40dd30 LeaveCriticalSection InterlockedIncrement InterlockedDecrement InterlockedDecrement WideCharToMultiByte 12184->12188 12189 40d330 10 API calls 12184->12189 12186->12184 12187->12184 12188->12184 12189->12184 11867 406e97 11868 406eb1 11867->11868 11870 406f05 11868->11870 11871 406b00 11868->11871 11872 406b0a IsBadReadPtr 11871->11872 11873 406b34 11871->11873 11872->11873 11874 406b1c 11872->11874 11873->11870 11874->11873 11875 406b22 IsBadWritePtr 11874->11875 11875->11873 10793 40149c 6 API calls 10794 401644 10793->10794 10795 401625 10793->10795 10796 401676 VirtualAlloc 10794->10796 10797 40165b 10794->10797 10798 4016c0 10796->10798 10799 4016a4 VirtualAlloc 10796->10799 10800 4016cd 10798->10800 10801 4016f7 VirtualAlloc 10798->10801 10799->10798 10802 401765 10801->10802 10818 40189d LoadLibraryA GetProcAddress 10802->10818 10805 4017eb 10822 401e68 10805->10822 10811 401846 10814 10008140 3 API calls 10814->10811 10815 10005d90 16 API calls 10815->10811 10819 401978 10818->10819 10820 4017c1 10818->10820 10913 402e70 KiUserExceptionDispatcher 10819->10913 10820->10805 10909 401d14 10820->10909 10823 401e9a 10822->10823 10824 4017fe 10822->10824 10914 402e70 KiUserExceptionDispatcher 10823->10914 10826 401abe LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 10824->10826 10827 401b85 10826->10827 10828 401810 10826->10828 10915 402e70 KiUserExceptionDispatcher 10827->10915 10828->10811 10828->10814 10828->10815 10830 10007bc0 GetInputState GetCurrentThreadId PostThreadMessageA GetMessageA 10828->10830 10895 10007020 CoInitialize CoCreateGuid 10828->10895 10898 10008580 LoadLibraryA GetProcAddress CreateToolhelp32Snapshot ??2@YAPAXI Process32First 10828->10898 10906 10002ee0 wsprintfA lstrlenA 10828->10906 10831 10007c22 GetVersionExA 10830->10831 10832 10007bfa 10830->10832 10834 10007c46 10831->10834 10835 10007c57 10831->10835 10916 10007120 LoadLibraryA 10832->10916 10836 10008140 3 API calls 10834->10836 10837 10007c62 10835->10837 10838 10007c67 10835->10838 10836->10835 10931 10005d20 10837->10931 10841 10007c73 GetVersionExA 10838->10841 10842 10007ef6 sprintf 10838->10842 10839 10007bff GetCurrentProcessId 10925 10007070 LoadLibraryA GetProcAddress 10839->10925 10844 100058d0 3 API calls 10841->10844 10846 10004dc0 13 API calls 10842->10846 10847 10007c96 10844->10847 10845 10007c0d 10845->10831 10848 10007c1b ExitProcess 10845->10848 10849 10007f8f lstrlenA 10846->10849 10850 10007cef 10847->10850 10856 10007cab CreateThread 10847->10856 10851 10007fa4 10849->10851 10868 10007fbd 10849->10868 10853 10007cfc 10850->10853 10854 10007e8e 10850->10854 10852 10003050 14 API calls 10851->10852 10857 10007fb3 10852->10857 10936 10007b20 RegOpenKeyExA 10853->10936 10859 100080ab 10854->10859 10864 10003050 14 API calls 10854->10864 10855 10007020 4 API calls 10860 10007fc5 wsprintfA 10855->10860 10861 10008140 3 API calls 10856->10861 10984 10006dc0 SHGetSpecialFolderPathA GetModuleFileNameA RegOpenKeyExA 10856->10984 10862 10005d90 16 API calls 10857->10862 10859->10811 10865 10008054 GetModuleFileNameA 10860->10865 10866 10007fe7 6 API calls 10860->10866 10867 10007ccb WaitForSingleObject 10861->10867 10862->10868 10863 10007d01 10869 10007d05 Sleep StartServiceCtrlDispatcherA Sleep StartServiceCtrlDispatcherA 10863->10869 10870 10007d4a ExpandEnvironmentStringsA wsprintfA 10863->10870 10871 10007ea5 10864->10871 10872 10008073 Sleep 10865->10872 10866->10872 10878 10007ce0 10867->10878 10868->10855 10873 10007e82 10869->10873 10875 10007da3 10870->10875 10876 10007dbb GetModuleFileNameA CopyFileA 10870->10876 10874 10005d90 16 API calls 10871->10874 10877 10008140 3 API calls 10872->10877 10958 100067a0 10873->10958 10879 10007eaf CreateThread 10874->10879 10875->10876 10937 100076e0 GetModuleFileNameA ExpandEnvironmentStringsA strncmp 10876->10937 10881 1000808d WaitForSingleObject 10877->10881 10883 10007ce6 Sleep 10878->10883 10885 10008140 3 API calls 10879->10885 10987 10006e60 GetModuleFileNameA 10879->10987 10889 100080a2 Sleep 10881->10889 10883->10883 10887 10007ed2 WaitForSingleObject 10885->10887 10891 10007ee7 10887->10891 10889->10889 10893 10007eed Sleep 10891->10893 10892 10005d90 16 API calls 10894 10007e73 Sleep 10892->10894 10893->10893 10894->10873 10896 10007054 CoUninitialize 10895->10896 10897 1000703a _snprintf 10895->10897 10896->10811 10897->10896 10899 10008680 _strcmpi 10898->10899 10900 100086ce ??3@YAXPAX 10898->10900 10901 10008696 ??3@YAXPAX 10899->10901 10902 100086ac Process32Next 10899->10902 10900->10811 10901->10811 10902->10900 10904 100086b7 lstrcmpiA 10902->10904 10904->10901 10905 100086c3 Process32Next 10904->10905 10905->10900 10905->10904 10907 10008a30 12 API calls 10906->10907 10908 10003003 10907->10908 10908->10811 10910 401e57 10909->10910 10911 401d5c 10909->10911 10910->10805 10911->10910 11009 402e70 KiUserExceptionDispatcher 10911->11009 10913->10820 10914->10824 10915->10828 10917 10007142 OutputDebugStringA 10916->10917 10918 1000715b GetProcAddress 10916->10918 10917->10839 10919 10007174 OutputDebugStringA 10918->10919 10920 10007189 CreateToolhelp32Snapshot Process32First 10918->10920 10919->10839 10921 100071ea 10920->10921 10922 100071b5 _strcmpi 10920->10922 10921->10839 10922->10921 10924 100071d4 Process32Next 10922->10924 10924->10921 10924->10922 10926 100070a1 OutputDebugStringA 10925->10926 10927 100070ba CreateToolhelp32Snapshot Process32First 10925->10927 10926->10845 10928 1000710c 10927->10928 10929 100070e6 10927->10929 10928->10845 10929->10928 10930 100070f3 Process32Next 10929->10930 10930->10928 10930->10929 10932 10008580 11 API calls 10931->10932 10933 10005d6e 10932->10933 10934 10005d82 10933->10934 10935 10005d75 WinExec 10933->10935 10934->10838 10935->10934 10936->10863 10938 10007762 10937->10938 10939 100078a8 OpenSCManagerA 10937->10939 10962 100063b0 10938->10962 10940 100078dc CreateServiceA LockServiceDatabase ChangeServiceConfig2A ChangeServiceConfig2A UnlockServiceDatabase 10939->10940 10941 10007aae 10939->10941 10943 10007a04 StartServiceA 10940->10943 10944 100079ce GetLastError 10940->10944 10973 10007ad9 10941->10973 10943->10941 10950 10007a15 RegOpenKeyA lstrlenA RegSetValueExA 10943->10950 10944->10943 10949 100079db OpenServiceA 10944->10949 10947 100077d3 CopyFileA 10967 100062c0 10947->10967 10948 100077bc 10948->10947 10949->10941 10953 100079fb StartServiceA 10949->10953 10950->10941 10953->10943 10955 10003050 10956 10002ee0 14 API calls 10955->10956 10957 100030a8 10956->10957 10957->10892 10959 10008140 3 API calls 10958->10959 10960 100067b7 WaitForSingleObject 10959->10960 10961 100067cc ExitProcess 10960->10961 10963 1000642d wsprintfA 10962->10963 10964 100063e5 10962->10964 10963->10947 10963->10948 10964->10963 10965 100063fe _access 10964->10965 10965->10964 10966 1000640f CreateDirectoryA 10965->10966 10966->10964 10968 100062d7 CreateFileA 10967->10968 10970 10006394 SetFileAttributesA 10967->10970 10969 1000630a SetFilePointer GetFileSize 10968->10969 10968->10970 10969->10970 10971 1000632a 10969->10971 10970->10939 10971->10970 10972 10006377 WriteFile 10971->10972 10972->10970 10972->10971 10974 10007ae4 10973->10974 10975 10007add CloseServiceHandle 10973->10975 10976 10007ae8 CloseServiceHandle 10974->10976 10977 10007aef 10974->10977 10975->10974 10976->10977 10978 10007b00 Sleep 10977->10978 10979 10007af9 RegCloseKey 10977->10979 10980 10007b13 10978->10980 10981 10007aba 10978->10981 10979->10978 10983 10006800 6 API calls 10980->10983 10981->10955 10983->10981 10985 10006e23 RegSetValueExA RegCloseKey 10984->10985 10986 10006e4c 10984->10986 10985->10986 11003 100067e0 GetTickCount rand 10987->11003 10989 10006f38 11004 100067e0 GetTickCount rand 10989->11004 10991 10006f46 11005 100067e0 GetTickCount rand 10991->11005 10993 10006f54 11006 100067e0 GetTickCount rand 10993->11006 10995 10006f62 11007 100067e0 GetTickCount rand 10995->11007 10997 10006f70 11008 100067e0 GetTickCount rand 10997->11008 10999 10006f7e wsprintfA RegOpenKeyExA 11000 10007015 10999->11000 11001 10006fb5 6 API calls 10999->11001 11001->11000 11002 10007011 Sleep 11001->11002 11002->11000 11003->10989 11004->10991 11005->10993 11006->10995 11007->10997 11008->10999 11009->10911 11015 401b9f 11016 401ba8 11015->11016 11017 401ce8 11016->11017 11018 401c20 VirtualFree 11016->11018 11020 401c3e 11016->11020 11018->11016 11019 401ccb VirtualProtect 11019->11017 11020->11017 11020->11019 11876 4034a0 11877 4033d0 7 API calls 11876->11877 11878 4034a7 11877->11878 11879 4034c1 InitializeCriticalSection 11878->11879 11880 4034e8 11879->11880 11883 403510 LeaveCriticalSection 11880->11883 11882 4034ef EnterCriticalSection 11883->11882 11884 10002ce0 11885 10001b60 2 API calls 11884->11885 11886 10002d01 11885->11886 11887 10001d00 15 API calls 11886->11887 11888 10002d1d 11887->11888 11889 10002d21 11888->11889 11890 10002d46 11888->11890 11891 10001c50 10 API calls 11889->11891 11899 10001420 11890->11899 11894 10002d32 11891->11894 11896 10002d62 11897 10001c50 10 API calls 11896->11897 11898 10002d81 11897->11898 11900 10004500 CreateEventA 11899->11900 11901 10001447 11900->11901 11902 10004580 14 API calls 11901->11902 11903 1000146d 11902->11903 11907 100045f0 WaitForSingleObject Sleep 11903->11907 11905 10001474 11906 10001f10 WaitForSingleObject 11905->11906 11906->11896 11907->11905 11908 100038e0 11910 100038f1 11908->11910 11909 10003964 11910->11909 11911 100036b0 10 API calls 11910->11911 11912 10003900 11911->11912 11912->11909 11913 10008550 2 API calls 11912->11913 11914 1000390d 11913->11914 11914->11909 11915 10003914 CreateProcessA 11914->11915 11918 100030b0 11915->11918 11919 100030b8 11918->11919 11920 100030bd 11918->11920 11922 10006c50 7 API calls 11919->11922 11923 10006da8 11922->11923 11924 10006d5d 6 API calls 11922->11924 11923->11920 11924->11920 11925 402aa0 11926 4037c0 ___CxxFrameHandler 12 API calls 11925->11926 11927 402acc 11926->11927 11928 10002ae0 11929 10002aec 11928->11929 11930 10002af4 11928->11930 11931 10002b15 ??2@YAPAXI 11930->11931 11932 10004620 21 API calls 11931->11932 11936 10002b94 11932->11936 11933 10002bbe 11934 10002bc5 ??3@YAXPAX 11933->11934 11935 10002bce 11933->11935 11934->11935 11936->11933 11937 10004ba0 5 API calls 11936->11937 11937->11933 11938 40b4a2 11939 40c2f0 10 API calls 11938->11939 11940 40b4aa 11939->11940 11945 406ea9 11946 406eb1 11945->11946 11947 406b00 2 API calls 11946->11947 11948 406f05 11946->11948 11947->11948 12197 40b9af 12202 403510 LeaveCriticalSection 12197->12202 12199 40b9b6 ArrayUnwindFilter 12201 40ba56 12199->12201 12203 403510 LeaveCriticalSection 12199->12203 12202->12199 12203->12201 12204 4029b0 12209 402970 12204->12209 12206 4029d2 12210 402987 12209->12210 12211 403530 10 API calls 12210->12211 12213 40299f 12210->12213 12211->12213 12219 403510 LeaveCriticalSection 12213->12219 12214 4029a9 12214->12206 12215 403680 12214->12215 12216 403692 12215->12216 12218 40368d 12215->12218 12220 403510 LeaveCriticalSection 12216->12220 12218->12206 12219->12214 12220->12218 12221 100039f0 ??2@YAPAXI VirtualAlloc 12222 10003a40 12221->12222 11949 4062b3 11950 406720 6 API calls 11949->11950 11951 4062b8 11950->11951 11951->11949 11952 4062e3 11951->11952 11953 401eb4 LoadLibraryA GetProcAddress 11954 401f6e 11953->11954 11957 401fbf 11953->11957 11955 401fa2 LoadLibraryA 11954->11955 11954->11957 11956 401fcb 11955->11956 11955->11957 11958 40127b KiUserExceptionDispatcher 11956->11958 11961 401fed 11958->11961 11959 4020a1 GetProcAddress 11959->11961 11960 4020bd GetProcAddress 11960->11961 11961->11957 11961->11959 11961->11960 11963 402e70 KiUserExceptionDispatcher 11961->11963 11963->11961

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 10007bc0-10007bf8 GetInputState GetCurrentThreadId PostThreadMessageA GetMessageA 1 10007c22-10007c44 GetVersionExA 0->1 2 10007bfa-10007c08 call 10007120 GetCurrentProcessId call 10007070 0->2 4 10007c46-10007c57 call 10008140 1->4 5 10007c5a-10007c60 1->5 16 10007c0d-10007c19 2->16 4->5 7 10007c62 call 10005d20 5->7 8 10007c67-10007c6d 5->8 7->8 12 10007c73-10007ca3 GetVersionExA call 100058d0 8->12 13 10007ef6-10007fa2 sprintf call 10004dc0 lstrlenA 8->13 21 10007ca5-10007ca9 12->21 22 10007cef-10007cf6 12->22 23 10007fc0-10007fe5 call 10007020 wsprintfA 13->23 24 10007fa4-10007fbd call 10003050 call 10005d90 13->24 16->1 19 10007c1b-10007c1c ExitProcess 16->19 21->22 29 10007cab-10007ce0 CreateThread call 10008140 WaitForSingleObject 21->29 26 10007cfc-10007d03 call 10007b20 22->26 27 10007e8e-10007e90 22->27 39 10008054-1000806d GetModuleFileNameA 23->39 40 10007fe7-10008052 GetModuleFileNameA lstrcatA * 4 MoveFileA 23->40 24->23 43 10007d05-10007d45 Sleep StartServiceCtrlDispatcherA Sleep StartServiceCtrlDispatcherA 26->43 44 10007d4a-10007da1 ExpandEnvironmentStringsA wsprintfA 26->44 32 10007e96-10007ee7 call 10003050 call 10005d90 CreateThread call 10008140 WaitForSingleObject 27->32 33 100080ab-100080b4 27->33 57 10007ce6-10007ced Sleep 29->57 67 10007eed-10007ef4 Sleep 32->67 46 10008073-10008088 Sleep call 10008140 39->46 40->46 47 10007e82-10007e88 call 100067a0 ExitProcess 43->47 49 10007da3-10007db4 44->49 50 10007dbb-10007e81 GetModuleFileNameA CopyFileA call 100076e0 call 10003050 call 10005d90 Sleep 44->50 55 1000808d-1000809b WaitForSingleObject 46->55 49->50 50->47 63 100080a2-100080a9 Sleep 55->63 57->57 63->63 67->67
                                    APIs
                                    • GetInputState.USER32 ref: 10007BC9
                                    • GetCurrentThreadId.KERNEL32 ref: 10007BD4
                                    • PostThreadMessageA.USER32(00000000), ref: 10007BDB
                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 10007BEC
                                    • GetCurrentProcessId.KERNEL32 ref: 10007C01
                                      • Part of subcall function 10007070: LoadLibraryA.KERNEL32(Kernel32.dll,?,00000000,00000000), ref: 10007088
                                      • Part of subcall function 10007070: GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 10007094
                                      • Part of subcall function 10007070: OutputDebugStringA.KERNEL32(GetProc error), ref: 100070A6
                                    • ExitProcess.KERNEL32 ref: 10007C1C
                                    • GetVersionExA.KERNEL32 ref: 10007C3B
                                    • GetVersionExA.KERNEL32(?), ref: 10007C80
                                    • CreateThread.KERNEL32(00000000,00000000,10006DC0,00000000,00000000,00000000), ref: 10007CB5
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?), ref: 10007CD3
                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 10007CDA
                                    • Sleep.KERNEL32(000F4240,?,?,?,?,?,?,?,?,?,?), ref: 10007CEB
                                    • Sleep.KERNEL32 ref: 10007D28
                                    • StartServiceCtrlDispatcherA.ADVAPI32(?), ref: 10007D35
                                    • Sleep.KERNEL32(000003E8), ref: 10007D3C
                                    • StartServiceCtrlDispatcherA.ADVAPI32(?), ref: 10007D43
                                    • ExitProcess.KERNEL32 ref: 10007E88
                                      • Part of subcall function 10007120: LoadLibraryA.KERNEL32(Kernel32.dll,?,?,00000000), ref: 10007138
                                      • Part of subcall function 10007120: OutputDebugStringA.KERNEL32(Loaddll error), ref: 1000714B
                                    • ExpandEnvironmentStringsA.KERNEL32(%ProgramFiles%\Microsoft Msmiou\,?,00000104,?,?,?), ref: 10007D5C
                                    • wsprintfA.USER32 ref: 10007D7F
                                    • GetModuleFileNameA.KERNEL32(00000000,?,000000E1), ref: 10007E29
                                    • CopyFileA.KERNEL32(?,?,00000000), ref: 10007E40
                                    • Sleep.KERNEL32(000001F4,?,?,?,?,?,?,?,?,Aaegmai.exe,?,?,?), ref: 10007E7B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Sleep$ProcessThread$CtrlCurrentDebugDispatcherExitFileLibraryLoadMessageOutputServiceStartStringVersion$AddressCloseCopyCreateEnvironmentExpandHandleInputModuleNameObjectPostProcSingleStateStringsWaitwsprintf
                                    • String ID: %$%ProgramFiles%\Microsoft Msmiou\$.exe$Aaegmai.exe$C$Default$G$Mqgaku auegyyegeecmkimecg$Rsssqi yqeaiusa$Saukqc waqoaeiw$\$c$e$http://x.vay.cc/1.jpg$p$r$s$t$u$.Wu
                                    • API String ID: 4008411486-1395517537
                                    • Opcode ID: bab88af11f6b48f30df971d4e62b5e3ec82fa2ef94e2e934d60d71c8370059ba
                                    • Instruction ID: ed3127d2ed973381872836914633078b1d508e2121c281cc79069413aba0975f
                                    • Opcode Fuzzy Hash: bab88af11f6b48f30df971d4e62b5e3ec82fa2ef94e2e934d60d71c8370059ba
                                    • Instruction Fuzzy Hash: 02C1F6B1408348AFF314DB748C85EEF7BECFB89384F040A1CF68556196DB7499058BA6

                                    Control-flow Graph

                                    APIs
                                    • LoadLibraryA.KERNEL32(kernel32.dll,HeapAlloc), ref: 00401502
                                    • GetProcAddress.KERNEL32(00000000), ref: 00401509
                                    • LoadLibraryA.KERNEL32(kernel32.dll,VirtualAlloc), ref: 00401598
                                    • GetProcAddress.KERNEL32(00000000), ref: 0040159F
                                    • LoadLibraryA.KERNEL32(kernel32.dll,GetProcessHeap), ref: 004015F1
                                    • GetProcAddress.KERNEL32(00000000), ref: 004015F8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressLibraryLoadProc
                                    • String ID: .$.$2$2$3$3$A$A$E$E$E$E$GetProcessHeap$H$HeapAlloc$K$K$L$L$N$N$R$R$V$VirtualAlloc$a$a$c$c$d$d$e$i$kernel32.dll$kernel32.dll$kernel32.dll$l$l$l$l$l$l$l$l$l$o$o$p$r$t$u
                                    • API String ID: 2574300362-4013917992
                                    • Opcode ID: 712b4ef04c9159f4835f35c4a3c6e821e28e79fd423ca0a0ed8b518a40decddf
                                    • Instruction ID: 8114380cada086979454d1969582b8d3431fd090255e38395bd1b8d59baf883f
                                    • Opcode Fuzzy Hash: 712b4ef04c9159f4835f35c4a3c6e821e28e79fd423ca0a0ed8b518a40decddf
                                    • Instruction Fuzzy Hash: 75C15174D04288DFEB11CBE8C848BDEBFB1AF15309F144198E5487B392C7BA5949CB69

                                    Control-flow Graph

                                    APIs
                                    • wsprintfA.USER32 ref: 10005E82
                                    • GetLocalTime.KERNEL32(?,?,75571760,00000000), ref: 10005E8C
                                    • wsprintfA.USER32 ref: 10005F2C
                                    • lstrlenA.KERNEL32 ref: 10005F64
                                      • Part of subcall function 10008A30: LoadLibraryA.KERNEL32(ADVAPI32.dll,00000000,?,00000000,?,1000B800,1000C368,000000FF), ref: 10008A5F
                                      • Part of subcall function 10008A30: GetProcAddress.KERNEL32(00000000,RegCreateKeyExA), ref: 10008A76
                                      • Part of subcall function 10008A30: GetProcAddress.KERNEL32(00000000,RegSetValueExA), ref: 10008A81
                                      • Part of subcall function 10008A30: GetProcAddress.KERNEL32(00000000,RegDeleteKeyA), ref: 10008A8C
                                      • Part of subcall function 10008A30: GetProcAddress.KERNEL32(00000000,RegDeleteValueA), ref: 10008A97
                                      • Part of subcall function 10008A30: GetProcAddress.KERNEL32(00000000,RegOpenKeyExA), ref: 10008AA2
                                      • Part of subcall function 10008A30: GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 10008AAC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$wsprintf$LibraryLoadLocalTimelstrlen
                                    • String ID: %$%$%$-$-$C$C$E$M$M$T$T$Y$a$c$i$i$k$l$m$n$n$o$o$r$r$r$r$v
                                    • API String ID: 1449506856-1324992209
                                    • Opcode ID: 85a800a94a4e8cba2e98fecf3d026871f8f9ae41bc4d057c3f8553274830ddb0
                                    • Instruction ID: e44eca6ed3266e0cbe6ed09acf468b45f17c01723d41422cdbf0e1ff620ae683
                                    • Opcode Fuzzy Hash: 85a800a94a4e8cba2e98fecf3d026871f8f9ae41bc4d057c3f8553274830ddb0
                                    • Instruction Fuzzy Hash: 4551E52100D7C19EE312CB68988879BFFE55FA6348F48499DF2C447292C6AA964CC777

                                    Control-flow Graph

                                    APIs
                                    • lstrcpyA.KERNEL32(?), ref: 10005A04
                                      • Part of subcall function 10004F70: lstrlenA.KERNEL32(?,?,?,?,755683C0,Rsssqi yqeaiusa,00000000,00000000,1F901F90), ref: 10004FD9
                                      • Part of subcall function 10004F70: lstrcpyA.KERNEL32(?,Default), ref: 10004FE5
                                      • Part of subcall function 10004F70: lstrlenA.KERNEL32(?), ref: 10004FEC
                                    • lstrcpyA.KERNEL32(?,Default,00000000,00000000,1F901F90), ref: 10005A3C
                                    • getsockname.WS2_32(?), ref: 10005A8A
                                    • GetVersionExA.KERNEL32 ref: 10005AC5
                                    • RegOpenKeyA.ADVAPI32(80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,?), ref: 10005B07
                                    • RegQueryValueExA.KERNEL32(?,~MHz,00000000,?,?,?,?,?,?), ref: 10005B28
                                    • RegCloseKey.ADVAPI32(?,?,?,?), ref: 10005B33
                                    • wsprintfA.USER32 ref: 10005B89
                                    • wsprintfA.USER32 ref: 10005BA4
                                    • GlobalMemoryStatusEx.KERNEL32(?), ref: 10005BB6
                                    • GetDriveTypeA.KERNEL32(?), ref: 10005BFC
                                    • GetDiskFreeSpaceExA.KERNEL32(?,?,?,?), ref: 10005C17
                                    • GetLastInputInfo.USER32(?), ref: 10005CA1
                                    • GetTickCount.KERNEL32 ref: 10005CA7
                                    • lstrcpyA.KERNEL32(?,10011C70,?,?,?,?,?,?,?,?,?,?), ref: 10005CEF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: lstrcpy$lstrlenwsprintf$CloseCountDiskDriveFreeGlobalInfoInputLastMemoryOpenQuerySpaceStatusTickTypeValueVersiongetsockname
                                    • String ID: :$@$Default$HARDWARE\DESCRIPTION\System\CentralProcessor\0$Rsssqi yqeaiusa$V5.0$V9.5$\$~MHz
                                    • API String ID: 568875508-787302955
                                    • Opcode ID: abbeaf24fb284591937f580f060cf7e450266c720b9a3a3193ac98d61eab76e4
                                    • Instruction ID: 56df92f5f37225f3c4c5383eac6adf3c2b23c19ba9dfa00b355b0c64cf377daf
                                    • Opcode Fuzzy Hash: abbeaf24fb284591937f580f060cf7e450266c720b9a3a3193ac98d61eab76e4
                                    • Instruction Fuzzy Hash: 588138B55083859FE720CB60D884FDBB7E8EFC8345F40891EF68997254EB74A548CB92

                                    Control-flow Graph

                                    APIs
                                    • LoadLibraryA.KERNEL32(Kernel32.dll,?,?,00000000), ref: 10007138
                                    • OutputDebugStringA.KERNEL32(Loaddll error), ref: 1000714B
                                    • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 10007161
                                    • OutputDebugStringA.KERNEL32(GetProc error), ref: 10007179
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: DebugOutputString$AddressLibraryLoadProc
                                    • String ID: CreateToolhelp32Snapshot$GetProc error$Kernel32.dll$Loaddll error$explorer.exe
                                    • API String ID: 1020089312-3138658180
                                    • Opcode ID: 4025efbf808970fbaaf7cadac909587e224237a4606c5147075b4c15ae5bfc20
                                    • Instruction ID: 5f00e2c2720a6fa663694ed9185400f081eba7d1abc25da340defbc7ad3a255d
                                    • Opcode Fuzzy Hash: 4025efbf808970fbaaf7cadac909587e224237a4606c5147075b4c15ae5bfc20
                                    • Instruction Fuzzy Hash: 1E212976E0451C97F710EBA95CC8AF973A8FB453A7F000366ED6DD21D4DB309951C660

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 325 100026a0-100026b4 326 100026c3-10002702 325->326 327 100026b6-100026c0 325->327 328 10002704-10002719 Sleep lstrlenA 326->328 329 10002757 328->329 330 1000271b-10002722 call 10002590 328->330 332 10002759-10002770 GetKeyState GetAsyncKeyState 329->332 338 10002724-1000273b call 10002450 * 2 330->338 339 1000273d-10002747 call 10002450 330->339 334 10002772-10002779 GetKeyState 332->334 335 100027e5-100027ee 332->335 336 1000279a-100027a1 GetKeyState 334->336 337 1000277b-1000277e 334->337 340 100027f4-10002802 335->340 341 1000289c-100028a5 335->341 343 100027c1-100027c3 336->343 344 100027a3-100027a5 336->344 337->336 342 10002780-10002783 337->342 365 1000274a-10002755 338->365 339->365 347 10002804-10002819 lstrcatA 340->347 348 1000281b-1000282b lstrlenA 340->348 341->332 349 100028ab 341->349 342->336 352 10002785-10002788 342->352 353 100027d5-100027e0 343->353 356 100027c5-100027d0 343->356 344->353 354 100027a7-100027aa 344->354 358 1000284e-10002863 call 10002450 347->358 350 10002834-10002837 348->350 351 1000282d-10002832 348->351 349->328 359 10002865-1000286c 350->359 360 10002839-1000284d lstrcatA 350->360 351->358 352->336 361 1000278a-10002795 352->361 353->341 354->343 363 100027ac-100027af 354->363 356->341 358->341 367 10002873-10002876 359->367 368 1000286e-10002872 359->368 360->358 361->341 363->343 369 100027b1-100027bc 363->369 365->329 371 10002886-10002888 367->371 372 10002878-10002884 367->372 368->367 369->341 371->341 374 1000288a-10002895 371->374 373 10002896 lstrcatA 372->373 373->341 374->373
                                    APIs
                                    • Sleep.KERNEL32(0000000A), ref: 10002706
                                    • lstrlenA.KERNEL32(?), ref: 10002711
                                    • GetKeyState.USER32(00000010), ref: 1000275B
                                    • GetAsyncKeyState.USER32(0000000D), ref: 10002767
                                    • GetKeyState.USER32(00000014), ref: 10002774
                                    • GetKeyState.USER32(00000014), ref: 1000279C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: State$AsyncSleeplstrlen
                                    • String ID: <BackSpace>$<Enter>
                                    • API String ID: 43598291-3792472884
                                    • Opcode ID: c5cbdbf5fef63062adc8feb3bc6158000b59bf5a96a0c2c72ef7be3b408fe2ab
                                    • Instruction ID: f377390131d6ee888f65603b6ab40ea5564e5195fa5945844a904dd60498c128
                                    • Opcode Fuzzy Hash: c5cbdbf5fef63062adc8feb3bc6158000b59bf5a96a0c2c72ef7be3b408fe2ab
                                    • Instruction Fuzzy Hash: 625101394097969BFB10EB60DC80BAB73A9EB883C4F110E29E95583199EB31D4498353

                                    Control-flow Graph

                                    APIs
                                    • LoadLibraryA.KERNEL32(Kernel32.dll,?,00000000,00000000), ref: 10007088
                                    • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 10007094
                                    • OutputDebugStringA.KERNEL32(GetProc error), ref: 100070A6
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 100070C2
                                    • Process32First.KERNEL32(00000000,?), ref: 100070DD
                                    • Process32Next.KERNEL32(00000000,00000128), ref: 100070FB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process32$AddressCreateDebugFirstLibraryLoadNextOutputProcSnapshotStringToolhelp32
                                    • String ID: CreateToolhelp32Snapshot$GetProc error$Kernel32.dll
                                    • API String ID: 3128448922-2077241676
                                    • Opcode ID: 295daeb23bcfde2618456ea959a71a62bb36e26ecaa461f8c76c1baadd31b639
                                    • Instruction ID: 507c309df4cf87117a48498e4d3ef66e97e44aff555986cfcf13dff8ea8059fa
                                    • Opcode Fuzzy Hash: 295daeb23bcfde2618456ea959a71a62bb36e26ecaa461f8c76c1baadd31b639
                                    • Instruction Fuzzy Hash: B111AE71D0051C9BE710DBA98CC9AF9B7B8FB543E6F100396EE5DD2194DB349D81C660
                                    APIs
                                    • LoadLibraryA.KERNEL32(KERNEL32.dll,IsBadReadPtr), ref: 00401F27
                                    • GetProcAddress.KERNEL32(00000000), ref: 00401F2E
                                    • LoadLibraryA.KERNEL32(00000000), ref: 00401FB0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: LibraryLoad$AddressProc
                                    • String ID: B$IsBadReadPtr$KERNEL32.dll
                                    • API String ID: 1469910268-3420668620
                                    • Opcode ID: eefd4b8f1daa93a4577590aa29fc122f3aea43f51d69fa26bb5480e27314cb1f
                                    • Instruction ID: 064745a50b26fa7c1a372de2f7048e5898e4f938477faf6bf4bd766cdbdb6b02
                                    • Opcode Fuzzy Hash: eefd4b8f1daa93a4577590aa29fc122f3aea43f51d69fa26bb5480e27314cb1f
                                    • Instruction Fuzzy Hash: B4915D74D04289CFDB04CF98C588BDEBBB1BF49308F188169D5457B391C3B9A946CB69
                                    APIs
                                    • VirtualFree.KERNELBASE(?,?,00004000), ref: 00401C33
                                    • VirtualProtect.KERNEL32(?,?,?,?), ref: 00401CE1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Virtual$FreeProtect
                                    • String ID:
                                    • API String ID: 2581862158-0
                                    • Opcode ID: 6c05861f2a5891a13ed92c4e0e41e14a43f93bc6d9a88a91653539556f261a3c
                                    • Instruction ID: fffa9f1e529b255b45960d0ee6fdc1920ff1a43c67b3da6f5f52efa33736b65f
                                    • Opcode Fuzzy Hash: 6c05861f2a5891a13ed92c4e0e41e14a43f93bc6d9a88a91653539556f261a3c
                                    • Instruction Fuzzy Hash: 2D41CEB4E04209DFDB08CF55C591EAEB7B2BF88304F149269D905AB395D734E842CF94
                                    APIs
                                    • select.WS2_32(00000000,?,00000000,00000000,00000000), ref: 10001E7B
                                    • recv.WS2_32(?,?,00002000,00000000), ref: 10001EAC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: recvselect
                                    • String ID:
                                    • API String ID: 741273618-0
                                    • Opcode ID: 871a2907844a5b652a681063f6f6bfa09c943abc455f13851db8aa7e61c54d5c
                                    • Instruction ID: 383b25f4726329bae5db19e016879abe1d3d968958dc0de2e6bd548a2a5084d3
                                    • Opcode Fuzzy Hash: 871a2907844a5b652a681063f6f6bfa09c943abc455f13851db8aa7e61c54d5c
                                    • Instruction Fuzzy Hash: 0421D57624034567E720CA68DC85BDF7395EFC47E0F000A3DFA64971C6DB75A94A83A2
                                    APIs
                                    • GetSystemInfo.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 10004D98
                                    • wsprintfA.USER32 ref: 10004DAD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: InfoSystemwsprintf
                                    • String ID:
                                    • API String ID: 2452939696-0
                                    • Opcode ID: 4ee8b2c5c2afc367d6198751d22ea984fbe173bb3ef40887e6be74c354f8fdfd
                                    • Instruction ID: 97120f9da4bd28782017b24a4ea70e1ab9c57392149cacdebe9d3a8909138bc2
                                    • Opcode Fuzzy Hash: 4ee8b2c5c2afc367d6198751d22ea984fbe173bb3ef40887e6be74c354f8fdfd
                                    • Instruction Fuzzy Hash: E4D0C9B8404314ABD208EBA0CCC9C6B7BA8BB88244F444A08F94A52214D634D558CB62
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Version
                                    • String ID:
                                    • API String ID: 1889659487-0
                                    • Opcode ID: 818341d8fc485062122c1d51d3c390d6a5d3e06ed646751cc090d88ee85653da
                                    • Instruction ID: 866cea4765af16411f253e5ce4b0b67a6240cb3589ecf1f98e99485b69932c6d
                                    • Opcode Fuzzy Hash: 818341d8fc485062122c1d51d3c390d6a5d3e06ed646751cc090d88ee85653da
                                    • Instruction Fuzzy Hash: C0F014F1D44B419FD363CF5CEC82B217BA9FF44762F10423AA014926A2DAB89480DF98

                                    Control-flow Graph

                                    APIs
                                    • LoadLibraryA.KERNEL32 ref: 1000864B
                                    • GetProcAddress.KERNEL32(00000000), ref: 10008652
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 1000865C
                                    • ??2@YAPAXI@Z.MSVCRT(00000128), ref: 10008665
                                    • Process32First.KERNEL32(00000000,00000000), ref: 10008677
                                    • _strcmpi.MSVCRT ref: 10008689
                                    • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 1000869A
                                    • Process32Next.KERNEL32(00000000,00000000), ref: 100086AE
                                    • lstrcmpiA.KERNEL32(00000024,?), ref: 100086B9
                                    • Process32Next.KERNEL32(00000000,00000000), ref: 100086C5
                                    • CloseHandle.KERNEL32(00000000,00000000), ref: 100086CF
                                    • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 100086D6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process32$??3@Next$??2@AddressCloseCreateFirstHandleLibraryLoadProcSnapshotToolhelp32_strcmpilstrcmpi
                                    • String ID: .$2$2$3$3$C$K$L$N$R$S$T$a$a$d$n$r$s$t$t$.Wu
                                    • API String ID: 1825602229-222072272
                                    • Opcode ID: 7ce39e9619a4b459c6ef2c8217cac0212bf4b46d3c87e1cca43305406b8d310f
                                    • Instruction ID: 20ee00d77892bc51f8a53c1edb579a40f65325d4756f784b5e9045799c2fa881
                                    • Opcode Fuzzy Hash: 7ce39e9619a4b459c6ef2c8217cac0212bf4b46d3c87e1cca43305406b8d310f
                                    • Instruction Fuzzy Hash: 5C415E2110D3C09DE312CB79888479BBFD49FA6288F48099DF5C856287D6AAD20CC77B

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 148 100050d0-100057dd LoadLibraryA GetProcAddress * 3 CreateToolhelp32Snapshot 149 100057e3-10005803 strstr 148->149 150 1000588f-100058a6 lstrlenA 148->150 149->150 151 10005809-1000580a 149->151 154 100058b4-100058b6 150->154 155 100058a8-100058ae lstrcpyA 150->155 153 1000580e-1000581d Process32First 151->153 156 1000586a-1000588c strstr 153->156 157 1000581f 153->157 159 100058b8-100058b9 FreeLibrary 154->159 160 100058bf-100058c8 154->160 155->154 156->153 158 1000588e 156->158 161 10005821-10005832 lstrcmpiA 157->161 158->150 159->160 162 10005834-10005843 161->162 163 10005847-10005868 lstrcatA * 2 161->163 162->161 165 10005845 162->165 163->156 165->156
                                    APIs
                                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 100057A3
                                    • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 100057B7
                                    • GetProcAddress.KERNEL32(00000000,Process32First), ref: 100057C1
                                    • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 100057CD
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 100057D7
                                    • strstr.MSVCRT ref: 100057F8
                                    • Process32First.KERNEL32(00000000,?,?,755732F0,00000001), ref: 10005817
                                    • lstrcmpiA.KERNEL32(?,?), ref: 1000582A
                                    • lstrcatA.KERNEL32(?,?), ref: 10005859
                                    • lstrcatA.KERNEL32(?,1001194C), ref: 10005868
                                    • strstr.MSVCRT ref: 10005881
                                    • CloseHandle.KERNEL32(00000000), ref: 10005890
                                    • lstrlenA.KERNEL32(?), ref: 1000589E
                                    • lstrcpyA.KERNEL32(?,-/-), ref: 100058AE
                                    • FreeLibrary.KERNEL32(00000000), ref: 100058B9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$Librarylstrcatstrstr$CloseCreateFirstFreeHandleLoadProcess32SnapshotToolhelp32lstrcmpilstrcpylstrlen
                                    • String ID: -/-$CreateToolhelp32Snapshot$Mcshield.exe$Process32First$Process32Next$kernel32.dll$.Wu
                                    • API String ID: 2300032177-2469977333
                                    • Opcode ID: bb8bc624cc39c13df69926a1ae9fd9d6cde2e49158f923fe306c03369e031264
                                    • Instruction ID: cc1ecaae6683d165517e05800a742c989659b430ae820f92cda3658fe5a5e26e
                                    • Opcode Fuzzy Hash: bb8bc624cc39c13df69926a1ae9fd9d6cde2e49158f923fe306c03369e031264
                                    • Instruction Fuzzy Hash: 91F156F000A3C59BD774CF5589846DFBAA4FB86340F90890CD59A6F251CBBAC1A1CF96

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 166 10006440-100064a1 call 1000b780 wsprintfA CreateMutexA 169 100064a3-100064ae GetLastError 166->169 170 100064c6-100064ee call 10005d90 call 10001b60 166->170 169->170 171 100064b0-100064c0 ReleaseMutex exit 169->171 177 100064f0-10006524 call 10003b10 call 10003b40 call 10003ac0 170->177 178 10006529-1000652f 170->178 171->170 177->178 179 10006530-10006537 178->179 181 10006745-1000674e call 100021c0 179->181 182 1000653d-1000655c 179->182 193 1000676d-1000679b call 10001c50 181->193 185 10006562-100065a1 strstr 182->185 186 1000661d-10006636 lstrcatA 182->186 190 100065a7-1000661b strcspn strncpy strcspn lstrcatA atoi 185->190 191 1000663c-10006641 185->191 186->191 190->191 194 10006648-1000664e 191->194 195 10006650-10006652 194->195 196 1000666c-1000666e 194->196 198 10006654-1000665c 195->198 199 10006668-1000666a 195->199 201 10006671-10006673 196->201 198->196 203 1000665e-10006666 198->203 199->201 201->179 202 10006679-10006695 GetTickCount call 10001d00 201->202 202->179 206 1000669b-100066ef GetTickCount call 10003a50 call 10002440 call 100059d0 202->206 203->194 203->199 213 100066f1-100066f5 call 100021c0 206->213 214 10006713-10006737 WaitForSingleObject Sleep 206->214 221 100066fa-1000670e call 10003ac0 213->221 215 10006739-1000673b 214->215 216 1000673f-10006741 214->216 218 10006750-10006768 call 100021c0 call 10003ac0 215->218 219 1000673d 215->219 216->218 220 10006743 216->220 218->193 219->214 220->221 221->179
                                    APIs
                                    • wsprintfA.USER32 ref: 10006482
                                    • CreateMutexA.KERNEL32(00000000,00000000,?), ref: 10006497
                                    • GetLastError.KERNEL32 ref: 100064A3
                                    • ReleaseMutex.KERNEL32(00000000), ref: 100064B1
                                    • CloseHandle.KERNEL32(00000000), ref: 100064B8
                                    • exit.MSVCRT ref: 100064C0
                                      • Part of subcall function 100021C0: setsockopt.WS2_32(?,0000FFFF,00000080,?,00000004), ref: 100021E7
                                      • Part of subcall function 100021C0: CancelIo.KERNEL32(?), ref: 100021F1
                                      • Part of subcall function 100021C0: InterlockedExchange.KERNEL32(?,00000000), ref: 100021FD
                                      • Part of subcall function 100021C0: closesocket.WS2_32(?), ref: 10002207
                                      • Part of subcall function 100021C0: SetEvent.KERNEL32(?), ref: 10002211
                                      • Part of subcall function 10003AC0: TerminateThread.KERNEL32(?,000000FF,00000000,?,00000000,1F901F90,1000676D), ref: 10003AE6
                                      • Part of subcall function 10003AC0: CloseHandle.KERNEL32 ref: 10003AEB
                                    • strstr.MSVCRT ref: 10006596
                                    • strcspn.MSVCRT ref: 100065B3
                                    • strncpy.MSVCRT ref: 100065BC
                                    • strcspn.MSVCRT ref: 100065C8
                                    • lstrcatA.KERNEL32(?,?), ref: 10006602
                                    • atoi.MSVCRT(?), ref: 10006610
                                    • lstrcatA.KERNEL32(00000000,156.225.22.155), ref: 10006636
                                    • GetTickCount.KERNEL32 ref: 10006679
                                    • GetTickCount.KERNEL32 ref: 1000669B
                                    • WaitForSingleObject.KERNEL32(?,00000BB8), ref: 1000671D
                                    • Sleep.KERNEL32(000001F4), ref: 1000672A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseCountHandleMutexTicklstrcatstrcspn$CancelCreateErrorEventExchangeInterlockedLastObjectReleaseSingleSleepTerminateThreadWaitatoiclosesocketexitsetsockoptstrncpystrstrwsprintf
                                    • String ID: %s:%d:%s$156.225.22.155$Rsssqi yqeaiusa$.Wu
                                    • API String ID: 3077434019-1852655475
                                    • Opcode ID: a11d83c3e9ae5d9a6a0cc2d7c690a3bfcd63a8508b6342766bc76147a56c70c0
                                    • Instruction ID: 936c7ba1aeec0b68900dfaa2bcecedb94024cf1f17f1b00cb6aeefd646a4d3c3
                                    • Opcode Fuzzy Hash: a11d83c3e9ae5d9a6a0cc2d7c690a3bfcd63a8508b6342766bc76147a56c70c0
                                    • Instruction Fuzzy Hash: 5581C3351087959BF324CB64CC95FDB77E9EF893C0F104928F98A97285EB35A908C762

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 227 10002ee0-10002ffe wsprintfA lstrlenA call 10008a30 229 10003003-1000300e 227->229
                                    APIs
                                    • wsprintfA.USER32 ref: 10002FCF
                                    • lstrlenA.KERNEL32(?,00000000,?,?,75571760), ref: 10002FE2
                                      • Part of subcall function 10008A30: LoadLibraryA.KERNEL32(ADVAPI32.dll,00000000,?,00000000,?,1000B800,1000C368,000000FF), ref: 10008A5F
                                      • Part of subcall function 10008A30: GetProcAddress.KERNEL32(00000000,RegCreateKeyExA), ref: 10008A76
                                      • Part of subcall function 10008A30: GetProcAddress.KERNEL32(00000000,RegSetValueExA), ref: 10008A81
                                      • Part of subcall function 10008A30: GetProcAddress.KERNEL32(00000000,RegDeleteKeyA), ref: 10008A8C
                                      • Part of subcall function 10008A30: GetProcAddress.KERNEL32(00000000,RegDeleteValueA), ref: 10008A97
                                      • Part of subcall function 10008A30: GetProcAddress.KERNEL32(00000000,RegOpenKeyExA), ref: 10008AA2
                                      • Part of subcall function 10008A30: GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 10008AAC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$LibraryLoadlstrlenwsprintf
                                    • String ID: %$C$C$E$M$T$Y$\$\$\$c$i$l$n$n$o$o$t$t$t$u$v
                                    • API String ID: 2349312171-2259266472
                                    • Opcode ID: 64dc2888341b0670352cd3d4f5dd59b5a6cd510f73c4438b7a0b62dd08301ed6
                                    • Instruction ID: 3a389a8193fcd0131c7d052384cde78d3639474158572851c350a6658b524500
                                    • Opcode Fuzzy Hash: 64dc2888341b0670352cd3d4f5dd59b5a6cd510f73c4438b7a0b62dd08301ed6
                                    • Instruction Fuzzy Hash: DB31E81110D3C1DDE352DA688448B9FBFD15FA6648F48099DF2C817292C6AA974CC7BB

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 230 10004dc0-10004f03 wsprintfA call 10008760
                                    APIs
                                    • wsprintfA.USER32 ref: 10004ED2
                                      • Part of subcall function 10008760: LoadLibraryA.KERNEL32(ADVAPI32.dll,00000000,?,00000000), ref: 100087AE
                                      • Part of subcall function 10008760: GetProcAddress.KERNEL32(00000000,RegQueryValueExA), ref: 100087C8
                                      • Part of subcall function 10008760: GetProcAddress.KERNEL32(00000000,RegOpenKeyExA), ref: 100087D2
                                      • Part of subcall function 10008760: GetProcAddress.KERNEL32(00000000,RegEnumValueA), ref: 100087DD
                                      • Part of subcall function 10008760: GetProcAddress.KERNEL32(00000000,RegEnumKeyExA), ref: 100087E5
                                      • Part of subcall function 10008760: GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 100087ED
                                      • Part of subcall function 10008760: RegOpenKeyExA.KERNEL32(75571760,?,00000000,00020019,?), ref: 10008812
                                      • Part of subcall function 10008760: FreeLibrary.KERNEL32(00000000), ref: 1000899B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$Library$FreeLoadOpenwsprintf
                                    • String ID: %$C$C$E$M$T$Y$\$\$\$c$i$l$n$n$o$o$t$t$t$u$v
                                    • API String ID: 4113823538-2259266472
                                    • Opcode ID: e17e5a31cb6b74c8cb34c47ca1cc637edb495c1cfba2363829f116dee32bb029
                                    • Instruction ID: c0b8f888539ecc2b337d7a97f6379b4e3860572a7028072eb7cbad3acca4f5fb
                                    • Opcode Fuzzy Hash: e17e5a31cb6b74c8cb34c47ca1cc637edb495c1cfba2363829f116dee32bb029
                                    • Instruction Fuzzy Hash: 6D41192110D3C0DEE352C668844479BFFD25BEA648F48599CF2C81B382C6BA961CC77B

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 233 10008760-10008817 LoadLibraryA GetProcAddress * 5 RegOpenKeyExA 234 10008825-1000882a 233->234 235 10008819-10008820 233->235 236 1000898a-10008998 call 100089bb 234->236 237 10008830-10008837 234->237 235->236 245 100089a1-100089b4 236->245 246 1000899a-1000899b FreeLibrary 236->246 237->236 239 1000883d 237->239 239->236 241 10008844-1000886b RegQueryValueExA 239->241 242 10008887-100088ae 239->242 243 10008948-1000896b 239->243 244 1000890d-10008934 239->244 241->236 247 10008871-10008882 lstrcpyA 241->247 242->236 253 100088b4 242->253 243->236 254 1000896d-10008979 243->254 244->236 252 10008936-10008946 244->252 246->245 249 10008983 247->249 249->236 255 1000897a-10008980 wsprintfA 252->255 256 100088ba-100088c0 253->256 254->255 255->249 257 100088c2-100088f8 call 100086f0 * 2 call 10008730 256->257 258 100088fa-1000890b lstrcpyA 256->258 257->256 258->249
                                    APIs
                                    • LoadLibraryA.KERNEL32(ADVAPI32.dll,00000000,?,00000000), ref: 100087AE
                                    • GetProcAddress.KERNEL32(00000000,RegQueryValueExA), ref: 100087C8
                                    • GetProcAddress.KERNEL32(00000000,RegOpenKeyExA), ref: 100087D2
                                    • GetProcAddress.KERNEL32(00000000,RegEnumValueA), ref: 100087DD
                                    • GetProcAddress.KERNEL32(00000000,RegEnumKeyExA), ref: 100087E5
                                    • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 100087ED
                                    • RegOpenKeyExA.KERNEL32(75571760,?,00000000,00020019,?), ref: 10008812
                                    • FreeLibrary.KERNEL32(00000000), ref: 1000899B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$Library$FreeLoadOpen
                                    • String ID: %08X$ADVAPI32.dll$RegCloseKey$RegEnumKeyExA$RegEnumValueA$RegOpenKeyExA$RegQueryValueExA
                                    • API String ID: 906421942-2913591164
                                    • Opcode ID: b53f3c26470d4968c2903438ec2dd6e63a23fa3cef330f6e3b07f12076739156
                                    • Instruction ID: 8c4d25f6b69c8f63784c1d53e9d9fbe15789118adcb351b840f422686eb70828
                                    • Opcode Fuzzy Hash: b53f3c26470d4968c2903438ec2dd6e63a23fa3cef330f6e3b07f12076739156
                                    • Instruction Fuzzy Hash: 32616DB2900219EBEB10DF94CC84FEFB7B8FB48740F144159F649A7284DB75AA45CBA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 265 10008a30-10008abe LoadLibraryA GetProcAddress * 6 266 10008ac4 265->266 267 10008ba8-10008bb6 call 10008bd6 265->267 266->267 268 10008af3-10008b0a RegOpenKeyExA 266->268 269 10008b35-10008b3a 266->269 270 10008b26-10008b33 lstrlenA 266->270 271 10008b79-10008b90 266->271 272 10008acb-10008aed RegCreateKeyExA 266->272 273 10008b4f-10008b66 266->273 282 10008bb8-10008bb9 FreeLibrary 267->282 283 10008bbf-10008bd2 267->283 268->267 275 10008b10-10008b19 268->275 276 10008b3b-10008b4b RegSetValueExA 269->276 270->276 271->267 285 10008b92-10008b9f 271->285 272->267 272->268 273->267 284 10008b68-10008b75 273->284 275->267 280 10008b1f 275->280 276->267 281 10008b4d 276->281 280->267 280->269 280->270 286 10008ba1 281->286 282->283 284->267 289 10008b77 284->289 285->267 285->286 286->267 289->286
                                    APIs
                                    • LoadLibraryA.KERNEL32(ADVAPI32.dll,00000000,?,00000000,?,1000B800,1000C368,000000FF), ref: 10008A5F
                                    • GetProcAddress.KERNEL32(00000000,RegCreateKeyExA), ref: 10008A76
                                    • GetProcAddress.KERNEL32(00000000,RegSetValueExA), ref: 10008A81
                                    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyA), ref: 10008A8C
                                    • GetProcAddress.KERNEL32(00000000,RegDeleteValueA), ref: 10008A97
                                    • GetProcAddress.KERNEL32(00000000,RegOpenKeyExA), ref: 10008AA2
                                    • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 10008AAC
                                    • RegCreateKeyExA.KERNEL32(?,00000001,00000000,00000000,00000000,000F003F,00000000,?,?), ref: 10008AE8
                                    • RegOpenKeyExA.KERNEL32(?,00000001,00000000,0002001F,?), ref: 10008B06
                                    • lstrlenA.KERNEL32(80000002), ref: 10008B2A
                                    • RegSetValueExA.KERNEL32(?,?,00000000,?,80000002,00000001), ref: 10008B46
                                    • FreeLibrary.KERNEL32(00000000), ref: 10008BB9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$Library$CreateFreeLoadOpenValuelstrlen
                                    • String ID: ADVAPI32.dll$RegCloseKey$RegCreateKeyExA$RegDeleteKeyA$RegDeleteValueA$RegOpenKeyExA$RegSetValueExA
                                    • API String ID: 3458221994-3188892968
                                    • Opcode ID: 55df64ef12231d941170aab4b13e0f0724291a0721f31477d5a477d93c4e0095
                                    • Instruction ID: d79a726ba8ef5e53d6a0f0444169fe093e458c7cd5bbc3b26cc650ea72237b90
                                    • Opcode Fuzzy Hash: 55df64ef12231d941170aab4b13e0f0724291a0721f31477d5a477d93c4e0095
                                    • Instruction Fuzzy Hash: 0E510AB1A00219BBEB04DFA4DC84FEEB7B8FF49780F108119FA55E7294D774A9018B61

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 290 10004c30-10004c9f LoadLibraryA GetProcAddress * 3 LoadLibraryA GetProcAddress CoInitialize 292 10004ca1-10004caa 290->292 293 10004cab-10004cbd 290->293 294 10004cc1-10004cc3 293->294 295 10004cc5-10004cce 294->295 296 10004ccf-10004cf1 294->296 299 10004cf3-10004d0d 296->299 300 10004d66-10004d72 296->300 305 10004d42-10004d64 299->305 306 10004d0f-10004d2e 299->306 303 10004d74-10004d75 FreeLibrary 300->303 304 10004d77-10004d79 300->304 303->304 307 10004d7b-10004d7c FreeLibrary 304->307 308 10004d7e-10004d87 304->308 305->299 305->300 311 10004d30-10004d35 306->311 312 10004d38-10004d3d 306->312 307->308 311->312 312->305
                                    APIs
                                    • LoadLibraryA.KERNEL32(Ole32.dll,00000000,755732F0,?,00000001), ref: 10004C42
                                    • GetProcAddress.KERNEL32(00000000,CoInitialize), ref: 10004C52
                                    • GetProcAddress.KERNEL32(00000000,CoUninitialize), ref: 10004C5C
                                    • GetProcAddress.KERNEL32(00000000,CoCreateInstance), ref: 10004C68
                                    • LoadLibraryA.KERNEL32(Oleaut32.dll,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 10004C73
                                    • GetProcAddress.KERNEL32(00000000,SysFreeString), ref: 10004C7D
                                    • CoInitialize.OLE32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 10004C83
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$LibraryLoad$Initialize
                                    • String ID: CoCreateInstance$CoInitialize$CoUninitialize$FriendlyName$Ole32.dll$Oleaut32.dll$SysFreeString
                                    • API String ID: 2287434211-3340630095
                                    • Opcode ID: cb434f53078fdba30b2bb0be0b2bcb7d9073196d91b39f1257c6526418b678c7
                                    • Instruction ID: 4ca749c3dd386b8f5ba94f1f0f354c4942880b4c6214c0f3594ddcc719ae528a
                                    • Opcode Fuzzy Hash: cb434f53078fdba30b2bb0be0b2bcb7d9073196d91b39f1257c6526418b678c7
                                    • Instruction Fuzzy Hash: 59417D71604306AFE200DF75CC84E5BBBE8FF89694F014919F644DB250EB35E84A8BA2
                                    APIs
                                    • LCMapStringW.KERNEL32(00000000,00000100,0040FD4C,00000001,00000000,00000000), ref: 0040BB81
                                    • LCMapStringA.KERNEL32(00000000,00000100,0040FD48,00000001,00000000,00000000), ref: 0040BBA9
                                    • LCMapStringA.KERNEL32(000004E4,00000100,?,00000000,00000020,00000100), ref: 0040BC00
                                    • MultiByteToWideChar.KERNEL32(00000000,0040A6B5,?,00000000,00000000,00000000), ref: 0040BC45
                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,?,00000000,00000000,00000000), ref: 0040BCC0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: String$ByteCharMultiWide
                                    • String ID:
                                    • API String ID: 352835431-0
                                    • Opcode ID: 57030e4d6ad603c3d6b87f7d243d4da753c8ea1d8d156a4662d4ba1f69d19dfc
                                    • Instruction ID: c8a72bfbc34c50cc10ee7a795bf5ac019ffeac40bdefbd4da4d57afbef0b44b1
                                    • Opcode Fuzzy Hash: 57030e4d6ad603c3d6b87f7d243d4da753c8ea1d8d156a4662d4ba1f69d19dfc
                                    • Instruction Fuzzy Hash: 7D91FB71A14209ABDB10CF94DC85FEF77B5EB48710F20852AF615B72C0D778A9418BAD
                                    APIs
                                      • Part of subcall function 10004DC0: wsprintfA.USER32 ref: 10004ED2
                                    • lstrlenA.KERNEL32(?,?,?,755683C0,1F901F90,?,10005A58,?,?,00000100), ref: 10004F52
                                    • gethostname.WS2_32(?,?), ref: 10004F5A
                                    • lstrlenA.KERNEL32(?,?,10005A58,?,?,00000100), ref: 10004F61
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: lstrlen$gethostnamewsprintf
                                    • String ID: H$o$s$t
                                    • API String ID: 2011373664-2997942591
                                    • Opcode ID: dc1b33caf8c5d92fc9d27f1bcbacecf99daad83217f76fd9b86bd276126c4ff0
                                    • Instruction ID: 195b30958b9f004f239f721d133d4540b2d882fa839fc41ac6bd1cdcff48019c
                                    • Opcode Fuzzy Hash: dc1b33caf8c5d92fc9d27f1bcbacecf99daad83217f76fd9b86bd276126c4ff0
                                    • Instruction Fuzzy Hash: 3CF0962100D3929AE301DB589C44E5FBFD8EFC6254F04095CF58452146C769A60DC7FB
                                    APIs
                                      • Part of subcall function 100021C0: setsockopt.WS2_32(?,0000FFFF,00000080,?,00000004), ref: 100021E7
                                      • Part of subcall function 100021C0: CancelIo.KERNEL32(?), ref: 100021F1
                                      • Part of subcall function 100021C0: InterlockedExchange.KERNEL32(?,00000000), ref: 100021FD
                                      • Part of subcall function 100021C0: closesocket.WS2_32(?), ref: 10002207
                                      • Part of subcall function 100021C0: SetEvent.KERNEL32(?), ref: 10002211
                                    • ResetEvent.KERNEL32(?,00000000,10013460), ref: 10001D10
                                    • socket.WS2_32 ref: 10001D20
                                    • gethostbyname.WS2_32(?), ref: 10001D3D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Event$CancelExchangeInterlockedResetclosesocketgethostbynamesetsockoptsocket
                                    • String ID:
                                    • API String ID: 513860241-0
                                    • Opcode ID: 49f0bde48943a12045197487d7f321ca135c5609154bfa06ddcc468a0ef1862c
                                    • Instruction ID: 0ab3f8268d16afc13eb63b7ce6a82c30aab0cc91fcf30b6f79a0feea18b7711f
                                    • Opcode Fuzzy Hash: 49f0bde48943a12045197487d7f321ca135c5609154bfa06ddcc468a0ef1862c
                                    • Instruction Fuzzy Hash: 78318DB1144311AFE310DF69CC85F9B77E8BF88754F00491DF2859A294D6B1E9888B62
                                    APIs
                                    • CoInitialize.OLE32(00000000), ref: 10007025
                                    • CoCreateGuid.OLE32(00000000,?,?,?,10007FC5), ref: 10007030
                                    • _snprintf.MSVCRT ref: 1000704B
                                    • CoUninitialize.COMBASE(?,?,?,10007FC5), ref: 10007054
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateGuidInitializeUninitialize_snprintf
                                    • String ID: %08X$1C093A1E
                                    • API String ID: 61646808-2509886562
                                    • Opcode ID: 46ea967f007e1341beaccad40756c24012115f556016e63794a524742450986c
                                    • Instruction ID: 263f48dfaef9095c76100317287a0be80b452200891cd3d20973d8d69edd3cf8
                                    • Opcode Fuzzy Hash: 46ea967f007e1341beaccad40756c24012115f556016e63794a524742450986c
                                    • Instruction Fuzzy Hash: 2FE0C274984355ABF700FB948CCDF6A3B65FF10381F844448F64B851A6E735D0608B53
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: malloc$Tablefree
                                    • String ID:
                                    • API String ID: 2903114640-0
                                    • Opcode ID: bd5a544da2b69ade10387c9bc969f7a27429d6ea055e7b46cd8c5b737e286342
                                    • Instruction ID: a5415cd87c6273a78d959c32fc7f8bc2d366dd0271ea90c27853accd055239b0
                                    • Opcode Fuzzy Hash: bd5a544da2b69ade10387c9bc969f7a27429d6ea055e7b46cd8c5b737e286342
                                    • Instruction Fuzzy Hash: 84110C737013155BF314CA0ABC81AEFB3DCEBC16B1F15052AF955C7204DB66AD0546E2
                                    APIs
                                    • malloc.MSVCRT ref: 10006196
                                    • strrchr.MSVCRT ref: 100061B3
                                    • wsprintfA.USER32 ref: 100061E1
                                    • URLDownloadToFileA.URLMON(00000000,00000000,?,00000000,00000000), ref: 100061F6
                                      • Part of subcall function 10008550: GetFileAttributesA.KERNEL32(?,10006209,?), ref: 10008555
                                      • Part of subcall function 10008550: GetLastError.KERNEL32 ref: 10008560
                                      • Part of subcall function 10005FA0: strrchr.MSVCRT ref: 10005FC9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Filestrrchr$AttributesDownloadErrorLastmallocwsprintf
                                    • String ID: c:\%s
                                    • API String ID: 1809852422-3279930864
                                    • Opcode ID: 42af66eab8004a3d2a5560a97285f3cd4f5a80f1d9281ef6eee5d20c7b228d9e
                                    • Instruction ID: 642eac388d9637214fe81173592c1bef9b8eea6dda56b7b84067276b66d186f9
                                    • Opcode Fuzzy Hash: 42af66eab8004a3d2a5560a97285f3cd4f5a80f1d9281ef6eee5d20c7b228d9e
                                    • Instruction Fuzzy Hash: 73117B766103002BF304C778DC45BBB73C9EBD8350F144439FE15C62C1EAB99A098362
                                    APIs
                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,75571760,00000000,00000000,00000000,00000000), ref: 1000815C
                                    • _beginthreadex.MSVCRT ref: 10008184
                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 10008196
                                    • CloseHandle.KERNEL32(?), ref: 100081A1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseCreateEventHandleObjectSingleWait_beginthreadex
                                    • String ID: .Wu
                                    • API String ID: 92035984-3424199868
                                    • Opcode ID: baa944a629af42372f5d8f2e2333c628e0688425d9f32cc3f2d37009f8296061
                                    • Instruction ID: f857c391777d8c366786b4090d3c3db3a64e4b005c1083bac85649b0adf554ab
                                    • Opcode Fuzzy Hash: baa944a629af42372f5d8f2e2333c628e0688425d9f32cc3f2d37009f8296061
                                    • Instruction Fuzzy Hash: 4B01F674608311AFE314DF18CC85F6BBBE4FB89754F144A0DF998A3395D634EA048B92
                                    APIs
                                    • setsockopt.WS2_32(?,0000FFFF,00000080,?,00000004), ref: 100021E7
                                    • CancelIo.KERNEL32(?), ref: 100021F1
                                    • InterlockedExchange.KERNEL32(?,00000000), ref: 100021FD
                                    • closesocket.WS2_32(?), ref: 10002207
                                    • SetEvent.KERNEL32(?), ref: 10002211
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CancelEventExchangeInterlockedclosesocketsetsockopt
                                    • String ID:
                                    • API String ID: 1486965892-0
                                    • Opcode ID: c5cb8189381730b384fee02563421651531b032639a49d17508a848de7e61f69
                                    • Instruction ID: bd3fc856b2ee71789fb1c63483ee779e84cb3b5a540c39c39a08c2d163932c29
                                    • Opcode Fuzzy Hash: c5cb8189381730b384fee02563421651531b032639a49d17508a848de7e61f69
                                    • Instruction Fuzzy Hash: 96F09072104325AFE324CF94CC88E9B73B8AF48311F104A0DF782826E4CB71E4448B50
                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\aQ7bSXduYp.exe,00000104), ref: 00404D90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileModuleName
                                    • String ID: C:\Users\user\Desktop\aQ7bSXduYp.exe$stdargv.c$%p
                                    • API String ID: 514040917-289923974
                                    • Opcode ID: e91d81416b772ac04a81b8feb6f2004f988655c4935d20421c561d3baebc0de9
                                    • Instruction ID: 4f025f47108e8652e79001dbdfa36325de1fabc67bad4b42f0a04ca65805b3c0
                                    • Opcode Fuzzy Hash: e91d81416b772ac04a81b8feb6f2004f988655c4935d20421c561d3baebc0de9
                                    • Instruction Fuzzy Hash: F9219FB4D00209AFDB14EF94D881FAE77B4BB84705F10817EE911B7282D674A608CB99
                                    APIs
                                    • GetCommandLineA.KERNEL32 ref: 00403313
                                    • GetStartupInfoA.KERNEL32(?), ref: 00403342
                                    • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 0040337A
                                      • Part of subcall function 00403400: ExitProcess.KERNEL32 ref: 00403422
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CommandExitHandleInfoLineModuleProcessStartup
                                    • String ID: %p
                                    • API String ID: 2164999147-1556559175
                                    • Opcode ID: 7dd73d02d9c2fac171bbf6c11e4a9c9439ea667cebe605c8e52d80075529a8c1
                                    • Instruction ID: 2201ff6311b7bd07c2d5c1d8a1f62c6ad5e1d163e1fbacbfa95269d927f4f072
                                    • Opcode Fuzzy Hash: 7dd73d02d9c2fac171bbf6c11e4a9c9439ea667cebe605c8e52d80075529a8c1
                                    • Instruction Fuzzy Hash: 77111DB5D003049BDB10EFE5E946B9E7AB5AF84709F10403EE605BB2D2DB389504CB69
                                    APIs
                                    • WSAStartup.WS2_32(00000202,?), ref: 10001BCD
                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 10001BDB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateEventStartup
                                    • String ID: x$y
                                    • API String ID: 1546077022-2106771652
                                    • Opcode ID: 426ecb344f0b08d2cb45c40d3dedcf2a379ef812f491c83adadb1465f5656b9e
                                    • Instruction ID: c8a3d2ba0344312a6bce927157729c4d9ee91638349e8c3330d949956953cfd7
                                    • Opcode Fuzzy Hash: 426ecb344f0b08d2cb45c40d3dedcf2a379ef812f491c83adadb1465f5656b9e
                                    • Instruction Fuzzy Hash: 72116D341097809EE331CF28C945BD6BBE4EB1AB94F40891DE4DA877C5CBB96048CB63
                                    APIs
                                    • GetCPInfo.KERNEL32(000004E4,?), ref: 0040A5A7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Info
                                    • String ID: $z
                                    • API String ID: 1807457897-2251613814
                                    • Opcode ID: 8ea7662d8286fdfc1452980aff72eadbfd65cf4211e5c969f7c0a9973e679ef5
                                    • Instruction ID: e25080547dbd5d999750e601fd7b11c573f40e369b89516b4e4b9c3e18cf8790
                                    • Opcode Fuzzy Hash: 8ea7662d8286fdfc1452980aff72eadbfd65cf4211e5c969f7c0a9973e679ef5
                                    • Instruction Fuzzy Hash: B881B47494465CCBDB24CB54CC50BEBBB75AB48302F14C1EAD44967382C2365F96CF9A
                                    APIs
                                    • RtlAllocateHeap.NTDLL(006B0000,00000000,00000000), ref: 0040B286
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID: R`@
                                    • API String ID: 1279760036-2203585019
                                    • Opcode ID: ea0d65dc5ebfeac53a9caf7a64beb67daa6323502dbd79376e402a4a91830054
                                    • Instruction ID: aed69060c0eb56d7c6e8fcb121ea7dd52fadd965f7285890864e90ba9df31ae5
                                    • Opcode Fuzzy Hash: ea0d65dc5ebfeac53a9caf7a64beb67daa6323502dbd79376e402a4a91830054
                                    • Instruction Fuzzy Hash: D13170B1904248EBDB10DF58D849BAE3770EB01359F24827AF8156F2C1C379AA45CBCE
                                    APIs
                                    • _ftol.MSVCRT ref: 10001274
                                    • VirtualAlloc.KERNEL32(00000000,00000000,00001000,00000004,?,?,?,?,?,?,?,10005D0E,?,0000022C), ref: 10001288
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocVirtual_ftol
                                    • String ID:
                                    • API String ID: 2737540598-0
                                    • Opcode ID: cfc840a8b6786815519e745eefe0d9c00073eac5ba6829d38652545ea074e0ed
                                    • Instruction ID: 6908696e533b2aa954a8ce573bf45ff01ca13c428f3c73a91b775599d79457cc
                                    • Opcode Fuzzy Hash: cfc840a8b6786815519e745eefe0d9c00073eac5ba6829d38652545ea074e0ed
                                    • Instruction Fuzzy Hash: 881102357443048BE704EF29AC817AAB7E4EFD42A1F04843EFE09CB285DA75D818CA65
                                    APIs
                                    • send.WS2_32(?,00000003,00002000,00000000), ref: 100023CA
                                    • Sleep.KERNEL32(0000000A), ref: 100023F7
                                    • send.WS2_32(?,00000003,?,00000000), ref: 10002411
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: send$Sleep
                                    • String ID:
                                    • API String ID: 3329562092-0
                                    • Opcode ID: ac1a046c781eb947e43fee74e26503661c97bf61f8be5c5cedc578b3cfb7a9db
                                    • Instruction ID: 4a9a241c68524aee76ec91de3a6fabbafdb6c0f762ad73af93a68b78635ad0cd
                                    • Opcode Fuzzy Hash: ac1a046c781eb947e43fee74e26503661c97bf61f8be5c5cedc578b3cfb7a9db
                                    • Instruction Fuzzy Hash: 40117C326043129BE314CF59CCC4B5FBBE8EB85B90F11092DF94596285D670DD4A8BA2
                                    APIs
                                    • CloseHandle.KERNEL32(?,10003B08,00000000,1F901F90,1000676D), ref: 1000455A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID: .Wu
                                    • API String ID: 2962429428-3424199868
                                    • Opcode ID: 3516c36fcb6986ea655a9ad33279f0a0e61dfbcd4ee5f32034a5f00f11764ef4
                                    • Instruction ID: 3745094fa8e85b9ac4cc01dd982d642109f166637319b05583a497fdafc83de2
                                    • Opcode Fuzzy Hash: 3516c36fcb6986ea655a9ad33279f0a0e61dfbcd4ee5f32034a5f00f11764ef4
                                    • Instruction Fuzzy Hash: 35B012704003088FDF00DF20C458C023B24EB023843188084E4448721BC3368402CA00
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalLeaveSection
                                    • String ID:
                                    • API String ID: 3988221542-0
                                    • Opcode ID: 2bee19067ff3c82a4c8288c50c1f98c969a423d989482c7a9c3ae6ee972f33bf
                                    • Instruction ID: e6e9b2471936f98a2a0985a6b24402172fa604f0918a7ba489a8f63e118d382f
                                    • Opcode Fuzzy Hash: 2bee19067ff3c82a4c8288c50c1f98c969a423d989482c7a9c3ae6ee972f33bf
                                    • Instruction Fuzzy Hash: 5EA17E70D04204DBDB04DF94D9446EDBBF1BF48308F2884BAD446BB382D23A9A65DB5B
                                    APIs
                                    • LoadLibraryA.KERNEL32(00000000), ref: 00401FB0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: 188172162600be29632338a5308ac4ad1829ebda56a93be96e69ddcf1fb249ce
                                    • Instruction ID: c5dc83629bcdb0a0f5ac40e06384724b92d9a083beba33d1b2d3cea22322ab14
                                    • Opcode Fuzzy Hash: 188172162600be29632338a5308ac4ad1829ebda56a93be96e69ddcf1fb249ce
                                    • Instruction Fuzzy Hash: 0DF0E274D00649CBDB10DF95CA886AEB7B5FB44319F20822AD615BB2A0C378AD42CF14
                                    APIs
                                    • KiUserExceptionDispatcher.NTDLL(?,?,00410070,?,?,?,?,?,0040105E,0000002D,00410070), ref: 00402EA3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: DispatcherExceptionUser
                                    • String ID:
                                    • API String ID: 6842923-0
                                    • Opcode ID: 504c3df098ef20354e4df235f4c1b1e352f87f6bea0b8b9abae6d1421e38f675
                                    • Instruction ID: 0e5cd092de92c1dc5847f928907223a595e81f3d2a0c8ac990d0af89312a6172
                                    • Opcode Fuzzy Hash: 504c3df098ef20354e4df235f4c1b1e352f87f6bea0b8b9abae6d1421e38f675
                                    • Instruction Fuzzy Hash: 38F0AC76D00118ABCB14DF99D8409EEB7B9FB8D310F00856AE919B7640D6746909DBA4
                                    APIs
                                    • VirtualFree.KERNELBASE(?,00000000,00008000,?,10002247,?,?,?,?,?,10005D0E,?,0000022C), ref: 100013F2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FreeVirtual
                                    • String ID:
                                    • API String ID: 1263568516-0
                                    • Opcode ID: 14ab1d68f21f23075cf7b2e2abad107260decba5c574609cacbbda05bdbf7880
                                    • Instruction ID: 7d0e7bcbdbd1ae8c3abe6f2ee10f44ff9d79e60c744fc710ad2ad4863104cedd
                                    • Opcode Fuzzy Hash: 14ab1d68f21f23075cf7b2e2abad107260decba5c574609cacbbda05bdbf7880
                                    • Instruction Fuzzy Hash: 91D0C970644B119BF7708F15EC48B8377E8AB04B54F11C85DE4AA9BAC4CBB8E8488F94
                                    APIs
                                    • GetInputState.USER32 ref: 10007209
                                    • GetCurrentThreadId.KERNEL32 ref: 10007214
                                    • PostThreadMessageA.USER32(00000000), ref: 1000721B
                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 1000722C
                                    • OutputDebugStringA.KERNEL32(Dele_fs), ref: 1000723F
                                      • Part of subcall function 10007120: LoadLibraryA.KERNEL32(Kernel32.dll,?,?,00000000), ref: 10007138
                                      • Part of subcall function 10007120: OutputDebugStringA.KERNEL32(Loaddll error), ref: 1000714B
                                    • GetCurrentProcessId.KERNEL32 ref: 1000724C
                                      • Part of subcall function 10007070: LoadLibraryA.KERNEL32(Kernel32.dll,?,00000000,00000000), ref: 10007088
                                      • Part of subcall function 10007070: GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 10007094
                                      • Part of subcall function 10007070: OutputDebugStringA.KERNEL32(GetProc error), ref: 100070A6
                                    • ExitProcess.KERNEL32 ref: 10007267
                                    • GetVersionExA.KERNEL32 ref: 10007286
                                    • GetVersionExA.KERNEL32(?), ref: 100072CB
                                    • CreateThread.KERNEL32(00000000,00000000,Function_00006DC0,00000000,00000000,00000000), ref: 10007300
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 1000731E
                                    • CloseHandle.KERNEL32(00000000), ref: 10007325
                                    • Sleep.KERNEL32(000F4240), ref: 10007336
                                    • Sleep.KERNEL32 ref: 10007373
                                    • StartServiceCtrlDispatcherA.ADVAPI32(?), ref: 10007380
                                    • Sleep.KERNEL32(000003E8), ref: 10007387
                                    • StartServiceCtrlDispatcherA.ADVAPI32(?), ref: 1000738E
                                    • ExpandEnvironmentStringsA.KERNEL32(%ProgramFiles%\Microsoft Msmiou\,?,00000104), ref: 100073A7
                                    • wsprintfA.USER32 ref: 100073CA
                                    • GetModuleFileNameA.KERNEL32(00000000,?,000000E1), ref: 10007474
                                    • CopyFileA.KERNEL32(?,?,00000000), ref: 1000748B
                                    • Sleep.KERNEL32(000001F4,?,?,?,?,?,?,?,?,Aaegmai.exe), ref: 100074C6
                                    • ExitProcess.KERNEL32 ref: 100074D3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Sleep$DebugOutputProcessStringThread$CtrlCurrentDispatcherExitFileLibraryLoadMessageServiceStartVersion$AddressCloseCopyCreateEnvironmentExpandHandleInputModuleNameObjectPostProcSingleStateStringsWaitwsprintf
                                    • String ID: %$%ProgramFiles%\Microsoft Msmiou\$.exe$Aaegmai.exe$C$Default$Dele_fs$G$Mqgaku auegyyegeecmkimecg$Rsssqi yqeaiusa$Saukqc waqoaeiw$\$c$e$http://x.vay.cc/1.jpg$p$r$s$t$u$.Wu
                                    • API String ID: 81703965-427030306
                                    • Opcode ID: 1bc2ff75900ca4db3b8c891c4345d69501e1d3f43621e7ffb2d53e015f4afebc
                                    • Instruction ID: 88a1e9cc268378a1592cc313e96216eeba8de6f82b883423bac26bfb2869f79c
                                    • Opcode Fuzzy Hash: 1bc2ff75900ca4db3b8c891c4345d69501e1d3f43621e7ffb2d53e015f4afebc
                                    • Instruction Fuzzy Hash: 6DC104B1408348AFF314DB748C85EEF7B9CFB89384F040A1CF68556196DB789A058BA6
                                    APIs
                                    • LoadLibraryA.KERNEL32(kernel32.dll,HeapReAlloc), ref: 00401335
                                    • GetProcAddress.KERNEL32(00000000), ref: 0040133C
                                    • LoadLibraryA.KERNEL32(kernel32.dll,HeapAlloc), ref: 00401377
                                    • GetProcAddress.KERNEL32(00000000), ref: 0040137E
                                    • LoadLibraryA.KERNEL32(kernel32.dll,GetProcessHeap), ref: 004013D5
                                    • GetProcAddress.KERNEL32(00000000), ref: 004013DC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressLibraryLoadProc
                                    • String ID: .$2$3$A$A$E$E$G$GetProcessHeap$H$H$H$HeapAlloc$HeapReAlloc$K$L$N$P$R$R$a$a$a$c$c$c$d$e$e$e$e$e$e$kernel32.dll$kernel32.dll$kernel32.dll$l$l$l$l$l$l$o$o$o$p$p$p$r$s$s$t
                                    • API String ID: 2574300362-1412782267
                                    • Opcode ID: 024ed6269add65bb879169941b2fd0d3083ecbb0b3343712da361891da8eae23
                                    • Instruction ID: e3bfb5ed5b37cb8be8f4df4aa4d0fd607de3c52dbb5d6cf9c797f6be4d6cb49f
                                    • Opcode Fuzzy Hash: 024ed6269add65bb879169941b2fd0d3083ecbb0b3343712da361891da8eae23
                                    • Instruction Fuzzy Hash: 0551C760C082C8D9EB12D7E8D84C7DEBFB15F26709F084099E5847A292C7FE0559C77A
                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?,00000000), ref: 10007715
                                    • ExpandEnvironmentStringsA.KERNEL32(%ProgramFiles%\Microsoft Msmiou\,?,00000104), ref: 1000772C
                                    • strncmp.MSVCRT ref: 10007751
                                    • wsprintfA.USER32 ref: 10007799
                                    • CopyFileA.KERNEL32(?,?,00000000), ref: 10007841
                                    • SetFileAttributesA.KERNEL32(?,74680007), ref: 100078A0
                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 100078C6
                                    • CreateServiceA.ADVAPI32(00000000,?,?,000F01FF,00000110,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000), ref: 100078FF
                                    • LockServiceDatabase.ADVAPI32(00000000), ref: 1000790E
                                    • ChangeServiceConfig2A.ADVAPI32(00000000,00000001,Rsssqi yqeaiusa), ref: 1000792E
                                    • ChangeServiceConfig2A.ADVAPI32(00000000,00000002,00015180), ref: 100079B7
                                    • UnlockServiceDatabase.ADVAPI32(?), ref: 100079C4
                                    • GetLastError.KERNEL32 ref: 100079CE
                                    • OpenServiceA.ADVAPI32(00000000,?,000F01FF), ref: 100079E5
                                    • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 100079FE
                                    • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 10007A07
                                      • Part of subcall function 100063B0: _access.MSVCRT ref: 10006405
                                      • Part of subcall function 100063B0: CreateDirectoryA.KERNEL32(?,00000000), ref: 10006416
                                    • RegOpenKeyA.ADVAPI32(80000002,?,?), ref: 10007A7E
                                    • lstrlenA.KERNEL32(?), ref: 10007A88
                                    • RegSetValueExA.ADVAPI32(?,Description,00000000,00000001,?,00000000), ref: 10007AA0
                                      • Part of subcall function 10007AD9: CloseServiceHandle.ADVAPI32(00000000,10007ABA), ref: 10007ADE
                                      • Part of subcall function 10007AD9: CloseServiceHandle.ADVAPI32(00000000,10007ABA), ref: 10007AE9
                                      • Part of subcall function 10007AD9: RegCloseKey.ADVAPI32(?,10007ABA), ref: 10007AFA
                                      • Part of subcall function 10007AD9: Sleep.KERNEL32(000001F4,10007ABA), ref: 10007B05
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseFileOpen$ChangeConfig2CreateDatabaseHandleStart$AttributesCopyDirectoryEnvironmentErrorExpandLastLockManagerModuleNameSleepStringsUnlockValue_accesslstrlenstrncmpwsprintf
                                    • String ID: %$%ProgramFiles%\Microsoft Msmiou\$Aaegmai.exe$Description$Rsssqi yqeaiusa$SYSTEM\CurrentControlSet\Services\$\$s
                                    • API String ID: 3790363062-3995887331
                                    • Opcode ID: e4b3b6daffb285c63ad86877fa5addb509bdb35b6eeabc8bb2d963f4c62d2ca7
                                    • Instruction ID: 5c30ca6fcc712d38e342b9667786387558bda50c993f602cf64b20952b599d07
                                    • Opcode Fuzzy Hash: e4b3b6daffb285c63ad86877fa5addb509bdb35b6eeabc8bb2d963f4c62d2ca7
                                    • Instruction Fuzzy Hash: 71B196719002289BDB25CB649C85BDE7BB9FB49750F00429DF51A971C5CBB45F84CF90
                                    APIs
                                    • CreateFileA.KERNEL32 ref: 10001773
                                    • DeviceIoControl.KERNEL32(00000000,00090018,00000000,00000000,00000000,00000000,C0000000,00000000), ref: 1000179F
                                    • WriteFile.KERNEL32(00000000,?,00000200,00000003,00000000), ref: 100017B3
                                    • DeviceIoControl.KERNEL32(00000000,0009001C,00000000,00000000,00000000,00000000,C0000000,00000000), ref: 100017CE
                                    • CloseHandle.KERNEL32(00000000), ref: 100017D1
                                    • Sleep.KERNEL32(000007D0), ref: 100017DC
                                    • GetVersion.KERNEL32 ref: 100017E2
                                    • GetCurrentProcess.KERNEL32(00000028,00000003), ref: 100017F6
                                    • OpenProcessToken.ADVAPI32(00000000), ref: 100017FD
                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 1000180F
                                    • AdjustTokenPrivileges.ADVAPI32(00000003,00000000,DLAC,00000000,00000000,00000000), ref: 10001837
                                    • ExitWindowsEx.USER32(00000006,00000000), ref: 10001841
                                    • exit.MSVCRT ref: 10001849
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ControlDeviceFileProcessToken$AdjustCloseCreateCurrentExitHandleLookupOpenPrivilegePrivilegesSleepValueVersionWindowsWriteexit
                                    • String ID: .$0$A$C$DLAC$E$H$L$P$S$SeShutdownPrivilege$U$Y$.Wu
                                    • API String ID: 1264138919-3908245136
                                    • Opcode ID: 6fa703d6b52aeb68faa550979059f33683fa09f48bfe30dd443d6114e9b7918c
                                    • Instruction ID: ecba3bd938ea97beba5de9f3e4b012c150556fb508d925a7fd554e55ce58fae3
                                    • Opcode Fuzzy Hash: 6fa703d6b52aeb68faa550979059f33683fa09f48bfe30dd443d6114e9b7918c
                                    • Instruction Fuzzy Hash: C841713114C3C0AEF311DB648C49F9BBFE46B9A749F444A4CF3946A1D2C6B59608C76B
                                    APIs
                                    • Sleep.KERNEL32(000003E8), ref: 10003CEB
                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,00000002), ref: 10003CF7
                                    • OpenServiceA.ADVAPI32(00000000,Rsssqi yqeaiusa,000F01FF), ref: 10003D08
                                    • DeleteService.ADVAPI32(00000000), ref: 10003D0F
                                    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 10003D1F
                                    • lstrcatA.KERNEL32 ref: 10003D70
                                    • DeleteFileA.KERNEL32(.a\), ref: 10003D7B
                                      • Part of subcall function 10003B60: GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 10003B77
                                      • Part of subcall function 10003B60: GetShortPathNameA.KERNEL32(?,?,00000104), ref: 10003B94
                                      • Part of subcall function 10003B60: GetEnvironmentVariableA.KERNEL32(COMSPEC,?,00000104), ref: 10003BB4
                                      • Part of subcall function 10003B60: lstrcpyA.KERNEL32(?, /c del ), ref: 10003BCF
                                      • Part of subcall function 10003B60: lstrcatA.KERNEL32(?,?), ref: 10003BE8
                                      • Part of subcall function 10003B60: lstrcatA.KERNEL32(?, > nul), ref: 10003BF7
                                      • Part of subcall function 10003B60: lstrcatA.KERNEL32(?,?), ref: 10003C09
                                      • Part of subcall function 10003B60: GetCurrentProcess.KERNEL32 ref: 10003C4A
                                      • Part of subcall function 10003B60: SetPriorityClass.KERNEL32(00000000), ref: 10003C53
                                      • Part of subcall function 10003B60: GetCurrentThread.KERNEL32 ref: 10003C5D
                                      • Part of subcall function 10003B60: SetThreadPriority.KERNEL32(00000000), ref: 10003C66
                                      • Part of subcall function 10003B60: CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,0000000C,00000000,00000000,?,?), ref: 10003C88
                                      • Part of subcall function 10003B60: SetPriorityClass.KERNEL32(?,00000040), ref: 10003C99
                                      • Part of subcall function 10003B60: SetThreadPriority.KERNEL32(00000100,000000F1), ref: 10003CA2
                                      • Part of subcall function 10003B60: ResumeThread.KERNEL32(00000100), ref: 10003CA9
                                    • exit.MSVCRT ref: 10003D88
                                    • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004,Function_000039F0,?,00000000,00000000,00000000), ref: 10003DCA
                                    • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004,Function_00002AC0,00000000,00000000,00000000,00000001,?,00000000,00000000,00000000), ref: 10003E10
                                    • Sleep.KERNEL32(0000000A,?,?,?,?,?,?,?,?,?,?,?,Function_00002A10,00000000,00000000,00000000), ref: 10003E92
                                    • Sleep.KERNEL32(00000064), ref: 10003F29
                                    • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004), ref: 10004032
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: PriorityThreadlstrcat$AllocSleepVirtual$ClassCurrentDeleteFileNameOpenProcessService$CreateDirectoryEnvironmentManagerModulePathResumeShortSystemVariableexitlstrcpy
                                    • String ID: .a\$D$Rsssqi yqeaiusa$\$a$f$l$t$u$y
                                    • API String ID: 3590732025-988682999
                                    • Opcode ID: 61c3a47928d235452a5fd8c6fa91931a4892519e0c0b6017ea361fd58e430c63
                                    • Instruction ID: b244be189efcdeb6cc92b075c93be6bdaf1c08e27fc697086f98e0db2580f7bf
                                    • Opcode Fuzzy Hash: 61c3a47928d235452a5fd8c6fa91931a4892519e0c0b6017ea361fd58e430c63
                                    • Instruction Fuzzy Hash: 6AB14536344304ABF710DB54EC82FABBB58EB95796F04803AFB459E1CADBB360148761
                                    APIs
                                    • SetupDiGetClassDevsA.SETUPAPI(00000000,PCI,00000000,00000006), ref: 10001886
                                    • SetupDiEnumDeviceInfo.SETUPAPI ref: 100018B8
                                    • SetupDiGetDeviceRegistryPropertyA.SETUPAPI(00000000,?,00000008,00000000,?,00000064,?), ref: 10001908
                                    • GetLastError.KERNEL32 ref: 1000190E
                                    • GetLastError.KERNEL32 ref: 10001910
                                    • GetLastError.KERNEL32 ref: 10001917
                                    • LocalFree.KERNEL32(00000000), ref: 1000192F
                                    • SetupDiGetDeviceRegistryPropertyA.SETUPAPI(00000000,?,00000008,?,?,?,?), ref: 10001951
                                    • GetLastError.KERNEL32 ref: 10001957
                                    • _strcmpi.MSVCRT ref: 10001970
                                    • SetupDiSetClassInstallParamsA.SETUPAPI ref: 100019AA
                                    • GetLastError.KERNEL32 ref: 100019B4
                                    • SetupDiCallClassInstaller.SETUPAPI(00000012,00000000,?), ref: 100019BE
                                    • GetLastError.KERNEL32 ref: 100019C8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLastSetup$ClassDevice$PropertyRegistry$CallDevsEnumFreeInfoInstallInstallerLocalParams_strcmpi
                                    • String ID: PCI$d${4D36E972-E325-11CE-BFC1-08002BE10318}
                                    • API String ID: 3489100548-713369733
                                    • Opcode ID: 7005b48a16ad0ebacf396c7ca7f1c3da0a9b2f8559a61461d0719d8e286a00a0
                                    • Instruction ID: 2b17c4ba8dad4854c59fb3ea2eab905c43b9bc95da52602cb632f4d8605aef69
                                    • Opcode Fuzzy Hash: 7005b48a16ad0ebacf396c7ca7f1c3da0a9b2f8559a61461d0719d8e286a00a0
                                    • Instruction Fuzzy Hash: 93414E71104359ABF300DBA4CC95FEBB7E8FF85784F40491DFA8596184E7B4D9088B62
                                    APIs
                                    • LoadLibraryA.KERNEL32(userenv.dll), ref: 10006892
                                    • GetProcAddress.KERNEL32(00000000,CreateEnvironmentBlock), ref: 1000689C
                                    • GetCurrentProcess.KERNEL32 ref: 100068F5
                                    • OpenProcessToken.ADVAPI32(00000000,000F01FF,?), ref: 10006906
                                    • DuplicateTokenEx.ADVAPI32(?,02000000,00000000,00000001,00000001,?), ref: 10006920
                                    • LoadLibraryA.KERNEL32(Kernel32.dll,WTSGetActiveConsoleSessionId), ref: 10006930
                                    • GetProcAddress.KERNEL32(00000000), ref: 10006933
                                    • SetTokenInformation.ADVAPI32(?,0000000C,?,00000004), ref: 10006951
                                    • CreateProcessAsUserA.ADVAPI32(?,00000000,?,00000000,00000000,00000000,00000430,?,00000000,00000044,?), ref: 1000698C
                                    • CloseHandle.KERNEL32(?), ref: 100069A1
                                    • CloseHandle.KERNEL32(?), ref: 100069A8
                                    • FreeLibrary.KERNEL32(00000000), ref: 100069B3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: LibraryProcessToken$AddressCloseHandleLoadProc$CreateCurrentDuplicateFreeInformationOpenUser
                                    • String ID: CreateEnvironmentBlock$D$Kernel32.dll$WTSGetActiveConsoleSessionId$userenv.dll
                                    • API String ID: 1797627335-609967149
                                    • Opcode ID: 28db3a70bec168a2f067cef202fe6c884769c6fdfd67d7c63dd3e7b957af29b4
                                    • Instruction ID: 6c8faf9185daa6d3cb4a3ef148a5aecad5bd36bfe1131a22130b012f6e80a81c
                                    • Opcode Fuzzy Hash: 28db3a70bec168a2f067cef202fe6c884769c6fdfd67d7c63dd3e7b957af29b4
                                    • Instruction Fuzzy Hash: 4F3115B1518315AFE600DF65CC88E5BBBE8FBC8B44F004A0EF68993254D770D909CBA2
                                    APIs
                                    • SHGetSpecialFolderPathA.SHELL32(00000000,?,0000001A,00000000), ref: 10001593
                                    • FindFirstFileA.KERNEL32(?,?), ref: 1000161D
                                    • FindNextFileA.KERNEL32(00000000,?), ref: 10001631
                                    • FindNextFileA.KERNEL32(00000000,?), ref: 1000163B
                                    • FindNextFileA.KERNEL32(00000000,00000010), ref: 100016B6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileFind$Next$FirstFolderPathSpecial
                                    • String ID: \Tencent\Users\*.*
                                    • API String ID: 2928578574-2867266411
                                    • Opcode ID: 574d862e1081ecde5ac50e721bfd1d19110dbe5ec7564eae71b279cea5334adc
                                    • Instruction ID: 393567bf372bf7f76afcdd7d334bc6448685448c28d66662a974c839ba3671ae
                                    • Opcode Fuzzy Hash: 574d862e1081ecde5ac50e721bfd1d19110dbe5ec7564eae71b279cea5334adc
                                    • Instruction Fuzzy Hash: 9641E6322047485BD328C6788C557EB77D5FBC4361F450B2EFA67972D4DEF499088241
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Event
                                    • String ID:
                                    • API String ID: 4201588131-0
                                    • Opcode ID: 72a9966f78db4782842ee1ddd4924beea740902d761926a3ec385324d09e37ad
                                    • Instruction ID: f499b291814b811c83a97806797d7be1ec9ba0a1496daf92aab79aef3217052a
                                    • Opcode Fuzzy Hash: 72a9966f78db4782842ee1ddd4924beea740902d761926a3ec385324d09e37ad
                                    • Instruction Fuzzy Hash: 33117B393042155FF304E7F89C89AAA77C8DB866E2F10422AF187C31CACE608C458372
                                    APIs
                                      • Part of subcall function 10008760: LoadLibraryA.KERNEL32(ADVAPI32.dll,00000000,?,00000000), ref: 100087AE
                                      • Part of subcall function 10008760: GetProcAddress.KERNEL32(00000000,RegQueryValueExA), ref: 100087C8
                                      • Part of subcall function 10008760: GetProcAddress.KERNEL32(00000000,RegOpenKeyExA), ref: 100087D2
                                      • Part of subcall function 10008760: GetProcAddress.KERNEL32(00000000,RegEnumValueA), ref: 100087DD
                                      • Part of subcall function 10008760: GetProcAddress.KERNEL32(00000000,RegEnumKeyExA), ref: 100087E5
                                      • Part of subcall function 10008760: GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 100087ED
                                      • Part of subcall function 10008760: RegOpenKeyExA.KERNEL32(75571760,?,00000000,00020019,?), ref: 10008812
                                      • Part of subcall function 10008760: FreeLibrary.KERNEL32(00000000), ref: 1000899B
                                    • lstrlenA.KERNEL32(?), ref: 1000361B
                                    • strstr.MSVCRT ref: 1000362F
                                    • lstrcpyA.KERNEL32(00000000,?), ref: 1000363E
                                    • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 1000369A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$Library$CreateFreeLoadOpenProcesslstrcpylstrlenstrstr
                                    • String ID: Applications\iexplore.exe\shell\open\command$D
                                    • API String ID: 3176674629-535818822
                                    • Opcode ID: 666f1638132c99918fb24f8d193807154dbbcf2b7eff2c9ee9c26017fb28e5ab
                                    • Instruction ID: 3c7c75f77b2c05db0d19b1f3ba4dd3d011b93e8e2404cc49e21dea0be2637339
                                    • Opcode Fuzzy Hash: 666f1638132c99918fb24f8d193807154dbbcf2b7eff2c9ee9c26017fb28e5ab
                                    • Instruction Fuzzy Hash: F9218E71114700AAF750CB64CC45BEBB7ECEB84381F40891CBA55A62D4EBB6E5448B62
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: $ $
                                    • API String ID: 0-3665324030
                                    • Opcode ID: ddffb5defa1e59829f3234e8e1589640ab1fcdbe4b706babe3f04c33649a3e3a
                                    • Instruction ID: 3530f8b7d0a1b963a0034aff1d8e652a030b7b762c5cfea18934d513d3907353
                                    • Opcode Fuzzy Hash: ddffb5defa1e59829f3234e8e1589640ab1fcdbe4b706babe3f04c33649a3e3a
                                    • Instruction Fuzzy Hash: 2922F779E012099FCB08CF98D590AADBBF2BF88314F24C1A9E815AB356C735E941CF55
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 319ef1e59eca53be3e16f270085130441ae959a47dd33c77f14fc1b27aa0896c
                                    • Instruction ID: 8d2c18ba67f0487f6209aecac05d75a0c4e551dea5673684c326ec8ff49ac4f0
                                    • Opcode Fuzzy Hash: 319ef1e59eca53be3e16f270085130441ae959a47dd33c77f14fc1b27aa0896c
                                    • Instruction Fuzzy Hash: B841E4F27053056FE704DF68AC81B67B3D8FB84295F16412AFA05C7686EFB1E81487A4
                                    APIs
                                    • OpenClipboard.USER32(00000000), ref: 100014C8
                                    • GetClipboardData.USER32(00000001), ref: 100014DA
                                    • GlobalLock.KERNEL32(00000000), ref: 100014E3
                                    • GlobalUnlock.KERNEL32(00000000), ref: 1000154C
                                    • CloseClipboard.USER32 ref: 10001552
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Clipboard$Global$CloseDataLockOpenUnlock
                                    • String ID:
                                    • API String ID: 1006321803-0
                                    • Opcode ID: b69ab7b4f17cff2844c24c881cc7e6a000170ef6716410263ea5647b65c9d92c
                                    • Instruction ID: 8307db010902a887664cff108ee7aa31ae3e0e3fff18e3d430beacd02437c1e7
                                    • Opcode Fuzzy Hash: b69ab7b4f17cff2844c24c881cc7e6a000170ef6716410263ea5647b65c9d92c
                                    • Instruction Fuzzy Hash: 2211C678604761ABF318DB348C8899A3BE0EBC93A1F10861DF855832E5EBB4D90487A5
                                    APIs
                                    • OpenEventLogA.ADVAPI32(00000000), ref: 10002E9D
                                    • ClearEventLogA.ADVAPI32(00000000,00000000), ref: 10002EA8
                                    • CloseEventLog.ADVAPI32(00000000), ref: 10002EAB
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Event$ClearCloseOpen
                                    • String ID:
                                    • API String ID: 1391105993-0
                                    • Opcode ID: b70ffc2c62dc2dec69516cf1bd47191b730bf8ea45cfc114df946b0144b177a7
                                    • Instruction ID: 07f93a36fd5fe316aff954bb92eca92d8bf612cadc73f9ea17d1e091f2a11fdd
                                    • Opcode Fuzzy Hash: b70ffc2c62dc2dec69516cf1bd47191b730bf8ea45cfc114df946b0144b177a7
                                    • Instruction Fuzzy Hash: 5A115EB1548395AFE310CF18C880A5FBBE4FB89790F50892DF988CB214D339D944CB66
                                    APIs
                                      • Part of subcall function 10008390: LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,10002DAC,SeShutdownPrivilege,00000001), ref: 100083A7
                                      • Part of subcall function 10008390: GetProcAddress.KERNEL32(00000000,OpenProcessToken), ref: 100083B7
                                      • Part of subcall function 10008390: GetProcAddress.KERNEL32(00000000,AdjustTokenPrivileges), ref: 100083C1
                                      • Part of subcall function 10008390: GetProcAddress.KERNEL32(00000000,LookupPrivilegeValueA), ref: 100083CD
                                      • Part of subcall function 10008390: LoadLibraryA.KERNEL32(kernel32.dll,?,?,?,?,?,?,?,?,?,?,?,?,?,10002DAC,SeShutdownPrivilege), ref: 100083D8
                                      • Part of subcall function 10008390: GetProcAddress.KERNEL32(00000000,GetCurrentProcess), ref: 100083E4
                                    • ExitWindowsEx.USER32(?,00000000), ref: 10002DB6
                                      • Part of subcall function 10008390: LoadLibraryA.KERNEL32(KERNEL32.dll), ref: 10008440
                                      • Part of subcall function 10008390: GetProcAddress.KERNEL32(00000000,GetLastError), ref: 10008448
                                      • Part of subcall function 10008390: CloseHandle.KERNEL32(?), ref: 1000845A
                                      • Part of subcall function 10008390: FreeLibrary.KERNEL32(00000000), ref: 1000846B
                                      • Part of subcall function 10008390: FreeLibrary.KERNEL32(?), ref: 10008476
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressLibraryProc$Load$Free$CloseExitHandleWindows
                                    • String ID: SeShutdownPrivilege
                                    • API String ID: 3789203340-3733053543
                                    • Opcode ID: 7a58245bb5eff222f8108f6104cad989a67e4da206da56029bee0577b97d090e
                                    • Instruction ID: 83f9ef3de106cdeeb747a248e5f0f3247bd8612a5196f129aec919e7817163a2
                                    • Opcode Fuzzy Hash: 7a58245bb5eff222f8108f6104cad989a67e4da206da56029bee0577b97d090e
                                    • Instruction Fuzzy Hash: 23C012349506002AF91493A45C47F893250BB84A81F400540F7D46D1C5D5F1B3984266
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: $
                                    • API String ID: 0-227171996
                                    • Opcode ID: 3a9c2d31f389efb7f264c21c275e64e0ffe3238d54e5f2972f9c7b4b81ca4b42
                                    • Instruction ID: a66656210b83fd0df57e8b558d00acce7a5cd6fe2d80571edcf340883a0670cb
                                    • Opcode Fuzzy Hash: 3a9c2d31f389efb7f264c21c275e64e0ffe3238d54e5f2972f9c7b4b81ca4b42
                                    • Instruction Fuzzy Hash: 9F61A1B56087458BE754CF18D88032ABBE1FBC6390F508A2EE895CB349D7B5D945CB82
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: @
                                    • API String ID: 0-2766056989
                                    • Opcode ID: f4bf2680ef3248429d39c3b8066eb94c847ce6e0231793368804ed1634a09217
                                    • Instruction ID: 13f9ebc2374390c495546a099d653296fd997bac0217c3e36fb0d9ef46117357
                                    • Opcode Fuzzy Hash: f4bf2680ef3248429d39c3b8066eb94c847ce6e0231793368804ed1634a09217
                                    • Instruction Fuzzy Hash: 63D18B716083828FE724CF28C4906AFB7E1FFC9380F654A2DE88597354D7759986CB82
                                    APIs
                                    • SetUnhandledExceptionFilter.KERNEL32(Function_000046E0), ref: 00404748
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExceptionFilterUnhandled
                                    • String ID:
                                    • API String ID: 3192549508-0
                                    • Opcode ID: 3306b3174313b55bf8be29f039b9ddbaac2ac983cf4e6601462b486b8aa1252c
                                    • Instruction ID: e56077977efb1732e8bec96efd377264990ebaf83d5f5d42c289fe92ea7d206e
                                    • Opcode Fuzzy Hash: 3306b3174313b55bf8be29f039b9ddbaac2ac983cf4e6601462b486b8aa1252c
                                    • Instruction Fuzzy Hash: 7AB01274444308ABD610BFE7BC054057B9CD942A513104033E90992652E9F66004C96E
                                    APIs
                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00404769
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExceptionFilterUnhandled
                                    • String ID:
                                    • API String ID: 3192549508-0
                                    • Opcode ID: 6963baa75a27ebb195acaf6b01503b7126bd8a997433f31c9fc9f9307439e5b1
                                    • Instruction ID: 85756d268d16d83a847e015f8d150b6bd15ce2b1526d02d400bfa6abffa5d8bd
                                    • Opcode Fuzzy Hash: 6963baa75a27ebb195acaf6b01503b7126bd8a997433f31c9fc9f9307439e5b1
                                    • Instruction Fuzzy Hash: E4B01231400348D7C510B7ECBC08842739C9B089013004030B109C3513CAB0F400C669
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: "
                                    • API String ID: 0-123907689
                                    • Opcode ID: 54c5e86aec0f2748e05579c184993dcbf9dbf0596ea3bff60650ea41aacc1006
                                    • Instruction ID: 388db6d1f01a0f7db8352f7145bd4645a94910a9a349946d4481ec59318e247a
                                    • Opcode Fuzzy Hash: 54c5e86aec0f2748e05579c184993dcbf9dbf0596ea3bff60650ea41aacc1006
                                    • Instruction Fuzzy Hash: F231E775D00209DBCB04CF98C981BAEFBB1FF49314F24922AE515BB380D338A941CB99
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 29f5d243be617eb6698dd051341d873243d397d5d56500ed40f776a4dea7b810
                                    • Instruction ID: 08e5a79b20f77a293d72b4dd4a5b0ab38bcdc72d282846e0d439398825a31733
                                    • Opcode Fuzzy Hash: 29f5d243be617eb6698dd051341d873243d397d5d56500ed40f776a4dea7b810
                                    • Instruction Fuzzy Hash: BC726D716087428FDB58DF18C89066AB7E2FFC9340F144A6DE896CB349E774D985CB82
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9709bcbb5a1bad45d3bab01697a71c48898f17f490beb2bea85d9ccf3f9f9657
                                    • Instruction ID: 250c5ea3547accfd089bfcc3fe628247e14d1ee97697f6cae587cc5f5f07bd0f
                                    • Opcode Fuzzy Hash: 9709bcbb5a1bad45d3bab01697a71c48898f17f490beb2bea85d9ccf3f9f9657
                                    • Instruction Fuzzy Hash: 20528F706047418FEB48CF19C880B6ABBE1FFC5380F114A6DE8858B34AD771E945CB92
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3bb5d4079a9ed0d26703fe803cf78960c33ac773f335689581c61450468df882
                                    • Instruction ID: 901090ba863dcf6a7da9903f4275f9156b72296b619cd34df61bfda641677d1a
                                    • Opcode Fuzzy Hash: 3bb5d4079a9ed0d26703fe803cf78960c33ac773f335689581c61450468df882
                                    • Instruction Fuzzy Hash: 63F17D316083868FD708DF2CC89066ABBE1EF8A384F154A7DE9D6C7342D675D885CB46
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: dca000b2f6927503bda9435cdfa2d38ec8c2434b44ad82a88198043659fe7c76
                                    • Instruction ID: 8f57e891ba8db73c944690b8d0185df232bac97677883d55374a267a0d41c5eb
                                    • Opcode Fuzzy Hash: dca000b2f6927503bda9435cdfa2d38ec8c2434b44ad82a88198043659fe7c76
                                    • Instruction Fuzzy Hash: D6717233755A8207F71CCE3E8C602BAABD38FC925472EC87E94DAC7746EC69D4165204
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 75e51c949339fc18b029399bf83d93c29fbcbd76fb2ccc872c93cae2b815755d
                                    • Instruction ID: d8a5d6a4d46c8641a611cc0348d87d8b0695ff799a5e3dd4007f4c57e3acc660
                                    • Opcode Fuzzy Hash: 75e51c949339fc18b029399bf83d93c29fbcbd76fb2ccc872c93cae2b815755d
                                    • Instruction Fuzzy Hash: 86A1E775A0414DDFCB08CFA8C595AEEBBB2FF88314F14C299D956AB345D730AA41CB84
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c85ce8d0ef776024ddb259d9a2a5fcac40c2af7a67b56185cc24cd593861807f
                                    • Instruction ID: bca32d7d635a6743aa564981c353ed3202441003e5e76482013228cc6dd9a8c3
                                    • Opcode Fuzzy Hash: c85ce8d0ef776024ddb259d9a2a5fcac40c2af7a67b56185cc24cd593861807f
                                    • Instruction Fuzzy Hash: 3581B9727185524BF719DF29DCD052F77E3EBCD380B19863EC6858735AE930A8198B90
                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 10006E7F
                                      • Part of subcall function 100067E0: GetTickCount.KERNEL32 ref: 100067E1
                                      • Part of subcall function 100067E0: rand.MSVCRT ref: 100067E9
                                    • wsprintfA.USER32 ref: 10006F8E
                                    • RegOpenKeyExA.ADVAPI32(80000002,SOFT,00000000,00020006,?), ref: 10006FAB
                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 10006FC3
                                    • RegSetValueExA.ADVAPI32(?,?,00000000,00000001,?,00000000), ref: 10006FD9
                                    • Sleep.KERNEL32(00000000), ref: 10006FE9
                                    • printf.MSVCRT ref: 10006FF5
                                    • Sleep.KERNEL32(00000000), ref: 10007000
                                    • RegCloseKey.ADVAPI32(?), ref: 10007006
                                    • Sleep.KERNEL32(00000000), ref: 10007013
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Sleep$FileModuleName$CloseCountOpenTickValueprintfrandwsprintf
                                    • String ID: %c%c%c%c%c%c$A$C$E$M$R$R$SOFT$V$c$d$e$e$f$i$i$i$s$s$s$sssssss894sa8d9748asf48a74fs9898g$t$t$u$u$w
                                    • API String ID: 1608177436-3228888539
                                    • Opcode ID: 6201ad9aa8d7dc043c6790680b903a2137fa2258fe65d183e6588477d92159e3
                                    • Instruction ID: 4ee3ec84b17b1c5dcf399050531c59c277722f6681821ca1fdc42a60e278d094
                                    • Opcode Fuzzy Hash: 6201ad9aa8d7dc043c6790680b903a2137fa2258fe65d183e6588477d92159e3
                                    • Instruction Fuzzy Hash: 7F5171A1D0D2CCEDFB01C7E89C45BEEBF755F26348F084099E5447A282D2AA5618C776
                                    APIs
                                    • LoadLibraryA.KERNEL32(kernel32.dll,VirtualAlloc), ref: 00401931
                                    • GetProcAddress.KERNEL32(00000000), ref: 00401938
                                      • Part of subcall function 00402E70: KiUserExceptionDispatcher.NTDLL(?,?,00410070,?,?,?,?,?,0040105E,0000002D,00410070), ref: 00402EA3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressDispatcherExceptionLibraryLoadProcUser
                                    • String ID: .$2$3$A$E$E$K$L$N$PKE.$R$V$VirtualAlloc$a$c$d$i$kernel32.dll$l$l$l$l$l$o$r$t$u
                                    • API String ID: 1886913702-4028478765
                                    • Opcode ID: 4ef809b5726fb3139421dd50b0718fed76d7718ecafa033577060d2b1ce95e18
                                    • Instruction ID: b989b2ae7dfb34a7103c7879cfcc8143ecfb91dabf2696620dc30b45d3be86b1
                                    • Opcode Fuzzy Hash: 4ef809b5726fb3139421dd50b0718fed76d7718ecafa033577060d2b1ce95e18
                                    • Instruction Fuzzy Hash: FD314C70D082C8DAEB11CBA8D448BDDBFB1AB26708F140199E59477382C3BE4409C77A
                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 10003B77
                                    • GetShortPathNameA.KERNEL32(?,?,00000104), ref: 10003B94
                                    • GetEnvironmentVariableA.KERNEL32(COMSPEC,?,00000104), ref: 10003BB4
                                    • lstrcpyA.KERNEL32(?, /c del ), ref: 10003BCF
                                    • lstrcatA.KERNEL32(?,?), ref: 10003BE8
                                    • lstrcatA.KERNEL32(?, > nul), ref: 10003BF7
                                    • lstrcatA.KERNEL32(?,?), ref: 10003C09
                                    • GetCurrentProcess.KERNEL32 ref: 10003C4A
                                    • SetPriorityClass.KERNEL32(00000000), ref: 10003C53
                                    • GetCurrentThread.KERNEL32 ref: 10003C5D
                                    • SetThreadPriority.KERNEL32(00000000), ref: 10003C66
                                    • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,0000000C,00000000,00000000,?,?), ref: 10003C88
                                    • SetPriorityClass.KERNEL32(?,00000040), ref: 10003C99
                                    • SetThreadPriority.KERNEL32(00000100,000000F1), ref: 10003CA2
                                    • ResumeThread.KERNEL32(00000100), ref: 10003CA9
                                    • GetCurrentProcess.KERNEL32(00000020), ref: 10003CC1
                                    • SetPriorityClass.KERNEL32(00000000), ref: 10003CC4
                                    • GetCurrentThread.KERNEL32 ref: 10003CC8
                                    • SetThreadPriority.KERNEL32(00000000), ref: 10003CCB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: PriorityThread$Current$ClassProcesslstrcat$Name$CreateEnvironmentFileModulePathResumeShortVariablelstrcpy
                                    • String ID: /c del $ > nul$COMSPEC$D
                                    • API String ID: 3725893594-850586679
                                    • Opcode ID: 54fbc1f53e90734bf33b5bcde083400d5116cb4d044677edd240d241b6b10a04
                                    • Instruction ID: e7bdb26fbee75a5f6cd2c3611a9187368e1173e7e8cf91e5f688b2eed28bb1b1
                                    • Opcode Fuzzy Hash: 54fbc1f53e90734bf33b5bcde083400d5116cb4d044677edd240d241b6b10a04
                                    • Instruction Fuzzy Hash: 28414F71618318ABF714DBA0DC85FABB7ACFB84740F004A1DF645D6184DBB5E908CB62
                                    APIs
                                    • LoadLibraryA.KERNEL32(kernel32.dll,VirtualFree), ref: 00401AEA
                                    • GetProcAddress.KERNEL32(00000000), ref: 00401AF1
                                    • LoadLibraryA.KERNEL32(kernel32.dll,VirtualProtect), ref: 00401B45
                                    • GetProcAddress.KERNEL32(00000000), ref: 00401B4C
                                      • Part of subcall function 00402E70: KiUserExceptionDispatcher.NTDLL(?,?,00410070,?,?,?,?,?,0040105E,0000002D,00410070), ref: 00402EA3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressLibraryLoadProc$DispatcherExceptionUser
                                    • String ID: @$P$V$VirtualFree$VirtualProtect$a$c$e$i$kernel32.dll$kernel32.dll$l$o$r$r$t$t$t$u
                                    • API String ID: 109903041-3203620437
                                    • Opcode ID: 47935b526a153d22c9f38f43a766c04ef3fc6742b82a4ecc72367dd90494dbf6
                                    • Instruction ID: 8f8edad36a8844111e4ea6da53c9dfc8a874efb3bc9e7fb3566b758854e825f8
                                    • Opcode Fuzzy Hash: 47935b526a153d22c9f38f43a766c04ef3fc6742b82a4ecc72367dd90494dbf6
                                    • Instruction Fuzzy Hash: 84317170D48288DADB10CBA8C909BDEBFB5AB1A714F140169E944773D2C3BE5508C77A
                                    APIs
                                    • RegisterServiceCtrlHandlerA.ADVAPI32(Rsssqi yqeaiusa,10006B00), ref: 100069E2
                                    • SetServiceStatus.ADVAPI32(00000000,100139F0), ref: 10006A35
                                    • Sleep.KERNEL32(000001F4), ref: 10006A4C
                                    • GetVersionExA.KERNEL32(?), ref: 10006A5B
                                    • SetServiceStatus.ADVAPI32(00000000,100139F0), ref: 10006A7E
                                      • Part of subcall function 100067A0: WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,?,?,?,10007E87,?,?,?,?,?,?), ref: 100067BF
                                      • Part of subcall function 100067A0: CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,10007E87,?,?,?,?,?,?,?), ref: 100067C6
                                    • Sleep.KERNEL32(0000003C), ref: 10006A87
                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 10006A9A
                                    • wsprintfA.USER32 ref: 10006AB5
                                    • CloseHandle.KERNEL32(00000000), ref: 10006ACC
                                    • SetServiceStatus.ADVAPI32(00000000,100139F0), ref: 10006AE7
                                    • exit.MSVCRT ref: 10006AEB
                                    • SetServiceStatus.ADVAPI32(00000000,100139F0,756904E0), ref: 10006B5E
                                    • Sleep.KERNEL32(000001F4), ref: 10006B65
                                    • SetServiceStatus.ADVAPI32(00000000,100139F0), ref: 10006B8B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$Status$Sleep$CloseHandle$CtrlFileHandlerModuleNameObjectRegisterSingleVersionWaitexitwsprintf
                                    • String ID: %s Win7$Rsssqi yqeaiusa$.Wu
                                    • API String ID: 617891212-966947304
                                    • Opcode ID: 2ad54932797aafbc30b25fc021203933e186005e07ef1ac160e5349e1e025df4
                                    • Instruction ID: be7a7a9dc8521a97ca6a371e5d9d1867d4f57154c79d6d0d78abe06bd75d98c0
                                    • Opcode Fuzzy Hash: 2ad54932797aafbc30b25fc021203933e186005e07ef1ac160e5349e1e025df4
                                    • Instruction Fuzzy Hash: 1A51FBB1546365ABF304DF94CC8AF967FA8EB89744F00C618E248AB2A5C7F59084CF51
                                    APIs
                                    • LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,10002DAC,SeShutdownPrivilege,00000001), ref: 100083A7
                                    • GetProcAddress.KERNEL32(00000000,OpenProcessToken), ref: 100083B7
                                    • GetProcAddress.KERNEL32(00000000,AdjustTokenPrivileges), ref: 100083C1
                                    • GetProcAddress.KERNEL32(00000000,LookupPrivilegeValueA), ref: 100083CD
                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?,?,?,?,?,?,?,?,?,?,?,?,10002DAC,SeShutdownPrivilege), ref: 100083D8
                                    • GetProcAddress.KERNEL32(00000000,GetCurrentProcess), ref: 100083E4
                                    • LoadLibraryA.KERNEL32(KERNEL32.dll), ref: 10008440
                                    • GetProcAddress.KERNEL32(00000000,GetLastError), ref: 10008448
                                    • CloseHandle.KERNEL32(?), ref: 1000845A
                                    • FreeLibrary.KERNEL32(00000000), ref: 1000846B
                                    • FreeLibrary.KERNEL32(?), ref: 10008476
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressLibraryProc$Load$Free$CloseHandle
                                    • String ID: ADVAPI32.dll$AdjustTokenPrivileges$GetCurrentProcess$GetLastError$KERNEL32.dll$LookupPrivilegeValueA$OpenProcessToken$kernel32.dll$.Wu
                                    • API String ID: 2887716753-1297170231
                                    • Opcode ID: bc1d1333d400c750d1f9856437150adc5f43a741e5bf62c8d62a4a71a5088aef
                                    • Instruction ID: f301a40821df81d7dc462619c10b5cde91244197f9f0ec9ce5f72fdbc0275710
                                    • Opcode Fuzzy Hash: bc1d1333d400c750d1f9856437150adc5f43a741e5bf62c8d62a4a71a5088aef
                                    • Instruction Fuzzy Hash: C12194B16043056BE300DB75CC85F6FBBE8EFC8694F44491DF68497140DB75DA448BA6
                                    APIs
                                    • LoadLibraryA.KERNEL32(wininet.dll), ref: 100036D2
                                    • GetProcAddress.KERNEL32(00000000,InternetOpenA), ref: 100036E6
                                    • GetProcAddress.KERNEL32(00000000,InternetOpenUrlA), ref: 10003703
                                    • FreeLibrary.KERNEL32(00000000), ref: 10003728
                                    • CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000002,00000000,00000000), ref: 10003752
                                    • GetProcAddress.KERNEL32(00000000,InternetReadFile), ref: 10003774
                                    • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 100037B0
                                    • CloseHandle.KERNEL32(?), ref: 100037CA
                                    • Sleep.KERNEL32(00000001), ref: 100037D6
                                    • GetProcAddress.KERNEL32(00000000,InternetCloseHandle), ref: 100037E2
                                    • FreeLibrary.KERNEL32(00000000), ref: 100037F5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$Library$FileFree$CloseCreateHandleLoadSleepWrite
                                    • String ID: InternetCloseHandle$InternetOpenA$InternetOpenUrlA$InternetReadFile$MSIE 6.0$MZ$wininet.dll$.Wu
                                    • API String ID: 2977986460-3197645918
                                    • Opcode ID: 0bfaf2880d9a4a802b049c59113daa5498a9a5d02bbc2dfc40136576c0a0fc57
                                    • Instruction ID: 3666ced693ccb845996f430b1c3d1107c8a7800bd8690e7c3b5605d68986f6f5
                                    • Opcode Fuzzy Hash: 0bfaf2880d9a4a802b049c59113daa5498a9a5d02bbc2dfc40136576c0a0fc57
                                    • Instruction Fuzzy Hash: 0931C3B1208345ABF321DB65CC94FAFB7E8EFC9B90F10451DF64496180DB74E90987AA
                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 10006CAE
                                    • GetShortPathNameA.KERNEL32(?,?,00000104), ref: 10006CC3
                                    • GetEnvironmentVariableA.KERNEL32(COMSPEC,?,00000104), ref: 10006CDB
                                    • lstrcatA.KERNEL32(?,/c del ), ref: 10006CF4
                                    • lstrcatA.KERNEL32(?,?), ref: 10006D03
                                    • lstrcatA.KERNEL32(?, > nul), ref: 10006D12
                                    • ShellExecuteExA.SHELL32 ref: 10006D53
                                    • SetPriorityClass.KERNEL32(?,00000040), ref: 10006D6A
                                    • GetCurrentProcess.KERNEL32(00000100), ref: 10006D71
                                    • SetPriorityClass.KERNEL32(00000000), ref: 10006D78
                                    • GetCurrentThread.KERNEL32 ref: 10006D7C
                                    • SetThreadPriority.KERNEL32(00000000), ref: 10006D83
                                    • SHChangeNotify.SHELL32(00000004,00000001,?,00000000), ref: 10006D93
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Prioritylstrcat$ClassCurrentNameThread$ChangeEnvironmentExecuteFileModuleNotifyPathProcessShellShortVariable
                                    • String ID: > nul$/c del $<$@$COMSPEC
                                    • API String ID: 2091984646-3567428472
                                    • Opcode ID: 4e0f0f29ea395dbc5a403466097e4696b05239ee6d2b6a21f43b065a5371378d
                                    • Instruction ID: 258d5b7cc21e178090f30a69b78e91572c1f89f14ece20d994ae93f435e76a13
                                    • Opcode Fuzzy Hash: 4e0f0f29ea395dbc5a403466097e4696b05239ee6d2b6a21f43b065a5371378d
                                    • Instruction Fuzzy Hash: E8315CB1508349AFE710DB64CC84FDBBBA8FBC9394F00492DF78996190DA759508CBA2
                                    APIs
                                    • strrchr.MSVCRT ref: 10005FC9
                                    • RegOpenKeyExA.ADVAPI32(80000000,00000000,00000000,000F003F,?,?,00000000), ref: 10005FFB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Openstrrchr
                                    • String ID: "%1$%s\shell\open\command$D
                                    • API String ID: 1564636448-1634606264
                                    • Opcode ID: f8fadf5d45f201080859017d28aa8ca60d29a73c56c4841201857da525bb7b99
                                    • Instruction ID: 799b5bd3833e65ca799b9e2eb06c40be4e437a2eca7bc72d22d887cf82a183a3
                                    • Opcode Fuzzy Hash: f8fadf5d45f201080859017d28aa8ca60d29a73c56c4841201857da525bb7b99
                                    • Instruction Fuzzy Hash: 15418372204345ABE714CB60DC80FEBB7E9EBC4344F044D1DFA5497250EA75E549C7A2
                                    APIs
                                    • LoadLibraryA.KERNEL32(kernel32.dll,HeapFree), ref: 004011BC
                                    • GetProcAddress.KERNEL32(00000000), ref: 004011C3
                                    • LoadLibraryA.KERNEL32(KERNEL32.dll,GetProcessHeap), ref: 00401210
                                    • GetProcAddress.KERNEL32(00000000), ref: 00401217
                                      • Part of subcall function 00402E70: KiUserExceptionDispatcher.NTDLL(?,?,00410070,?,?,?,?,?,0040105E,0000002D,00410070), ref: 00402EA3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressLibraryLoadProc$DispatcherExceptionUser
                                    • String ID: F$GetProcessHeap$H$HeapFree$KERNEL32.dll$a$c$e$e$e$kernel32.dll$p$r
                                    • API String ID: 109903041-3689313246
                                    • Opcode ID: bb8c3953176cde90c5b35ca12f2989082ed73af47aa4abd779e29b0ead38e1a4
                                    • Instruction ID: 69c7d6370a8dd438e4874d72da0fe88dc6561b03f8dbd0dd4fbf006d741de7f5
                                    • Opcode Fuzzy Hash: bb8c3953176cde90c5b35ca12f2989082ed73af47aa4abd779e29b0ead38e1a4
                                    • Instruction Fuzzy Hash: F741F160D082C8D9EB12C7A8D9487DEBFB55B26719F180199E584762C2C7FF0618C7BA
                                    APIs
                                    • InterlockedIncrement.KERNEL32(0045D1D8), ref: 00409645
                                    • LoadLibraryA.KERNEL32(user32.dll), ref: 00409661
                                    • GetProcAddress.KERNEL32(00000000,wsprintfA), ref: 00409682
                                    • OutputDebugStringA.KERNEL32(?), ref: 004096C2
                                    • InterlockedDecrement.KERNEL32(0045D1D8), ref: 004096CD
                                    • InterlockedDecrement.KERNEL32(0045D1D8), ref: 0040983B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Interlocked$Decrement$AddressDebugIncrementLibraryLoadOutputProcString
                                    • String ID: %s(%d) : %s$R:$Second Chance Assertion Failed: File %s, Line %d$_CrtDbgReport: String too long or IO Error$user32.dll$wsprintfA
                                    • API String ID: 1024810826-2213716946
                                    • Opcode ID: ac30aebc00a2b65d6ffe6751ad345a08069c68c6f6ece29ed597163b867a85a3
                                    • Instruction ID: bf86a47b5444c72da6d17ff0f440cdf0d0983f1ba59a11e2de5bbafff5f8e696
                                    • Opcode Fuzzy Hash: ac30aebc00a2b65d6ffe6751ad345a08069c68c6f6ece29ed597163b867a85a3
                                    • Instruction Fuzzy Hash: E081BF76910304EBDB24DF54DC95BEA3378AF48305F1485BAF809A62C2D7789E88CF59
                                    APIs
                                    • LoadLibraryA.KERNEL32(user32.dll,00000000,00000000,00000000), ref: 100081E1
                                    • GetProcAddress.KERNEL32(00000000,GetThreadDesktop), ref: 100081F4
                                    • GetProcAddress.KERNEL32(00000000,GetUserObjectInformationA), ref: 100081FF
                                    • GetProcAddress.KERNEL32(00000000,SetThreadDesktop), ref: 1000820A
                                    • GetProcAddress.KERNEL32(00000000,CloseDesktop), ref: 10008218
                                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 10008222
                                    • GetProcAddress.KERNEL32(00000000,GetCurrentThreadId), ref: 1000822F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$LibraryLoad
                                    • String ID: CloseDesktop$GetCurrentThreadId$GetThreadDesktop$GetUserObjectInformationA$SetThreadDesktop$kernel32.dll$user32.dll
                                    • API String ID: 2238633743-588083535
                                    • Opcode ID: 29abb12e586fa040ba1daad7168e19b3db925dde575962b9aa71365ffed2a0b2
                                    • Instruction ID: d9e335a01bcf499399397701cc45019b0ccf4ef7b405941e9ebc317f74ff5936
                                    • Opcode Fuzzy Hash: 29abb12e586fa040ba1daad7168e19b3db925dde575962b9aa71365ffed2a0b2
                                    • Instruction Fuzzy Hash: EA212FB1D00618AFEB10DFA5CC84FEEBBB8FB48790F10411AF614E7240DB749A408BA5
                                    APIs
                                    • LoadLibraryA.KERNEL32(kernel32.dll,HeapFree), ref: 0040233C
                                    • GetProcAddress.KERNEL32(00000000), ref: 00402343
                                    • LoadLibraryA.KERNEL32(KERNEL32.dll,VirtualFree), ref: 004023BF
                                    • GetProcAddress.KERNEL32(00000000), ref: 004023C6
                                    • LoadLibraryA.KERNEL32(KERNEL32.dll,GetProcessHeap), ref: 004023D9
                                    • GetProcAddress.KERNEL32(00000000), ref: 004023E0
                                      • Part of subcall function 00402E70: KiUserExceptionDispatcher.NTDLL(?,?,00410070,?,?,?,?,?,0040105E,0000002D,00410070), ref: 00402EA3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressLibraryLoadProc$DispatcherExceptionUser
                                    • String ID: D$GetProcessHeap$HeapFree$KERNEL32.dll$KERNEL32.dll$VirtualFree$kernel32.dll
                                    • API String ID: 109903041-3217695185
                                    • Opcode ID: 0471020af816e0c10deb91e709e11e4ca2be90c61c551be4d9350030257f12a5
                                    • Instruction ID: dd5e1e6dc17e71a7484664c5c96d99ba48e4eb391a0bd6fa7bb913cf4fb6e21f
                                    • Opcode Fuzzy Hash: 0471020af816e0c10deb91e709e11e4ca2be90c61c551be4d9350030257f12a5
                                    • Instruction Fuzzy Hash: 80315670D483C8EAEB11CBE8D948B9EBFB5AB12719F140169E544772C2C7BE4508C77A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: "%1$%s\shell\open\command$D
                                    • API String ID: 0-1634606264
                                    • Opcode ID: af3f44a66e067d319cc4f4095ccf4bb989ec2faebcd3ce1dc9429fc4ac04dea9
                                    • Instruction ID: 3b60721297add876bbf5fc82eedd6e34e95aeaf5cbbf963108d86314e992faf5
                                    • Opcode Fuzzy Hash: af3f44a66e067d319cc4f4095ccf4bb989ec2faebcd3ce1dc9429fc4ac04dea9
                                    • Instruction Fuzzy Hash: 13511432108745ABF724C764CC55FEB77D8EB84381F40482DFB54962C5EBB5A608CB92
                                    APIs
                                    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 10002464
                                    • CreateFileA.KERNEL32(?,40000000,00000002,00000000,00000004,00000080,00000000), ref: 10002505
                                    • GetFileSize.KERNEL32 ref: 10002518
                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 1000252C
                                    • lstrlenA.KERNEL32(?), ref: 1000253A
                                    • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 10002543
                                    • lstrlenA.KERNEL32(?,?,00000000,00000000), ref: 10002569
                                    • WriteFile.KERNEL32(00000000,00000000,00000000), ref: 10002572
                                    • CloseHandle.KERNEL32(00000000), ref: 10002579
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$lstrlen$??2@CloseCreateDirectoryHandlePointerSizeSystemWrite
                                    • String ID: .key$Default$.Wu
                                    • API String ID: 686648604-754640202
                                    • Opcode ID: c8e073827d887def72b4b277827f220a939d3f284d1fe10410174d1b95eabb2c
                                    • Instruction ID: 94fbe2f20e4dfee87ea8ff808e77046cee4651ddaf7763b7102ed85f1552d9b6
                                    • Opcode Fuzzy Hash: c8e073827d887def72b4b277827f220a939d3f284d1fe10410174d1b95eabb2c
                                    • Instruction Fuzzy Hash: B0312B312007081BE718DB748C9AFAB3A4AEBC57B1F54072DFA578B2D6DEE49D088250
                                    APIs
                                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 1000849F
                                    • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 100084B3
                                    • GetProcAddress.KERNEL32(00000000,Process32First), ref: 100084BD
                                    • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 100084C7
                                    • lstrcmpiA.KERNEL32(?,?), ref: 10008508
                                    • CloseHandle.KERNEL32(00000000), ref: 10008521
                                    • FreeLibrary.KERNEL32(00000000), ref: 1000852C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$Library$CloseFreeHandleLoadlstrcmpi
                                    • String ID: CreateToolhelp32Snapshot$Process32First$Process32Next$kernel32.dll$.Wu
                                    • API String ID: 1314729832-281824930
                                    • Opcode ID: b4d04c0ec4fb893e7aa4a79bf5d107acaacc7aa3e2847d76f07c2cd52efc22e1
                                    • Instruction ID: 75bed72865b25e84cb0fd308bc054aeba0a201aa0dae88120b2183505ababa2c
                                    • Opcode Fuzzy Hash: b4d04c0ec4fb893e7aa4a79bf5d107acaacc7aa3e2847d76f07c2cd52efc22e1
                                    • Instruction Fuzzy Hash: 9D11A370144715ABE311DB718C88FAB7AE8FFD97C1F010418FA8483245EB74DA098BA2
                                    APIs
                                    • GetEnvironmentStringsW.KERNEL32 ref: 0040529D
                                    • GetEnvironmentStrings.KERNEL32 ref: 004052B8
                                    • GetEnvironmentStringsW.KERNEL32 ref: 004052ED
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 00405357
                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00405388
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 004053AD
                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 004053D0
                                    • GetEnvironmentStrings.KERNEL32 ref: 004053F1
                                    • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00405466
                                    • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00405488
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                    • String ID: a_env.c
                                    • API String ID: 158306478-1218344748
                                    • Opcode ID: b5e6de8868c18dcb80ccc168d0f9724616bae644a3193a429e9ae2cde91faea9
                                    • Instruction ID: b10cc31f32a9c0d4791375c3cdb41f7fd8d0871ec8412da233b981226d490063
                                    • Opcode Fuzzy Hash: b5e6de8868c18dcb80ccc168d0f9724616bae644a3193a429e9ae2cde91faea9
                                    • Instruction Fuzzy Hash: 3C611C70D00609EFDB14DFA4D84ABAFBBB1EF48305F24447AD501BA281D7785985CF99
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ??2@??3@
                                    • String ID: O$P$e$n$o$p$r$x$y
                                    • API String ID: 1936579350-665402123
                                    • Opcode ID: a9f15a5609e470d7b506450aa7368d1fa0b88d0a6f048e2faa9dbb145b1f1aac
                                    • Instruction ID: 3692af032c8f74a7448cfbc9b25724ec032470320efd82e58de406069b8f673d
                                    • Opcode Fuzzy Hash: a9f15a5609e470d7b506450aa7368d1fa0b88d0a6f048e2faa9dbb145b1f1aac
                                    • Instruction Fuzzy Hash: 7121E4A16083815FE301DE78984572BBBC6EB95684F44442CF94497386DFBAEA0D83A3
                                    APIs
                                      • Part of subcall function 10004DC0: wsprintfA.USER32 ref: 10004ED2
                                    • lstrlenA.KERNEL32(?,?,?,?,755683C0,Rsssqi yqeaiusa,00000000,00000000,1F901F90), ref: 10004FD9
                                    • lstrcpyA.KERNEL32(?,Default), ref: 10004FE5
                                    • lstrlenA.KERNEL32(?), ref: 10004FEC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: lstrlen$lstrcpywsprintf
                                    • String ID: C$Default$G$c$e$p$r$t$u
                                    • API String ID: 3119633594-4271276820
                                    • Opcode ID: 53b571e7e5782a6b10e4944cb20398db5a19ad4df56a1d283e74e2a9cb397cb2
                                    • Instruction ID: 4cb25a30716088ae15ae6051cb06f13dced165f59787a813520f2c1d2ff989c5
                                    • Opcode Fuzzy Hash: 53b571e7e5782a6b10e4944cb20398db5a19ad4df56a1d283e74e2a9cb397cb2
                                    • Instruction Fuzzy Hash: 74015B2140D3D19AE302DB298844B8FBFD48FE6248F08898CF1C857253D6B9961DC7BB
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _get_int_arg
                                    • String ID: -$.$5$ch != _T('\0')$output.c
                                    • API String ID: 1853115473-969519535
                                    • Opcode ID: 77878b7f5e4b14ac23e318a867e009683f67d1b7fd0176462cbae87527bf0eec
                                    • Instruction ID: 0b30f0e5d39e4640d1bcf628ae85e314e075eaa161c9280c7354a6fc1720db46
                                    • Opcode Fuzzy Hash: 77878b7f5e4b14ac23e318a867e009683f67d1b7fd0176462cbae87527bf0eec
                                    • Instruction Fuzzy Hash: 832279B5D04218DBDB24CF94C8947EEB7B1AF49304F2482EAD419BB280D7389E85DF59
                                    APIs
                                    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 10004302
                                    • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 100043A3
                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 100043B2
                                    • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 100043BB
                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 100043CE
                                    • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 100043F6
                                    • CloseHandle.KERNEL32(00000000), ref: 100043FF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$??2@??3@CloseCreateDirectoryHandleReadSizeSystem
                                    • String ID: .key$Default$.Wu
                                    • API String ID: 672438164-754640202
                                    • Opcode ID: c5984c09ec34bd10944bea341ec4145ab8e351a683e2eb105694719c3a40ca63
                                    • Instruction ID: 0df5a831510a63df1367d60be323571a78bc34c8aae415aa1ce2a19351602c89
                                    • Opcode Fuzzy Hash: c5984c09ec34bd10944bea341ec4145ab8e351a683e2eb105694719c3a40ca63
                                    • Instruction Fuzzy Hash: 27314A316047081FE318DB749C5596F7A8AEBC92B0F55073DFA67872C2EEF09D088691
                                    APIs
                                      • Part of subcall function 10004DC0: wsprintfA.USER32 ref: 10004ED2
                                    • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 10005055
                                    • lstrcpyA.KERNEL32(?,10012198,?,?,?,?,?,?,?,?,?,?,?,?), ref: 10005061
                                    • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 10005068
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: lstrlen$lstrcpywsprintf
                                    • String ID: M$T$a$e$i$k$m$r
                                    • API String ID: 3119633594-394501062
                                    • Opcode ID: a2d2ada28ae358257b563558a7e43129e4b2749408b5bd0a1175ba5b5f92fe47
                                    • Instruction ID: 43671457a03df2c0adf9ef3ddb2966a26eab9649ea6081fc9b36d8f2d5bd91c3
                                    • Opcode Fuzzy Hash: a2d2ada28ae358257b563558a7e43129e4b2749408b5bd0a1175ba5b5f92fe47
                                    • Instruction Fuzzy Hash: 7401286110C3D29AE302DB288848B8FBFD59FE2648F08084DF5C446242D76A926D87F7
                                    APIs
                                      • Part of subcall function 10008580: LoadLibraryA.KERNEL32 ref: 1000864B
                                      • Part of subcall function 10008580: GetProcAddress.KERNEL32(00000000), ref: 10008652
                                      • Part of subcall function 10008580: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 1000865C
                                      • Part of subcall function 10008580: ??2@YAPAXI@Z.MSVCRT(00000128), ref: 10008665
                                      • Part of subcall function 10008580: Process32First.KERNEL32(00000000,00000000), ref: 10008677
                                      • Part of subcall function 10008580: _strcmpi.MSVCRT ref: 10008689
                                      • Part of subcall function 10008580: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 1000869A
                                    • WinExec.KERNEL32(taskkill /f /im rundll32.exe,00000000), ref: 10005D7C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ??2@??3@AddressCreateExecFirstLibraryLoadProcProcess32SnapshotToolhelp32_strcmpi
                                    • String ID: .$2$3$d$n$taskkill /f /im rundll32.exe$u$x
                                    • API String ID: 1235656449-3094880203
                                    • Opcode ID: c101da3c5a201e27bad7d979422eb9688827141025a338f21c82d2f45f12132b
                                    • Instruction ID: 96f1eca156b0e4eff2f5dc6913b3ee451fa91117cbec719f6b5fbf4d114350d2
                                    • Opcode Fuzzy Hash: c101da3c5a201e27bad7d979422eb9688827141025a338f21c82d2f45f12132b
                                    • Instruction Fuzzy Hash: 25F0971444C3C0ADE302DB6C840974BBED55BA2688F48C89EE4DC5A297D6BAD25CC773
                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,00409916,00000002,00000000,00000000,?,?), ref: 0040999C
                                      • Part of subcall function 004095B0: DebugBreak.KERNEL32 ref: 004095B3
                                    Strings
                                    • szUserMessage != NULL, xrefs: 00409963
                                    • dbgrpt.c, xrefs: 0040996F
                                    • _CrtDbgReport: String too long or IO Error, xrefs: 00409BF9
                                    • ..., xrefs: 004099EC, 00409A44
                                    • <program name unknown>, xrefs: 004099A6
                                    • Debug %s!Program: %s%s%s%s%s%s%s%s%s%s%s(Press Retry to debug the application), xrefs: 00409BDC
                                    • Microsoft Visual C++ Debug Library, xrefs: 00409C12
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: BreakDebugFileModuleName
                                    • String ID: ...$<program name unknown>$Debug %s!Program: %s%s%s%s%s%s%s%s%s%s%s(Press Retry to debug the application)$Microsoft Visual C++ Debug Library$_CrtDbgReport: String too long or IO Error$dbgrpt.c$szUserMessage != NULL
                                    • API String ID: 3969911889-457056794
                                    • Opcode ID: 0f33eab89c74a6f7f70dc8e371eaa4b3b4d7f8afa29fd5e269344d6ad445eed3
                                    • Instruction ID: 82c6c3db928ba7a11471b822d675effb30d4a5a2ff11710b561130670d3adb26
                                    • Opcode Fuzzy Hash: 0f33eab89c74a6f7f70dc8e371eaa4b3b4d7f8afa29fd5e269344d6ad445eed3
                                    • Instruction Fuzzy Hash: 3D7177B4E00218ABDB24DF54DC42BDAB374BB59304F1085BAE609762C2D3789F95CF99
                                    APIs
                                    • LoadLibraryA.KERNEL32 ref: 100049A3
                                    • GetProcAddress.KERNEL32(00000000,IsBadReadPtr), ref: 100049B3
                                    • LoadLibraryA.KERNEL32(?), ref: 100049EB
                                    • realloc.MSVCRT ref: 10004A0A
                                    • GetProcAddress.KERNEL32(00000000,?), ref: 10004A59
                                    • FreeLibrary.KERNEL32(?,00000000,?,?,10004717,00000000,?), ref: 10004AAA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Library$AddressLoadProc$Freerealloc
                                    • String ID: IsBadReadPtr$kernel32.dll
                                    • API String ID: 343009874-2271619998
                                    • Opcode ID: 0edb90ad8a3f97d5b32876884c508db8f96aa26cb441f3ac87e1f665d0d36104
                                    • Instruction ID: 943f36dfc45f3edd014fbf9aefcaaf0a29c58e454401c9a78b426052af33b81d
                                    • Opcode Fuzzy Hash: 0edb90ad8a3f97d5b32876884c508db8f96aa26cb441f3ac87e1f665d0d36104
                                    • Instruction Fuzzy Hash: C63150B1A007179BE710CF29C844B16B7E8FF45388F028929ED59D7255EB34ED14CB9A
                                    APIs
                                    • LoadLibraryA.KERNEL32(user32.dll,?,?,?,1000C348,000000FF,?,10008109,00000000), ref: 100082E8
                                    • GetProcAddress.KERNEL32(00000000,OpenInputDesktop), ref: 100082FF
                                    • GetProcAddress.KERNEL32(00000000,OpenDesktopA), ref: 1000830A
                                    • GetProcAddress.KERNEL32(00000000,CloseDesktop), ref: 10008314
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$LibraryLoad
                                    • String ID: CloseDesktop$OpenDesktopA$OpenInputDesktop$user32.dll
                                    • API String ID: 2238633743-3711086354
                                    • Opcode ID: 87f077cc38fa9355382c0ad814016904e34658d0567dc41e845f42e717152d04
                                    • Instruction ID: 639762d0b2d001fcf54d4d449a3be421f04d5924b7195cc0df15fed843997a13
                                    • Opcode Fuzzy Hash: 87f077cc38fa9355382c0ad814016904e34658d0567dc41e845f42e717152d04
                                    • Instruction Fuzzy Hash: F7116671D00618AFE700DFA58C44FDEBBF8FF48690F104125FA14E3284D7745A018BA1
                                    APIs
                                    • LoadLibraryA.KERNEL32(user32.dll,Microsoft Visual C++ Debug Library), ref: 0040AF7B
                                    • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 0040AF93
                                    • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 0040AFB4
                                    • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 0040AFC8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$LibraryLoad
                                    • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
                                    • API String ID: 2238633743-4044615076
                                    • Opcode ID: 6c28c6b1f8e5e04ee614dce1f282fd38a31f25c6fcfaff65a1037fb506f0a287
                                    • Instruction ID: de20af04a8c214f7d121f0f85548d5ea39c6fa4b49d3416487e07ed0eeee28c2
                                    • Opcode Fuzzy Hash: 6c28c6b1f8e5e04ee614dce1f282fd38a31f25c6fcfaff65a1037fb506f0a287
                                    • Instruction Fuzzy Hash: B1114CB4D00708EFCB20DFA4D949B9E7BB4FB18747F10457AE901A7691C3B89988CB59
                                    APIs
                                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 100029F4
                                      • Part of subcall function 10004BA0: FreeLibrary.KERNEL32(?,00000000,00000000,00000000,10004747,00000000,?,?), ref: 10004BF0
                                      • Part of subcall function 10004BA0: free.MSVCRT ref: 10004BFF
                                      • Part of subcall function 10004BA0: VirtualFree.KERNEL32(5D5E5FC0,00000000,00008000,00000000,10004747,00000000,?,?), ref: 10004C18
                                      • Part of subcall function 10004BA0: GetProcessHeap.KERNEL32(00000000,10004747,00000000,10004747,00000000,?,?), ref: 10004C21
                                      • Part of subcall function 10004BA0: HeapFree.KERNEL32(00000000,?,?), ref: 10004C28
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Free$HeapVirtual$LibraryProcessfree
                                    • String ID: M$P$e$g$i$l$n$u
                                    • API String ID: 1525015432-1729584574
                                    • Opcode ID: dc96b8bb69206cd3f6e3527d9060e7c40065f5498cc4de25d2c2e22e5569962f
                                    • Instruction ID: 3cd4cd10520a3ceb6f1e40123bde33da23cbbf893c65359a72b0183ae737aca1
                                    • Opcode Fuzzy Hash: dc96b8bb69206cd3f6e3527d9060e7c40065f5498cc4de25d2c2e22e5569962f
                                    • Instruction Fuzzy Hash: A4017C7140C380AAE311DB589845B6BBBD9AFD6744F08880CF5C856295DBBAD90883B7
                                    APIs
                                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 10002AA6
                                      • Part of subcall function 10004BA0: FreeLibrary.KERNEL32(?,00000000,00000000,00000000,10004747,00000000,?,?), ref: 10004BF0
                                      • Part of subcall function 10004BA0: free.MSVCRT ref: 10004BFF
                                      • Part of subcall function 10004BA0: VirtualFree.KERNEL32(5D5E5FC0,00000000,00008000,00000000,10004747,00000000,?,?), ref: 10004C18
                                      • Part of subcall function 10004BA0: GetProcessHeap.KERNEL32(00000000,10004747,00000000,10004747,00000000,?,?), ref: 10004C21
                                      • Part of subcall function 10004BA0: HeapFree.KERNEL32(00000000,?,?), ref: 10004C28
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Free$HeapVirtual$LibraryProcessfree
                                    • String ID: M$P$e$g$i$l$n$u
                                    • API String ID: 1525015432-1729584574
                                    • Opcode ID: 16e5facdf6395daf8fae5cb4b1721a79098da2994c3da5b7dd2472f1d18b9f37
                                    • Instruction ID: 9b38f55cc4ba52800e70aa4bf33643b90296dfa00965b85e298b3884a1199f6d
                                    • Opcode Fuzzy Hash: 16e5facdf6395daf8fae5cb4b1721a79098da2994c3da5b7dd2472f1d18b9f37
                                    • Instruction Fuzzy Hash: E501806150C380AAE311DA289804B9FBED98FD6794F08454DF8C856296CBBAD65C83B7
                                    APIs
                                    • GetStdHandle.KERNEL32(000000F4,?,00000000), ref: 00405CD6
                                    • WriteFile.KERNEL32(00000000,?,00000000), ref: 00405CDD
                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00405D03
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$HandleModuleNameWrite
                                    • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                    • API String ID: 3784150691-4022980321
                                    • Opcode ID: 7da677e911cda10281670ec787c1eddfd45c1811d09e76ac564727a7cc2abb3c
                                    • Instruction ID: c66328e3824cdc0b33dd50bd2a94af21d3face6f33e503974c5ccbb0c5265c84
                                    • Opcode Fuzzy Hash: 7da677e911cda10281670ec787c1eddfd45c1811d09e76ac564727a7cc2abb3c
                                    • Instruction Fuzzy Hash: CB41B5B1D00308EBDB20DB90DC82BAF7374EB14305F10857AE505762C2E7799A99CF99
                                    APIs
                                    • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000), ref: 1000339C
                                    • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 100033D2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CreateWrite
                                    • String ID: %s %s$.Wu
                                    • API String ID: 2263783195-2135594154
                                    • Opcode ID: 20d9cf86228e1c1e6c50905047135263e8ca82ba7906513989c4d2c8763dfb55
                                    • Instruction ID: 3743ef5fdc58a93c92196b36047ebbee77f50bb103d2af28ea4dba453ef85ca5
                                    • Opcode Fuzzy Hash: 20d9cf86228e1c1e6c50905047135263e8ca82ba7906513989c4d2c8763dfb55
                                    • Instruction Fuzzy Hash: C03107761043466BF321CB28DC89FEF73D8EBC43A1F404929FA54961C4DB78A50D87A2
                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 100028D9
                                    • CopyFileA.KERNEL32(?,?,00000000), ref: 10002909
                                    • RegOpenKeyExA.ADVAPI32(80000001,SOFTWARE\Microsoft\Windows\CurrentVersion\Run,00000000,000F003F,?), ref: 10002925
                                    • RegSetValueExA.ADVAPI32(?,?,00000000,00000001,?,00000104), ref: 1000294B
                                    • RegCloseKey.ADVAPI32 ref: 10002956
                                    Strings
                                    • SOFTWARE\Microsoft\Windows\CurrentVersion\Run, xrefs: 1000291B
                                    • C:\Program Files\Common Files\scvh0st.exe, xrefs: 100028E4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseCopyModuleNameOpenValue
                                    • String ID: C:\Program Files\Common Files\scvh0st.exe$SOFTWARE\Microsoft\Windows\CurrentVersion\Run
                                    • API String ID: 3295893203-1185028701
                                    • Opcode ID: 17ad042768858737f052513e4b875a1417c86927ba6e98811639907262b2814a
                                    • Instruction ID: 2807fe29cd3542294ee6844bf3f849b1890e9e9cd354654402acd874cc838904
                                    • Opcode Fuzzy Hash: 17ad042768858737f052513e4b875a1417c86927ba6e98811639907262b2814a
                                    • Instruction Fuzzy Hash: 6B115E71208304BBF704C764CC45FEBB7A9EBC8740F004A18F64596294DAB5A448C752
                                    APIs
                                    • LoadLibraryA.KERNEL32(kernel32.dll,00000000,755732F0,00000001,?,10005C5D), ref: 10005079
                                    • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 10005095
                                    • GetProcAddress.KERNEL32(00000000,GetCurrentProcess), ref: 1000509F
                                    • FreeLibrary.KERNEL32(00000000,?,10005C5D), ref: 100050B4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressLibraryProc$FreeLoad
                                    • String ID: GetCurrentProcess$IsWow64Process$kernel32.dll
                                    • API String ID: 2256533930-2522683910
                                    • Opcode ID: de5a23b5b84dff248027fb193cbefa81c82c4469be5486f87854405e39234b22
                                    • Instruction ID: 95e96d424b8dc866bf610e1a79f0de374263097fada87e72b7105fa79506478b
                                    • Opcode Fuzzy Hash: de5a23b5b84dff248027fb193cbefa81c82c4469be5486f87854405e39234b22
                                    • Instruction Fuzzy Hash: 33E065B6102324BFF214D7748C88EAF77A8DF856E5B004509F945D3204DB31CC0486B2
                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 1000681A
                                    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1000682A
                                    • GetTickCount.KERNEL32 ref: 10006830
                                    • wsprintfA.USER32 ref: 10006846
                                    • MoveFileA.KERNEL32(?), ref: 1000685C
                                    • MoveFileExA.KERNEL32(?,00000000,00000004(MOVEFILE_DELAY_UNTIL_REBOOT)), ref: 1000686B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$Move$CountDirectoryModuleNameSystemTickwsprintf
                                    • String ID: %s\%d.bak
                                    • API String ID: 830686190-2116986511
                                    • Opcode ID: 6a1be2c848eb7a969d7db17d9e86234426fe5d8290cc3d5521ce5b5f56e96b41
                                    • Instruction ID: e657657075605cfff884c4cc4a2bea9d1db9898d2ec1cc003315c848a05afbb7
                                    • Opcode Fuzzy Hash: 6a1be2c848eb7a969d7db17d9e86234426fe5d8290cc3d5521ce5b5f56e96b41
                                    • Instruction Fuzzy Hash: 05F01DF6004318BBE314EBA0CDC9EEB776CFB94745F408A18F38595095DBB49558CB52
                                    APIs
                                    • _CxxThrowException.MSVCRT(?,1000EEF8), ref: 10001FFE
                                    • ??2@YAPAXI@Z.MSVCRT(10001EC6,?,00000004,00000000,00000004,10001ED5,00000004,?,00000003,00000003,00000000,?,10001ED5,?,00000000,?), ref: 10002072
                                    • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,00000000,1000BAF0,000000FF,753523A0,10001ED5,?,00000000), ref: 10002083
                                    • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,10001EC6,?,?), ref: 10002149
                                    • ??3@YAXPAX@Z.MSVCRT(00000000,10001EC6,?,?), ref: 10002152
                                    • _CxxThrowException.MSVCRT(?), ref: 10002172
                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,1000BAF0,000000FF,753523A0,10001ED5,?,00000000), ref: 1000217F
                                    • ??3@YAXPAX@Z.MSVCRT(1000BAF0,?,?,?,?,?,00000000,1000BAF0,000000FF,753523A0,10001ED5,?,00000000), ref: 1000218F
                                      • Part of subcall function 10002230: ??2@YAPAXI@Z.MSVCRT(?,?,?,?,?,?,10005D0E,?,0000022C), ref: 10002258
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ??3@$??2@$ExceptionThrow
                                    • String ID:
                                    • API String ID: 4137962090-0
                                    • Opcode ID: f6aa161688ee4f6ee0024ddb390261e06af80915ade76e8f9d84d39527ff759a
                                    • Instruction ID: 7cfd08a3667c8f3bff20fe777b419f2fee706ce4a41ed334fdf56aa4ac6b698a
                                    • Opcode Fuzzy Hash: f6aa161688ee4f6ee0024ddb390261e06af80915ade76e8f9d84d39527ff759a
                                    • Instruction Fuzzy Hash: DE717775A00149ABEF04DFA4C891AEFB7B9EF887C0F104429F605AB245DB74BE45C7A1
                                    APIs
                                    • GetStartupInfoA.KERNEL32(?), ref: 00405527
                                    • GetFileType.KERNEL32(?), ref: 00405686
                                    • GetStdHandle.KERNEL32(?), ref: 00405728
                                    • GetFileType.KERNEL32(000000FF), ref: 0040573B
                                    • SetHandleCount.KERNEL32(00000020), ref: 004057BA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileHandleType$CountInfoStartup
                                    • String ID: ioinit.c
                                    • API String ID: 1710529072-350981760
                                    • Opcode ID: ba4bf6655b9ce77474aa3cdc962939841fd669aaa1d81c5ade1d16592a99e302
                                    • Instruction ID: 708b14380a247b9ade55c17a13c8d3c41876aceecd1145cc7bd7b15b65bd0dd8
                                    • Opcode Fuzzy Hash: ba4bf6655b9ce77474aa3cdc962939841fd669aaa1d81c5ade1d16592a99e302
                                    • Instruction Fuzzy Hash: 1AB12474A00748CFDB14CFD8C894AAEBBB2FB45304F24866AD4056F399C779984ACF49
                                    APIs
                                    • CreateFileA.KERNEL32(?,40000000,00000002,00000000,00000004,00000080,00000000,?), ref: 100062F9
                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?), ref: 10006312
                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 1000631B
                                    • WriteFile.KERNEL32(00000000,?,00000400,00000000,00000000), ref: 10006389
                                    • CloseHandle.KERNEL32(00000000), ref: 10006396
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseCreateHandlePointerSizeWrite
                                    • String ID: .Wu
                                    • API String ID: 1886887421-3424199868
                                    • Opcode ID: 220bfaa021bea67525b236f0f04cdc36db5342f36e34257a21021ad22f91ca23
                                    • Instruction ID: b0029bd9fb1e005456cfc35da5dd38bb37c3330f5ee9c25cfa7a0fbc93e4cf82
                                    • Opcode Fuzzy Hash: 220bfaa021bea67525b236f0f04cdc36db5342f36e34257a21021ad22f91ca23
                                    • Instruction Fuzzy Hash: 22217F752403556FF3209B24CC85FBF769AEB88BC0F104534FB46661C6CAB469098698
                                    APIs
                                    • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000007,00000000), ref: 10006DD5
                                    • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 10006DFC
                                    • RegOpenKeyExA.ADVAPI32(80000001,SOFTWARE\Microsoft\Windows\CurrentVersion\Run,00000000,000F003F,?), ref: 10006E18
                                    • RegSetValueExA.ADVAPI32(?,10013460,00000000,00000001,?,00000104), ref: 10006E3B
                                    • RegCloseKey.ADVAPI32(?,?,10013460,00000000,00000001,?,00000104), ref: 10006E46
                                    Strings
                                    • SOFTWARE\Microsoft\Windows\CurrentVersion\Run, xrefs: 10006E0E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseFileFolderModuleNameOpenPathSpecialValue
                                    • String ID: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
                                    • API String ID: 3065614200-3913687870
                                    • Opcode ID: 8c430a6efb7b864261c6ee0dc320bcd0facc867f682ed069a28d88e3fd618178
                                    • Instruction ID: fbbb8ee022bfa8af7ce0853a2e641239e4fc611deb7e72754b99820753c5bc93
                                    • Opcode Fuzzy Hash: 8c430a6efb7b864261c6ee0dc320bcd0facc867f682ed069a28d88e3fd618178
                                    • Instruction Fuzzy Hash: E10162B4248344BBF314D764CC8AFAB7BA4EBC8B44F10891CF789AA1D5DAB4A444C752
                                    APIs
                                    • IsBadWritePtr.KERNEL32(00000000,00000000), ref: 00408239
                                    • IsBadWritePtr.KERNEL32(?,000041C4), ref: 0040829F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Write
                                    • String ID: $ $?
                                    • API String ID: 3165279579-1466984971
                                    • Opcode ID: 3bf11002b635388773db174a007a06e7b85aba451dd92a0086ce8152766c5557
                                    • Instruction ID: 7cd4307bbffec7d52c3a7db334ebc04e617089b284f55b84a26793f0cff8a4a3
                                    • Opcode Fuzzy Hash: 3bf11002b635388773db174a007a06e7b85aba451dd92a0086ce8152766c5557
                                    • Instruction Fuzzy Hash: 3EF1B570A00529CBCB64CF59CE907EDB7B1BB85314F6082EAD459AB394CB35AE81CF45
                                    APIs
                                    • GetStringTypeW.KERNEL32(00000001,0040FD4C,00000001,00000001), ref: 0040BEDC
                                    • GetStringTypeA.KERNEL32(00000000,00000001,0040FD48,00000001,00000001), ref: 0040BF01
                                    • GetStringTypeA.KERNEL32(00000000,00000000,000004E4,?,00000100), ref: 0040BF4A
                                    • MultiByteToWideChar.KERNEL32(00000000,0040A680,000004E4,?,00000000,00000000), ref: 0040BF8F
                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,000004E4,?,00000000,00000000), ref: 0040C01B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: StringType$ByteCharMultiWide
                                    • String ID:
                                    • API String ID: 3852931651-0
                                    • Opcode ID: 2e8ce4bc642123c617d8f20b99919d8b5b848cc1161f7770a587f8aa546bdb8d
                                    • Instruction ID: 4c3ce5b9d6f761a6f3ea0860c9838c3b330106d6d33055a688869aefd4a6a07a
                                    • Opcode Fuzzy Hash: 2e8ce4bc642123c617d8f20b99919d8b5b848cc1161f7770a587f8aa546bdb8d
                                    • Instruction Fuzzy Hash: D55139B1A10209EBCB10CF98CC86BAB77B5EB48711F10863AF515F72C0D7799945CBA9
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _strupr$MessageSendVisibleWindowlstrlenstrstr
                                    • String ID:
                                    • API String ID: 850376632-0
                                    • Opcode ID: 8f874e1fc1454320b976937ab8c21b85a6d687aaad34c7fbfcabefb16f4094b3
                                    • Instruction ID: ea269e3bfa838260eddff204f0556494777ae984c0a8e72db09fbaad5451d422
                                    • Opcode Fuzzy Hash: 8f874e1fc1454320b976937ab8c21b85a6d687aaad34c7fbfcabefb16f4094b3
                                    • Instruction Fuzzy Hash: 340192B16003156BF710D768DC84FDBBBDCAF45388F008839E644E21A4EA35E5098BA6
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __aulldiv__aullrem
                                    • String ID: '$0$9
                                    • API String ID: 3839614884-269856862
                                    • Opcode ID: 7fba6f0986731dc7c67397734f7e0973bc6ddaa7e56d86bd279fc43707d16fc5
                                    • Instruction ID: 1484ed002eee6c801e9fcd347e662f4492a4880fbd3adf435be06999b1b2b901
                                    • Opcode Fuzzy Hash: 7fba6f0986731dc7c67397734f7e0973bc6ddaa7e56d86bd279fc43707d16fc5
                                    • Instruction Fuzzy Hash: F1510370909229CBDF24DF28C9887AAB7B1BB44304F2082EAE00DB7280D7395E85CF44
                                    APIs
                                    • ??2@YAPAXI@Z.MSVCRT(?), ref: 10003830
                                    • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 100038C1
                                      • Part of subcall function 100036B0: LoadLibraryA.KERNEL32(wininet.dll), ref: 100036D2
                                      • Part of subcall function 100036B0: GetProcAddress.KERNEL32(00000000,InternetOpenA), ref: 100036E6
                                      • Part of subcall function 100036B0: GetProcAddress.KERNEL32(00000000,InternetOpenUrlA), ref: 10003703
                                      • Part of subcall function 100036B0: FreeLibrary.KERNEL32(00000000), ref: 10003728
                                      • Part of subcall function 10008550: GetFileAttributesA.KERNEL32(?,10006209,?), ref: 10008555
                                      • Part of subcall function 10008550: GetLastError.KERNEL32 ref: 10008560
                                    • CreateProcessA.KERNEL32(?,?,00000000,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 100038A3
                                    • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,00000000,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 100038AA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ??3@AddressLibraryProc$??2@AttributesCreateErrorFileFreeLastLoadProcess
                                    • String ID: D
                                    • API String ID: 4236665762-2746444292
                                    • Opcode ID: e0fe488ed2437090df209219b4c602549d70b81b895ed81b94df822e75cee367
                                    • Instruction ID: a5bde385685e12b30f7c7c259c52aa5e73f7a25028a22e3bab38776bf1136713
                                    • Opcode Fuzzy Hash: e0fe488ed2437090df209219b4c602549d70b81b895ed81b94df822e75cee367
                                    • Instruction Fuzzy Hash: 6A1108B65146001BF605DA349C01A6B77DDDBD42A0F048439F90A97285EAB6E90E87A2
                                    APIs
                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,?,00000000,1000BADC,000000FF,10006781), ref: 10001C86
                                    • CloseHandle.KERNEL32(?,?,00000000,?,00000000,1000BADC,000000FF,10006781), ref: 10001CA3
                                    • CloseHandle.KERNEL32(?,?,00000000,?,00000000,1000BADC,000000FF,10006781), ref: 10001CA9
                                    • WSACleanup.WS2_32 ref: 10001CAB
                                      • Part of subcall function 100021C0: setsockopt.WS2_32(?,0000FFFF,00000080,?,00000004), ref: 100021E7
                                      • Part of subcall function 100021C0: CancelIo.KERNEL32(?), ref: 100021F1
                                      • Part of subcall function 100021C0: InterlockedExchange.KERNEL32(?,00000000), ref: 100021FD
                                      • Part of subcall function 100021C0: closesocket.WS2_32(?), ref: 10002207
                                      • Part of subcall function 100021C0: SetEvent.KERNEL32(?), ref: 10002211
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle$CancelCleanupEventExchangeInterlockedObjectSingleWaitclosesocketsetsockopt
                                    • String ID: .Wu
                                    • API String ID: 136543108-3424199868
                                    • Opcode ID: 13e63e094bd2eb5bd89276c4cc1018c774a8f945e9222548d8b146be8698d900
                                    • Instruction ID: f209caddfa5839f10d9a3c33a85bf07631f9ea308632b1ee6666812f23b3a2b8
                                    • Opcode Fuzzy Hash: 13e63e094bd2eb5bd89276c4cc1018c774a8f945e9222548d8b146be8698d900
                                    • Instruction Fuzzy Hash: A7119175004B91CFE310DF18C984B9AB7E8EB45B60F504A0CF1A6536D5CBB8A909CBA3
                                    APIs
                                    • LoadLibraryW.KERNEL32(ntdll.dll,?,75571760,10007C96,?,?,?), ref: 100058D9
                                    • GetProcAddress.KERNEL32(00000000,RtlGetNtVersionNumbers), ref: 100058EB
                                    • FreeLibrary.KERNEL32(00000000), ref: 10005915
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Library$AddressFreeLoadProc
                                    • String ID: RtlGetNtVersionNumbers$ntdll.dll
                                    • API String ID: 145871493-1263206204
                                    • Opcode ID: 0c67c078b8ae09ff37aa46c3dcf20c292fe727355f7212a1f1e47316ffe1a4a1
                                    • Instruction ID: d3d1fa96fb756a2bf0946433c0eac4786d00cde402a2b740953615462e2fc08b
                                    • Opcode Fuzzy Hash: 0c67c078b8ae09ff37aa46c3dcf20c292fe727355f7212a1f1e47316ffe1a4a1
                                    • Instruction Fuzzy Hash: 66F065762006229BE361DB25DC88D6B37A6EFC57A1B154528F544D7344CB34DD06C771
                                    APIs
                                    • ___AdjustPointer.LIBCMTD ref: 0040416D
                                    • ___AdjustPointer.LIBCMTD ref: 004041F1
                                    • ___AdjustPointer.LIBCMTD ref: 0040424F
                                    • ___AdjustPointer.LIBCMTD ref: 004042CA
                                      • Part of subcall function 00409C60: IsBadReadPtr.KERNEL32(?,?), ref: 00409C73
                                      • Part of subcall function 00409C90: IsBadWritePtr.KERNEL32(?,00404294), ref: 00409CA3
                                    • ___AdjustPointer.LIBCMTD ref: 004042F3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AdjustPointer$ReadWrite
                                    • String ID:
                                    • API String ID: 152555143-0
                                    • Opcode ID: a2577821a99ff62d0e1a3424e32d0e674afdc4c4875c46c1386e2c30ec489300
                                    • Instruction ID: fbd5b16380e2c49ff7a606291ce4cb993ee0c5a068ac3461fe3ea520fec72d2d
                                    • Opcode Fuzzy Hash: a2577821a99ff62d0e1a3424e32d0e674afdc4c4875c46c1386e2c30ec489300
                                    • Instruction Fuzzy Hash: 58819FB5B002059BDB04DF55E885E6B73B5AF98309F10812DFE05AB3C2D639EC52CBA5
                                    APIs
                                    • GetForegroundWindow.USER32(?), ref: 100025A6
                                    • GetWindowTextA.USER32(00000000,100134CC,00000400), ref: 100025BC
                                    • lstrlenA.KERNEL32(100134CC), ref: 100025F1
                                    • GetLocalTime.KERNEL32(?), ref: 10002604
                                    • wsprintfA.USER32 ref: 10002659
                                      • Part of subcall function 10002450: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 10002464
                                      • Part of subcall function 10002450: CreateFileA.KERNEL32(?,40000000,00000002,00000000,00000004,00000080,00000000), ref: 10002505
                                      • Part of subcall function 10002450: GetFileSize.KERNEL32 ref: 10002518
                                      • Part of subcall function 10002450: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 1000252C
                                      • Part of subcall function 10002450: lstrlenA.KERNEL32(?), ref: 1000253A
                                      • Part of subcall function 10002450: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 10002543
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$Windowlstrlen$??2@CreateDirectoryForegroundLocalPointerSizeSystemTextTimewsprintf
                                    • String ID:
                                    • API String ID: 1247169605-0
                                    • Opcode ID: 056dc71ff4e629217caae47359128fb0abf0ecaf49f57d8664b6d7b9b678489f
                                    • Instruction ID: a48b67f0896fe2f38bf58be364837e2218b236164bb0912a55cfe2f5c32c33e0
                                    • Opcode Fuzzy Hash: 056dc71ff4e629217caae47359128fb0abf0ecaf49f57d8664b6d7b9b678489f
                                    • Instruction Fuzzy Hash: A121A1B12053136BE705DB28CC94AA777E5EF88344F508938F245D7794DA38E8498B65
                                    APIs
                                    • FreeLibrary.KERNEL32(?,00000000,00000000,00000000,10004747,00000000,?,?), ref: 10004BF0
                                    • free.MSVCRT ref: 10004BFF
                                    • VirtualFree.KERNEL32(5D5E5FC0,00000000,00008000,00000000,10004747,00000000,?,?), ref: 10004C18
                                    • GetProcessHeap.KERNEL32(00000000,10004747,00000000,10004747,00000000,?,?), ref: 10004C21
                                    • HeapFree.KERNEL32(00000000,?,?), ref: 10004C28
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Free$Heap$LibraryProcessVirtualfree
                                    • String ID:
                                    • API String ID: 831075735-0
                                    • Opcode ID: e502b7b0df1307f1dc68fd0e58be9ec16ce209b13cf9b9819544c2e320b6bc93
                                    • Instruction ID: c4b22691f729e0e73a0b112ff6c8b73a5f6ad4d15aaf35290984b53f91244410
                                    • Opcode Fuzzy Hash: e502b7b0df1307f1dc68fd0e58be9ec16ce209b13cf9b9819544c2e320b6bc93
                                    • Instruction Fuzzy Hash: FB112AB12007119BE760CB69CCC4F57B3E8BF48690F128918F59AC7299DB70F845CB54
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Catch
                                    • String ID: csm$csm$csm
                                    • API String ID: 78271584-393685449
                                    • Opcode ID: 42041f55aedd2a658c860c43a8bd6268828e80dfdf72fed6d069a4e319bf414a
                                    • Instruction ID: 1081b5c0fc64e7567b7813433359b24f0f379af0ea5cb2948763b65feeeeacf6
                                    • Opcode Fuzzy Hash: 42041f55aedd2a658c860c43a8bd6268828e80dfdf72fed6d069a4e319bf414a
                                    • Instruction Fuzzy Hash: B89113B5A00109DFCF04DF95C480AAEBBB9BF48305F10816AE955AB381D739EE41CF99
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __aulldiv__aullrem
                                    • String ID: 0$9
                                    • API String ID: 3839614884-1975997740
                                    • Opcode ID: e0ed0c947f0032e83b22bdeb66a77682cdb916694bcad444b9a5c41dff3ff05f
                                    • Instruction ID: 21bc1264f8b0b3200022bf3a121e9f51d813f477de1a6d366d8be312cfae0f20
                                    • Opcode Fuzzy Hash: e0ed0c947f0032e83b22bdeb66a77682cdb916694bcad444b9a5c41dff3ff05f
                                    • Instruction Fuzzy Hash: D451F370909229CBDF24DF28C9887AAB7B1BB44304F2082EAE04DB7280D7395E85DF45
                                    APIs
                                    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1000445B
                                    • DeleteFileA.KERNEL32(?), ref: 100044EC
                                      • Part of subcall function 100042D0: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 10004302
                                      • Part of subcall function 100042D0: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 100043A3
                                      • Part of subcall function 100042D0: GetFileSize.KERNEL32(00000000,00000000), ref: 100043B2
                                      • Part of subcall function 100042D0: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 100043BB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$DirectorySystem$??2@CreateDeleteSize
                                    • String ID: .key$Default
                                    • API String ID: 2930496114-1583214558
                                    • Opcode ID: 66b09590ffcb0c1b3da8410adecc627db9d377959ad880a2b8652abb80ea05f6
                                    • Instruction ID: 141a8b37691aae2fbd8da05fdbc6e3495a09b372ee2bec7482234fe0d6603d82
                                    • Opcode Fuzzy Hash: 66b09590ffcb0c1b3da8410adecc627db9d377959ad880a2b8652abb80ea05f6
                                    • Instruction Fuzzy Hash: F32126766006441BD72CCA78949566A76C2FBC5370F69472EF6B7872C5DEF08D488240
                                    APIs
                                    • InterlockedIncrement.KERNEL32(0045F008), ref: 0040C14C
                                    • InterlockedDecrement.KERNEL32(0045F008), ref: 0040C160
                                    • InterlockedDecrement.KERNEL32(0045F008), ref: 0040C1A6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Interlocked$Decrement$Increment
                                    • String ID: z
                                    • API String ID: 2574743344-1657960367
                                    • Opcode ID: c412f6aa3aa6ae6142b7f87bdd3515a78cfa3495b29279b984b89f068f8699bb
                                    • Instruction ID: 2b8a8a0e75cc9b87a3f5748db09485aa13002c131676a62cc4f0f5a3e329d174
                                    • Opcode Fuzzy Hash: c412f6aa3aa6ae6142b7f87bdd3515a78cfa3495b29279b984b89f068f8699bb
                                    • Instruction Fuzzy Hash: 9B015275540208EFEB10DF54D98579A3B65AB0470AF14823AFC096E2C3D7799A88CF9B
                                    APIs
                                      • Part of subcall function 00403430: InitializeCriticalSection.KERNEL32(0045DC90), ref: 00403439
                                      • Part of subcall function 00403430: InitializeCriticalSection.KERNEL32(0045DCC0), ref: 00403446
                                      • Part of subcall function 00403430: InitializeCriticalSection.KERNEL32(0045DCA8), ref: 00403453
                                      • Part of subcall function 00403430: InitializeCriticalSection.KERNEL32(0045DC78), ref: 0040345F
                                    • TlsAlloc.KERNEL32 ref: 00404479
                                    • TlsSetValue.KERNEL32(00000001,00000000), ref: 004044BA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalInitializeSection$AllocValue
                                    • String ID: tidtable.c
                                    • API String ID: 3805685275-1617207422
                                    • Opcode ID: d6bc5191b5ba4ef757adf66d6b70cc4044b0d41f729a829732c4e7105f474861
                                    • Instruction ID: 671459543a1281f39d466c8307b7a22d350fb038fbf37dc563bf0b76e076690c
                                    • Opcode Fuzzy Hash: d6bc5191b5ba4ef757adf66d6b70cc4044b0d41f729a829732c4e7105f474861
                                    • Instruction Fuzzy Hash: 1F01DFF4A00204EBD720EFB0EE05B5A77A4AB48715F204779EA16B72C3E3399A00D758
                                    APIs
                                    • HeapAlloc.KERNEL32(006B0000,00000000,00002020,?,?,00409051), ref: 00408865
                                    • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004), ref: 00408889
                                    • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004), ref: 004088AC
                                    • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 004089F6
                                    • HeapFree.KERNEL32(006B0000,00000000,0045B1B0), ref: 00408A12
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocVirtual$FreeHeap
                                    • String ID:
                                    • API String ID: 714016831-0
                                    • Opcode ID: e222481e2887e826b0159ec41dde2bc037073fa34ec96e36dd2596f5fe098146
                                    • Instruction ID: b11544ad845e826f7db3b9b90aba117d37baededb7bb2ca324301372f2666f67
                                    • Opcode Fuzzy Hash: e222481e2887e826b0159ec41dde2bc037073fa34ec96e36dd2596f5fe098146
                                    • Instruction Fuzzy Hash: 8F512874A00208EFDB10DF94C958BADB7B1FB44315F20C1BAE9517B392C7789A45DB89
                                    APIs
                                    • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 0040D8BD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileWrite
                                    • String ID:
                                    • API String ID: 3934441357-0
                                    • Opcode ID: b03e5c944414cff1cf2b17dd77434943c7c65ed34fc496e3ce839834ae763251
                                    • Instruction ID: fdaa2fb25cf05a2213b49bd8640ee482f1167bf6c5f83201068bca996552bf0f
                                    • Opcode Fuzzy Hash: b03e5c944414cff1cf2b17dd77434943c7c65ed34fc496e3ce839834ae763251
                                    • Instruction Fuzzy Hash: 8C8151B1D04248DFCB18DF94C890BAEBBB1BF44304F14C1BAE516AB285D7349A85DF59
                                    APIs
                                      • Part of subcall function 100013E0: VirtualFree.KERNELBASE(?,00000000,00008000,?,10002247,?,?,?,?,?,10005D0E,?,0000022C), ref: 100013F2
                                    • ??2@YAPAXI@Z.MSVCRT(?,?,?,?,?,?,10005D0E,?,0000022C), ref: 10002258
                                    • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?), ref: 100022E0
                                    • ??2@YAPAXI@Z.MSVCRT(?,00000000,00000000,?), ref: 100022EA
                                    • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,?,00000003,?,?,10005D0E,?,0000022C), ref: 1000232C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ??2@??3@$FreeVirtual
                                    • String ID:
                                    • API String ID: 1650017971-0
                                    • Opcode ID: c5e5d27ccef60cc8be74dcaa34ac63e01c33774272376b1c3775be7e886e16a8
                                    • Instruction ID: d3fa48762b05b9e9323a2ca31b24d982332920f663e6929492fff3a8368ba7d1
                                    • Opcode Fuzzy Hash: c5e5d27ccef60cc8be74dcaa34ac63e01c33774272376b1c3775be7e886e16a8
                                    • Instruction Fuzzy Hash: 5831D9793443041BE704DE648852B6FB3D9EFC86D0F44092CF94A57386DAB4BE088795
                                    APIs
                                    • wsprintfA.USER32 ref: 100039A4
                                    • lstrlenA.KERNEL32(?,00000000), ref: 100039B7
                                      • Part of subcall function 10008A30: LoadLibraryA.KERNEL32(ADVAPI32.dll,00000000,?,00000000,?,1000B800,1000C368,000000FF), ref: 10008A5F
                                      • Part of subcall function 10008A30: GetProcAddress.KERNEL32(00000000,RegCreateKeyExA), ref: 10008A76
                                      • Part of subcall function 10008A30: GetProcAddress.KERNEL32(00000000,RegSetValueExA), ref: 10008A81
                                      • Part of subcall function 10008A30: GetProcAddress.KERNEL32(00000000,RegDeleteKeyA), ref: 10008A8C
                                      • Part of subcall function 10008A30: GetProcAddress.KERNEL32(00000000,RegDeleteValueA), ref: 10008A97
                                      • Part of subcall function 10008A30: GetProcAddress.KERNEL32(00000000,RegOpenKeyExA), ref: 10008AA2
                                      • Part of subcall function 10008A30: GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 10008AAC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$LibraryLoadlstrlenwsprintf
                                    • String ID: Clore$SYSTEM\Clore
                                    • API String ID: 2349312171-3032097531
                                    • Opcode ID: 66a52a2ed3d64cd27f1ec8e0d28a8f3c72f2030accc327ee81c9046f3cd0c22d
                                    • Instruction ID: 820f47de7e5b7802a1b7fb9489fe39e42b639f32d9662c75ebce772ce3c5df1f
                                    • Opcode Fuzzy Hash: 66a52a2ed3d64cd27f1ec8e0d28a8f3c72f2030accc327ee81c9046f3cd0c22d
                                    • Instruction Fuzzy Hash: BFF0B4361052107BE3109758CC05BE7BF98EF88340F804839F745A61A2E674A25886A7
                                    APIs
                                    • CloseServiceHandle.ADVAPI32(00000000,10007ABA), ref: 10007ADE
                                    • CloseServiceHandle.ADVAPI32(00000000,10007ABA), ref: 10007AE9
                                    • RegCloseKey.ADVAPI32(?,10007ABA), ref: 10007AFA
                                    • Sleep.KERNEL32(000001F4,10007ABA), ref: 10007B05
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Close$HandleService$Sleep
                                    • String ID:
                                    • API String ID: 994006413-0
                                    • Opcode ID: 9a0e4b5660d2efa5304ec43b3332a1052fa86b0f6711dbbd10502f37b2f495ea
                                    • Instruction ID: 65ac2dfc12c58c512becd3c8d3c7521bc5e031c31c44808cc6bb81eec709054b
                                    • Opcode Fuzzy Hash: 9a0e4b5660d2efa5304ec43b3332a1052fa86b0f6711dbbd10502f37b2f495ea
                                    • Instruction Fuzzy Hash: D5E0EC30A013249BF641E7608CC8A6E3665F749FC57900954F0469105CCB384840CA91
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __aulldiv__aullrem
                                    • String ID: 9
                                    • API String ID: 3839614884-2366072709
                                    • Opcode ID: 958e21a9cd15d81a582a1124451a163dff5f3f1bc1b0f61a0603cc9cafd4b8c8
                                    • Instruction ID: 8d03bc6037125a3e2ecd1e752aa0f73b5bcd253a9f613774c54d6ac970b2668f
                                    • Opcode Fuzzy Hash: 958e21a9cd15d81a582a1124451a163dff5f3f1bc1b0f61a0603cc9cafd4b8c8
                                    • Instruction Fuzzy Hash: E3410671D09219CBDF24DF69C9897AAB7B5BB44304F2082EAE44DB7280D7399E85CF44
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __aulldiv__aullrem_get_int_arg
                                    • String ID: 9
                                    • API String ID: 1225292562-2366072709
                                    • Opcode ID: 98a172039d4150e514bc1a3f41f0bf78351ae1e9735974a3cb1e126cc2fe2e54
                                    • Instruction ID: ad62f49ec76c792fb98bffde15ed811b684334197f234f1b984b84098178ec9f
                                    • Opcode Fuzzy Hash: 98a172039d4150e514bc1a3f41f0bf78351ae1e9735974a3cb1e126cc2fe2e54
                                    • Instruction Fuzzy Hash: A641F771D09229CBDF24DF69C9887A9B7B5BB44304F2082EAE40DB7284D7395E85CF45
                                    APIs
                                    • RegOpenKeyExA.ADVAPI32(80000002,?,00000000,000F003F,?), ref: 10007BA8
                                    Strings
                                    • Rsssqi yqeaiusa, xrefs: 10007B6A
                                    • SYSTEM\CurrentControlSet\Services\, xrefs: 10007B42
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Open
                                    • String ID: Rsssqi yqeaiusa$SYSTEM\CurrentControlSet\Services\
                                    • API String ID: 71445658-3799923235
                                    • Opcode ID: 3985fd40b17addd00207b7d41fbee87c9d65ff839c7e0df91eb3abc1b4b84038
                                    • Instruction ID: caae09da150ae1ca5f385957c9647905fb565e9fad3fc4eeec72bee49261548c
                                    • Opcode Fuzzy Hash: 3985fd40b17addd00207b7d41fbee87c9d65ff839c7e0df91eb3abc1b4b84038
                                    • Instruction Fuzzy Hash: 7801C4322186041BD718C97CD855AAB7AC6EBD4270F640B3EBA67C71C0DEE4890D8191
                                    APIs
                                    • GetCurrentProcess.KERNEL32(?), ref: 00404816
                                    • TerminateProcess.KERNEL32(00000000), ref: 0040481D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$CurrentTerminate
                                    • String ID: +"
                                    • API String ID: 2429186680-1193355281
                                    • Opcode ID: 9ce8f4ce1f2a35572cf061478f595c7c9687750fc7816b2635dd6978b9cb1d89
                                    • Instruction ID: 7f03d689e6a001cce194c690d092f6444c184fc11b58b80f7bcd927e96ccf4d7
                                    • Opcode Fuzzy Hash: 9ce8f4ce1f2a35572cf061478f595c7c9687750fc7816b2635dd6978b9cb1d89
                                    • Instruction Fuzzy Hash: B91121B5D00244DBDB10EFA5ED057A937A1BB85305F208576EA01626E2C7789A88CB5A
                                    APIs
                                    • TerminateThread.KERNEL32(?,000000FF,00000000,?,00000000,1F901F90,1000676D), ref: 10003AE6
                                    • CloseHandle.KERNEL32 ref: 10003AEB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandleTerminateThread
                                    • String ID: .Wu
                                    • API String ID: 2476175854-3424199868
                                    • Opcode ID: ecf0781d584861efdefd12e0d0dc3ad8a7dd559ffa829062700c37be060fd4fc
                                    • Instruction ID: f8fafb5c612ae70fb252c92c9e28510685fa6dd80ed7e1ba4b18f47684ddcb9f
                                    • Opcode Fuzzy Hash: ecf0781d584861efdefd12e0d0dc3ad8a7dd559ffa829062700c37be060fd4fc
                                    • Instruction Fuzzy Hash: E8F039763003259BEB14DFAEDCD0D5BB3A9EF856A07110536EE55D724ECE31A8418A24
                                    APIs
                                      • Part of subcall function 10008140: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,75571760,00000000,00000000,00000000,00000000), ref: 1000815C
                                      • Part of subcall function 10008140: _beginthreadex.MSVCRT ref: 10008184
                                      • Part of subcall function 10008140: WaitForSingleObject.KERNEL32(?,000000FF), ref: 10008196
                                      • Part of subcall function 10008140: CloseHandle.KERNEL32(?), ref: 100081A1
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,?,?,?,10007E87,?,?,?,?,?,?), ref: 100067BF
                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,10007E87,?,?,?,?,?,?,?), ref: 100067C6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2652091238.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000000.00000002.2652056131.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652124873.000000001000C000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000000.00000002.2652139468.0000000010011000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_10000000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandleObjectSingleWait$CreateEvent_beginthreadex
                                    • String ID: .Wu
                                    • API String ID: 1089044457-3424199868
                                    • Opcode ID: c094c382bb003335e962e14bba7ae2994990265d9fc6328f3f8a97f6cffa9aac
                                    • Instruction ID: 977c1e53b05c9923654f862d4e07a1a1af9861af21d07574cdd5dbfdf25decf7
                                    • Opcode Fuzzy Hash: c094c382bb003335e962e14bba7ae2994990265d9fc6328f3f8a97f6cffa9aac
                                    • Instruction Fuzzy Hash: 6ED0C93568573036F17127196C4BFCA25049B07FA1F340250FB14BD2DADA94394242AE
                                    APIs
                                    • HeapReAlloc.KERNEL32(006B0000,00000000,00000000,-00000010,?,?,00407B27), ref: 00407F4D
                                    • HeapAlloc.KERNEL32(006B0000,00000008,000041C4,?,?,00407B27), ref: 00407F9C
                                    • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004,?,00407B27), ref: 00407FC3
                                    • HeapFree.KERNEL32(006B0000,00000000,00000000,?,00407B27), ref: 00407FE8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocHeap$FreeVirtual
                                    • String ID:
                                    • API String ID: 3499195154-0
                                    • Opcode ID: 1427f94a1975e0d4b451b94547360274fd9ed767bead6ab8e95d48f53152bf47
                                    • Instruction ID: cfca7ecdcb1c783ca09ebc5a15e7acdf923e519563a376cf1469654e27d81cbf
                                    • Opcode Fuzzy Hash: 1427f94a1975e0d4b451b94547360274fd9ed767bead6ab8e95d48f53152bf47
                                    • Instruction Fuzzy Hash: B03138B4A40204EFC704DF58D994B1AB7B1FB48315F2086B8E105AB392C772EE05DB4A
                                    APIs
                                    • InitializeCriticalSection.KERNEL32(0045DC90), ref: 00403439
                                    • InitializeCriticalSection.KERNEL32(0045DCC0), ref: 00403446
                                    • InitializeCriticalSection.KERNEL32(0045DCA8), ref: 00403453
                                    • InitializeCriticalSection.KERNEL32(0045DC78), ref: 0040345F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2650353946.0000000000401000.00000080.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000000.00000002.2650340456.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650367446.000000000040F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650378798.0000000000410000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650394770.0000000000411000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650416735.000000000045A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650428711.000000000045D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650565114.000000000045F000.00000040.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650578256.0000000000464000.00000080.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.0000000000467000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    • Associated: 00000000.00000002.2650590503.000000000046E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_400000_aQ7bSXduYp.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalInitializeSection
                                    • String ID:
                                    • API String ID: 32694325-0
                                    • Opcode ID: 5f1b8555b0a628452610dbccf8852f53c226535e74953eadea85dfe7828eb152
                                    • Instruction ID: ed7a8e8709a4d8ce4fb65f0a5350aeeb54ef97483a5e59ea8638f4d556142151
                                    • Opcode Fuzzy Hash: 5f1b8555b0a628452610dbccf8852f53c226535e74953eadea85dfe7828eb152
                                    • Instruction Fuzzy Hash: C2D0B7B65223049FC614ABA4FD4C956377DB74C64E3048634F50593622CB35E416CB5A